{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:17Z","timestamp":1750307537056,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,28]],"date-time":"2008-03-28T00:00:00Z","timestamp":1206662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,28]]},"DOI":"10.1145\/1593105.1593201","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T13:29:27Z","timestamp":1249997367000},"page":"361-365","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A case study on computer security for non-expert computer user"],"prefix":"10.1145","author":[{"given":"Felicia","family":"Doswell","sequence":"first","affiliation":[{"name":"Norfolk State University, Norfolk, VA"}]}],"member":"320","published-online":{"date-parts":[[2008,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013202.1013203"},{"key":"e_1_3_2_1_2_1","unstructured":"Drummond T. (2002). Home Computer Security. Carnegie Mellon University.  Drummond T. (2002). Home Computer Security. Carnegie Mellon University."},{"key":"e_1_3_2_1_3_1","unstructured":"Faulkner M. (2003). Host Based Intrusion Detection Systems. The University of Alabama in Huntsville. http:\/\/webpages.uah.edu\/~faulknmj\/660%20tutorial.htm  Faulkner M. (2003). Host Based Intrusion Detection Systems. The University of Alabama in Huntsville. http:\/\/webpages.uah.edu\/~faulknmj\/660%20tutorial.htm"},{"key":"e_1_3_2_1_4_1","unstructured":"Microsoft Corporation. (2007). How to enable and apply security auditing in Windows Auditing in Windows 2000 Server  Microsoft Corporation. (2007). How to enable and apply security auditing in Windows Auditing in Windows 2000 Server"},{"key":"e_1_3_2_1_5_1","unstructured":"Morton H. (July 2006). Identity Theft Statutes. Website: http:\/\/www.ncsl.org\/programs\/lis\/privacy\/idt-statutes.htm  Morton H. (July 2006). Identity Theft Statutes. Website: http:\/\/www.ncsl.org\/programs\/lis\/privacy\/idt-statutes.htm"},{"key":"e_1_3_2_1_6_1","unstructured":"Richardson R. (2003) CSI\/FBI Computer Crime and Security Survey. Website: http:\/\/i.cmpnet.com\/gocsi\/db_area\/pdfs\/fbi\/FBI2003.pdf  Richardson R. (2003) CSI\/FBI Computer Crime and Security Survey. Website: http:\/\/i.cmpnet.com\/gocsi\/db_area\/pdfs\/fbi\/FBI2003.pdf"},{"volume-title":"Retrieved","year":"2002","author":"Rogers R. L.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"Smith G. (2001). Intrusion Detection Systems. INFS440 Emerging Technologies Sciences in Colleges. Volume 18 Issue 6  Smith G. (2001). Intrusion Detection Systems. INFS440 Emerging Technologies Sciences in Colleges. Volume 18 Issue 6"},{"key":"e_1_3_2_1_9_1","unstructured":"Spangler T. (2005). Intrusion Detection and Prevention. Website: http:\/\/www.baselinemag.com\/article2\/0 1397 1816918 00.as p?kc=BANKT0209KTX1K01  Spangler T. (2005). Intrusion Detection and Prevention. Website: http:\/\/www.baselinemag.com\/article2\/0 1397 1816918 00.as p?kc=BANKT0209KTX1K01"},{"key":"e_1_3_2_1_10_1","unstructured":"Stallings W. (2005). Operating Systems Internal and Design Principles. Fifth Edition. Pearson Education Inc.  Stallings W. (2005). Operating Systems Internal and Design Principles. Fifth Edition. Pearson Education Inc."},{"key":"e_1_3_2_1_11_1","article-title":"). Developing and enhancing a computer and network security curriculum","volume":"21","author":"Streff K","year":"2006","journal-title":"Journal of Computing Sciences in Colleges."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095714.1095758"},{"key":"e_1_3_2_1_13_1","article-title":"). Computer security: theory, process and management","volume":"18","author":"Whitson G","year":"2003","journal-title":"Journal of Computing Sciences in Colleges."}],"event":{"name":"ACM SE08: ACM Southeast Regional Conference","acronym":"ACM SE08","location":"Auburn Alabama"},"container-title":["Proceedings of the 46th Annual Southeast Regional Conference on XX"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593201","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1593105.1593201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:19Z","timestamp":1750249399000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,28]]},"references-count":13,"alternative-id":["10.1145\/1593105.1593201","10.1145\/1593105"],"URL":"https:\/\/doi.org\/10.1145\/1593105.1593201","relation":{},"subject":[],"published":{"date-parts":[[2008,3,28]]},"assertion":[{"value":"2008-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}