{"id":"https://openalex.org/W1999741571","doi":"https://doi.org/10.1080/10658980701746478","title":"Holistic Information Security: ISO 27001 and Due Care","display_name":"Holistic Information Security: ISO 27001 and Due Care","publication_year":2007,"publication_date":"2007-11-20","ids":{"openalex":"https://openalex.org/W1999741571","doi":"https://doi.org/10.1080/10658980701746478","mag":"1999741571"},"language":"en","primary_location":{"id":"doi:10.1080/10658980701746478","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10658980701746478","pdf_url":null,"source":{"id":"https://openalex.org/S20257531","display_name":"Information Systems Security","issn_l":"1065-898X","issn":["1065-898X","1934-869X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Systems Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022658745","display_name":"Edward H. Freeman","orcid":null},"institutions":[{"id":"https://openalex.org/I162281398","display_name":"University of Hartford","ror":"https://ror.org/034gcgd08","country_code":"US","type":"education","lineage":["https://openalex.org/I162281398"]},{"id":"https://openalex.org/I4401726811","display_name":"Hartford Financial Services (United States)","ror":"https://ror.org/00mwq1g96","country_code":null,"type":"company","lineage":["https://openalex.org/I4401726811"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Edward H. Freeman","raw_affiliation_strings":["Educational Consultant , West Hartford, CT, USA","Educational Consultant, West Hartford, CT, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Educational Consultant , West Hartford, CT, USA","institution_ids":["https://openalex.org/I162281398","https://openalex.org/I4401726811"]},{"raw_affiliation_string":"Educational Consultant, West Hartford, CT, USA#TAB#","institution_ids":["https://openalex.org/I162281398","https://openalex.org/I4401726811"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5022658745"],"corresponding_institution_ids":["https://openalex.org/I162281398","https://openalex.org/I4401726811"],"apc_list":null,"apc_paid":null,"fwci":0.7913,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.83195731,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"16","issue":"5","first_page":"291","last_page":"294"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5590782165527344},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.546271800994873},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5261159539222717},{"id":"https://openalex.org/keywords/information-systems-security","display_name":"Information systems security","score":0.5174391865730286},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4176989197731018},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.2913967967033386},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.27094677090644836},{"id":"https://openalex.org/keywords/management-information-systems","display_name":"Management information systems","score":0.17987903952598572},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.10418060421943665}],"concepts":[{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5590782165527344},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.546271800994873},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5261159539222717},{"id":"https://openalex.org/C2988319471","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information systems security","level":4,"score":0.5174391865730286},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4176989197731018},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.2913967967033386},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.27094677090644836},{"id":"https://openalex.org/C29848774","wikidata":"https://www.wikidata.org/wiki/Q61905","display_name":"Management information systems","level":3,"score":0.17987903952598572},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.10418060421943665},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/10658980701746478","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10658980701746478","pdf_url":null,"source":{"id":"https://openalex.org/S20257531","display_name":"Information Systems Security","issn_l":"1065-898X","issn":["1065-898X","1934-869X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Systems Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W657731981","https://openalex.org/W1967562459","https://openalex.org/W2495036708","https://openalex.org/W3121795612","https://openalex.org/W4205863354"],"related_works":["https://openalex.org/W4240303192","https://openalex.org/W3180980481","https://openalex.org/W2045270467","https://openalex.org/W3030809641","https://openalex.org/W2001689082","https://openalex.org/W4293560903","https://openalex.org/W2128120947","https://openalex.org/W2354187990","https://openalex.org/W2383215107","https://openalex.org/W2366471546"],"abstract_inverted_index":{"\u201cThe":[0],"only":[1],"truly":[2],"secure":[3],"system":[4],"is":[5,8],"one":[6],"that":[7],"powered":[9],"off,":[10],"cast":[11],"in":[12,19],"a":[13,20],"block":[14],"of":[15,35],"concrete":[16],"and":[17],"sealed":[18],"lead-lined":[21],"room":[22],"with":[23],"armed":[24],"guards\u2014and":[25],"even":[26],"then":[27],"I":[28],"have":[29],"my":[30],"doubts.\u201d":[31],"\u2014Gene":[32],"Spafford,":[33],"Professor":[34],"Computer":[36],"Science,":[37],"Purdue":[38],"University":[39]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-02-25T21:11:00.739837","created_date":"2025-10-10T00:00:00"}
