{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:30Z","timestamp":1750307310088,"version":"3.41.0"},"reference-count":13,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2011,11]]},"abstract":"<jats:p>Sounding the alert on emergency calling system deficiencies.<\/jats:p>","DOI":"10.1145\/2018396.2018405","type":"journal-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:05Z","timestamp":1319545385000},"page":"23-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Security risks in next-generation emergency services"],"prefix":"10.1145","volume":"54","author":[{"given":"Hannes","family":"Tschofenig","sequence":"first","affiliation":[{"name":"Nokia Siemens Networks, Finland"}]}],"member":"320","published-online":{"date-parts":[[2011,11]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Barnes R. Cooper A. and Tschofenig H. Technical considerations for next-generation 911---Comments in the matter of framework for next generation 911 deployment PS Docket No. 10--255; http:\/\/fjallfoss.fcc.gov\/ecfs\/document\/view?id=7021034355.  Barnes R. Cooper A. and Tschofenig H. Technical considerations for next-generation 911---Comments in the matter of framework for next generation 911 deployment PS Docket No. 10--255; http:\/\/fjallfoss.fcc.gov\/ecfs\/document\/view?id=7021034355."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for U.S. Policy","author":"Clark D.","year":"2010","unstructured":"Clark , D. , and Landau , S . Untangling attribution . In Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for U.S. Policy , 2010 . Clark, D., and Landau, S. Untangling attribution. In Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for U.S. Policy, 2010."},{"key":"e_1_2_1_3_1","unstructured":"EENA. False emergency calls EENA operations document; http:\/\/www.eena.org\/ressource\/static\/files\/2011_03_15_3.1.2.fc_v1.0.pdf.  EENA. False emergency calls EENA operations document; http:\/\/www.eena.org\/ressource\/static\/files\/2011_03_15_3.1.2.fc_v1.0.pdf."},{"key":"e_1_2_1_4_1","volume-title":"Don't make the call---The new phenomenon of 'swatting","author":"FBI.","year":"2008","unstructured":"FBI. Don't make the call---The new phenomenon of 'swatting ,' Feb. 2008 ; http:\/\/www.fbi.gov\/news\/stories\/2008\/february\/swatting020408. FBI. Don't make the call---The new phenomenon of 'swatting,' Feb. 2008; http:\/\/www.fbi.gov\/news\/stories\/2008\/february\/swatting020408."},{"key":"e_1_2_1_5_1","volume-title":"PS Docket No. 10--255","author":"Federal Communications Commission","year":"2010","unstructured":"Federal Communications Commission . Framework for next generation 911 deployment , PS Docket No. 10--255 , December 21, 2010 ; http:\/\/www.fcc.gov\/daily_Releases\/Daily_Business\/2010\/db1221\/FCC-10-200A1.pdf. Federal Communications Commission. Framework for next generation 911 deployment, PS Docket No. 10--255, December 21, 2010; http:\/\/www.fcc.gov\/daily_Releases\/Daily_Business\/2010\/db1221\/FCC-10-200A1.pdf."},{"key":"e_1_2_1_6_1","unstructured":"NENA. NENA executive board approves end-state vision for next generation 9-1-1; http:\/\/www.nena.org\/stories\/technical\/executive-board-approves-i3-standard.  NENA. NENA executive board approves end-state vision for next generation 9-1-1; http:\/\/www.nena.org\/stories\/technical\/executive-board-approves-i3-standard."},{"key":"e_1_2_1_7_1","volume-title":"NICC ND 1638 Issue 1.1.2","author":"NICC.","year":"2010","unstructured":"NICC. VOIP---Location for Emergency Calls (Architecture) , NICC ND 1638 Issue 1.1.2 , March 2010 ; http:\/\/www.niccstandards.org.uk\/files\/current\/ND1638%20V1.1.2.pdf. NICC. VOIP---Location for Emergency Calls (Architecture), NICC ND 1638 Issue 1.1.2, March 2010; http:\/\/www.niccstandards.org.uk\/files\/current\/ND1638%20V1.1.2.pdf."},{"key":"e_1_2_1_8_1","volume-title":"DRAFT Electronic Authentication Guideline","author":"NIST.","year":"2011","unstructured":"NIST. DRAFT Electronic Authentication Guideline ; Special Publication 800-63, June 2011 ; http:\/\/csrc.nist.gov\/publications\/PubsDrafts.html#SP-800-63-Rev.%201. NIST. DRAFT Electronic Authentication Guideline; Special Publication 800-63, June 2011; http:\/\/csrc.nist.gov\/publications\/PubsDrafts.html#SP-800-63-Rev.%201."},{"key":"e_1_2_1_9_1","unstructured":"NIST. National Strategy for Trust Identities in Cyberspace (NSTIC); http:\/\/www.nist.gov\/nstic\/.  NIST. National Strategy for Trust Identities in Cyberspace (NSTIC); http:\/\/www.nist.gov\/nstic\/."},{"key":"e_1_2_1_10_1","volume-title":"Best current practice for communications services in support of emergency calling","author":"Rosen B.","year":"2011","unstructured":"Rosen , B. and Polk , J . Best current practice for communications services in support of emergency calling ; draft-ietf-ecrit-phonebcp-17 (work in progress), March 2011 . Rosen, B. and Polk, J. Best current practice for communications services in support of emergency calling; draft-ietf-ecrit-phonebcp-17 (work in progress), March 2011."},{"key":"e_1_2_1_11_1","unstructured":"Rosen B. et al. Framework for emergency calling using Internet multimedia; draft-ietf-ecrit-framework-12 (work in progress).  Rosen B. et al. Framework for emergency calling using Internet multimedia; draft-ietf-ecrit-framework-12 (work in progress)."},{"key":"e_1_2_1_12_1","volume-title":"et al. Security threats and requirements for emergency call marking and mapping. RFC","author":"Taylor T.","year":"2008","unstructured":"Taylor , T. et al. Security threats and requirements for emergency call marking and mapping. RFC 5069, January 2008 . Taylor, T. et al. Security threats and requirements for emergency call marking and mapping. RFC 5069, January 2008."},{"key":"e_1_2_1_13_1","volume-title":"May","author":"Tschofenig H.","year":"2011","unstructured":"Tschofenig , H. , Schulzrinne , H. , and Aboba , B . Trustworthy location information, draft-ietf-ecrit-trustworthy-location-02 (work in progress) , May 2011 . Tschofenig, H., Schulzrinne, H., and Aboba, B. Trustworthy location information, draft-ietf-ecrit-trustworthy-location-02 (work in progress), May 2011."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2018396.2018405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2018396.2018405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:04Z","timestamp":1750244404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2018396.2018405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":13,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["10.1145\/2018396.2018405"],"URL":"https:\/\/doi.org\/10.1145\/2018396.2018405","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2011,11]]},"assertion":[{"value":"2011-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}