{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:30:30Z","timestamp":1761708630386,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940953","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"45-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Using the Parkerian Hexad to introduce security in an information literacy class"],"prefix":"10.1145","author":[{"given":"Randall C.","family":"Reid","sequence":"first","affiliation":[{"name":"University of West Florida, Pensacola, Fla"}]},{"given":"Arthur H.","family":"Gilbert","sequence":"additional","affiliation":[{"name":"University of West Florida, Pensacola, Fla"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Information Security Management: Understanding ISO 17799","author":"Carlson T.","year":"2001","unstructured":"Carlson , T. , Information Security Management: Understanding ISO 17799 , 2001 , INS Whitepaper , DOL= http:\/\/www.ins.com\/downloads\/whitepapers\/ins_white_paper_info_security_iso_17799_1101.pdf Carlson, T., Information Security Management: Understanding ISO 17799, 2001, INS Whitepaper, DOL= http:\/\/www.ins.com\/downloads\/whitepapers\/ins_white_paper_info_security_iso_17799_1101.pdf"},{"unstructured":"Choney S. \"Is the desktop going the way of the dinosaur?\" 2008 DOL= http:\/\/www.msnbc.msn.com\/id\/27556783\/  Choney S. \"Is the desktop going the way of the dinosaur?\" 2008 DOL= http:\/\/www.msnbc.msn.com\/id\/27556783\/","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-124","volume-title":"NIST Special Publication 800-124 Guidelines on Cell Phone and PDA Security","author":"Jansen W.","year":"2008","unstructured":"Jansen , W. and Scarfone , K. , \" NIST Special Publication 800-124 Guidelines on Cell Phone and PDA Security \", 2008 DOL = http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-124\/SP800-124.pdf Jansen, W. and Scarfone, K., \"NIST Special Publication 800-124 Guidelines on Cell Phone and PDA Security\", 2008 DOL= http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-124\/SP800-124.pdf"},{"unstructured":"Kabay \" Security for Telecommuters\" DOL= http:\/\/www.buscalegis.ccj.ufsc.br\/revistas\/index.php\/buscalegis\/article\/viewFile\/3003\/2574  Kabay \" Security for Telecommuters\" DOL= http:\/\/www.buscalegis.ccj.ufsc.br\/revistas\/index.php\/buscalegis\/article\/viewFile\/3003\/2574","key":"e_1_3_2_1_4_1"},{"volume-title":"Keynote Address: International Conf. on Mobile Computing and Networking (MOBICOM 1995)","author":"Kleinrock L.","unstructured":"Kleinrock , L. , \" Nomadic Computing \" Keynote Address: International Conf. on Mobile Computing and Networking (MOBICOM 1995) DOL= http:\/\/www.cs.ucla.edu\/~lk\/LK\/Bib\/PS\/paper199.pdf Kleinrock, L., \"Nomadic Computing\" Keynote Address: International Conf. on Mobile Computing and Networking (MOBICOM 1995) DOL= http:\/\/www.cs.ucla.edu\/~lk\/LK\/Bib\/PS\/paper199.pdf","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Fighting Computer Crime: A new Framework for Protecting Information New York","author":"Parker D. B.","year":"1998","unstructured":"Parker , D. B. Fighting Computer Crime: A new Framework for Protecting Information New York . 1998 , Wiley Computer Publishing , John Wiley &amp; Sons, Inc. Parker, D. B. Fighting Computer Crime: A new Framework for Protecting Information New York. 1998, Wiley Computer Publishing, John Wiley &amp; Sons, Inc."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1107622.1107636"},{"key":"e_1_3_2_1_8_1","volume-title":"transforming market, generation","author":"Sidener J","year":"2008","unstructured":"Sidener , J , \" Cell phones taking on many roles , transforming market, generation \", 2008 , DOL = http:\/\/legacy.signonsandiego.com\/news\/metro\/20080127-9999-1n27phone.html Sidener, J, \"Cell phones taking on many roles, transforming market, generation\", 2008, DOL= http:\/\/legacy.signonsandiego.com\/news\/metro\/20080127-9999-1n27phone.html"},{"key":"e_1_3_2_1_9_1","volume-title":"Security Architecture for Sensitive Information Systems","author":"Wu X.","year":"2009","unstructured":"Wu , X. , Security Architecture for Sensitive Information Systems , 2009 , PhD dissertation at Monash University DOL = http:\/\/beast.infotech.monash.edu.au\/~srini\/theses\/Ping_Thesis.pdf Wu, X., Security Architecture for Sensitive Information Systems, 2009, PhD dissertation at Monash University DOL= http:\/\/beast.infotech.monash.edu.au\/~srini\/theses\/Ping_Thesis.pdf"}],"event":{"sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"],"acronym":"InfoSecCD '10","name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","location":"Kennesaw Georgia"},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940953","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:50Z","timestamp":1750249070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":9,"alternative-id":["10.1145\/1940941.1940953","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940953","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}