{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:27Z","timestamp":1750306527749,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,27]],"date-time":"2014-10-27T00:00:00Z","timestamp":1414368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,27]]},"DOI":"10.1145\/2691195.2691275","type":"proceedings-article","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T14:15:23Z","timestamp":1425392123000},"page":"500-501","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Security metrics to evaluate organizational IT security"],"prefix":"10.1145","author":[{"given":"Teresa","family":"Pereira","sequence":"first","affiliation":[{"name":"Polytechnic Institute of Viana do Castelo, Viana do Castelo, Portugal"}]},{"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[{"name":"University of Minho, Guimar\u00e3es, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2014,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ashford W. (2011). Security Think Tank: How can businesses measure the effectiveness of their IT security teams?{on-line}. ComputerWeekly.com. Available from: http:\/\/www.computerweekly.com\/feature\/Security-Think-Tank-How-can-businesses-measure-the-effectiveness-of-their-IT-security-teams. {Accessed January 2014}.  Ashford W. (2011). Security Think Tank: How can businesses measure the effectiveness of their IT security teams? {on-line}. ComputerWeekly.com. Available from: http:\/\/www.computerweekly.com\/feature\/Security-Think-Tank-How-can-businesses-measure-the-effectiveness-of-their-IT-security-teams. {Accessed January 2014}."},{"key":"e_1_3_2_1_2_1","unstructured":"ISO\/IEC_JTC1 2009a. ISO\/IEC FDIS 27000 Information Technology - Security Techniques - Information Security Management Systems - Overview and Vocabulary. ISO copyright office: Geneva Switzerland.  ISO\/IEC_JTC1 2009a. ISO\/IEC FDIS 27000 Information Technology - Security Techniques - Information Security Management Systems - Overview and Vocabulary. ISO copyright office: Geneva Switzerland."},{"key":"e_1_3_2_1_3_1","unstructured":"Pagett J. Ng S. (2010). Improving Residual Risk Management Through the Use of Security Metrics {on-line}. Royal Holloway Series 2010. Available from: http:\/\/cdn.ttgtmedia.com\/searchSecurityUK\/downloads\/RHUL_Pagett_v2.pdf. {Accessed January 2014}.  Pagett J. Ng S. (2010). Improving Residual Risk Management Through the Use of Security Metrics {on-line}. Royal Holloway Series 2010. Available from: http:\/\/cdn.ttgtmedia.com\/searchSecurityUK\/downloads\/RHUL_Pagett_v2.pdf. {Accessed January 2014}."},{"key":"e_1_3_2_1_4_1","unstructured":"Pel\u00e1ez M. H. S. (2010). Measuring effectiveness in Information Security Controls {on-line}. SANS Institute InfoSec Reading Room. Available from: http:\/\/www.sans.org\/reading-room\/whitepapers\/basics\/measuring-effectiveness-information-security-controls-33398. {Accessed January 2014}.  Pel\u00e1ez M. H. S. (2010). Measuring effectiveness in Information Security Controls {on-line}. SANS Institute InfoSec Reading Room. Available from: http:\/\/www.sans.org\/reading-room\/whitepapers\/basics\/measuring-effectiveness-information-security-controls-33398. {Accessed January 2014}."},{"key":"e_1_3_2_1_5_1","unstructured":"Pereira T. 2012. Conceptual Framework to Support Information Security Risk Management. Doctoral Thesis. University of Minho.  Pereira T. 2012. Conceptual Framework to Support Information Security Risk Management. Doctoral Thesis. University of Minho."}],"event":{"name":"ICEGOV2014: 8th International Conference on Theory and Practice of Electronic Governance","sponsor":["Macao Foundation, Macao SAR Govt Macao Foundation, Macao SAR Government","Municipio de Guimar\u00e3es Municipio de Guimar\u00e3es"],"location":"Guimaraes Portugal","acronym":"ICEGOV2014"},"container-title":["Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2691195.2691275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2691195.2691275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:08Z","timestamp":1750227128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2691195.2691275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,27]]},"references-count":5,"alternative-id":["10.1145\/2691195.2691275","10.1145\/2691195"],"URL":"https:\/\/doi.org\/10.1145\/2691195.2691275","relation":{},"subject":[],"published":{"date-parts":[[2014,10,27]]},"assertion":[{"value":"2014-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}