{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:10:11Z","timestamp":1742911811341,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031613784"},{"type":"electronic","value":"9783031613791"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61379-1_15","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:06:11Z","timestamp":1717203971000},"page":"232-244","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using a\u00a0Digital Transformation to\u00a0Improve Enterprise Security\u2014A Case Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3508-7684","authenticated-orcid":false,"given":"David Brookshire","family":"Conner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"unstructured":"https:\/\/obamawhitehouse.archives.gov\/node\/18007","key":"15_CR1"},{"unstructured":"18 April 2019. https:\/\/alala1.k12.hi.us\/-STATE\/-BOE\/-Minutes.-nsf\/-a15fa9df1-1029f-d70a2565-cb0065b-6b7\/1aa04467e9-faab760a2-583f6007bc46b?-OpenDocument","key":"15_CR2"},{"unstructured":"17 December 2020. https:\/\/alala1.k12.hi.us\/-STATE\/-BOE\/-Minutes.nsf\/-a15fa9df11029fd-70a2565cb0065b6b7\/-ce605942f7ca-48820a25866a0-00dcd04?-OpenDocument","key":"15_CR3"},{"unstructured":"Hawaii DOE | Department announces appointments for top leadership positions. https:\/\/www.hawaiipublicschools.org\/ConnectWithUs\/MediaRoom\/PressReleases\/Pages\/HIDOE-announces-appointments-for-top-leadership-positions.aspx","key":"15_CR4"},{"unstructured":"HI BOE Minutes, 13 March 2018. https:\/\/alala1.k12.hi.us\/-STATE\/-BOE\/-Minutes.nsf\/-a15fa9df-11029fd7-0a2565c-b0065b6b-7\/9585c01-31538bd520a-25829-20000710e?-OpenDocument","key":"15_CR5"},{"unstructured":"FIC Presentation on Five-Year Technology Plan, March 2018 (March 2018). https:\/\/boe.hawaii.gov\/Meetings\/Notices\/Meeting%20Material%20Library\/FIC_03132018_4F%20Presentation%20on%20Overview%20of%20DOE%20OITS%20Five%20Year%20Technology%20Plan%20(rev).pdf","key":"15_CR6"},{"unstructured":"Hanna, N.K.: Mastering Digital Transformation: Towards a Smarter Society, Economy, City and Nation. Innovation, Technology and Education for Growth, 1st edn. Emerald Publishing Limited, Bingley (2016)","key":"15_CR7"},{"unstructured":"HCLTech: HCL takes Relationship Beyond the Contract with Est\u00e9e Lauder Companies, September 2017. https:\/\/www.youtube.com\/watch?v=J4HyDy1fyoA","key":"15_CR8"},{"unstructured":"Sacolick, I.: Driving Digital. AMACOM (2017)","key":"15_CR9"},{"unstructured":"Nelson, B., Phillips, A., Steuart, C.: Guide to Computer Forensics and Investigations, 6th edn. Cengage, Boston, MA (2019). oCLC: on1039396078","key":"15_CR10"},{"unstructured":"Robert, H.M., et\u00a0al.: Robert\u2019s Rules of Order Newly Revised, 12th edn. Public Affairs, New York (2020). A new and enlarged edition edn","key":"15_CR11"},{"unstructured":"Satell, G., Kates, A., McLees, T.: 4 Principles to Guide Your Digital Transformation. Harvard Business Review (Nov 2021), https:\/\/hbr.org\/2021\/11\/4-principles-to-guide-your-digital-transformation, section: Digital transformation","key":"15_CR12"},{"doi-asserted-by":"publisher","unstructured":"Sherwood, J.: Enterprise Security Architecture: A Business-Driven Approach, 1st edn. CRC Press, Boca Raton (2005). https:\/\/doi.org\/10.1201\/b17776","key":"15_CR13","DOI":"10.1201\/b17776"},{"unstructured":"Shostack, A., Stewart, A.: The New School of Information Security. Addison-Wesley, Upper Saddle River (2008). oCLC: ocn181142577","key":"15_CR14"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61379-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:58:16Z","timestamp":1717207096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61379-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031613784","9783031613791"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61379-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article. While this work was performed as an employee of HIDOE, the author no longer has any association with HIDOE and receives no compensation or other recognition from the Department.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}