{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:30:23Z","timestamp":1761708623371,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940966","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"107-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques"],"prefix":"10.1145","author":[{"given":"Richard M.","family":"Schneider","sequence":"first","affiliation":[{"name":"Kennesaw State University, MS, Kennesaw, GA"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"volume-title":"Retrieved","year":"2010","author":"International Telecommunication Union","key":"e_1_3_2_1_1_1"},{"volume-title":"International Journal of The Computer, The Internet, and Management, 10 (2). 1--22.","year":"2002","author":"Zang Z.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/14637150510619902"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.146"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/619060.621653"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Hwang M. S. Li C. T. Shen J. J. Chen Y. P. Challenges in e-government and security of information. Information &amp; Security: An International Journal 15 (1). 9--20.  Hwang M. S. Li C. T. Shen J. J. Chen Y. P. Challenges in e-government and security of information. Information &amp; Security: An International Journal 15 (1). 9--20.","DOI":"10.11610\/isij.1501"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.133"},{"volume":"130","volume-title":"Proceedings of the 2003 Annual National Conference on Digital Government Research. (Boston, MA, 2003). ACM International Conference Proceeding Series","author":"Luna-Reyes L. F.","key":"e_1_3_2_1_8_1"},{"volume-title":"Thomson Course Technology","year":"2010","author":"Whitman M.","key":"e_1_3_2_1_9_1"},{"volume-title":"Retrieved","year":"2010","author":"Stoneburner G.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Evangelidis A. A risk assessment framework for e-services. Electronic Journal of e-Government 2 (1). 21--30.  Evangelidis A. A risk assessment framework for e-services. Electronic Journal of e-Government 2 (1). 21--30."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Tchankova L. Risk Identification - Basic Stage in Risk Management. Environmental Management and Health 13 (3). 290--297.  Tchankova L. Risk Identification - Basic Stage in Risk Management. Environmental Management and Health 13 (3). 290--297.","DOI":"10.1108\/09566160210431088"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Liebermann Y. Stashevsky S. Perceived risks as barriers to internet and e-commerce usage. Qualitative Market Research: An International Journal 5 (4). 291--300.  Liebermann Y. Stashevsky S. Perceived risks as barriers to internet and e-commerce usage. Qualitative Market Research: An International Journal 5 (4). 291--300.","DOI":"10.1108\/13522750210443245"},{"key":"e_1_3_2_1_14_1","unstructured":"Zhou Z. Hu C. Study on the e-government security risk management. IJCSNS International Journal of Computer Science and Network Security 8 (5). 208--213.  Zhou Z. Hu C. Study on the e-government security risk management. IJCSNS International Journal of Computer Science and Network Security 8 (5). 208--213."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Fein R. A. Vossekuil B. &amp; Holden G. A. (1995). Threat assessment: An approach to prevent targeted violence. National Institute of Justice: Research in Action 1--7.  Fein R. A. Vossekuil B. &amp; Holden G. A. (1995). Threat assessment: An approach to prevent targeted violence. National Institute of Justice: Research in Action 1--7.","DOI":"10.1037\/e517592006-001"},{"volume-title":"Weapons of Mass Destruction Terrorism Research Program. Retrieved","year":"2010","author":"Ackerman A.","key":"e_1_3_2_1_16_1"}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '10"},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940966","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:50Z","timestamp":1750249070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":16,"alternative-id":["10.1145\/1940941.1940966","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940966","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}