{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:22:29Z","timestamp":1763580149881,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/hicss.2004.1265411","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"10 pp.","source":"Crossref","is-referenced-by-count":16,"title":["Cyber security exercises: testing an organization's ability to prevent, detect, and respond to cyber security events"],"prefix":"10.1109","author":[{"given":"G.B.","family":"White","sequence":"first","affiliation":[]},{"given":"G.","family":"Dietrich","sequence":"additional","affiliation":[]},{"given":"T.","family":"Goles","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/41166154"},{"journal-title":"FEMA News Department of Homeland Security","article-title":"TOPOFF 2","year":"2003","key":"ref11"},{"article-title":"Security patches aren't being applied","year":"2001","author":"lemos","key":"ref12"},{"key":"ref13","article-title":"2003 Global Security Survey","author":"melek","year":"2003","journal-title":"from Deloitte Touche Tohmatsu"},{"key":"ref14","article-title":"The Spread of the Sapphire\/Slammer Worm","author":"morre","year":"2003","journal-title":"Colleen Shannon Stuart Staniford and Nicholas Weaver"},{"journal-title":"National strategy for homeland security","year":"2002","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/37.969131"},{"journal-title":"Hacking Exposed 2ed","year":"2001","author":"scambray","key":"ref17"},{"key":"ref18","first-page":"25","article-title":"Scenario Planning: A Tool for Strategic Thinking","volume":"36","author":"schoemaker","year":"1995","journal-title":"Sloan Management Review"},{"key":"ref19","article-title":"Safe and Sound: A Treatise on Internet Security","author":"sigmond","year":"2001","journal-title":"RBC Capital Markets' report"},{"key":"ref4","article-title":"Training Remains the Weakest Link","volume":"5","author":"briney","year":"2002","journal-title":"Information Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1996.7"},{"key":"ref6","article-title":"The Texas Infrastructure Protection Center","author":"cornyn","year":"2002","journal-title":"Report of the State Infrastructure Protection Advisory Committee (SIPAC) Office of the Attorney General for the State of Texas"},{"journal-title":"Hackers Beware New Riders Publishing Indianapolis Indiana","year":"2002","author":"cole","key":"ref5"},{"journal-title":"Department of Homeland Security","article-title":"Sharing Information to Protect the Economy","year":"2003","key":"ref8"},{"journal-title":"Department of Homeland Security","article-title":"The National Strategy to Secure Cyberspace","year":"2003","key":"ref7"},{"article-title":"Best Practices in Network Security","year":"2000","author":"avolio","key":"ref2"},{"key":"ref1","first-page":"120","article-title":"The Myth of Secure Computing","volume":"81","author":"austin","year":"2003","journal-title":"Harvard Business Review"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"article-title":"Critical infrastructure operators lack key information","year":"2002","author":"sirhal","key":"ref20"},{"key":"ref22","article-title":"Blaster worm linked to severity of blackout","author":"verton","year":"2003","journal-title":"ComputerWorld"},{"journal-title":"Scenarios The art of strategic conversation","year":"1996","author":"van der heijden","key":"ref21"},{"key":"ref23","article-title":"Dark Screen Sheds Light on Cyberspace Security Issues","volume":"57","author":"white","year":"2003"}],"event":{"name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","start":{"date-parts":[[2004,1,8]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2004,1,8]]}},"container-title":["37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8934\/28293\/01265411.pdf?arnumber=1265411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T14:39:17Z","timestamp":1489502357000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hicss.2004.1265411","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}