{"id":"https://openalex.org/W2095519402","doi":"https://doi.org/10.1016/s0167-4048(98)80010-2","title":"A conceptual framework for information security management","display_name":"A conceptual framework for information security management","publication_year":1998,"publication_date":"1998-01-01","ids":{"openalex":"https://openalex.org/W2095519402","doi":"https://doi.org/10.1016/s0167-4048(98)80010-2","mag":"2095519402"},"language":"en","primary_location":{"id":"doi:10.1016/s0167-4048(98)80010-2","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s0167-4048(98)80010-2","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081918295","display_name":"Thomas Finne","orcid":null},"institutions":[{"id":"https://openalex.org/I130217899","display_name":"\u00c5bo Akademi University","ror":"https://ror.org/029pk6x14","country_code":"FI","type":"education","lineage":["https://openalex.org/I130217899"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Thomas Finne","raw_affiliation_strings":["Institute for Advanced Management Systems Research (IAMSR), \u00c5bo Akademi University, Lemmink\u00e4inengatan 14A, DataCity, 0520 \u00c5bo, Finland","Institute for Advanced Management Systems Research (IAMSR), \u00c5bo Akademi University, Lemmink\u00e4inengatan 14A, DataCity, 0520 \u00c5bo, Finland#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute for Advanced Management Systems Research (IAMSR), \u00c5bo Akademi University, Lemmink\u00e4inengatan 14A, DataCity, 0520 \u00c5bo, Finland","institution_ids":["https://openalex.org/I130217899"]},{"raw_affiliation_string":"Institute for Advanced Management Systems Research (IAMSR), \u00c5bo Akademi University, Lemmink\u00e4inengatan 14A, DataCity, 0520 \u00c5bo, Finland#TAB#","institution_ids":["https://openalex.org/I130217899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5081918295"],"corresponding_institution_ids":["https://openalex.org/I130217899"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.26404583,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"17","issue":"4","first_page":"303","last_page":"307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9602000117301941,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9165999889373779,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.6611253023147583},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5777368545532227},{"id":"https://openalex.org/keywords/conceptual-framework","display_name":"Conceptual framework","score":0.5486024022102356},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5004227161407471},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4965279698371887},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.48251578211784363},{"id":"https://openalex.org/keywords/stakeholder","display_name":"Stakeholder","score":0.4671007990837097},{"id":"https://openalex.org/keywords/conceptual-model","display_name":"Conceptual model","score":0.4490334987640381},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.423937052488327},{"id":"https://openalex.org/keywords/officer","display_name":"Officer","score":0.4119533896446228},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3972052335739136},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.29678916931152344},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2935444712638855},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1783478558063507},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.17355316877365112},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.1706390082836151},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.14572501182556152},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.09713354706764221},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.09459388256072998},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.0899498462677002}],"concepts":[{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.6611253023147583},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5777368545532227},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.5486024022102356},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5004227161407471},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4965279698371887},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.48251578211784363},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.4671007990837097},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.4490334987640381},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.423937052488327},{"id":"https://openalex.org/C2777189325","wikidata":"https://www.wikidata.org/wiki/Q61022630","display_name":"Officer","level":2,"score":0.4119533896446228},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3972052335739136},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.29678916931152344},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2935444712638855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1783478558063507},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.17355316877365112},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.1706390082836151},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.14572501182556152},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.09713354706764221},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.09459388256072998},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0899498462677002},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/s0167-4048(98)80010-2","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s0167-4048(98)80010-2","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W14976145","https://openalex.org/W1165602552","https://openalex.org/W1551281565","https://openalex.org/W1592189357","https://openalex.org/W2044406111","https://openalex.org/W2087638870","https://openalex.org/W2125165528","https://openalex.org/W2972163492","https://openalex.org/W3202854387","https://openalex.org/W4213079637","https://openalex.org/W4237698691"],"related_works":["https://openalex.org/W2988685731","https://openalex.org/W1489775241","https://openalex.org/W2014166370","https://openalex.org/W4283079098","https://openalex.org/W1998571523","https://openalex.org/W2336971988","https://openalex.org/W1512740566","https://openalex.org/W2106349751","https://openalex.org/W2515859451","https://openalex.org/W2121665040"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
