{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T16:02:27Z","timestamp":1772467347346,"version":"3.50.1"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2007,7,1]],"date-time":"2007-07-01T00:00:00Z","timestamp":1183248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2007,7]]},"abstract":"<jats:p>The major benefits of knowledge management, particularly as it pertains to security measures, makes it critical that organizations have a mechanism for defining and identifying knowledge needs.<\/jats:p>","DOI":"10.1145\/1272516.1272521","type":"journal-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T13:44:55Z","timestamp":1189777495000},"page":"103-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["A knowledge architecture for IT security"],"prefix":"10.1145","volume":"50","author":[{"given":"Someswar","family":"Kesh","sequence":"first","affiliation":[{"name":"University of Central Missouri, Warrensburg, MO"}]},{"given":"Pauline","family":"Ratnasingam","sequence":"additional","affiliation":[{"name":"University of Central Missouri, Warrensburg, MO"}]}],"member":"320","published-online":{"date-parts":[[2007,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250961"},{"key":"e_1_2_1_2_1","unstructured":"Barth S. Defining KM; www.destinationkm.com\/articles (June 2001)  Barth S. Defining KM; www.destinationkm.com\/articles (June 2001)"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047671.1047694"},{"key":"e_1_2_1_4_1","first-page":"2","article-title":"An integration of thoughts on KM","volume":"34","author":"Hult G.T","year":"2003","unstructured":"Hult , G.T . An integration of thoughts on KM . Decision Sciences 34 , 2 (Spring 2003 ), 189--195. Hult, G.T. An integration of thoughts on KM. Decision Sciences 34, 2 (Spring 2003), 189--195.","journal-title":"Decision Sciences"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2002010102"},{"key":"e_1_2_1_6_1","volume-title":"Management Information Systems-Managing the Digital Firm","author":"Laudon K.C.","year":"2004","unstructured":"Laudon , K.C. and Laudon , J. Management Information Systems-Managing the Digital Firm . Pearson Prentice Hall , Upper Saddle River, NJ, 2004 . Laudon, K.C.and Laudon, J. Management Information Systems-Managing the Digital Firm. Pearson Prentice Hall, Upper Saddle River, NJ, 2004."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/4132333"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITM.2003.002450"},{"key":"e_1_2_1_9_1","volume-title":"The knowledge creating company. Harvard Business Review on KM","author":"Nonaka I.","year":"1998","unstructured":"Nonaka , I. The knowledge creating company. Harvard Business Review on KM . Harvard Business School Press , Boston, MA , 1998 , 21--45. Nonaka, I. The knowledge creating company. Harvard Business Review on KM. Harvard Business School Press, Boston, MA, 1998, 21--45."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.85"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-26","volume-title":"Security Self-Assessment Guide for Information Technology System","author":"Swanson M.","year":"2001","unstructured":"Swanson , M. Security Self-Assessment Guide for Information Technology System . National Institute for Standards and Technology , Special Publication 800-26. U.S. Government Printing Office, Washington, DC. ( 2001 ). Swanson, M. Security Self-Assessment Guide for Information Technology System. National Institute for Standards and Technology, Special Publication 800-26. U.S. Government Printing Office, Washington, DC. (2001)."},{"key":"e_1_2_1_12_1","volume-title":"Thomson Course Technology","author":"Whitman M.E.","year":"2004","unstructured":"Whitman , M.E. , and Mattord , H.J . Management of Information Security . Thomson Course Technology , Boston, MA , 2004 . Whitman, M.E., and Mattord, H.J. Management of Information Security. Thomson Course Technology, Boston, MA, 2004."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1272516.1272521","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1272516.1272521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:11Z","timestamp":1750282871000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1272516.1272521"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":12,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2007,7]]}},"alternative-id":["10.1145\/1272516.1272521"],"URL":"https:\/\/doi.org\/10.1145\/1272516.1272521","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,7]]},"assertion":[{"value":"2007-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}