{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:58:36Z","timestamp":1730321916120,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T00:00:00Z","timestamp":1561075200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,21]]},"DOI":"10.1145\/3345252.3345302","type":"proceedings-article","created":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T19:41:50Z","timestamp":1568749310000},"page":"68-73","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Main Considerations in Elaborating Organizational Information Security Policies"],"prefix":"10.1145","author":[{"given":"Todor","family":"Tagarev","sequence":"first","affiliation":[{"name":"Institute of Information and Communication Technologies, Bulgarian Academy of Sciences, Sofia, Bulgaria"}]},{"given":"Dimitrina","family":"Polimirova","sequence":"additional","affiliation":[{"name":"National Laboratory of Computer Virology, Bulgarian Academy of Sciences Sofia, Bulgaria"}]}],"member":"320","published-online":{"date-parts":[[2019,6,21]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"15","article-title":"The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms). Connections","volume":"5","author":"Tagarev T.","year":"2006","unstructured":"T. Tagarev ( 2006 ). The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms). Connections : The Quarterly Journal , 5 ( 1 ), 15 -- 34 . T. Tagarev (2006). The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms). Connections: The Quarterly Journal, 5(1), 15--34.","journal-title":"The Quarterly Journal"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.206"},{"key":"e_1_3_2_1_3_1","volume-title":"M. Tavana and S. Patnaik (eds) Recent Developments in Data Science and Business Analytics","author":"Li X.","year":"2018","unstructured":"X. Li , M. Al-Shawabkeh and Z. Li ( 2018 ). Security Risk Management Approach for Improving Information Security Return of Investment . In: M. Tavana and S. Patnaik (eds) Recent Developments in Data Science and Business Analytics . Springer Proceedings in Business and Economics, 209--216. Springer , Cham. X. Li, M. Al-Shawabkeh and Z. Li (2018). Security Risk Management Approach for Improving Information Security Return of Investment. In: M. Tavana and S. Patnaik (eds) Recent Developments in Data Science and Business Analytics. Springer Proceedings in Business and Economics, 209--216. Springer, Cham."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2008.02.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.11610\/isij.4103"},{"key":"e_1_3_2_1_6_1","volume-title":"10 Steps to Cyber Security","author":"National Cybersecurity Centre","year":"2018","unstructured":"National Cybersecurity Centre ( 2018 ). 10 Steps to Cyber Security . GCHQ , London , https:\/\/www.ncsc.gov.uk\/collection\/10-steps-to-cyber-security. National Cybersecurity Centre (2018). 10 Steps to Cyber Security. GCHQ, London, https:\/\/www.ncsc.gov.uk\/collection\/10-steps-to-cyber-security."},{"key":"e_1_3_2_1_7_1","volume-title":"Official Journal of the European Union L194(1)","author":"Directive (EU) 2016\/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union","year":"2016","unstructured":"Directive (EU) 2016\/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union , Official Journal of the European Union L194(1) , 19 July 2016 . Directive (EU) 2016\/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, Official Journal of the European Union L194(1), 19 July 2016."},{"key":"e_1_3_2_1_8_1","volume-title":"Official Journal of the European Union L345","author":"Council Directive 2008\/114\/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection.","year":"2008","unstructured":"Council Directive 2008\/114\/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Official Journal of the European Union L345 , 23 Dec 2008 , 75--82. Council Directive 2008\/114\/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Official Journal of the European Union L345, 23 Dec 2008, 75--82."},{"key":"e_1_3_2_1_9_1","volume-title":"State Gazette 109","author":"Law on the State Agency \"National Security\".","year":"2007","unstructured":"Law on the State Agency \"National Security\". State Gazette 109 , 20 December 2007 , last amendment State Gazette 17, 26 February 2019, art. 6. Law on the State Agency \"National Security\". State Gazette 109, 20 December 2007, last amendment State Gazette 17, 26 February 2019, art. 6."},{"key":"e_1_3_2_1_10_1","volume-title":"Official Journal of the European Union L119","author":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation).","year":"2016","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119 , 4 May 2016 , 1--88. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119, 4 May 2016, 1--88."},{"key":"e_1_3_2_1_11_1","article-title":"Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems","author":"Snowdon J.L.","year":"2017","unstructured":"J.-P.Auffret, J.L. Snowdon , A. Stavrou ( 2017 ). Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems . Journal of Interconnection Networks, 17(1). J.-P.Auffret, J.L. Snowdon, A. Stavrou et al (2017). Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems. Journal of Interconnection Networks, 17(1).","journal-title":"Journal of Interconnection Networks, 17(1)."},{"key":"e_1_3_2_1_12_1","volume-title":"Information Security Policies: A Review of Challenges and Influencing Factors. In: 11th International Conference for Internet Technology and Secured Transactions (ICITST) IEEE, Barcelona.","author":"Alotaibi M.","year":"2016","unstructured":"M. Alotaibi , S. Furnell , and N. Clarke ( 2016 ). Information Security Policies: A Review of Challenges and Influencing Factors. In: 11th International Conference for Internet Technology and Secured Transactions (ICITST) IEEE, Barcelona. M. Alotaibi, S. Furnell, and N. Clarke (2016). Information Security Policies: A Review of Challenges and Influencing Factors. In: 11th International Conference for Internet Technology and Secured Transactions (ICITST) IEEE, Barcelona."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1571459"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1552743"},{"key":"e_1_3_2_1_16_1","volume-title":"PRAGMATIC Security Metrics: Applying Metametrics to Information Security","author":"Brotby W. K.","year":"2013","unstructured":"W. K. Brotby and G. Hinson ( 2013 ). PRAGMATIC Security Metrics: Applying Metametrics to Information Security . CRC Press, Boca Raton , FL. W. K. Brotby and G. Hinson (2013). PRAGMATIC Security Metrics: Applying Metametrics to Information Security. CRC Press, Boca Raton, FL."},{"key":"e_1_3_2_1_17_1","volume-title":"Sofia, Bulgaria.","author":"Georgiev V.","year":"2016","unstructured":"V. Georgiev and V. Monov ( 2016 ). Cybersecurity Metrics. Avangard Prima , Sofia, Bulgaria. V. Georgiev and V. Monov (2016). Cybersecurity Metrics. Avangard Prima, Sofia, Bulgaria."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2018.00012"},{"key":"e_1_3_2_1_19_1","volume-title":"Organizing for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions. Information & Security: An International Journal, 42","author":"Shalamanov V.","year":"2019","unstructured":"V. Shalamanov ( 2019 ). Organizing for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions. Information & Security: An International Journal, 42 . http:\/\/isij.eu\/article\/organizing-it-effectiveness-efficiency-and-cyber-resilience-academic-sector-national-and. V. Shalamanov (2019). Organizing for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions. Information & Security: An International Journal, 42. http:\/\/isij.eu\/article\/organizing-it-effectiveness-efficiency-and-cyber-resilience-academic-sector-national-and."}],"event":{"name":"CompSysTech '19: 20th International Conference on Computer Systems and Technologies","sponsor":["UORB University of Ruse, Bulgaria"],"location":"Ruse Bulgaria","acronym":"CompSysTech '19"},"container-title":["Proceedings of the 20th International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3345252.3345302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T14:48:27Z","timestamp":1673534907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3345252.3345302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,21]]},"references-count":19,"alternative-id":["10.1145\/3345252.3345302","10.1145\/3345252"],"URL":"https:\/\/doi.org\/10.1145\/3345252.3345302","relation":{},"subject":[],"published":{"date-parts":[[2019,6,21]]},"assertion":[{"value":"2019-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}