{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:47:48Z","timestamp":1729626468195,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/issa.2013.6641035","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:20:04Z","timestamp":1383074404000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["A software gateway to affordable and effective Information Security Governance in SMMEs"],"prefix":"10.1109","author":[{"given":"Jacques","family":"Coertze","sequence":"first","affiliation":[]},{"given":"Rossouw","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00706-4"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210431872"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.08.013"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35586-3_1"},{"journal-title":"A Framework for IT Governance in Small Businesses","year":"2009","author":"koornhof","key":"13"},{"journal-title":"A Framework for Information Security Governance in SMMEs","year":"2012","author":"coertze","key":"14"},{"key":"11","first-page":"1","article-title":"An investigation of information security in small and medium enterprises (SMEs) in the Eastern Cape","author":"upfold","year":"2005","journal-title":"Proceedings of the ISSA 2005 New Knowledge Today Conference"},{"key":"12","first-page":"1","article-title":"A model for information security governance in developing countries","author":"coertze","year":"2012","journal-title":"AfriComm"},{"journal-title":"Information Technology -Security Techniques - Information Security Management Systems - Requirements","year":"2005","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.167"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1201\/9781420059069"},{"key":"23","doi-asserted-by":"crossref","first-page":"23","DOI":"10.4102\/sajbm.v41i3.522","article-title":"The board and IT governance : The what, who and how","volume":"41","author":"posthumus","year":"2010","journal-title":"South African Journal of Business Management"},{"journal-title":"ISO27002 Security Framework Audit Program Template","year":"2012","key":"24"},{"journal-title":"Small Business Management An Entrepreneur's Guidebook","year":"2006","author":"megginson","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1108\/02635571211204263"},{"journal-title":"Corporate Governance of IT International Organization for Standardization (ISO)","year":"2008","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027515"},{"year":"0","key":"3"},{"journal-title":"Information Technology Code of Practice for Information Security Management","year":"2005","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.10.006"},{"journal-title":"Information Security Governance","year":"2008","author":"von solms","key":"1"},{"journal-title":"Principles of Information Security","year":"2012","author":"whitman","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.07.005"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2011.12.003"},{"journal-title":"IT Does so Matter!","year":"2003","author":"melymuka","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1859204.1859215"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/9780470476017"}],"event":{"name":"2013 Information Security for South Africa","start":{"date-parts":[[2013,8,14]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621627\/6641027\/06641035.pdf?arnumber=6641035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T09:10:54Z","timestamp":1564564254000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/issa.2013.6641035","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}