{"id":"https://openalex.org/W2047039064","doi":"https://doi.org/10.1016/0167-4048(96)88941-3","title":"The information security chain in a company","display_name":"The information security chain in a company","publication_year":1996,"publication_date":"1996-01-01","ids":{"openalex":"https://openalex.org/W2047039064","doi":"https://doi.org/10.1016/0167-4048(96)88941-3","mag":"2047039064"},"language":"en","primary_location":{"id":"doi:10.1016/0167-4048(96)88941-3","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(96)88941-3","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081918295","display_name":"Thomas Finne","orcid":null},"institutions":[{"id":"https://openalex.org/I130217899","display_name":"\u00c5bo Akademi University","ror":"https://ror.org/029pk6x14","country_code":"FI","type":"education","lineage":["https://openalex.org/I130217899"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Thomas Finne","raw_affiliation_strings":["Institute for Advanced Management Systems Research (IAMSR), \u00c5bo Akademi University, Lemmink\u00e4inengatan 14A, DataCity, 20520 \u00c5bo, Finland","Institute for Advanced Management Systems Research (IAMSR), \u00c5bo Akademi University, Lemmink\u00e4inengatan 14A, DataCity, 20520 \u00c5bo, Finland#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute for Advanced Management Systems Research (IAMSR), \u00c5bo Akademi University, Lemmink\u00e4inengatan 14A, DataCity, 20520 \u00c5bo, Finland","institution_ids":["https://openalex.org/I130217899"]},{"raw_affiliation_string":"Institute for Advanced Management Systems Research (IAMSR), \u00c5bo Akademi University, Lemmink\u00e4inengatan 14A, DataCity, 20520 \u00c5bo, Finland#TAB#","institution_ids":["https://openalex.org/I130217899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5081918295"],"corresponding_institution_ids":["https://openalex.org/I130217899"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":null,"fwci":1.7225,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.84557823,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"15","issue":"4","first_page":"297","last_page":"316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13197","display_name":"Spreadsheets and End-User Computing","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13197","display_name":"Spreadsheets and End-User Computing","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11810","display_name":"Complex Systems and Decision Making","score":0.9678999781608582,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9423999786376953,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.672208309173584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6675699949264526},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6348971128463745},{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.5219085216522217},{"id":"https://openalex.org/keywords/chain","display_name":"Chain (unit)","score":0.49166208505630493},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4916155934333801},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.47545120120048523},{"id":"https://openalex.org/keywords/certified-information-security-manager","display_name":"Certified Information Security Manager","score":0.451275497674942},{"id":"https://openalex.org/keywords/standard-of-good-practice","display_name":"Standard of Good Practice","score":0.4397931694984436},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4291859269142151},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.4106849730014801},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3464776277542114},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.32619452476501465},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.28344598412513733},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.127171128988266}],"concepts":[{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.672208309173584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6675699949264526},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6348971128463745},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.5219085216522217},{"id":"https://openalex.org/C199185054","wikidata":"https://www.wikidata.org/wiki/Q552299","display_name":"Chain (unit)","level":2,"score":0.49166208505630493},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4916155934333801},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.47545120120048523},{"id":"https://openalex.org/C180823521","wikidata":"https://www.wikidata.org/wiki/Q1662502","display_name":"Certified Information Security Manager","level":5,"score":0.451275497674942},{"id":"https://openalex.org/C47309137","wikidata":"https://www.wikidata.org/wiki/Q7598357","display_name":"Standard of Good Practice","level":5,"score":0.4397931694984436},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4291859269142151},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4106849730014801},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3464776277542114},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.32619452476501465},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.28344598412513733},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.127171128988266},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/0167-4048(96)88941-3","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(96)88941-3","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W38395155","https://openalex.org/W57571494","https://openalex.org/W83751335","https://openalex.org/W90366506","https://openalex.org/W592449701","https://openalex.org/W607764481","https://openalex.org/W638390775","https://openalex.org/W1136550528","https://openalex.org/W1492856410","https://openalex.org/W1506215424","https://openalex.org/W1526046997","https://openalex.org/W1544824331","https://openalex.org/W1551281565","https://openalex.org/W1592189357","https://openalex.org/W1969043849","https://openalex.org/W1970966581","https://openalex.org/W2010210302","https://openalex.org/W2035087568","https://openalex.org/W2087473807","https://openalex.org/W2087638870","https://openalex.org/W2118441018","https://openalex.org/W2472573380","https://openalex.org/W2491650774","https://openalex.org/W2496569913","https://openalex.org/W2798776846","https://openalex.org/W2904799080","https://openalex.org/W2915213281","https://openalex.org/W3176502092","https://openalex.org/W4205188686","https://openalex.org/W4243570923","https://openalex.org/W4246383935","https://openalex.org/W6603653507","https://openalex.org/W6630394615","https://openalex.org/W6642636773","https://openalex.org/W6642921448","https://openalex.org/W6652935150","https://openalex.org/W6660468472","https://openalex.org/W6672812748","https://openalex.org/W6677391125","https://openalex.org/W6720848570","https://openalex.org/W6723113686","https://openalex.org/W6816655574"],"related_works":["https://openalex.org/W2584162156","https://openalex.org/W2483557577","https://openalex.org/W2056794087","https://openalex.org/W2185133343","https://openalex.org/W3159280571","https://openalex.org/W4289113990","https://openalex.org/W2138802450","https://openalex.org/W2187749057","https://openalex.org/W2356121836","https://openalex.org/W1967972019"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
