{"id":"https://openalex.org/W1498505227","doi":"https://doi.org/10.1007/978-3-8348-9283-6_2","title":"Information Security Status in Organisations 2008","display_name":"Information Security Status in Organisations 2008","publication_year":2009,"publication_date":"2009-03-06","ids":{"openalex":"https://openalex.org/W1498505227","doi":"https://doi.org/10.1007/978-3-8348-9283-6_2","mag":"1498505227"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-8348-9283-6_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_2","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070687879","display_name":"Anas Tawileh","orcid":null},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Anas Tawileh","raw_affiliation_strings":["School of Computer Science, Cardiff University, 5 The Parade, Cardiff, CF24 3AA, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Cardiff University, 5 The Parade, Cardiff, CF24 3AA, UK","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056179669","display_name":"J. Hilton","orcid":"https://orcid.org/0000-0003-1462-2399"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jeremy Hilton","raw_affiliation_strings":["School of Computer Science, Cardiff University, 5 The Parade, Cardiff, CF24 3AA, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Cardiff University, 5 The Parade, Cardiff, CF24 3AA, UK","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007282378","display_name":"Stephen McIntosh","orcid":null},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Stephen McIntosh","raw_affiliation_strings":["School of Computer Science, Cardiff University, 5 The Parade, Cardiff, CF24 3AA, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Cardiff University, 5 The Parade, Cardiff, CF24 3AA, UK","institution_ids":["https://openalex.org/I79510175"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070687879"],"corresponding_institution_ids":["https://openalex.org/I79510175"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0875208,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"20","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13497","display_name":"Hermeneutics and Narrative Identity","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1211","display_name":"Philosophy"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13497","display_name":"Hermeneutics and Narrative Identity","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1211","display_name":"Philosophy"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13695","display_name":"Aging, Elder Care, and Social Issues","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/3600","display_name":"General Health Professions"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T13099","display_name":"Health, Medicine and Society","score":0.95660001039505,"subfield":{"id":"https://openalex.org/subfields/3600","display_name":"General Health Professions"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4295557737350464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3601415455341339},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.34952646493911743},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3320842385292053}],"concepts":[{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4295557737350464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3601415455341339},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.34952646493911743},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3320842385292053}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-8348-9283-6_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_2","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:19604","is_oa":false,"landing_page_url":"https://orca.cardiff.ac.uk/19604/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1970541644","https://openalex.org/W2021387376","https://openalex.org/W2038078648","https://openalex.org/W4240766441"],"related_works":["https://openalex.org/W1985421586","https://openalex.org/W123137085","https://openalex.org/W2473783875","https://openalex.org/W2577075070","https://openalex.org/W2340064104","https://openalex.org/W1915510559","https://openalex.org/W2953848394","https://openalex.org/W178971067","https://openalex.org/W1597982698","https://openalex.org/W1535929991","https://openalex.org/W2604369503","https://openalex.org/W208574602","https://openalex.org/W2152134089","https://openalex.org/W3171446130","https://openalex.org/W2399440312","https://openalex.org/W2502313493","https://openalex.org/W3026144538","https://openalex.org/W1916953309","https://openalex.org/W2617725625","https://openalex.org/W2247162596"],"abstract_inverted_index":{"This":[0],"paper":[1,97],"presents":[2],"the":[3,6,63,92,103,111],"results":[4,105],"of":[5,62,65,102,114],"latest":[7],"survey":[8,76,104],"on":[9,21],"information":[10,26,66],"security":[11,27,67,124],"management":[12],"and":[13,36,50,89,106,127],"pracitces":[14],"in":[15,117],"organisations.":[16],"The":[17,75,96],"study":[18],"is":[19],"based":[20],"a":[22,58,100],"holistic":[23],"approach":[24],"to":[25,33,54,84,91],"that":[28,119],"does":[29],"not":[30],"confine":[31],"itself":[32],"technical":[34],"measures":[35],"technology":[37],"implementations,":[38],"but":[39],"encompasses":[40],"other":[41],"equally":[42],"important":[43],"aspects":[44],"such":[45],"as":[46],"human,":[47],"social,":[48],"motiviational":[49],"trust.":[51],"In":[52],"order":[53],"achieve":[55],"this":[56,81],"purpose,":[57],"comprehensive":[59],"intellectual":[60],"framework":[61],"concepts":[64],"using":[68],"Soft":[69],"Systems":[70],"Methodology":[71],"(SSM)":[72],"was":[73],"utilised.":[74],"questions":[77],"were":[78],"drived":[79],"from":[80],"conceptual":[82],"model":[83],"ensure":[85],"their":[86],"coherence,":[87],"completeness":[88],"relevance":[90],"topic":[93],"being":[94],"addressed.":[95],"concludes":[98],"with":[99],"discussion":[101],"draws":[107],"significant":[108],"insight":[109],"into":[110],"existing":[112],"status":[113],"informaiton":[115],"assurance":[116],"organisations":[118],"could":[120],"be":[121],"useful":[122],"for":[123],"practitioners,":[125],"researchers":[126],"managers.":[128]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
