{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:42Z","timestamp":1750307502955,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940964","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"97-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Threat based risk management in the federal sector"],"prefix":"10.1145","author":[{"given":"Nathan","family":"Volk","sequence":"first","affiliation":[{"name":"Kennesaw State University, Kennesaw, GA"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Federal Information Security Management Act of 2002 H. R. 2458--48. DOI=http:\/\/csrc.nist.gov\/drivers\/documents\/FISMA-final.pdf.  Federal Information Security Management Act of 2002 H. R. 2458--48. DOI=http:\/\/csrc.nist.gov\/drivers\/documents\/FISMA-final.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"Government Accountability Office. {2008} Cyber Analysis and Warning. (GAO-08-588) DOI=http:\/\/democrats.science.house.gov\/Media\/file\/Reports\/GAO_report_7.08.pdf  Government Accountability Office. {2008} Cyber Analysis and Warning. (GAO-08-588) DOI=http:\/\/democrats.science.house.gov\/Media\/file\/Reports\/GAO_report_7.08.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"Department of Homeland Security. {2003} National Strategy to Secure Cyberspace. DOI=http:\/\/www.dhs.gov\/xlibrary\/assets\/National_Cyberspace_Strategy.pdf.  Department of Homeland Security. {2003} National Strategy to Secure Cyberspace. DOI=http:\/\/www.dhs.gov\/xlibrary\/assets\/National_Cyberspace_Strategy.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Sternstein Aliya. {2010}. Federal Cybersecurity Goes Real Time and Digital. Next. Gov. DOI=www.nextgov.com\/nextgov\/ng_20100421_5175.php  Sternstein Aliya. {2010}. Federal Cybersecurity Goes Real Time and Digital . Next. Gov. DOI=www.nextgov.com\/nextgov\/ng_20100421_5175.php"},{"key":"e_1_3_2_1_5_1","unstructured":"Bain Ben. {2010}. NASAs New Fisma Approach and What It Means For You. Federal Computer Week. DOI=http:\/\/fcw.com\/articles\/2010\/05\/24\/web-nasa-fisma-memo.aspx  Bain Ben. {2010}. NASAs New Fisma Approach and What It Means For You . Federal Computer Week. DOI=http:\/\/fcw.com\/articles\/2010\/05\/24\/web-nasa-fisma-memo.aspx"},{"key":"e_1_3_2_1_6_1","unstructured":"National Insitute of Standards and Technologies. {2010} Special Publication 800--53 Revision 3 DOI=http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-53-Rev3\/sp800-53-rev3-final.pdf  National Insitute of Standards and Technologies. {2010} Special Publication 800--53 Revision 3 DOI=http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-53-Rev3\/sp800-53-rev3-final.pdf"},{"key":"e_1_3_2_1_7_1","unstructured":"Government Accountability Office. {2009} Concerted Effort Needed To Improve Federal Performance Measures. (GAO-10-159T) DOI=www.gao.gov\/new.items\/d10159t.pdf  Government Accountability Office. {2009} Concerted Effort Needed To Improve Federal Performance Measures. (GAO-10-159T) DOI=www. gao .gov\/new.items\/d 10159t .pdf"},{"key":"e_1_3_2_1_8_1","unstructured":"National Insitute of Standards and Technologies. {2004} FIPS-199 Standards for Security Categorization of Federal Information and Information Systems DOI= http:\/\/csrc.nist.gov\/publications\/fips\/fips199\/FIPS-PUB-199-final.pdf  National Insitute of Standards and Technologies. {2004} FIPS-199 Standards for Security Categorization of Federal Information and Information Systems DOI= http:\/\/csrc.nist.gov\/publications\/fips\/fips199\/FIPS-PUB-199-final.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"National Insitute of Standards and Technologies. {2006} FIPS-200 Minimum Security Requirements for Federal Information and Information Systems DOI=http:\/\/csrc.nist.gov\/publications\/fips\/fips200\/FIPS-200-final-march.pdf  National Insitute of Standards and Technologies. {2006} FIPS-200 Minimum Security Requirements for Federal Information and Information Systems DOI=http:\/\/csrc.nist.gov\/publications\/fips\/fips200\/FIPS-200-final-march.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"National Insitute of Standards and Technologies. {2006} Special Publication 800--18 Guide for Developing Security Plans for Federal Information Systems DOI= http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-18-Rev1\/sp800-18-Rev1-final.pdf  National Insitute of Standards and Technologies. {2006} Special Publication 800--18 Guide for Developing Security Plans for Federal Information Systems DOI= http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-18-Rev1\/sp800-18-Rev1-final.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"Office of Management and Budget. {2001} Memorandum for Heads the Heads of Executive Departments and Agencies M-02-01  Office of Management and Budget. {2001} Memorandum for Heads the Heads of Executive Departments and Agencies M-02-01"},{"volume-title":"Marcus Ranum: The Biggest Security Threats Getting the Least Attention. Bank Info Security. DOI=http:\/\/www.bankinfosecurity.com\/articles.php?art_id=2032?rf=010810eb","year":"2009","author":"Field Tom","key":"e_1_3_2_1_12_1"},{"first-page":"45","volume-title":"Whitman, Michael &amp","author":"Herrod","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Whitman Michael &amp; Mattord Herbert (2010). Management of Information Security. Mason OH: Concourse Technology.   Whitman Michael &amp; Mattord Herbert (2010). Management of Information Security . Mason OH: Concourse Technology."},{"key":"e_1_3_2_1_15_1","unstructured":"Gorman Siobhan {2010}. Details of \"Einstein\" Cyber Shield Disclosed by White House DOI= http:\/\/blogs.wsj.com\/digits\/2010\/03\/02\/%E2%80%9Ceinstein%E2%80%9D-program-disclosed-as-us-cyber-shield\/  Gorman Siobhan {2010}. Details of \"Einstein\" Cyber Shield Disclosed by White House DOI= http:\/\/blogs.wsj.com\/digits\/2010\/03\/02\/%E2%80%9Ceinstein%E2%80%9D-program-disclosed-as-us-cyber-shield\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Microsoft Technet DOI=http:\/\/technet.microsoft.com\/en-us\/library\/Cc751212.sgfg0201_big%28en-us TechNet.10%29.gif  Microsoft Technet DOI=http:\/\/technet.microsoft.com\/en-us\/library\/Cc751212.sgfg0201_big%28en-us TechNet.10%29.gif"},{"key":"e_1_3_2_1_17_1","unstructured":"Office of Management and Budget {2009} Fiscal Year 2008 Report to Congresson Implementation of The Federal Information Security Security Act of 2002 DOI= http:\/\/www.google.com\/url?sa=t&amp;source=web&amp;cd=2&amp;ved=0CBgQFjAB&amp;url=http%3A%2F%2Fwww.whitehouse.gov%2Fomb%2Fasset.aspx%3FAssetId%3D835&amp;ei=iKo7TN7FAYL-8AaNntmnBg&amp;usg=AFQjCNFJXNx80ksfO1FReLSzzVbyRCJ0fg  Office of Management and Budget {2009} Fiscal Year 2008 Report to Congresson Implementation of The Federal Information Security Security Act of 2002 DOI= http:\/\/www.google.com\/url?sa=t&amp;source=web&amp;cd=2&amp;ved=0CBgQFjAB&amp;url=http%3A%2F%2Fwww.whitehouse.gov%2Fomb%2Fasset.aspx%3FAssetId%3D835&amp;ei=iKo7TN7FAYL-8AaNntmnBg&amp;usg=AFQjCNFJXNx80ksfO1FReLSzzVbyRCJ0fg"}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '10"},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:50Z","timestamp":1750249070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":17,"alternative-id":["10.1145\/1940941.1940964","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940964","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}