{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:49Z","timestamp":1750307929151,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231058","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"52-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Knowledge flow with information assurance track"],"prefix":"10.1145","author":[{"given":"Wasim A.","family":"Al-Hamdani","sequence":"first","affiliation":[{"name":"Kentucky State University, Frankfort, KY"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Kentucky State University Catalogue 2005--2007  Kentucky State University Catalogue 2005--2007"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.itm.iit.edu\/578\/  http:\/\/www.itm.iit.edu\/578\/"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/ia.gordon.army.mil\/iacourses.htm  http:\/\/ia.gordon.army.mil\/iacourses.htm"},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.ccs.neu.edu\/graduate\/msia.html  http:\/\/www.ccs.neu.edu\/graduate\/msia.html"},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.walshcollege.edu\/pages\/883.asp  http:\/\/www.walshcollege.edu\/pages\/883.asp"},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/www.sans.org\/resources\/  http:\/\/www.sans.org\/resources\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Michael E. Whitman Herbert J. Mattord Principles of Information Security Second Edition Course Technology; (November 23 2004)   Michael E. Whitman Herbert J. Mattord Principles of Information Security Second Edition Course Technology; (November 23 2004)"},{"key":"e_1_3_2_1_8_1","unstructured":"Mark Egan Tim Mather The Executive Guide to Information Security: Threats Challenges and Solutions Addison-Wesley Professional (November 30 2004)   Mark Egan Tim Mather The Executive Guide to Information Security: Threats Challenges and Solutions Addison-Wesley Professional (November 30 2004)"},{"key":"e_1_3_2_1_9_1","unstructured":"Mark Merkow James Breithaupt Information Security: Principles and Practices Prentice Hall (August 19 2005)   Mark Merkow James Breithaupt Information Security: Principles and Practices Prentice Hall (August 19 2005)"},{"key":"e_1_3_2_1_10_1","unstructured":"Thomas R. Peltier Information Security Policies Procedures and Standards: Guidelines for Effective Information Security Management AUERBACH; 1 edition (December 20 2001)   Thomas R. Peltier Information Security Policies Procedures and Standards: Guidelines for Effective Information Security Management AUERBACH; 1 edition (December 20 2001)"},{"key":"e_1_3_2_1_11_1","unstructured":"Hossein Bidgoli Handbook of Information Security Threats Vulnerabilities Prevention Detection and Management Wiley (January 3 2006)  Hossein Bidgoli Handbook of Information Security Threats Vulnerabilities Prevention Detection and Management Wiley (January 3 2006)"},{"key":"e_1_3_2_1_12_1","unstructured":"Jan Killmeyer Jan Killmeyer Tudor \"Information Security Architecture Second Edition AUERBACH; 2 edition (June 28 2003)   Jan Killmeyer Jan Killmeyer Tudor \" Information Security Architecture Second Edition AUERBACH; 2 edition (June 28 2003)"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Susan Hansche J. Berti and C. Harre Official (ISC)2 Guide to the CISSP Exam AUERBACH; (December 15 2003)   Susan Hansche J. Berti and C. Harre Official (ISC)2 Guide to the CISSP Exam AUERBACH; (December 15 2003)","DOI":"10.1201\/9780203507872"},{"key":"e_1_3_2_1_14_1","unstructured":"Michael G Solomon and Mike Chapple Information Security Illuminated Jones and Bartlett Illuminated Series 2004   Michael G Solomon and Mike Chapple Information Security Illuminated Jones and Bartlett Illuminated Series 2004"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Susan Hansche Offical (ISC)2 Guide to the CISSPISSPCBK AUERBACH; (2006)   Susan Hansche Offical (ISC)2 Guide to the CISSPISSPCBK AUERBACH; (2006)","DOI":"10.1201\/9780203888933"},{"key":"e_1_3_2_1_16_1","unstructured":"ED Harold F. Tipton and Micki Krause \"Information security Management Handbook\" Third edition Auerbach Pub ISBN 0-8493-9561-5  ED Harold F. Tipton and Micki Krause \"Information security Management Handbook\" Third edition Auerbach Pub ISBN 0-8493-9561-5"},{"key":"e_1_3_2_1_17_1","unstructured":"ED Harold F. Tipton and Micki Krause \"Information security Management Handbook\" Fifth edition Auerbach Pub ISBN 0-8493-1997-8  ED Harold F. Tipton and Micki Krause \"Information security Management Handbook\" Fifth edition Auerbach Pub ISBN 0-8493-1997-8"},{"key":"e_1_3_2_1_18_1","unstructured":"Lewis University http:\/\/www.lewisu.edu\/  Lewis University http:\/\/www.lewisu.edu\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Georgia Tech http:\/\/www.cc.gatech.edu  Georgia Tech http:\/\/www.cc.gatech.edu"},{"key":"e_1_3_2_1_20_1","unstructured":"Kennesaw State University http:\/\/infosec.kennesaw.edu\/  Kennesaw State University http:\/\/infosec.kennesaw.edu\/"},{"key":"e_1_3_2_1_21_1","unstructured":"University of San Francisco http:\/\/www.usfca.edu\/online\/  University of San Francisco http:\/\/www.usfca.edu\/online\/"},{"key":"e_1_3_2_1_22_1","unstructured":"Nova Southeastern University http:\/\/www.scis.nova.edu\/  Nova Southeastern University http:\/\/www.scis.nova.edu\/"},{"key":"e_1_3_2_1_23_1","unstructured":"Iowa State University http:\/\/www.bus.iastate.edu\/  Iowa State University http:\/\/www.bus.iastate.edu\/"},{"key":"e_1_3_2_1_24_1","unstructured":"https:\/\/www.isc2.org\/  https:\/\/www.isc2.org\/"},{"key":"e_1_3_2_1_25_1","unstructured":"http:\/\/www.isaca.org\/  http:\/\/www.isaca.org\/"}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231058","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":25,"alternative-id":["10.1145\/1231047.1231058","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231058","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}