{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:07Z","timestamp":1754157667680,"version":"3.41.2"},"reference-count":13,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2002,8,1]],"date-time":"2002-08-01T00:00:00Z","timestamp":1028160000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2002,8]]},"DOI":"10.1108\/09685220210431890","type":"journal-article","created":{"date-parts":[[2004,4,29]],"date-time":"2004-04-29T20:17:05Z","timestamp":1083269825000},"page":"135-139","source":"Crossref","is-referenced-by-count":8,"title":["System insecurity \u2013 firewalls"],"prefix":"10.1108","volume":"10","author":[{"given":"Mayur S.","family":"Desai","sequence":"first","affiliation":[]},{"given":"Thomas C.","family":"Richards","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"von der Embse","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00247-5"},{"key":"B2","unstructured":"Business Week (2000), \u201cCyber crime\u201d,Business Week, 21 February, pp. 37\u201042."},{"key":"B3","unstructured":"Greene, T. (2001), \u201cNext gen help create faster firewalls\u201d,Network World, Vol. 18 No. 14, pp. 78\u201093."},{"key":"B4","unstructured":"Hansen, M. (1996), \u201cSafety and the Internet\u201d,Professional Safety, Vol. 41 No. 1, pp. 8\u201010."},{"key":"B5","doi-asserted-by":"crossref","unstructured":"Knobbe, R., Purtell, A. and Schwab, S. (1998), \u201cAdvanced security proxies: an architecture and implementation for high\u2010performance network firewalls\u201d,Proceedings of the DARPA Information Survivability Conference, Vol. 1, pp. 341\u20107.","DOI":"10.1109\/DISCEX.2000.824974"},{"key":"B6","unstructured":"Kokka, S. (1998), \u201cProperty rights on an Internet\u201d,Journal of Technology Law & Policy, Vol. 3 No. 2, pp. 24\u201035."},{"key":"B7","unstructured":"Liebmann, L. (1999), \u201cTo have and have NAT: managing though the firewall\u201d,Business Communications Review, Vol. 29 No. 7, pp. 48\u201053."},{"key":"B8","unstructured":"Luehlfing, M. (2000), \u201cDefending the security of the accounting system\u201d,The CPA Journal, Vol. 70 No. 10, pp. 62\u20105."},{"key":"B9","unstructured":"McCollum, T. (1997), \u201cComputer crime\u201d,Nation\u2019s Business, November, pp. 18\u201026."},{"key":"B10","unstructured":"McCune, J.C. (1998), \u201cHow safe is your data?\u201d,Management Review, October, pp. 17\u201021."},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1109\/52.776951"},{"key":"B12","unstructured":"Santalesa, R. (2000), \u201cA suite new answer to Internet security\u201d,Internet Week, 10 April, Vol. 50, p. 5."},{"key":"B13","unstructured":"Vizard, M. (2001), \u201cBeyond firewalls\u201d,Infoworld, Vol. 23 No. 8, pp. 69\u20104."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220210431890","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220210431890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:39Z","timestamp":1753402119000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/10\/3\/135-139\/173099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,8]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,8]]}},"alternative-id":["10.1108\/09685220210431890"],"URL":"https:\/\/doi.org\/10.1108\/09685220210431890","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2002,8]]}}}