{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T16:32:38Z","timestamp":1724085158664},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1109\/eit53891.2022.9813791","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T19:32:19Z","timestamp":1657222339000},"source":"Crossref","is-referenced-by-count":2,"title":["Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices"],"prefix":"10.1109","author":[{"given":"Muhammad Maaz Ali","family":"Khan","sequence":"first","affiliation":[{"name":"Saint Cloud State University,Department of Information Systems,Saint Cloud,USA"}]},{"given":"Enow Nkongho","family":"Ehabe","sequence":"additional","affiliation":[{"name":"Saint Cloud State University,Department of Information Systems,Saint Cloud,USA"}]},{"given":"Akalanka B.","family":"Mailewa","sequence":"additional","affiliation":[{"name":"Saint Cloud State University,Department of Computer Science &#x0026; IT,Saint Cloud,USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3388142.3388168"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2767005"},{"key":"ref12","first-page":"45","article-title":"How to increase the information assurance in the information age","author":"sosin","year":"2018","journal-title":"Journal of Defense Resources Management (JoDRM)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.04.004"},{"key":"ref14","article-title":"SOME LEGAL ASPECTS ON CYBERCRIME","author":"stefan","year":"2017","journal-title":"Annals of the Constantin Brancusi University of Targu Jiu-Letters & Social Sciences Series 3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2012.02.004"},{"key":"ref16","author":"wilson","year":"2017","journal-title":"Cyber Risk Market Failures and Financial Stability No 2017\/185 International Monetary Fund"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.12.002"},{"key":"ref18","article-title":"Dynamic & portable vulnerability assessment testbed with Linux containers to ensure the security of MongoDB in Singularity LXCs","author":"dissanayaka","year":"2018","journal-title":"In Companion Conference of the Supercomputing-2018 (SC18)"},{"key":"ref19","article-title":"Cybersecurity: investing for competitive outcomes","author":"kosutic","year":"2020","journal-title":"Journal of Business Strategy"},{"key":"ref28","article-title":"The influence of black market activities through dark web on the economy: a survey","author":"mazi","year":"2020","journal-title":"In The Midwest Instruction and Computing Symposium (MICS) Milwaukee School of Engineering and Northwestern Mutual Milwaukee Wisconsin"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493213"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom52276.2021.00018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03154-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3147234.3148133"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25988-8_9"},{"key":"ref8","first-page":"99","article-title":"Managing software security risks","author":"gary","year":"2017","journal-title":"Computer 35"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3147234.3148132"},{"key":"ref2","first-page":"1","article-title":"Using the CIA and AAA models to explain cybersecurity activities","author":"livinus obiora","year":"2017","journal-title":"PM World Journal"},{"key":"ref9","article-title":"A survey of effective and efficient software testing","author":"mailewa","year":"2015","journal-title":"The Midwest Instruction and Computing Symposium (MICS) Grand Forks"},{"key":"ref1","first-page":"214","article-title":"Security threats in cloud computing","author":"shaikh","year":"2011","journal-title":"2011 International Conference for Internet Technology and Secured Transactions ICITST"},{"key":"ref20","first-page":"30","article-title":"An analysis of cybersecurity legislation and policy creation on the state level","author":"alexander","year":"2019","journal-title":"National Cyber Summit"},{"key":"ref22","article-title":"Darknet and black market activities against the cybersecurity: a survey","author":"akintaro","year":"2019","journal-title":"Midwest instructions and computing symposium"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2501\/IJMR-2017-050"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2005.10855759"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ITQMIS51053.2020.9322883"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev45635.2020.00020"}],"event":{"name":"2022 IEEE International Conference on Electro Information Technology (eIT)","location":"Mankato, MN, USA","start":{"date-parts":[[2022,5,19]]},"end":{"date-parts":[[2022,5,21]]}},"container-title":["2022 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9813697\/9813750\/09813791.pdf?arnumber=9813791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:45:29Z","timestamp":1659660329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9813791\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/eit53891.2022.9813791","relation":{},"subject":[],"published":{"date-parts":[[2022,5,19]]}}}