{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:51:12Z","timestamp":1730202672280,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/ccc.2016.28","type":"proceedings-article","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T16:35:39Z","timestamp":1476981339000},"page":"107-112","source":"Crossref","is-referenced-by-count":5,"title":["Management Attitudes toward Information Security in Omani Public Sector Organisations"],"prefix":"10.1109","author":[{"given":"Fathiya","family":"Al-Izki","sequence":"first","affiliation":[]},{"given":"George R. S.","family":"Weir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.10.005"},{"key":"ref11","first-page":"3","article-title":"Engaging top management in information technology","volume":"4","author":"rockart","year":"1984","journal-title":"Sloan Management Review"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.65.1.96"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/02678379808256863"},{"key":"ref15","article-title":"A synthesis of safety culture and safety climate research","author":"wiegmann","year":"2002","journal-title":"University of Illinois at Urbana-Champaign"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435446"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250030411"},{"journal-title":"Formation des stratégies et middle managers","year":"2005","author":"payaud","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-4375(97)00025-X"},{"key":"ref4","article-title":"GTAG1: Information Technology Controls","author":"richards","year":"2005","journal-title":"The Institute of Internal Auditors"},{"key":"ref3","article-title":"PRAGMATIC Security Metrics: Applying Metametrics to Information Security","author":"krag brotby","year":"2013","journal-title":"CRC"},{"key":"ref6","first-page":"67","article-title":"Management's role in information security in cyber economy","volume":"1","author":"mccrohan","year":"2002","journal-title":"California Management Review"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2934.2006.00590.x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2006.09.003"},{"key":"ref2","article-title":"Vers une implication et une action des dirigeants de PME dans la sécurité de leur système d'information","author":"barlette","year":"2012","journal-title":"Presses des Mines"},{"key":"ref1","article-title":"Information security culture: A definition and a literature review, Computer Applications and Information Systems (WCCAIS)","author":"alhogail","year":"2014","journal-title":"World Congress on Engineering 2014"},{"key":"ref9","article-title":"Exploring the Relationship between Organisational Culture and Information Security Culture","author":"lim","year":"2009","journal-title":"7th Australian Information Security Management Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/001401397188288"},{"journal-title":"Research Methodology","year":"1991","author":"sampieri","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1993.tb01295.x"},{"journal-title":"Organisational security culture and information security compliance for e-government development the moderating effect of social pressure","year":"2015","author":"alkalbani","key":"ref24"},{"journal-title":"Analyzing quantitative data","year":"1989","author":"taylor-powell","key":"ref23"}],"event":{"name":"2016 Cybersecurity and Cyberforensics Conference (CCC)","start":{"date-parts":[[2016,8,2]]},"location":"Amman, Jordan","end":{"date-parts":[[2016,8,4]]}},"container-title":["2016 Cybersecurity and Cyberforensics Conference (CCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7593909\/7600192\/07600219.pdf?arnumber=7600219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T03:15:56Z","timestamp":1478056556000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7600219\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ccc.2016.28","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}