{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:05Z","timestamp":1750307885331,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,28]],"date-time":"2007-09-28T00:00:00Z","timestamp":1190937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,28]]},"DOI":"10.1145\/1409908.1409933","type":"proceedings-article","created":{"date-parts":[[2008,9,30]],"date-time":"2008-09-30T13:03:19Z","timestamp":1222779799000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Management of security policies for mobile devices"],"prefix":"10.1145","author":[{"given":"Andy","family":"Green","sequence":"first","affiliation":[{"name":"Kennesaw State University, Kennesaw, GA"}]}],"member":"320","published-online":{"date-parts":[[2007,9,28]]},"reference":[{"volume-title":"Retrieved","year":"2007","key":"e_1_3_2_1_1_1","unstructured":"\"Bluetooth\". ( 2007 ). Retrieved June 25, 2007, from http:\/\/en.wikipedia.org\/wiki\/Bluetooth \"Bluetooth\". (2007). Retrieved June 25, 2007, from http:\/\/en.wikipedia.org\/wiki\/Bluetooth"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"Brenner Bill","year":"2007","unstructured":"Brenner , Bill . ( 2007 , February 13). \"Mobile carriers admit to malware attacks \". Retrieved June 25, 2007 from http:\/\/searchsecurity.techtarget.com\/originalContent\/0,289142,sid14_gci1243513,00.html Brenner, Bill. (2007, February 13). \"Mobile carriers admit to malware attacks\". Retrieved June 25, 2007 from http:\/\/searchsecurity.techtarget.com\/originalContent\/0,289142,sid14_gci1243513,00.html"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Hackers","year":"2007","unstructured":"\" Hackers using a new threat, Web@Work survey\". (2006, May 18) . Retrieved June 25, 2007 from http:\/\/www.crimeresearch.org\/articles\/hackers-using-new-threat\/ \"Hackers using a new threat, Web@Work survey\". (2006, May 18). Retrieved June 25, 2007 from http:\/\/www.crimeresearch.org\/articles\/hackers-using-new-threat\/"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Phifer Lisa","year":"2006","unstructured":"Phifer , Lisa . ( 2006 , April 25). \"Policies for reducing mobile risk \". Retrieved June 25, 2007 from http:\/\/searchsecurity.techtarget.com\/tip\/0,289483,sid14_gci1184648,00.html?bucket=ETA&topic=300021 Phifer, Lisa. (2006, April 25). \"Policies for reducing mobile risk\". Retrieved June 25, 2007 from http:\/\/searchsecurity.techtarget.com\/tip\/0,289483,sid14_gci1184648,00.html?bucket=ETA&topic=300021"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Pritchard Stephen","year":"2007","unstructured":"Pritchard , Stephen . ( 2007 , June 18). \"Mobile apps will boost productivity \". Retrieved June 25, 2007, from http:\/\/www.computerweekly.com\/Articles\/2007\/06\/18\/224847\/mobile-apps-will-boost-productivity.htm Pritchard, Stephen. (2007, June 18). \"Mobile apps will boost productivity\". Retrieved June 25, 2007, from http:\/\/www.computerweekly.com\/Articles\/2007\/06\/18\/224847\/mobile-apps-will-boost-productivity.htm"},{"volume-title":"Retrieved","year":"2007","key":"e_1_3_2_1_6_1","unstructured":"\"Smartphone\". ( 2007 ). Retrieved June 25, 2007 from http:\/\/en.wikipedia.org\/wiki\/Smart_phone \"Smartphone\". (2007). Retrieved June 25, 2007 from http:\/\/en.wikipedia.org\/wiki\/Smart_phone"},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"Sturgeon Will","year":"2006","unstructured":"Sturgeon , Will . ( 2006 , February 15). \"Beware the 'pod slurping' employee \". Retrieved June 25, 2007, from http:\/\/news.com.com\/Beware+the+pod+slurping+employee\/2100-1029_3-6039926.html Sturgeon, Will. (2006, February 15). \"Beware the 'pod slurping' employee\". Retrieved June 25, 2007, from http:\/\/news.com.com\/Beware+the+pod+slurping+employee\/2100-1029_3-6039926.html"},{"key":"e_1_3_2_1_8_1","volume-title":"Management of Information Security","author":"Whitman M.","year":"2007","unstructured":"Whitman , M. , &amp; Mattord , H. ( 2007 ). Management of Information Security ( 2 nd ed.). Boston : Thomson Course Technology . Whitman, M., &amp; Mattord, H. (2007). Management of Information Security (2nd ed.). Boston: Thomson Course Technology.","edition":"2"}],"event":{"name":"InfoSecCD07: 2007 Information Security Curriculum Development Conference","acronym":"InfoSecCD07","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 4th annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409908.1409933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1409908.1409933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:09Z","timestamp":1750258029000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409908.1409933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,28]]},"references-count":8,"alternative-id":["10.1145\/1409908.1409933","10.1145\/1409908"],"URL":"https:\/\/doi.org\/10.1145\/1409908.1409933","relation":{},"subject":[],"published":{"date-parts":[[2007,9,28]]},"assertion":[{"value":"2007-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}