<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Defining a Research Method for Engineering a Business Information Security Artefact</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Yuri</forename><surname>Bobbert</surname></persName>
							<email>yuri.bobbert@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Antwerp</orgName>
								<address>
									<settlement>Antwerp</settlement>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Radboud University</orgName>
								<address>
									<settlement>Nijmegen</settlement>
									<country key="NL">Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Defining a Research Method for Engineering a Business Information Security Artefact</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">D48C45172071D3A89561B7DA6E2EB257</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Business Information Security</term>
					<term>Design Science Research</term>
					<term>Group Support Systems</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper proposes research methods for designing and engineering a Business Information Security (BIS) artefact. Defining research methods to establish artefact functions (e.g. dash-boarding, risk register) that reflect the parameters of control for Board of Directors, is the main motivation for this research paper. The ultimate goal is to engineer this BIS artefact and thereby solve the problem of a low level of BIS maturity. We propose a research method that can be used to establish an experimental dashboard with initial parameters of control, based on a Design Science Research (DSR) approach. Group Support System (GSS) research can assist organisations applying the artefact into the organisations with the accompanying collaboration and decision making (fit to purpose) processes.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction</head><p>Information Security is a strategic issue for business leaders and several institutions and communities have launched numerous initiatives to encourage business leaders to ensure good stewardship in this area <ref type="bibr" target="#b0">[1]</ref>. The associated compliance obligations and the increase in security breaches have made many business leaders aware of its impact on the business continuity <ref type="bibr" target="#b1">[2]</ref>, civil and legal liabilities <ref type="bibr" target="#b2">[3]</ref> reputation <ref type="bibr" target="#b3">[4]</ref>, employability and financial position <ref type="bibr" target="#b4">[5]</ref>, <ref type="bibr" target="#b5">[6]</ref>. Within this multidisciplinary context of Information Security we therefore use the term "Business Information Security" <ref type="bibr" target="#b6">[7]</ref>. Most of the contributions by practitioner's bodies [8], <ref type="bibr" target="#b7">[9]</ref> [10] are prescriptive in nature <ref type="bibr" target="#b9">[11]</ref>. Little academic research has been done on determining the BIS parameters which boards can use to improve their BIS maturity. This paper focusses on examining the "parameters of control", that can function as requirements, via multiple qualitative research methods proposed by Johannesson and Perjons' Design Science Research (DSR) Framework <ref type="bibr" target="#b10">[12]</ref>. DSR aims to solve real problems by creating knowledge and understanding of a design problem and the solutions are acquired by establishing and applying artefacts. In this research we therefore refer to an artefact that contributes in solving the Business Information Security problems at hand. We formulated the following research question: Which research methods contribute to defining the requirements for the parameters of a Business Information Security artefact?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Examining research methods to translate business problems to artefact requirements</head><p>Design science strategy focuses on solving real-life problems. According to Hevner et al. <ref type="bibr" target="#b11">[13]</ref> it involves generating knowledge and building artefacts to solve defined business problems.</p><p>Business requirements are aligned with technical artefact requirements via an iterative process referred to as the "design cycle" <ref type="bibr" target="#b12">[14]</ref>. This cycle involves designing, testing and evaluating the artefact <ref type="bibr" target="#b13">[15]</ref>. It includes an academic rigour cycle and a practical relevance cycle <ref type="bibr" target="#b14">[16]</ref>. A continuous process of iterations, which are initially framed in the experimental phase, establishes the artefact <ref type="bibr" target="#b10">[12]</ref>. In the table below we summarize the most important qualitative interpretivist methods to gain, capture and transfer knowledge items to be used in the artefact design process, according to the DSR approach Johannesson and Perjons <ref type="bibr" target="#b10">[12]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2.Delphi research</head><p>Anonymous inventory and selection of views and standpoints (preferably based upon literature data). Rigorous examination process for scrutinizing the problem via, for example, expert opinions. Collecting global views on criteria requirements with the use of technology. Knowledge sharing. Enables double loop learning via multiple iterations. Automated. No geographical limitations. Limited in group interaction and discussion.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3.Case Study Research (CSR)</head><p>Deeper qualitative insight into BIS parameters and requirements within a certain industry/country. Used for confirmatory and exploratory studies related to validating requirements. Detailed insight into the effectiveness of requirements (i.e. critical success factors). Validating and evidencing the artefact requirements. Supports retroperspectives. The personal approach encourages the target group (Boards of Directors) to engage in BIS. CSR is a time intensive and consuming.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.Group Support System research (GSS)</head><p>Enables to create, share and capture knowledge as well as design items. Stimulates design thinking and stakeholder collaboration due to the "group element". Ability to collect, assess and select product requirements in a very short timeframe. Supports the regulative process <ref type="bibr" target="#b11">[13]</ref> of testing and validating requirements. Processing large data sets. Double Loop learning. Bridging knowing-doing gaps. Stimulating group dialogues (i.e. among Boards of Directors and Management teams). Makes it possible to establish group consensus. Supports the decision-making process. Threat of the "law of the decibel". Requires professional group moderation skills <ref type="bibr" target="#b12">[14]</ref>.</p><p>The proposed definition of a "research method to design and engineer a BIS artefact" starts with the initial phase of rigours literature research (1) to explicate the problem and followed by Delphi Research (2) to predefine views and standpoints and further explicate the problem via multiple views and iterations. After that Case Study Research (3) can provide in depth knowledge data on certain influences to BIS such as context, regulations, technology or culture. The gathered data during Delphi and CSR is then used in GSS to fuel the design and decision making process. GSS can be applied to determine the requirements among stakeholders and to prepare or guide the stakeholder -usergroup to discuss the implementation (fit to purpose). This DSR methodology based on a structured process <ref type="bibr" target="#b13">[15]</ref>, <ref type="bibr" target="#b14">[16]</ref>, <ref type="bibr" target="#b15">[17]</ref>, <ref type="bibr" target="#b16">[18]</ref>, <ref type="bibr" target="#b11">[13]</ref>, <ref type="bibr" target="#b17">[19]</ref>, <ref type="bibr" target="#b10">[12]</ref> in order to improve the Maturity of Business Information Security is coined and published as the "MBIS method" in several publications <ref type="bibr" target="#b18">[20]</ref>, <ref type="bibr" target="#b19">[21]</ref>, <ref type="bibr" target="#b20">[22]</ref>, <ref type="bibr" target="#b21">[23]</ref>, <ref type="bibr" target="#b22">[24]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusion</head><p>In this paper we make two propositions: a) refers to the product and data view and b) focuses on implementing the artefact and facilitating meetings. The first proposition (a) was involved in the previous mentioned MBIS research publications according to the MBIS method <ref type="bibr" target="#b18">[20]</ref>, <ref type="bibr" target="#b21">[23]</ref>, <ref type="bibr" target="#b20">[22]</ref>. The second proposition (b) was researched and tested in collaboration with Antwerp Management School among twenty five Chief Information Officers (CIO) and Chief Information Security Officers (CISO), who validated the implementation of the predefined artefact requirements <ref type="bibr" target="#b23">[25]</ref>. The use of GSS in facilitating implementation and decisionmaking (fit to purpose) related to BIS has also been researched and published <ref type="bibr">[21] [24]</ref>. The artefact is used by academics and practitioners and assists Board of Directors (BoD) into gaining more control. For example via a dashboard that provides scores of the current versus the desired state of BIS maturity. Conclusive we can state that by making use of the multiple methods that are proposed in the paper contribute in the design and engineering of the BIS artefact as well as the implementation into organisations.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Research methods and their contribution to Business Information Security Explicating and defining the problem in a systematic, structured way. Objectivity removes the element of Fear Uncertainty and Doubt (FUD). Unbiased, structured point of departure for the design cycle. Requires a certain level of expertise in the topic.</figDesc><table><row><cell>Type</cell><cell>of</cell><cell>Contribution to designing and engineering a Business Information</cell></row><row><cell>research</cell><cell></cell><cell>Security artefact</cell></row><row><cell cols="2">within DSR</cell><cell></cell></row><row><cell cols="2">1.Literature</cell><cell></cell></row><row><cell>research</cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Partnering for Cyber Resilience; Risk and Responsibility in a Hyperconnected World -Principles and Guidelines</title>
		<author>
			<persName><surname>Wef</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">World Economic Forum</title>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">The Economic Impact of Cyber-Attacks</title>
		<author>
			<persName><forename type="first">B</forename><surname>Cashell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Jackson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jickling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Webel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>The Library of Congress</publisher>
			<pubPlace>United States</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">Fox-It</forename></persName>
		</author>
		<title level="m">FOX IT in assignment of the Ministry of the Interior and Kingdom Relations</title>
				<meeting><address><addrLine>Den Haag</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>DigiNotar Certificate Authority breach</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Examining the Antecedents and Consequences of Corporate Reputation: A Customers perspective</title>
		<author>
			<persName><forename type="first">G</forename><surname>Walsh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Mitchell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Jackson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Beatty</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Britisch Journal of management</title>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">The Effect of Information Security Incidents on Corporate Values in the Japanese Stock Market</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ishiguro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Tanaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Matsuura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Murase</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<pubPlace>Tokyo, Japan</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Institute of Industrial Science, The University of Tokyo</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers</title>
		<author>
			<persName><forename type="first">H</forename><surname>Cavusoglu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Raghunathan</surname></persName>
		</author>
		<imprint>
			<publisher>International Journal of E-Commerce</publisher>
			<biblScope unit="page" from="2" to="2002" />
			<pubPlace>Dallas, Texas United States</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">From Information Security to Business Security</title>
		<author>
			<persName><forename type="first">V</forename><surname>Solms</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Computer &amp; Security, Elsevier</publisher>
			<pubPlace>South Africa</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m">ISF, Corporate Governance Requirements for Information Risk Management</title>
				<meeting><address><addrLine>UK</addrLine></address></meeting>
		<imprint>
			<publisher>Information Security Forum</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m">Information risks; Whose Business are They</title>
				<meeting><address><addrLine>United States</addrLine></address></meeting>
		<imprint>
			<publisher>IT Governance Institute</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
		<respStmt>
			<orgName>ITGI</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Using Standards to Create Effect in the Boardroom</title>
		<author>
			<persName><forename type="first">E</forename><surname>Koning</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Bikker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ISACA Journal</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Johannesson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Perjons</surname></persName>
		</author>
		<title level="m">An introduction to Design Science</title>
				<meeting><address><addrLine>Stockholm</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
		<respStmt>
			<orgName>University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Wieringa</surname></persName>
		</author>
		<title level="m">Design Science Methodology: For Information System and Software Engineering</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">De fata morgana van Group Support Systemen</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M J</forename><surname>Kolfschoten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Proper</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Informatie</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="10" to="14" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Design Science Research in Europe</title>
		<author>
			<persName><forename type="first">R</forename><surname>Winter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Information Systems</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="470" to="474" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The discipline of Enterprise Engineering</title>
		<author>
			<persName><forename type="first">J</forename><surname>Dietz</surname></persName>
		</author>
		<author>
			<persName><surname>Hoogervorst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Organizational Design and Engineering</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="86" to="114" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A Conceptual Framework for Analysing Enterprise Engineering Methodologies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Albani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Raber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Winter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Enterprise Modelling and Information Systems Architectures</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Organising and managing the fuzzy front end of new product development</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">J</forename><surname>Aken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nagel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">ECIS working paper series</title>
		<imprint>
			<biblScope unit="volume">200412</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
		<respStmt>
			<orgName>Technische Universiteit Eindhoven</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Design Science Research in Information Systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Hevner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>March</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Park</forename></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ram</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Management Information Systems Quarterly</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="75" to="105" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A Research Journey into Maturing the Business Information Security of Mid Market Organizations</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Bobbert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mulder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal on IT/Business Alignment and Governance</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="18" to="39" />
			<date type="published" when="2010-12">October-December 2010. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Boardroom dynamics: Group Support for the Board&apos;s Involvement in a Smart Security</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Bobbert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mulder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ISACA Journal</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Governance Practices and Critical Succes Factors suitable for Business Information Security</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Bobbert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mulder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Computational Intelligence and Communication Networks</title>
				<meeting><address><addrLine>India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Group Support Systems Research in the Field of Business Information Security; a Practitioners View</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Bobbert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mulder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">46th Hawaii International Conference on System Science</title>
				<meeting><address><addrLine>Hawaii US</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Vergaderen om te besluiten: Het gebruik van Group Support Systemen in informatiebeveiliging</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Bobbert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mulder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Platform voor Informatiebeveiliging</title>
		<imprint>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="4" to="7" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Cyber Security; Facts or Fiction</title>
		<author>
			<persName><forename type="first">G</forename><surname>Mari</surname></persName>
		</author>
		<ptr target="http://blog.antwerpmanagementschool.be/" />
	</analytic>
	<monogr>
		<title level="j">Antwerp Management School</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="11" to="2016" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><surname>Peters</surname></persName>
		</author>
		<title level="m">Reputatie onder druk; Het managen van reputaties in een veranderende samenleving</title>
				<meeting><address><addrLine>Den Haag</addrLine></address></meeting>
		<imprint>
			<publisher>SDU Uitgevers</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">Governing for Enterprise Security (GES) Implementation Guide</title>
		<author>
			<persName><forename type="first">J</forename><surname>Allen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<pubPlace>CERT , US</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Carnegie Mellon University, Software Engineering Institute</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Information security awareness and behavior: a theory-based literature review</title>
		<author>
			<persName><forename type="first">B</forename><surname>Lebek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Uffen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Neumann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Hohler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Breitner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Management Research Review</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">37</biblScope>
			<biblScope unit="page" from="1049" to="1092" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Security lapses and the omission of information security measures: A threat control model and empirical test</title>
		<author>
			<persName><forename type="first">M</forename><surname>Workman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Bommer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Straub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers in Human Behavior</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="2799" to="2816" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Organising and managing the fuzzy front end of new product development</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">J</forename><surname>Aken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nagel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">ECIS working paper series</title>
		<imprint>
			<biblScope unit="volume">200412</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
