{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:41:37Z","timestamp":1730342497034,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.23919\/cisti.2017.7976036","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T16:47:59Z","timestamp":1499964479000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Results of information systems planning: Articulation between vision, goals and policies"],"prefix":"10.23919","author":[{"given":"Isabel Maria","family":"Lopes","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-878289-78-0.ch002"},{"journal-title":"Information Security Policies Made Easy","year":"1999","author":"wood","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-21555-3"},{"key":"ref11","first-page":"107","article-title":"A Study of Legitimacy as a Social Dimension of Organizational Information Systems","author":"banville","year":"1991","journal-title":"Information Systems Research Contemporary Approaches & Emergent Traditions"},{"journal-title":"A Sociedade da Informa&#x00E7;&#x00E3;o e do Conhecimento Um Desafio Epistemol&#x00F3;gico nos Sistemas de Informa&#x00E7;&#x00E3;o","year":"2000","author":"coelho","key":"ref12"},{"journal-title":"Strategic Planning for Information Systems","year":"1990","author":"ward","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0024-6301(91)90251-I"},{"journal-title":"Developing an Information Security Policy","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00504-7"},{"journal-title":"Office of Information Technology Information Security Guidelines for NSW Government Agencies","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/09685229910292817"},{"journal-title":"Secrets and Lies Digital Security in a Networked World","year":"2000","author":"schneier","key":"ref19"},{"journal-title":"Adop&#x00E7;&#x00E3;o de Pol&#x00ED;ticas de Seguran&#x00E7;a de Sistemas de Informa&#x00E7;&#x00E3;o na Administra&#x00E7;&#x00E3;o P&#x00FA;blica Local em Portugal","year":"2012","author":"lopes","key":"ref28"},{"key":"ref4","article-title":"The Management of Information Systems","author":"dickson","year":"1985","journal-title":"International student edition"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.09.009"},{"journal-title":"PRAXIS Um Referencial para o Planeamento de Sistemas de Informa&#x00E7;&#x00E3;o","year":"1994","author":"amaral","key":"ref3"},{"journal-title":"Strategic Planning for Information Systems","year":"2002","author":"ward","key":"ref6"},{"journal-title":"Managing Information Security A Program for the Electronic Information Age","year":"1982","author":"schweitzer","key":"ref29"},{"key":"ref5","first-page":"223","article-title":"Information Systems Planning in the United Kingdom and Australia - A comparison of current practice","volume":"4","author":"galliers","year":"1987","journal-title":"Oxford Surveys in Information Technology"},{"key":"ref8","first-page":"259","article-title":"Information System? Which One Do You Mean?","author":"carvalho","year":"1999","journal-title":"ISCO 4 - Information Systems Concepts An Integrated Discipline Emerging"},{"journal-title":"La th&#x00E9;orie du syst&#x00E8;me general - Th&#x00E9;orie de la mod&#x00E9;lisation&#x201D; 3 Edition na Vers&#x00E3;o Portuguesa &#x201C;A Teoria do Sistema Geral","year":"1990","author":"le moigne","key":"ref7"},{"journal-title":"Planeamento Estrat&#x00E9;gico de Sistemas de Informa&#x00E7;&#x00E3;o","year":"2007","author":"vicente","key":"ref2"},{"key":"ref9","article-title":"Information Systems Curriculum: A basis for course design","author":"buckingham","year":"1997","journal-title":"Information systems education recommendations and implementation"},{"journal-title":"Resultados do Planeamento de Sistemas de Informa&#x00E7;&#x00E3;o","year":"1998","author":"de s\u00e1-soares","key":"ref1"},{"journal-title":"Security Architecture Design Deployment and Operations","year":"2001","author":"king","key":"ref20"},{"key":"ref22","first-page":"917","article-title":"Information Security Policies from the Ground Up","author":"shorten","year":"2004","journal-title":"Information Security Management Handbook"},{"journal-title":"Information Security Policies Procedures and Standards Guidelines for Effective Information Security Management","year":"2002","author":"peltier","key":"ref21"},{"key":"ref24","first-page":"22","article-title":"The Influence of Information Security Policies on Information Security Culture: Illustrated through a Case Study","author":"da veiga","year":"2015","journal-title":"Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)"},{"journal-title":"Security Policy Roadmap - Process for Creating Security Policies","year":"2001","author":"kee","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-14454-9"},{"journal-title":"Interpreta&#x00E7;&#x00E3;o da Seguran&#x00E7;a de Sistemas de Informa&#x00E7;&#x00E3;o Segundo a Teoria da Ac&#x00E7;&#x00E3;o","year":"2005","author":"de s\u00e1-soares","key":"ref25"}],"event":{"name":"2017 12th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2017,6,21]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2017,6,24]]}},"container-title":["2017 12th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7966453\/7975671\/07976036.pdf?arnumber=7976036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T11:40:11Z","timestamp":1502883611000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7976036\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/cisti.2017.7976036","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}