{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T00:50:28Z","timestamp":1674089428219},"reference-count":0,"publisher":"Inderscience Publishers","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJBIS"],"published-print":{"date-parts":[[2009]]},"DOI":"10.1504\/ijbis.2009.024504","type":"journal-article","created":{"date-parts":[[2009,4,8]],"date-time":"2009-04-08T11:30:13Z","timestamp":1239190213000},"page":"419","source":"Crossref","is-referenced-by-count":3,"title":["Employing the social-technical perspective in identifying security management systems in organisations"],"prefix":"10.1504","volume":"4","author":[{"given":"Suhazimah","family":"Dzazali","sequence":"first","affiliation":[]},{"given":"Sulaiman","family":"Ainin","sequence":"additional","affiliation":[]},{"given":"Ali Hussein Saleh","family":"Zolait","sequence":"additional","affiliation":[]}],"member":"378","container-title":["International Journal of Business Information Systems"],"original-title":[],"language":"en","deposited":{"date-parts":[[2009,4,8]],"date-time":"2009-04-08T11:30:25Z","timestamp":1239190225000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.inderscience.com\/link.php?id=24504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":0,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009]]}},"URL":"https:\/\/doi.org\/10.1504\/ijbis.2009.024504","relation":{},"ISSN":["1746-0972","1746-0980"],"issn-type":[{"value":"1746-0972","type":"print"},{"value":"1746-0980","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}