{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:40:51Z","timestamp":1769636451948,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,9]],"date-time":"2014-09-09T00:00:00Z","timestamp":1410220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,9]]},"DOI":"10.1145\/2659651.2659742","type":"proceedings-article","created":{"date-parts":[[2014,12,16]],"date-time":"2014-12-16T13:41:52Z","timestamp":1418737312000},"page":"65-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Managing Mobile Device Security in Critical Infrastructure Sectors"],"prefix":"10.1145","author":[{"given":"Chalee","family":"Vorakulpipat","sequence":"first","affiliation":[{"name":"National Electronics and Computer Technology Center, Pathumthani, Thailand, +66 2564 6900 ext 2551"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chantri","family":"Polprasert","sequence":"additional","affiliation":[{"name":"Srinakharinwirot University, Bangkok, Thailand, +66 2649 5000 ext 18626"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Siwaruk","family":"Siwamogsatham","sequence":"additional","affiliation":[{"name":"National Electronics and Computer Technology Center, Pathumthani, Thailand, +66 2564 6900 ext 2551"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2014,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"World Economic Forum Annual Meeting","author":"World Economic Forum","year":"2014"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2004.10.001"},{"key":"e_1_3_2_1_3_1","unstructured":"Federal Ministry of the Interior 2008. Protecting Critical Infrastructures -- Risk and Crisis Management. http:\/\/www.bmi.bund.de.  Federal Ministry of the Interior 2008. Protecting Critical Infrastructures -- Risk and Crisis Management. http:\/\/www.bmi.bund.de."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"e_1_3_2_1_6_1","unstructured":"Rashid F. Y. 2012. State of SCADA Security Worries Researchers. http:\/\/www.eweek.com\/c\/a\/Security\/State-of-SCADA-Security-Worry-Researchers-234517\/.  Rashid F. Y. 2012. State of SCADA Security Worries Researchers. http:\/\/www.eweek.com\/c\/a\/Security\/State-of-SCADA-Security-Worry-Researchers-234517\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of IEEE Workshop on Information Assurance and Security","author":"Bowen C. L."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.28945\/91"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-013-0024-2"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of The 38th North American Power Symposium","author":"Davis C. M."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the SCADA Security Scientific Symposium","author":"Cheung S."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of International Conference on Advanced Communication Technology","author":"Kang D.-H."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.405"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.698"},{"key":"e_1_3_2_1_15_1","unstructured":"IBM Internet Security Systems. 2007. A strategic approach to protecting SCADA and process control systems. IBM Internet Security Systems White Paper.  IBM Internet Security Systems. 2007. A strategic approach to protecting SCADA and process control systems. IBM Internet Security Systems White Paper."},{"key":"e_1_3_2_1_16_1","unstructured":"Burt J. 2011. BYOD Trend Pressures Corporate Networks. eWeek 28 14 30--31.  Burt J. 2011. BYOD Trend Pressures Corporate Networks. eWeek 28 14 30--31."},{"key":"e_1_3_2_1_17_1","article-title":"Securing the \"Bring Your Own Device\" Policy","volume":"2","author":"Armando A.","year":"2012","journal-title":"Journal of Internet Services and Information Security."},{"key":"e_1_3_2_1_18_1","unstructured":"Azzurri Communications 2014. Azzurri's BYOD Matrix. http:\/\/www.azzurricommunications.com\/~\/media\/Resources\/White%20papers\/Media\/BYOD%20Matrix%20-%20Stakeholder%20impact.ashx.  Azzurri Communications 2014. Azzurri's BYOD Matrix. http:\/\/www.azzurricommunications.com\/~\/media\/Resources\/White%20papers\/Media\/BYOD%20Matrix%20-%20Stakeholder%20impact.ashx."},{"key":"e_1_3_2_1_19_1","unstructured":"Eschelbeck G. and Schwartzberg D. 2012. \"BYOD Risks and Rewards. A Sophos Whitepaper.  Eschelbeck G. and Schwartzberg D. 2012. \"BYOD Risks and Rewards. A Sophos Whitepaper."},{"key":"e_1_3_2_1_20_1","first-page":"44","article-title":"Tech-savvy teaching","volume":"21","author":"Hockly N.","year":"2012","journal-title":"BYOD. Modern English Teacher"},{"key":"e_1_3_2_1_21_1","unstructured":"Trusted Information Sharing Network for Critical Infrastructure Protection. 2009. Mobile Device Security Information for CIOs\/CSOs. http:\/\/www.tisn.gov.au\/Documents\/Mobile+Device+Security+Information+for+CIOs+and+CSOs.doc.  Trusted Information Sharing Network for Critical Infrastructure Protection. 2009. Mobile Device Security Information for CIOs\/CSOs. http:\/\/www.tisn.gov.au\/Documents\/Mobile+Device+Security+Information+for+CIOs+and+CSOs.doc."}],"event":{"name":"SIN '14: The 7th International Conference on Security of Information and Networks","location":"Glasgow Scotland UK","acronym":"SIN '14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","MNIT Malaviya National Institute of Technology","Aksaray Univ. Aksaray University","SICSA The Scottish Informatics and Computer Science Alliance","University of Glasgow University of Glasgow"]},"container-title":["Proceedings of the 7th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659651.2659742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2659651.2659742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:22Z","timestamp":1750231162000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659651.2659742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,9]]},"references-count":21,"alternative-id":["10.1145\/2659651.2659742","10.1145\/2659651"],"URL":"https:\/\/doi.org\/10.1145\/2659651.2659742","relation":{},"subject":[],"published":{"date-parts":[[2014,9,9]]},"assertion":[{"value":"2014-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}