{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T15:04:23Z","timestamp":1714057463232},"reference-count":11,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2000,12,1]],"date-time":"2000-12-01T00:00:00Z","timestamp":975628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000,12,1]]},"abstract":"The paper discusses the assignment of security clearances to employees in a security conscious organisation. New approaches are suggested for solving two major problems. First, full implementation of the \u201cneed\u2010to\u2010know\u201d principle is provided by the introduction of data access statements (DAS) as part of an employee\u2019s job description. Second, for the problem of setting up border points between different security clearances, the paper introduces a fuzzy set model. This model helps to solve this problem, effectively connecting it with the cost of security.<\/jats:p>","DOI":"10.1108\/09685220010356247","type":"journal-article","created":{"date-parts":[[2002,7,28]],"date-time":"2002-07-28T22:52:34Z","timestamp":1027896754000},"page":"210-217","source":"Crossref","is-referenced-by-count":7,"title":["\u201cNeed\u2010to\u2010know\u201d principle and fuzzy security clearances modelling"],"prefix":"10.1108","volume":"8","author":[{"given":"Lech J.","family":"Janczewski","sequence":"first","affiliation":[]},{"given":"Victor","family":"Portougal","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020120075742900_B1","unstructured":"Amoroso, E. (1994), Fundamentals of Computer Security Technology, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020120075742900_B2","unstructured":"British Standard BS 7799 (1995), Code of Practice for Information Security Management, UK."},{"key":"key2022020120075742900_B3","unstructured":"Forcht, K. (1994), Computer Security Management, Boyd & Fraser Publishing Company, USA."},{"key":"key2022020120075742900_B4","unstructured":"Frank, L. (1992), EDP\u2010Security, Elsevier Science Publishers, The Netherlands."},{"key":"key2022020120075742900_B5","unstructured":"Janczewski, L. and Low, B. (1998), \u201cReference monitor for hypermedia\u2010based hospital information systems\u201d, in Papp and Posch, G. (Eds), Global IT Security, O\u00a8sterreichische Computer Gesellschaft, Austria."},{"key":"key2022020120075742900_B6","unstructured":"Jordan, E. (1999), \u201cBusiness and computer contingency planning in Australia\u201d, JBC \u2013 Continuity, Mcquarie Report, Summer 98 issue, Australia."},{"key":"key2022020120075742900_B7","unstructured":"Leung, V. (1998), \u201cOptmization of information security policy development\u201d, MCom. Thesis, Department of MSIS, The University of Auckland, New Zealand."},{"key":"key2022020120075742900_B8","unstructured":"OECD (1992), Information Computer Communications Policy, Guidelines for the Security of Information Systems, Publication No OECD\/GD (92) 190, France."},{"key":"key2022020120075742900_B9","unstructured":"Pfleeger, C. (1997), Security in Computing, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020120075742900_B10","doi-asserted-by":"crossref","unstructured":"Portougal, V. and Janczewski, L. (1998), \u201cIndustrial information\u2010weight security models\u201d, Information Management & Computer Security, Vol. 6 No. 5.","DOI":"10.1108\/09685229810240112"},{"key":"key2022020120075742900_B11","unstructured":"Schuler, R. et al. (1992), Human Resource Management in Australia, Harper Educational, Australia"}],"container-title":["Information Management & Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220010356247","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220010356247\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220010356247\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T20:46:53Z","timestamp":1643748413000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220010356247\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,12,1]]},"references-count":11,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2000,12,1]]}},"alternative-id":["10.1108\/09685220010356247"],"URL":"https:\/\/doi.org\/10.1108\/09685220010356247","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2000,12,1]]}}}