{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T22:11:04Z","timestamp":1768083064261,"version":"3.49.0"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T00:00:00Z","timestamp":1138752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2006,2]]},"DOI":"10.1145\/1113034.1113075","type":"journal-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:07:09Z","timestamp":1139238429000},"page":"81-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["State and local law enforcement is not ready for a cyber Katrina"],"prefix":"10.1145","volume":"49","author":[{"given":"Rahul","family":"Bhaskar","sequence":"first","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2006,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1287\/inte.29.3.77"},{"key":"e_1_2_1_2_1","volume-title":"Business Week (Sept. 19","author":"Cohn L.","year":"2005"},{"key":"e_1_2_1_3_1","unstructured":"Homeland Security Presidential Directive\/HSPD5. Feb. 2003; www.whitehouse.gov\/news\/releases\/2003\/02\/20030228-9.html (accessed Nov. 2005).  Homeland Security Presidential Directive\/HSPD5. Feb. 2003; www.whitehouse.gov\/news\/releases\/2003\/02\/20030228-9.html (accessed Nov. 2005)."},{"key":"e_1_2_1_4_1","unstructured":"The FBI Bulletin. Computer forensics: Characteristics and preservation (2003 accessed from www.findarticles.com Sept. 2005).  The FBI Bulletin. Computer forensics: Characteristics and preservation (2003 accessed from www.findarticles.com Sept. 2005)."},{"key":"e_1_2_1_5_1","unstructured":"Gartner Group. Teleconference on Computer Security (Oct. 2004 accessed Oct. 2005 from www.gartner.com).  Gartner Group. Teleconference on Computer Security (Oct. 2004 accessed Oct. 2005 from www.gartner.com)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Incident Command System (accessed from www.osha.gov Sept. 2005).  Incident Command System (accessed from www.osha.gov Sept. 2005).","DOI":"10.7901\/2169-3358-2005-1-291"},{"key":"e_1_2_1_7_1","unstructured":"Killerece G. et al. State of Practice of Computer Security Incident Response Teams (accessed from www.sei.org on May 15 2005)  Killerece G. et al. State of Practice of Computer Security Incident Response Teams (accessed from www.sei.org on May 15 2005)"},{"key":"e_1_2_1_8_1","unstructured":"MSISAC\n\n  \n  : Mission and Goals (accessed Sept. 2005 from www.cscic.state.ny.us\/msisac\/).  MSISAC: Mission and Goals (accessed Sept. 2005 from www.cscic.state.ny.us\/msisac\/)."},{"key":"e_1_2_1_9_1","unstructured":"The National Strategy to Secure Cyberspace (Feb. 2003 accessed Sept. 2005 from www.dhs.gov).  The National Strategy to Secure Cyberspace (Feb. 2003 accessed Sept. 2005 from www.dhs.gov)."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1113034.1113075","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1113034.1113075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:25Z","timestamp":1750262905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1113034.1113075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,2]]},"references-count":9,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,2]]}},"alternative-id":["10.1145\/1113034.1113075"],"URL":"https:\/\/doi.org\/10.1145\/1113034.1113075","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,2]]},"assertion":[{"value":"2006-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}