{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:48Z","timestamp":1750307928681,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231076","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"130-135","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A year affair with security"],"prefix":"10.1145","author":[{"given":"Laurence","family":"Holt","sequence":"first","affiliation":[{"name":"Kennesaw State University, Kennesaw, GA"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Deloitte ( (2006) 2006 Global Security Survey Zurich Switzerland: MacKinnon M. &amp; Melek A.  Deloitte (2006) 2006 Global Security Survey Zurich Switzerland: MacKinnon M. &amp; Melek A."},{"key":"e_1_3_2_1_2_1","unstructured":"\"In God We Trust\" \"All Others We Monitor\" (1995) Generic RC-135 patch image downloaded from http:\/\/www.55srwa.org\/gallery\/55_glr_pic50.html 6 July 2006  \"In God We Trust\" \"All Others We Monitor\" (1995) Generic RC-135 patch image downloaded from http:\/\/www.55srwa.org\/gallery\/55_glr_pic50.html 6 July 2006"},{"key":"e_1_3_2_1_3_1","unstructured":"International Organization for Standardization (2005) Information technology --- Security techniques --- Code of practice for information security management. Reference number ISO\/IEC 17799:2005(E) Switzerland: ISO  International Organization for Standardization (2005) Information technology --- Security techniques --- Code of practice for information security management. Reference number ISO\/IEC 17799:2005(E) Switzerland: ISO"},{"key":"e_1_3_2_1_4_1","unstructured":"McCumber J. (1991) McCumber Cube downloaded from http:\/\/en.wikipedia.org\/wiki\/Mccumber_cube 6 July 2006  McCumber J. (1991) McCumber Cube downloaded from http:\/\/en.wikipedia.org\/wiki\/Mccumber_cube 6 July 2006"},{"key":"e_1_3_2_1_5_1","unstructured":"National Institute of Standards and Technology (1996) Generally Accepted Principles and Practices for Securing Information Technology Systems downloaded from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-14\/800-14.pdf 6 July 2006  National Institute of Standards and Technology (1996) Generally Accepted Principles and Practices for Securing Information Technology Systems downloaded from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-14\/800-14.pdf 6 July 2006"},{"key":"e_1_3_2_1_6_1","unstructured":"National Institute of Standards and Technology (2000) Password Guidelines. downloaded from http:\/\/csrc.nist.gov\/organizations\/fissea\/presentations\/2000\/p asswrd-guide.doc 8 July 2006  National Institute of Standards and Technology (2000) Password Guidelines. downloaded from http:\/\/csrc.nist.gov\/organizations\/fissea\/presentations\/2000\/p asswrd-guide.doc 8 July 2006"},{"key":"e_1_3_2_1_7_1","unstructured":"VISA (2001) Payment Card Industry Data Security Standard retrieved 18 July 2006 from http:\/\/usa.visa.com\/business\/accepting_visa\/ops_risk_manag ement\/cisp.html  VISA (2001) Payment Card Industry Data Security Standard retrieved 18 July 2006 from http:\/\/usa.visa.com\/business\/accepting_visa\/ops_risk_manag ement\/cisp.html"},{"key":"e_1_3_2_1_8_1","unstructured":"Whitman M. E. &amp; Mattord H. J. (2006). Zen and the Art of Information Security - A Philosophical Spiritual and Mystical Approach to Protecting Information. Readings and Cases in the Management of Information Security (pp. 33--44). Canada: Thomson.  Whitman M. E. &amp; Mattord H. J. (2006). Zen and the Art of Information Security - A Philosophical Spiritual and Mystical Approach to Protecting Information. Readings and Cases in the Management of Information Security (pp. 33--44). Canada: Thomson."}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231076"}},"subtitle":["the development of a security program and manager"],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":8,"alternative-id":["10.1145\/1231047.1231076","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231076","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}