{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:43Z","timestamp":1750307503303,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940967","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"117-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cautionary tales from real world failures for managing security in the cyber world"],"prefix":"10.1145","author":[{"given":"Bill","family":"Naber","sequence":"first","affiliation":[{"name":"Kennesaw State University, MS, Kennesaw, GA"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Clark C. 1997. Radium Girls: women and industrial health reform. The University of North Carolina Press Chapel Hill NC.  Clark C. 1997. Radium Girls: women and industrial health reform . The University of North Carolina Press Chapel Hill NC."},{"key":"e_1_3_2_1_2_1","unstructured":"Dowie M. 1995. Losing Ground -- American Environmentalism at the Close of the Twentieth Century. The MIT Press Cambridge MA.  Dowie M. 1995. Losing Ground -- American Environmentalism at the Close of the Twentieth Century . The MIT Press Cambridge MA."},{"key":"e_1_3_2_1_3_1","unstructured":"Federal Financial Institutions Examination Council. 2006. Information Security IT Examination Handbook. DOI=http:\/\/www.ffiec.gov\/ffiecinfobase\/booklets\/information_security\/information_security.pdf.  Federal Financial Institutions Examination Council. 2006. Information Security IT Examination Handbook . DOI=http:\/\/www.ffiec.gov\/ffiecinfobase\/booklets\/information_security\/information_security.pdf."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"French F. and Burgess C. 2007. In the Shadow of the Moon -- A Challenging Journey to Tranquility 1965--1969. University of Nebraska Press Lincoln NE.  French F. and Burgess C. 2007. In the Shadow of the Moon -- A Challenging Journey to Tranquility 1965--1969 . University of Nebraska Press Lincoln NE.","DOI":"10.2307\/j.ctt1djmcxs"},{"key":"e_1_3_2_1_5_1","unstructured":"ISC2. 2008. 2008 Annual Report. DOI = https:\/\/www.isc2.org\/uploadedFiles\/(ISC)2_Public_Content\/About_ISC2\/2008 annual report electronic.pdf.  ISC2. 2008. 2008 Annual Report . DOI = https:\/\/www.isc2.org\/uploadedFiles\/(ISC)2_Public_Content\/About_ISC2\/2008 annual report electronic.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"ISO\/IEC JTC 1. 2005. ISO\/IEC 17799:2005 Information technology -- Security Techniques -- Code of practice for information security management. The International Organization for Standardization Switzerland.  ISO\/IEC JTC 1. 2005. ISO\/IEC 17799:2005 Information technology -- Security Techniques -- Code of practice for information security management . The International Organization for Standardization Switzerland."},{"key":"e_1_3_2_1_7_1","unstructured":"IT Governance Institute. 2007. COBIT 4.1 -- Framework Control Objectives Management Guidelines Maturity Models. DOI = http:\/\/www.isaca.org\/Knowledge-Center\/cobit\/Documents\/CobiT_4.1.pdf.   IT Governance Institute. 2007. COBIT 4.1 -- Framework Control Objectives Management Guidelines Maturity Models . DOI = http:\/\/www.isaca.org\/Knowledge-Center\/cobit\/Documents\/CobiT_4.1.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"Lim J. 1998. An Engineering Disaster: Therac-25. DOI= http:\/\/www.stanford.edu\/class\/cs181\/Materials\/therac.pdf.  Lim J. 1998. An Engineering Disaster: Therac-25 . DOI= http:\/\/www.stanford.edu\/class\/cs181\/Materials\/therac.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"McDonald's. 2010. World Wide Web Home Page. DOI=http:\/\/www.mcdonalds.com\/us\/en\/home.html.  McDonald's. 2010. World Wide Web Home Page . DOI=http:\/\/www.mcdonalds.com\/us\/en\/home.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Petroski H. 1997. Design Paradigms -- Case Histories of Error and Judgment in Engineering. The Press Syndicate of the University of Cambridge Cambridge United Kingdom.  Petroski H. 1997. Design Paradigms -- Case Histories of Error and Judgment in Engineering . The Press Syndicate of the University of Cambridge Cambridge United Kingdom."},{"key":"e_1_3_2_1_11_1","unstructured":"Petroski H. 1999. Remaking the World -- Adventures in Engineering. Vintage Books New York NY.  Petroski H. 1999. Remaking the World -- Adventures in Engineering . Vintage Books New York NY."},{"key":"e_1_3_2_1_12_1","unstructured":"Petroski H. 1985. To Engineer is Human -- The Role of Failure in Successful Design. St. Martin's Press New York NY.  Petroski H. 1985. To Engineer is Human -- The Role of Failure in Successful Design . St. Martin's Press New York NY."},{"key":"e_1_3_2_1_13_1","unstructured":"Rhodes R. 2008. Arsenals of Folly -- The Making of the Nuclear Arms Race. Vintage Books New York NY.  Rhodes R. 2008. Arsenals of Folly -- The Making of the Nuclear Arms Race . Vintage Books New York NY."},{"key":"e_1_3_2_1_14_1","unstructured":"Rubin C. 1994. The Green Crusade -- Rethinking the Roots of Environmentalism. Rowman &amp; Littlefield Publishers Inc. Lanham MD.  Rubin C. 1994. The Green Crusade -- Rethinking the Roots of Environmentalism . Rowman &amp; Littlefield Publishers Inc. Lanham MD."},{"key":"e_1_3_2_1_15_1","unstructured":"Singh S. 1999. The Code Book -- The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography. Doubleday New York NY.   Singh S. 1999. The Code Book -- The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography . Doubleday New York NY."},{"key":"e_1_3_2_1_16_1","unstructured":"Whittaker W. 2001. Child Labor in America-History Policy and Legislative Issue. Novinka Books Hauppauge N  Whittaker W. 2001. Child Labor in America-History Policy and Legislative Issue . Novinka Books Hauppauge N"}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '10"},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:50Z","timestamp":1750249070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":16,"alternative-id":["10.1145\/1940941.1940967","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940967","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}