{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:48Z","timestamp":1750307928700,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231073","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"194-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A tentative proposal"],"prefix":"10.1145","author":[{"given":"John C.","family":"Beachboard","sequence":"first","affiliation":[{"name":"Idaho State University, Pocatello, Idaho"}]},{"given":"Alma","family":"Cole","sequence":"additional","affiliation":[{"name":"NIATEC, Pocatello, Idaho"}]},{"given":"Mike","family":"Mellor","sequence":"additional","affiliation":[{"name":"NIATEC, Pocatello, Idaho"}]},{"given":"Steven","family":"Hernandez","sequence":"additional","affiliation":[{"name":"NIATEC, Pocatello, Idaho"}]},{"given":"Kregg","family":"Aytes","sequence":"additional","affiliation":[{"name":"Idaho State University, Pocatello, Idaho"}]},{"given":"Nelson","family":"Massad","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, Jupiter, Florida"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Managing information security risks: The OCTAVE(sm) approach","author":"Alberts C.","year":"2002","unstructured":"Alberts , C. , &amp; Dorofee , A. ( 2002 ). Managing information security risks: The OCTAVE(sm) approach . Boston, MA : Addison-Wesley . Alberts, C., &amp; Dorofee, A. (2002). Managing information security risks: The OCTAVE(sm) approach. Boston, MA: Addison-Wesley."},{"key":"e_1_3_2_1_2_1","volume-title":"Assessing and managing security risk in IT systems: A structured methodology","author":"McCumber J.","year":"2005","unstructured":"McCumber , J. ( 2005 ). Assessing and managing security risk in IT systems: A structured methodology . Boca Raton, FL : Auerbach Publications . McCumber, J. (2005). Assessing and managing security risk in IT systems: A structured methodology. Boca Raton, FL: Auerbach Publications."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Eleventh Americas Conference on Information Systems (p. 3627)","author":"Mooney J.","year":"2005","unstructured":"Mooney , J. , Chun , M. , Hovav , A. , George , J. , &amp; Griffy-Brown , C. ( 2005 ). Are prevailing theories and practices of IS security management adequate? An evaluation and call to action . In Proceedings of the Eleventh Americas Conference on Information Systems (p. 3627) . Omaha, NE: Association for Information Systems. Mooney, J., Chun, M., Hovav, A., George, J., &amp; Griffy-Brown, C. (2005). Are prevailing theories and practices of IS security management adequate? An evaluation and call to action. In Proceedings of the Eleventh Americas Conference on Information Systems (p. 3627). Omaha, NE: Association for Information Systems."},{"key":"e_1_3_2_1_4_1","volume-title":"Special Publication Risk management guide for information technology systems. In 800-30","author":"National Institute of Standards and Technology.","year":"2002","unstructured":"National Institute of Standards and Technology. ( 2002 ). Special Publication Risk management guide for information technology systems. In 800-30 . Washington, DC : U.S. Government Printing Office . National Institute of Standards and Technology. (2002). Special Publication Risk management guide for information technology systems. In 800-30. Washington, DC: U.S. Government Printing Office."},{"volume-title":"Available: http:\/\/www.cert.org\/octave\/methods.html (Accessed","year":"2003","key":"e_1_3_2_1_5_1","unstructured":"OCTAVE methods. ( 2003 ). Available: http:\/\/www.cert.org\/octave\/methods.html (Accessed 9 February 2006). OCTAVE methods. (2003). Available: http:\/\/www.cert.org\/octave\/methods.html (Accessed 9 February 2006)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420031195","volume-title":"Information security risk analysis","author":"Peltier","year":"2005","unstructured":"Peltier , 2. ( 2005 ). Information security risk analysis 2 nd Edition. Boca Raton, FL : Auerbach Publications . Peltier, 2. (2005). Information security risk analysis 2nd Edition. Boca Raton, FL: Auerbach Publications.","edition":"2"},{"key":"e_1_3_2_1_7_1","volume-title":"Information systems &amp","author":"RiskWatch","year":"2005","unstructured":"RiskWatch : Information systems &amp ; ISO 1799 2005 Product Sheet . (2005). Available: http:\/\/www.riskwatch.com\/ProductSheets\/RW-IS_Product_Flyer_0705.pdf (Accessed 31 January 2006). RiskWatch: Information systems &amp; ISO 1799 2005 Product Sheet. (2005). Available: http:\/\/www.riskwatch.com\/ProductSheets\/RW-IS_Product_Flyer_0705.pdf (Accessed 31 January 2006)."},{"key":"e_1_3_2_1_8_1","volume-title":"Secrets &amp","author":"Schneier B.","year":"2004","unstructured":"Schneier , B. ( 2004 ). Secrets &amp ; lies: Digital security in a networked world. Indianapolis, IN : Wiley Publishing . Schneier, B. (2004). Secrets &amp; lies: Digital security in a networked world. Indianapolis, IN: Wiley Publishing."},{"key":"e_1_3_2_1_9_1","volume-title":"Available: http:\/\/sourceforge.net\/docs\/about","author":"Sourceforge FAQ","year":"2006","unstructured":"Sourceforge .net FAQ . ( 2006 ). Available: http:\/\/sourceforge.net\/docs\/about . Sourceforge.net FAQ. (2006). Available: http:\/\/sourceforge.net\/docs\/about."},{"key":"e_1_3_2_1_10_1","volume-title":"Principles of information security","author":"Whitman M. E.","year":"2003","unstructured":"Whitman , M. E. , &amp; Mattord , H. J. ( 2003 ). Principles of information security . Boston, MA : Thomson Course Technology . Whitman, M. E., &amp; Mattord, H. J. (2003). Principles of information security. Boston, MA: Thomson Course Technology."}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231073"}},"subtitle":["improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model"],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":10,"alternative-id":["10.1145\/1231047.1231073","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231073","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}