{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:50:15Z","timestamp":1725501015594},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744085"},{"type":"electronic","value":"9783540744092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74409-2_25","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T11:57:55Z","timestamp":1187351875000},"page":"228-236","source":"Crossref","is-referenced-by-count":4,"title":["Using the Lens of Circuits of Power in Information Systems Security Management"],"prefix":"10.1007","author":[{"given":"Christos","family":"Fragos","sequence":"first","affiliation":[]},{"given":"Maria","family":"Karyda","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Kiountouzis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/S0305-0483(99)00072-9","volume":"28","author":"C. Avgerou","year":"2000","unstructured":"Avgerou, C.: Information systems: what sort of science is it? Omega\u00a028, 567\u2013579 (2000)","journal-title":"Omega"},{"issue":"6","key":"25_CR2","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1145\/358141.358148","volume":"26","author":"L. Markus","year":"1983","unstructured":"Markus, L.: Power, Politics, and MIS Implementation. Communications of the ACM\u00a026(6), 430\u2013444 (1983)","journal-title":"Communications of the ACM"},{"issue":"6","key":"25_CR3","doi-asserted-by":"crossref","first-page":"294","DOI":"10.17705\/1jais.00041","volume":"4","author":"L. Silva","year":"2003","unstructured":"Silva, L., Backhouse, J.: The Circuits-of-Power Framework for Studying Power in Institutionalization of Information Systems. Journal of the Association for Information Systems\u00a04(6), 294\u2013336 (2003)","journal-title":"Journal of the Association for Information Systems"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1111\/j.1365-2575.2004.00176.x","volume":"14","author":"B. Doolin","year":"2004","unstructured":"Doolin, B.: Power and resistance in the implementation of a medical management information system. Info Systems J.\u00a014, 343\u2013362 (2004)","journal-title":"Info Systems J."},{"issue":"3","key":"25_CR5","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2004.08.011","volume":"24","author":"M. Karyda","year":"2005","unstructured":"Karyda, M., Kiountouzis, E., Kokolakis, S.: Information systems security policies: a contextual perspective. Computers and Security\u00a024(3), 246\u2013260 (2005)","journal-title":"Computers and Security"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1353-4858(02)06011-7","volume":"6","author":"K. Hone","year":"2002","unstructured":"Hone, K., Eloff, J.: What makes an effective security policy? Network and Security\u00a06, 14\u201316 (2002)","journal-title":"Network and Security"},{"key":"25_CR7","unstructured":"Goodwin, B.: Companies are at risk from staff ignorance. Computer Weekly, 00104787, 1\/27\/2004 (2004)"},{"issue":"1","key":"25_CR8","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1287\/isre.2.1.29","volume":"2","author":"R. Hirschheim","year":"1991","unstructured":"Hirschheim, R., Newman, M.: Symbolism and Information Systems Development: Myth, Metaphor and Magic. Information Systems Research\u00a02(1), 29\u201362 (1991)","journal-title":"Information Systems Research"},{"key":"25_CR9","volume-title":"In the age of the smart machine","author":"S. Zuboff","year":"1988","unstructured":"Zuboff, S.: In the age of the smart machine. Basic Books, New York (1988)"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1177\/0038038592026002009","volume":"26","author":"G. Sewell","year":"1992","unstructured":"Sewell, G., Wilkinson, B.: Someone to watch over me: surveillance, discipline and just-in-time labour process. Sociology\u00a026, 271\u2013289 (1992)","journal-title":"Sociology"},{"issue":"6","key":"25_CR11","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1145\/214762.214764","volume":"30","author":"L. Markus","year":"1987","unstructured":"Markus, L., Bjorn-Andersen, N.: Power over users: Its exercise by system professionals. Communications of the ACM\u00a030(6), 498\u2013504 (1987)","journal-title":"Communications of the ACM"},{"issue":"4","key":"25_CR12","doi-asserted-by":"publisher","first-page":"397","DOI":"10.2307\/4132315","volume":"26","author":"J. Jasperson","year":"2002","unstructured":"Jasperson, J., Carte, T., Saunders, C., Butler, B., Croes, H., Zheng, W.: Review: Power and Information Technology Research. MIS Quarterly\u00a026(4), 397\u2013459 (2002)","journal-title":"MIS Quarterly"},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1046\/j.1365-2575.2001.00099.x","volume":"11","author":"G. Dhillon","year":"2001","unstructured":"Dhillon, G., Backhouse, J.: Current directions in IS security research: towards socio-organisational perspectives. Information Systems Journal\u00a0(11), 127\u2013153 (2001)","journal-title":"Information Systems Journal"},{"key":"25_CR14","first-page":"453","volume-title":"The Proceedings of the 16th IFIP International Conference on Information Security (SEC 2001)","author":"M. Karyda","year":"2001","unstructured":"Karyda, M., Kokolakis, S., Kiountouzis, E.: Redefining Information Systems Security: Viable Information Systems. In: The Proceedings of the 16th IFIP International Conference on Information Security (SEC 2001), Paris, France, June 2001, pp. 453\u2013467. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Lipson, H., Fisher, D.: Survivability \u2013 a new technical and business perspective on security. In: The proceedings of the New Security Paradigm Workshop, June 1999, Canada (1999)","DOI":"10.1145\/335169.335187"},{"issue":"7","key":"25_CR16","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/341852.341877","volume":"43","author":"G. Dhillon","year":"2000","unstructured":"Dhillon, G., Backhouse, J.: Information System Security Management in the new Millennium. Communications of the ACM\u00a043(7), 125\u2013128 (2000)","journal-title":"Communications of the ACM"},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1023\/A:1006151900807","volume":"22","author":"L. Introna","year":"1999","unstructured":"Introna, L., Pouloudi, A.: Privacy in the Information Age: Stakeholders, Interests and Values. Journal of Business Ethics\u00a022, 27\u201338 (1999)","journal-title":"Journal of Business Ethics"},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S1361-3723(00)10029-6","volume":"10","author":"C. Wood","year":"2000","unstructured":"Wood, C.: An unappreciated reason why security policies fail. Computer Fraud and Security\u00a010, 13\u201314 (2000)","journal-title":"Computer Fraud and Security"},{"key":"25_CR19","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/0167-4048(87)90066-6","volume":"6","author":"C. Wood","year":"1987","unstructured":"Wood, C.: Information systems security: Management success factors. Computer and Security\u00a06, 314\u2013320 (1987)","journal-title":"Computer and Security"},{"key":"25_CR20","doi-asserted-by":"crossref","DOI":"10.4135\/9781446279267","volume-title":"Frameworks of power","author":"S.R. Clegg","year":"1989","unstructured":"Clegg, S.R.: Frameworks of power. Sage Publications, London (1989)"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Callon, M.: Some elements of sociology of translation: Domestication of the scallops and the fishermen of St Brieuc Bay. In: Law, J. (ed.) Power, Action and Belief, pp. 196\u2013233. Routledge and Kegan Paul, London (1986)","DOI":"10.1111\/j.1467-954X.1984.tb00113.x"},{"key":"25_CR22","volume-title":"Science in Action","author":"B. Latour","year":"1987","unstructured":"Latour, B.: Science in Action. Harvard University Press, Cambridge, MA (1987)"},{"key":"25_CR23","volume-title":"Power\/Knowledge: Selected interviews and other writings 1972-77","author":"M. Foucault","year":"1980","unstructured":"Foucault, M.: Power\/Knowledge: Selected interviews and other writings 1972-77. Harvester Press, Brighton, UK (1980)"},{"key":"25_CR24","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-02248-9","volume-title":"Power: A radical view","author":"S. Lukes","year":"1974","unstructured":"Lukes, S.: Power: A radical view. The Macmillan Press Ltd, London (1974)"},{"key":"25_CR25","volume-title":"The constitution of society","author":"A. Giddens","year":"1984","unstructured":"Giddens, A.: The constitution of society. Polity press, Cambridge, UK (1984)"},{"key":"25_CR26","doi-asserted-by":"crossref","first-page":"413","DOI":"10.2307\/25148767","volume":"30","author":"J. Backhouse","year":"2006","unstructured":"Backhouse, J., Hsu, C., Silva, L.: Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard. MIS Quarterly\u00a030, 413\u2013438 (2006)","journal-title":"MIS Quarterly"},{"key":"25_CR27","volume-title":"Reassembling the Social: An Introduction to Actor-Network-Theory","author":"B. Latour","year":"2005","unstructured":"Latour, B.: Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford University Press, Oxford (2005)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74409-2_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:25:16Z","timestamp":1619504716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74409-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744085","9783540744092"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74409-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}