{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:43Z","timestamp":1750307503822,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940973","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"163-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Sworn to protect...implementing the security systems development life cycle into local law enforcement"],"prefix":"10.1145","author":[{"given":"Brett W.","family":"Brubaker","sequence":"first","affiliation":[{"name":"Kennesaw State University, MS, Kennesaw, GA"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"unstructured":"Austin R. &amp; Darby C. (2003 June). The myth of secure computing. Harvard Business Review 120--126.  Austin R. &amp; Darby C. (2003 June). The myth of secure computing. Harvard Business Review 120--126.","key":"e_1_3_2_1_1_1"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"59","article-title":"The impact of organizational change on information systems security","volume":"8","author":"Cline M.","year":"2010","journal-title":"Journal of Business &amp; Economics Research"},{"unstructured":"Cobb County Government Organizational Chart: http:\/\/www.cobbcounty.org.  Cobb County Government Organizational Chart: http:\/\/www.cobbcounty.org.","key":"e_1_3_2_1_3_1"},{"unstructured":"Georgia Controlled Substance Act (title 16-13-30 of the Official Code of the Georgia Assembly).  Georgia Controlled Substance Act (title 16-13-30 of the Official Code of the Georgia Assembly ).","key":"e_1_3_2_1_4_1"},{"issue":"5","key":"e_1_3_2_1_5_1","first-page":"28","article-title":"Adopting a well-rounded information security solution","volume":"75","author":"Grace E.","year":"2009","journal-title":"Collector"},{"key":"e_1_3_2_1_6_1","first-page":"59","article-title":"Security threats won't let up","volume":"970","author":"Hulme G. V.","year":"2004","journal-title":"Information Week"},{"unstructured":"ISO 17799 and ISO 27001: http\/\/www.17799central.com.  ISO 17799 and ISO 27001: http\/\/www.17799central.com.","key":"e_1_3_2_1_7_1"},{"issue":"2","key":"e_1_3_2_1_8_1","first-page":"103","article-title":"Developing an information security awareness program for a non-profit organization","volume":"5","author":"Kolb N.","year":"2009","journal-title":"International Management Review"},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"58","article-title":"An integrated framework for information security management","volume":"30","author":"Ma Q.","year":"2009","journal-title":"Review of Business"},{"unstructured":"NIST 800-14: http:\/\/www.ffiec.gov\/ffiecinfobase\/resources\/info_sec.  NIST 800-14: http:\/\/www.ffiec.gov\/ffiecinfobase\/resources\/info_sec.","key":"e_1_3_2_1_10_1"},{"unstructured":"Privacy statistics and breach information for commercial organizations: http:\/\/www.privacyrights.org.  Privacy statistics and breach information for commercial organizations: http:\/\/www.privacyrights.org.","key":"e_1_3_2_1_11_1"},{"unstructured":"Robinson A. (1990). Modern approaches to manufacturing improvement: The shingo system. New York New York: Productivity Press.  Robinson A. (1990). Modern approaches to manufacturing improvement: The shingo system . New York New York: Productivity Press.","key":"e_1_3_2_1_12_1"},{"unstructured":"Systems Development Life Cycle chart: http:\/\/www.thinknetworks.co.uk.  Systems Development Life Cycle chart: http:\/\/www.thinknetworks.co.uk.","key":"e_1_3_2_1_13_1"},{"unstructured":"The Commission on Accreditation for Law Enforcement Agencies: http\/\/www.calea.org.  The Commission on Accreditation for Law Enforcement Agencies: http\/\/www.calea.org.","key":"e_1_3_2_1_14_1"},{"unstructured":"Whitman M. E. &amp; Mattord H. J. (2010). Management of information security third edition. Boston Massachusetts: Course Technology.  Whitman M. E. &amp; Mattord H. J. (2010). Management of information security third edition . Boston Massachusetts: Course Technology.","key":"e_1_3_2_1_15_1"}],"event":{"sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"],"acronym":"InfoSecCD '10","name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","location":"Kennesaw Georgia"},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:51Z","timestamp":1750249071000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":15,"alternative-id":["10.1145\/1940941.1940973","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940973","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}