{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:34Z","timestamp":1750307974160,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,7,18]],"date-time":"2007-07-18T00:00:00Z","timestamp":1184716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,7,18]]},"DOI":"10.1145\/1280680.1280702","type":"proceedings-article","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T13:06:52Z","timestamp":1223384812000},"page":"149-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting, analyzing and responding to security incidents"],"prefix":"10.1145","author":[{"given":"Rodrigo","family":"Werlinger","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"David","family":"Botta","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2007,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Computer Security Incident Response Team CSIRT web page (accessed Feb 2007) available at: http:\/\/www.cert.org\/csirts  Computer Security Incident Response Team CSIRT web page (accessed Feb 2007) available at: http:\/\/www.cert.org\/csirts"},{"key":"e_1_3_2_1_2_1","unstructured":"HOT Admin project web page (accessed Feb 2007) available at: http:\/\/www.hotadmin.org  HOT Admin project web page (accessed Feb 2007) available at: http:\/\/www.hotadmin.org"},{"key":"e_1_3_2_1_3_1","unstructured":"Kathy Charmaz \"Constructing Grounded Theory\" SAGE publications 2006.  Kathy Charmaz \"Constructing Grounded Theory\" SAGE publications 2006."},{"key":"e_1_3_2_1_4_1","unstructured":"Wikipedia CIA triad web page definition (accesed April 2007) available at: http:\/\/en.wikipedia.org\/wiki\/CIA_triad  Wikipedia CIA triad web page definition (accesed April 2007) available at: http:\/\/en.wikipedia.org\/wiki\/CIA_triad"},{"key":"e_1_3_2_1_5_1","unstructured":"Forum for Incident Response and Security Teams web page (accesed February 2007) available at: http:\/\/www.first.org\/  Forum for Incident Response and Security Teams web page (accesed February 2007) available at: http:\/\/www.first.org\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Eser Kandogan and Eben M. Haber \"Security Administration Tools and Practices\" Security Administration tools and practices O'Reilly August 2005 chapter 18 ISBN: 0-596-00827-9.  Eser Kandogan and Eben M. Haber \"Security Administration Tools and Practices\" Security Administration tools and practices O'Reilly August 2005 chapter 18 ISBN: 0-596-00827-9."},{"key":"e_1_3_2_1_7_1","unstructured":"Fetterman David M. \"Ethnography Step by Step\" Applied Social Research Methods Series Volume 17 second edition 1998.  Fetterman David M. \"Ethnography Step by Step\" Applied Social Research Methods Series Volume 17 second edition 1998."}],"event":{"name":"SOUPS '07: The third Symposium on Usable Privacy and Security","sponsor":["CyLab"],"location":"Pittsburgh Pennsylvania USA","acronym":"SOUPS '07"},"container-title":["Proceedings of the 3rd symposium on Usable privacy and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280680.1280702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1280680.1280702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:23Z","timestamp":1750258703000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280680.1280702"}},"subtitle":["a qualitative analysis"],"short-title":[],"issued":{"date-parts":[[2007,7,18]]},"references-count":7,"alternative-id":["10.1145\/1280680.1280702","10.1145\/1280680"],"URL":"https:\/\/doi.org\/10.1145\/1280680.1280702","relation":{},"subject":[],"published":{"date-parts":[[2007,7,18]]},"assertion":[{"value":"2007-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}