{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:56Z","timestamp":1750307516571,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,28]],"date-time":"2009-06-28T00:00:00Z","timestamp":1246147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,28]]},"DOI":"10.1145\/1599272.1599287","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"85-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A study of online service and information exposure of public companies"],"prefix":"10.1145","author":[{"given":"S. H.","family":"Kwok","sequence":"first","affiliation":[{"name":"School of Business Administration, HKUST"}]},{"given":"Anthony C. T.","family":"Lai","sequence":"additional","affiliation":[{"name":"School of Business Administration, HKUST"}]},{"given":"Jason C. K.","family":"Yeung","sequence":"additional","affiliation":[{"name":"Handshake Networking, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2009,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Hang Seng Indexes http:\/\/www.hsi.com.hk\/HSI-Net\/  Hang Seng Indexes http:\/\/www.hsi.com.hk\/HSI-Net\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Johnny Long 2008. Google Hacking for Penetration Testers Volume 2.  Johnny Long 2008. Google Hacking for Penetration Testers Volume 2.","DOI":"10.1016\/B978-159749176-1.50006-0"},{"key":"e_1_3_2_1_3_1","unstructured":"Vulnerable apache web server versions http:\/\/httpd.apache.org\/security\/vulnerabilities_13.html  Vulnerable apache web server versions http:\/\/httpd.apache.org\/security\/vulnerabilities_13.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Technology Risk Management imposed by Hong Kong Monetary Authority http:\/\/www.info.gov.hk\/hkma\/eng\/bank\/spma\/index.htm  Technology Risk Management imposed by Hong Kong Monetary Authority http:\/\/www.info.gov.hk\/hkma\/eng\/bank\/spma\/index.htm"},{"key":"e_1_3_2_1_5_1","unstructured":"SANS Top 20 2008 http:\/\/www.sans.org\/top20\/  SANS Top 20 2008 http:\/\/www.sans.org\/top20\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2009 Data Breach Investigations Report May 2009 http:\/\/www.verizonbusiness.com\/resources\/security\/reports\/2009_databreach_rp.pdf  2009 Data Breach Investigations Report May 2009 http:\/\/www.verizonbusiness.com\/resources\/security\/reports\/2009_databreach_rp.pdf"}],"event":{"name":"KDD09: The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Paris France","acronym":"KDD09"},"container-title":["Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599287","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1599272.1599287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:09Z","timestamp":1750249089000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599287"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,28]]},"references-count":6,"alternative-id":["10.1145\/1599272.1599287","10.1145\/1599272"],"URL":"https:\/\/doi.org\/10.1145\/1599272.1599287","relation":{},"subject":[],"published":{"date-parts":[[2009,6,28]]},"assertion":[{"value":"2009-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}