{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:29Z","timestamp":1750307609739,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,16]],"date-time":"2008-10-16T00:00:00Z","timestamp":1224115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,16]]},"DOI":"10.1145\/1414558.1414609","type":"proceedings-article","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T12:25:44Z","timestamp":1224678344000},"page":"193-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A security thread in a thread-based curriculum"],"prefix":"10.1145","author":[{"given":"Andy Ju An","family":"Wang","sequence":"first","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","volume":"200","author":"Schwartz K.","journal-title":"Week"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324302.1324306"},{"volume-title":"The Overview Report. ACM and IEEE Computer Society, 2005","year":"2005","author":"ACM and IEEE Computer Society","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"ACM Computing Curricula Information Technology Volume. ACM 2005. (at http:\/\/www.acm.org\/education\/curric_vols\/IT_October_2005.pdf)  ACM Computing Curricula Information Technology Volume. ACM 2005. (at http:\/\/www.acm.org\/education\/curric_vols\/IT_October_2005.pdf)"},{"key":"e_1_3_2_1_6_1","unstructured":"Furst M. and Richard DeMillo Creating Symphonic-Thinking Computer Science Graduates for an Increasingly Competitive Global Environment White Paper Georgia Institute of Technology College of Computing http:\/\/www.cc.gatech.edu\/education\/undergrad\/bscs\/threads_whitepaper.pdf.  Furst M. and Richard DeMillo Creating Symphonic-Thinking Computer Science Graduates for an Increasingly Competitive Global Environment White Paper Georgia Institute of Technology College of Computing http:\/\/www.cc.gatech.edu\/education\/undergrad\/bscs\/threads_whitepaper.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"Threads Resources College of Computing Georgia Institute of Technology www.cc.gatech.edu\/education\/undergrad\/bscs accessed on March 2 2008.  Threads Resources College of Computing Georgia Institute of Technology www.cc.gatech.edu\/education\/undergrad\/bscs accessed on March 2 2008."},{"volume-title":"Microsoft Press","year":"2004","author":"Swiderski F.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563480"},{"key":"e_1_3_2_1_10_1","unstructured":"Davidson M. A. \"Leading by Example: the case for IT Security in Academia\" Educause Review Jan\/Feb. 2005.  Davidson M. A. \"Leading by Example: the case for IT Security in Academia\" Educause Review Jan\/Feb. 2005."},{"key":"e_1_3_2_1_11_1","unstructured":"NSF Program Solicitation CISE Pathways to Revitalized Undergraduate Computing Education (CPATH) NSF 06-608 http:\/\/www.nsf.gov\/pubs\/2006\/nsf06608\/nsf06608.htm.  NSF Program Solicitation CISE Pathways to Revitalized Undergraduate Computing Education (CPATH) NSF 06-608 http:\/\/www.nsf.gov\/pubs\/2006\/nsf06608\/nsf06608.htm."},{"volume-title":"Proceedings of Frontiers in Education Conference, Session F1C, IEEE Catalog Number 04CH37579C, ISBN: 0-7803-8553-5.","year":"2004","author":"Wang J. A.","key":"e_1_3_2_1_12_1"},{"volume-title":"American Association of University Women Education Foundation","year":"2000","author":"Tech-Savvy","key":"e_1_3_2_1_13_1"},{"volume-title":"MIT Press","year":"2002","author":"Margolis J.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1227310.1227456"},{"key":"e_1_3_2_1_16_1","unstructured":"NSTISSI-4011 National Training Standard for Information Systems Security (INFOSEC) Professionals dated 20 June 1994. http:\/\/www.cnss.gov\/instructions.html.  NSTISSI-4011 National Training Standard for Information Systems Security (INFOSEC) Professionals dated 20 June 1994. http:\/\/www.cnss.gov\/instructions.html."},{"key":"e_1_3_2_1_17_1","unstructured":"CNSSI-4012 National Information Assurance Training Standard for Senior systems Managers dated June 2004 http:\/\/www.cnss.gov\/instructions.html.  CNSSI-4012 National Information Assurance Training Standard for Senior systems Managers dated June 2004 http:\/\/www.cnss.gov\/instructions.html."},{"key":"e_1_3_2_1_18_1","unstructured":"CNSSI-4013 National Information Assurance Training Standard for System Administrators (SA) dated March 2004. http:\/\/www.cnss.gov\/instructions.html.  CNSSI-4013 National Information Assurance Training Standard for System Administrators (SA) dated March 2004. http:\/\/www.cnss.gov\/instructions.html."},{"key":"e_1_3_2_1_19_1","unstructured":"CNSSI-4014 National Information Assurance Training Standard for Information Systems Security Officers dated April 2004. http:\/\/www.cnss.gov\/instructions.html.  CNSSI-4014 National Information Assurance Training Standard for Information Systems Security Officers dated April 2004. http:\/\/www.cnss.gov\/instructions.html."},{"key":"e_1_3_2_1_20_1","unstructured":"CNSSI-4016 National Information Assurance Training Standard for Risk Analysts dated November 2005. http:\/\/www.cnss.gov\/instructions.html.  CNSSI-4016 National Information Assurance Training Standard for Risk Analysts dated November 2005. http:\/\/www.cnss.gov\/instructions.html."},{"key":"e_1_3_2_1_21_1","unstructured":"ABET 2008-2009 Criteria for Accrediting Computing Programs - New Criteria 2008. http:\/\/www.abet.org\/.  ABET 2008-2009 Criteria for Accrediting Computing Programs - New Criteria 2008. http:\/\/www.abet.org\/."},{"volume-title":"First Workshop of CPATH, Georgia Tech","year":"2008","author":"LeBlanc R.","key":"e_1_3_2_1_22_1"}],"event":{"name":"SIGITE08: ACM Special Interest Group for Information Technology Education Conference","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Cincinnati OH USA","acronym":"SIGITE08"},"container-title":["Proceedings of the 9th ACM SIGITE conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1414558.1414609","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1414558.1414609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:38Z","timestamp":1750250738000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1414558.1414609"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,16]]},"references-count":21,"alternative-id":["10.1145\/1414558.1414609","10.1145\/1414558"],"URL":"https:\/\/doi.org\/10.1145\/1414558.1414609","relation":{},"subject":[],"published":{"date-parts":[[2008,10,16]]},"assertion":[{"value":"2008-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}