{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:14:56Z","timestamp":1764897296043,"version":"3.46.0"},"reference-count":0,"publisher":"Canadian Center of Science and Education","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CIS"],"DOI":"10.5539\/cis.v4n1p72","type":"journal-article","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T02:37:43Z","timestamp":1400035063000},"source":"Crossref","is-referenced-by-count":3,"title":["Presenting a Model for Ranking Organizations Based on the Level of the Information Security Maturity"],"prefix":"10.5539","volume":"4","author":[{"given":"Abbas Toloie","family":"Eshlaghy","sequence":"first","affiliation":[]},{"given":"Alireza","family":"Pourebrahimi","sequence":"additional","affiliation":[]},{"given":"Babak Zendehdel","family":"Nobari","sequence":"additional","affiliation":[]}],"member":"3486","published-online":{"date-parts":[[2011,12,19]]},"container-title":["Computer and Information Science"],"original-title":[],"link":[{"URL":"https:\/\/www.ccsenet.org\/journal\/index.php\/CIS\/article\/download\/8826\/6475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:12:20Z","timestamp":1764897140000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.ccsenet.org\/journal\/index.php\/cis\/article\/view\/8826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,19]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2010,12,20]]}},"URL":"https:\/\/doi.org\/10.5539\/cis.v4n1p72","relation":{},"ISSN":["1913-8997","1913-8989"],"issn-type":[{"type":"electronic","value":"1913-8997"},{"type":"print","value":"1913-8989"}],"subject":[],"published":{"date-parts":[[2011,12,19]]}}}