{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:59Z","timestamp":1750306559558,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2683467.2683478","type":"proceedings-article","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T13:32:15Z","timestamp":1420464735000},"page":"117-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Panel Summary"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Edwards","sequence":"first","affiliation":[{"name":"University of New Mexico, Albuquerque, NM, USA"}]},{"given":"Michael","family":"Locasto","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Jeremy","family":"Epstein","sequence":"additional","affiliation":[{"name":"SRI International, Arlington, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Guide to the software engineering body of knowledge-SWEBOK","author":"Abran A.","year":"2001","unstructured":"Abran , A. , Bourque , P. , Dupuis , R. , and Moore , J. W . Guide to the software engineering body of knowledge-SWEBOK . IEEE Press , 2001 . Abran, A., Bourque, P., Dupuis, R., and Moore, J. W. Guide to the software engineering body of knowledge-SWEBOK. IEEE Press, 2001."},{"key":"e_1_3_2_1_2_1","volume-title":"Security economics and the internal market. Study commissioned by ENISA","author":"Anderson R.","year":"2008","unstructured":"Anderson , R. , B\u00f6hme , R. , Clayton , R. , and Moore , T . Security economics and the internal market. Study commissioned by ENISA ( 2008 ). Anderson, R., B\u00f6hme, R., Clayton, R., and Moore, T. Security economics and the internal market. Study commissioned by ENISA (2008)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1100.1304"},{"key":"e_1_3_2_1_4_1","volume-title":"Economics of security: Facing the challenges. Study commissioned by ENISA","author":"B\u00f6hme R.","year":"2011","unstructured":"B\u00f6hme , R. , Rath , M. , Schneider , R. , and Telang , R . Economics of security: Facing the challenges. Study commissioned by ENISA ( 2011 ). B\u00f6hme, R., Rath, M., Schneider, R., and Telang, R. Economics of security: Facing the challenges. Study commissioned by ENISA (2011)."},{"key":"e_1_3_2_1_5_1","volume-title":"WEIS","author":"B\u00f6hme R.","year":"2010","unstructured":"B\u00f6hme , R. , and Schwartz , G . Modeling cyber-insurance: Towards a unifying framework . In WEIS ( 2010 ). B\u00f6hme, R., and Schwartz, G. Modeling cyber-insurance: Towards a unifying framework. In WEIS (2010)."},{"key":"e_1_3_2_1_6_1","volume-title":"How to Avoid a Replay of 'Crypto Wars' in Security Research. ;login 39, 4 (August","author":"Bratus S.","year":"2014","unstructured":"Bratus , S. , Arce , I. , Locasto , M. E. , and Zanero , S . Why Offensive Security Needs Engineering Textbooks: Or , How to Avoid a Replay of 'Crypto Wars' in Security Research. ;login 39, 4 (August 2014 ). Bratus, S., Arce, I., Locasto, M. E., and Zanero, S. Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of 'Crypto Wars' in Security Research. ;login 39, 4 (August 2014)."},{"key":"e_1_3_2_1_7_1","unstructured":"BSIMM. Building security in maturity model. http:\/\/www.bsimm.com\/facts\/ Aug. 2014.  BSIMM. Building security in maturity model. http:\/\/www.bsimm.com\/facts\/ Aug. 2014."},{"key":"e_1_3_2_1_8_1","first-page":"109","volume-title":"Financial markets and financial crises","author":"Calomiris C. W.","year":"1991","unstructured":"Calomiris , C. W. , and Gorton , G . The origins of banking panics: models, facts, and bank regulation . In Financial markets and financial crises . University of Chicago Press , 1991 , pp. 109 -- 174 . Calomiris, C. W., and Gorton, G. The origins of banking panics: models, facts, and bank regulation. In Financial markets and financial crises. University of Chicago Press, 1991, pp. 109--174."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483852.2483854"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920299"},{"key":"e_1_3_2_1_11_1","volume-title":"Aug.","author":"Cmmi","year":"2014","unstructured":"CMMI. Cmmi institute. http:\/\/whatis.cmmiinstitute.com\/what-is-cmmi , Aug. 2014 . CMMI. Cmmi institute. http:\/\/whatis.cmmiinstitute.com\/what-is-cmmi, Aug. 2014."},{"key":"e_1_3_2_1_12_1","unstructured":"Consortium I. S. S. C. Cissp - certified information systems security professional. https:\/\/www.isc2.org\/cissp\/default.aspx.  Consortium I. S. S. C. Cissp - certified information systems security professional. https:\/\/www.isc2.org\/cissp\/default.aspx."},{"key":"e_1_3_2_1_13_1","volume-title":"Aug.","author":"Council","year":"2014","unstructured":"Council , P. S. S. Pci ssc data security standards overview. https:\/\/www.pcisecuritystandards.org\/security_standards\/ , Aug. 2014 . Council, P. S. S. Pci ssc data security standards overview. https:\/\/www.pcisecuritystandards.org\/security_standards\/, Aug. 2014."},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security Symposium","author":"Craver S.","year":"2001","unstructured":"Craver , S. , Wu , M. , Liu , B. , Stubblefield , A. , Swartzlander , B. , Wallach , D. S. , Dean , D. , and Felten , E. W . Reading between the lines: Lessons from the sdmi challenge . In USENIX Security Symposium ( 2001 ). Craver, S., Wu, M., Liu, B., Stubblefield, A., Swartzlander, B., Wallach, D. S., Dean, D., and Felten, E. W. Reading between the lines: Lessons from the sdmi challenge. In USENIX Security Symposium (2001)."},{"key":"e_1_3_2_1_15_1","unstructured":"Criteria C. Common criteria for information technology security. https:\/\/www.commoncriteriaportal.org.  Criteria C. Common criteria for information technology security. https:\/\/www.commoncriteriaportal.org."},{"key":"e_1_3_2_1_16_1","first-page":"2581","article-title":"Nonlawyers and the unauthorized practice of law: An overview of the legal and ethical paramaters","volume":"67","author":"Denckla D. A","year":"1998","unstructured":"Denckla , D. A . Nonlawyers and the unauthorized practice of law: An overview of the legal and ethical paramaters . Fordham L. Rev. 67 ( 1998 ), 2581 . Denckla, D. A. Nonlawyers and the unauthorized practice of law: An overview of the legal and ethical paramaters. Fordham L. Rev. 67 (1998), 2581.","journal-title":"Fordham L. Rev."},{"key":"e_1_3_2_1_17_1","unstructured":"Doctorow C. Why it is not possible to regulate robots. http:\/\/www.theguardian.com\/technology\/blog\/2014\/apr\/02\/why-it-is-not-possible-to-regulate-robots April 2014.  Doctorow C. Why it is not possible to regulate robots. http:\/\/www.theguardian.com\/technology\/blog\/2014\/apr\/02\/why-it-is-not-possible-to-regulate-robots April 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382218"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535813.2535818"},{"key":"e_1_3_2_1_20_1","unstructured":"Evans P. Heartbleed bug: Rcmp asked revenue canada to delay news of sin thefts. http:\/\/www.cbc.ca\/news\/business\/1.2609192 April 2014.  Evans P. Heartbleed bug: Rcmp asked revenue canada to delay news of sin thefts. http:\/\/www.cbc.ca\/news\/business\/1.2609192 April 2014."},{"key":"e_1_3_2_1_21_1","unstructured":"Geer D. Cybersecurity as realpolitik. http:\/\/geer.tinho.net\/geer.blackhat.6viii14.txt Aug. 2014.  Geer D. Cybersecurity as realpolitik. http:\/\/geer.tinho.net\/geer.blackhat.6viii14.txt Aug. 2014."},{"key":"e_1_3_2_1_22_1","first-page":"2","article-title":"Defending the right to self representation: an empirical look at the pro se felony defendant","volume":"85","author":"Hashimoto E","year":"2007","unstructured":"Hashimoto , E . Defending the right to self representation: an empirical look at the pro se felony defendant . North Carolina Law Review 85 , 2 ( 2007 ), 423--487. Hashimoto, E. Defending the right to self representation: an empirical look at the pro se felony defendant. North Carolina Law Review 85, 2 (2007), 423--487.","journal-title":"North Carolina Law Review"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1937-5956.2010.01189.x"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2618111"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1897816.1897832"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/143062.143076"},{"key":"e_1_3_2_1_27_1","volume-title":"Taking the mystery out of web anonymity. The New York Times (July","author":"Markoff J.","year":"2010","unstructured":"Markoff , J. Taking the mystery out of web anonymity. The New York Times (July 2010 ). Markoff, J. Taking the mystery out of web anonymity. The New York Times (July 2010)."},{"key":"e_1_3_2_1_28_1","volume-title":"September","author":"Masnick M.","year":"2012","unstructured":"Masnick , M. Former copyright boss: New technology should be presumed illegal until congress says otherwise. https:\/\/www.techdirt.com\/blog\/innovation\/articles\/20120927\/00320920527\/ , September 2012 . Masnick, M. Former copyright boss: New technology should be presumed illegal until congress says otherwise. https:\/\/www.techdirt.com\/blog\/innovation\/articles\/20120927\/00320920527\/, September 2012."},{"key":"e_1_3_2_1_29_1","volume-title":"October","author":"McSherry C.","year":"2011","unstructured":"McSherry , C. Sopa: Hollywood finally gets a chance to break the internet. https:\/\/www.eff.org\/deeplinks\/2011\/10\/sopa-hollywood-finally-gets-chance-break-internet , October 2011 . McSherry, C. Sopa: Hollywood finally gets a chance to break the internet. https:\/\/www.eff.org\/deeplinks\/2011\/10\/sopa-hollywood-finally-gets-chance-break-internet, October 2011."},{"key":"e_1_3_2_1_30_1","first-page":"327","article-title":"Legislative history of osha, a","volume":"9","author":"Meeds L","year":"1973","unstructured":"Meeds , L . Legislative history of osha, a . Gonz. L. Rev. 9 ( 1973 ), 327 . Meeds, L. Legislative history of osha, a. Gonz. L. Rev. 9 (1973), 327.","journal-title":"Gonz. L. Rev."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/3105524"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653717"},{"key":"e_1_3_2_1_33_1","unstructured":"of America U. S. Digital millenium copyright act. http:\/\/thomas.loc.gov\/cgi-bin\/toGPO\/http:\/\/frwebgate.access.gpo.gov\/cgi-bin\/getdoc.cgi?dbname=105_cong_public_laws&docid=f:publ304.105.pdf 1998.  of America U. S. Digital millenium copyright act. http:\/\/thomas.loc.gov\/cgi-bin\/toGPO\/http:\/\/frwebgate.access.gpo.gov\/cgi-bin\/getdoc.cgi?dbname=105_cong_public_laws&docid=f:publ304.105.pdf 1998."},{"key":"e_1_3_2_1_34_1","unstructured":"of Energy D. Cybersecurity capability maturity model (c2m2). http:\/\/energy.gov\/sites\/prod\/files\/2014\/03\/f13\/C2M2-v1--1_cor.pdf.  of Energy D. Cybersecurity capability maturity model (c2m2). http:\/\/energy.gov\/sites\/prod\/files\/2014\/03\/f13\/C2M2-v1--1_cor.pdf."},{"key":"e_1_3_2_1_35_1","volume-title":"Oct.","author":"Examiners","year":"2010","unstructured":"of Examiners for Engineering, N. C., and Surveying . Continuing professional competency guidelines , Oct. 2010 . of Examiners for Engineering, N. C., and Surveying. Continuing professional competency guidelines, Oct. 2010."},{"key":"e_1_3_2_1_36_1","volume-title":"Apr.","author":"Standards N. I.","year":"1999","unstructured":"of Standards , N. I. , and Technology . Systems security engineering capability maturity model (sse-cmm) , Apr. 1999 . of Standards, N. I., and Technology. Systems security engineering capability maturity model (sse-cmm), Apr. 1999."},{"key":"e_1_3_2_1_37_1","volume-title":"Apr.","author":"Standards N. I.","year":"2014","unstructured":"of Standards , N. I. , and Technology . National vulnerability database. https:\/\/nvd.nist.gov\/ , Apr. 2014 . of Standards, N. I., and Technology. National vulnerability database. https:\/\/nvd.nist.gov\/, Apr. 2014."},{"key":"e_1_3_2_1_38_1","volume-title":"Dec.","author":"Omanovic E.","year":"2013","unstructured":"Omanovic , E. International agreement reached controlling export of mass and intrusive surveillance technology. https:\/\/www.privacyinternational.org\/blog\/international-agreement-reached-controlling-export-of-mass-and-intrusive-surveillance , Dec. 2013 . Omanovic, E. International agreement reached controlling export of mass and intrusive surveillance technology. https:\/\/www.privacyinternational.org\/blog\/international-agreement-reached-controlling-export-of-mass-and-intrusive-surveillance, Dec. 2013."},{"key":"e_1_3_2_1_39_1","unstructured":"Orleans L. U. N. Insurance requirements for contractors. http:\/\/finance.loyno.edu\/risk\/insurance-requirements-contractors 2014.  Orleans L. U. N. Insurance requirements for contractors. http:\/\/finance.loyno.edu\/risk\/insurance-requirements-contractors 2014."},{"volume-title":"Top 10--2010--the ten most critical web application security risks. The Open Web Application Security Project","year":"2010","key":"e_1_3_2_1_40_1","unstructured":"OWASP, T. Top 10--2010--the ten most critical web application security risks. The Open Web Application Security Project ( 2010 ). OWASP, T. Top 10--2010--the ten most critical web application security risks. The Open Web Application Security Project (2010)."},{"key":"e_1_3_2_1_41_1","unstructured":"Pantesco J. Ftc imposes record fine on choicepoint in data-loss case. http:\/\/jurist.law.pitt.edu\/paperchase\/2006\/01\/ftc-imposes-record-fine-on-choicepoint.php Jan. 2006.  Pantesco J. Ftc imposes record fine on choicepoint in data-loss case. http:\/\/jurist.law.pitt.edu\/paperchase\/2006\/01\/ftc-imposes-record-fine-on-choicepoint.php Jan. 2006."},{"key":"e_1_3_2_1_42_1","unstructured":"Proffesional C. S. S. L. https:\/\/www.isc2.org\/csslp\/Default.aspx .  Proffesional C. S. S. L. https:\/\/www.isc2.org\/csslp\/Default.aspx ."},{"key":"e_1_3_2_1_43_1","volume-title":"Aug.","author":"Project O. W. A. S.","year":"2014","unstructured":"Project , O. W. A. S. Software assurance maturity model. https:\/\/www.owasp.org\/index.php\/Category:Software_Assurance_Maturity_Model , Aug. 2014 . Project, O. W. A. S. Software assurance maturity model. https:\/\/www.owasp.org\/index.php\/Category:Software_Assurance_Maturity_Model, Aug. 2014."},{"key":"e_1_3_2_1_44_1","volume-title":"Trusted computer system evaluation criteria","author":"Qiu L.","year":"1985","unstructured":"Qiu , L. , Zhang , Y. , Wang , F. , Kyung , M. , and Mahajan , H. R . Trusted computer system evaluation criteria . In National Computer Security Center ( 1985 ), Citeseer. Qiu, L., Zhang, Y., Wang, F., Kyung, M., and Mahajan, H. R. Trusted computer system evaluation criteria. In National Computer Security Center (1985), Citeseer."},{"key":"e_1_3_2_1_45_1","unstructured":"Ragan S. Cybersecurity should be seen as an occupation not a profession report says. http:\/\/www.csoonline.com\/article\/2134002\/security-awareness\/cybersecurity-should-be-seen-as-an-occupation--not-a-profession--report-says.html Sept. 2013.  Ragan S. Cybersecurity should be seen as an occupation not a profession report says. http:\/\/www.csoonline.com\/article\/2134002\/security-awareness\/cybersecurity-should-be-seen-as-an-occupation--not-a-profession--report-says.html Sept. 2013."},{"key":"e_1_3_2_1_46_1","first-page":"201","article-title":"Police power and the regulation of medical practice: A historical review and guide for medical licensing board regulation of physicians in erisa-qualified managed care organizations, the","volume":"8","author":"Richards E. P","year":"1999","unstructured":"Richards , E. P . Police power and the regulation of medical practice: A historical review and guide for medical licensing board regulation of physicians in erisa-qualified managed care organizations, the . Annals Health L. 8 ( 1999 ), 201 . Richards, E. P. Police power and the regulation of medical practice: A historical review and guide for medical licensing board regulation of physicians in erisa-qualified managed care organizations, the. Annals Health L. 8 (1999), 201.","journal-title":"Annals Health L."},{"key":"e_1_3_2_1_47_1","unstructured":"Risen T. Ftc investigates target data breach. http:\/\/www.usnews.com\/news\/articles\/2014\/03\/26\/ftc-investigates-target-data-breach March 2014.  Risen T. Ftc investigates target data breach. http:\/\/www.usnews.com\/news\/articles\/2014\/03\/26\/ftc-investigates-target-data-breach March 2014."},{"key":"e_1_3_2_1_48_1","unstructured":"Rivner U. Anatomy of an attack. http:\/\/blogs.rsa.com\/anatomy-of-an-attack\/ Apr. 2011.  Rivner U. Anatomy of an attack. http:\/\/blogs.rsa.com\/anatomy-of-an-attack\/ Apr. 2011."},{"key":"e_1_3_2_1_49_1","volume-title":"Apr.","author":"Schneier B.","year":"2002","unstructured":"Schneier , B. Liability and security. https:\/\/www.schneier.com\/crypto-gram-0204.html#6 , Apr. 2002 . Schneier, B. Liability and security. https:\/\/www.schneier.com\/crypto-gram-0204.html#6, Apr. 2002."},{"key":"e_1_3_2_1_50_1","volume-title":"Dec.","author":"Schneier B.","year":"2010","unstructured":"Schneier , B. Brian snow sows cyber fears. https:\/\/www.schneier.com\/blog\/archives\/2010\/12\/brian_snow_sows.html , Dec. 2010 . Schneier, B. Brian snow sows cyber fears. https:\/\/www.schneier.com\/blog\/archives\/2010\/12\/brian_snow_sows.html, Dec. 2010."},{"key":"e_1_3_2_1_51_1","volume-title":"The ftc and the new common law of privacy. Available at SSRN","author":"Solove D. J.","year":"2013","unstructured":"Solove , D. J. , and Hartzog , W . The ftc and the new common law of privacy. Available at SSRN ( 2013 ). Solove, D. J., and Hartzog, W. The ftc and the new common law of privacy. Available at SSRN (2013)."},{"key":"e_1_3_2_1_52_1","volume-title":"A model pregime of privacy protection (version 3.0). Available at SSRN","author":"Solove D. J.","year":"2013","unstructured":"Solove , D. J. , and Hoofnagle , C. J . A model pregime of privacy protection (version 3.0). Available at SSRN ( 2013 ). Solove, D. J., and Hoofnagle, C. J. A model pregime of privacy protection (version 3.0). Available at SSRN (2013)."},{"key":"e_1_3_2_1_53_1","volume-title":"Analyzing the md5 collision in flame. Presentation at SummerCon, slides","author":"Sotirov A.","year":"2012","unstructured":"Sotirov , A. Analyzing the md5 collision in flame. Presentation at SummerCon, slides available at http:\/\/www. trailofbits. com\/resources\/flame-md5. pdf ( 2012 ). Sotirov, A. Analyzing the md5 collision in flame. Presentation at SummerCon, slides available at http:\/\/www. trailofbits. com\/resources\/flame-md5. pdf (2012)."},{"key":"e_1_3_2_1_54_1","unstructured":"Stanley M. K. Aig: Cyber threats a top concern for industry execs. http:\/\/www.lifehealthpro.com\/2013\/02\/07\/aig-cyber-threats-a-top-concern-for-industry-execs February 2013.  Stanley M. K. Aig: Cyber threats a top concern for industry execs. http:\/\/www.lifehealthpro.com\/2013\/02\/07\/aig-cyber-threats-a-top-concern-for-industry-execs February 2013."},{"key":"e_1_3_2_1_55_1","volume-title":"Curbing the Market for Cyber Weapons. Yale Law and Policy Review (December","author":"Stockton P.","year":"2013","unstructured":"Stockton , P. , and Golabek-Goldman , M. Curbing the Market for Cyber Weapons. Yale Law and Policy Review (December 2013 ). Stockton, P., and Golabek-Goldman, M. Curbing the Market for Cyber Weapons. Yale Law and Policy Review (December 2013)."},{"key":"e_1_3_2_1_56_1","volume-title":"The firm behind healthcare.gov had topnotch credentials -- and it didn't help. ComputerWorld (Oct","author":"Thibodeau P.","year":"2013","unstructured":"Thibodeau , P. The firm behind healthcare.gov had topnotch credentials -- and it didn't help. ComputerWorld (Oct . 2013 ). Thibodeau, P. The firm behind healthcare.gov had topnotch credentials -- and it didn't help. ComputerWorld (Oct. 2013)."},{"key":"e_1_3_2_1_57_1","volume-title":"Insurers struggle to get a grip on the burgeoning cyber risk market","author":"Thomas L.","year":"2014","unstructured":"Thomas , L. , and Finkle , J . Insurers struggle to get a grip on the burgeoning cyber risk market . Reuters (July 2014 ). Thomas, L., and Finkle, J. Insurers struggle to get a grip on the burgeoning cyber risk market. Reuters (July 2014)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/0305787950470401"},{"key":"e_1_3_2_1_59_1","volume-title":"Owasp top 10--2013 rcl-the ten most critical web application security risks. The open wep application security project","author":"Williams J.","year":"2013","unstructured":"Williams , J. , and Wichers , D . Owasp top 10--2013 rcl-the ten most critical web application security risks. The open wep application security project ( 2013 ). Williams, J., and Wichers, D. Owasp top 10--2013 rcl-the ten most critical web application security risks. The open wep application security project (2013)."},{"key":"e_1_3_2_1_60_1","volume-title":"The$10 million deductible. Slate (June","author":"Wolff J.","year":"2014","unstructured":"Wolff , J. The$10 million deductible. Slate (June 2014 ). Wolff, J. The$10 million deductible. Slate (June 2014)."},{"key":"e_1_3_2_1_61_1","unstructured":"Zetter K. The fight over cyber oversight. http:\/\/archive.wired.com\/politics\/security\/news\/2005\/02\/66632r February 2005.  Zetter K. The fight over cyber oversight. http:\/\/archive.wired.com\/politics\/security\/news\/2005\/02\/66632r February 2005."}],"event":{"name":"NSPW '14: New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Victoria British Columbia Canada","acronym":"NSPW '14"},"container-title":["Proceedings of the 2014 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683478","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2683467.2683478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:59Z","timestamp":1750227179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683478"}},"subtitle":["The Future of Software Regulation"],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":61,"alternative-id":["10.1145\/2683467.2683478","10.1145\/2683467"],"URL":"https:\/\/doi.org\/10.1145\/2683467.2683478","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}