{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:07Z","timestamp":1750306147642,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T00:00:00Z","timestamp":1475020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,28]]},"DOI":"10.1145\/2978192.2978235","type":"proceedings-article","created":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T14:28:57Z","timestamp":1473431337000},"page":"77-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Security Requirements Embedded in MS Programs in Information Sciences and Technologies"],"prefix":"10.1145","author":[{"given":"Jai W.","family":"Kang","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Qi","family":"Yu","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Edward P.","family":"Holden","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Tae H.","family":"Oh","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Luiz Fernando Capretz, and Faheem Ahmed","author":"Aleem","year":"2015","unstructured":"Aleem , Saiqa , Luiz Fernando Capretz, and Faheem Ahmed . 2015 . \"Security Issues in Data Warehouse .\" arXiv preprint arXiv:1507.05644. Aleem, Saiqa, Luiz Fernando Capretz, and Faheem Ahmed. 2015. \"Security Issues in Data Warehouse.\" arXiv preprint arXiv:1507.05644."},{"key":"e_1_3_2_1_2_1","unstructured":"CIA Triad. http:\/\/www.techrepublic.com\/blog\/it-security\/the-cia-triad\/  CIA Triad. http:\/\/www.techrepublic.com\/blog\/it-security\/the-cia-triad\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Cisco. (2014 Jan.). The Internet of Things {Online}. Available: http:\/\/share.cisco.com\/internet-of-things.html .  Cisco. (2014 Jan.). The Internet of Things {Online}. Available: http:\/\/share.cisco.com\/internet-of-things.html ."},{"key":"e_1_3_2_1_4_1","unstructured":"Dwork C. \"Differential Privacy.\" http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx?id=64346.  Dwork C. \"Differential Privacy.\" http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx?id=64346."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Edwards B. Hofmeyr S. and Forrest S. 2015. Hype and heavy tails: A closer look at data breaches. WEIS.  Edwards B. Hofmeyr S. and Forrest S. 2015. Hype and heavy tails: A closer look at data breaches. WEIS.","DOI":"10.1093\/cybsec\/tyw003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Farooqi A. H. and Khan F. A. 2009. Intrusion detection systems for wireless sensor networks: A survey. In Communication and networking (pp. 234--241). Springer Berlin Heidelberg.  Farooqi A. H. and Khan F. A. 2009. Intrusion detection systems for wireless sensor networks: A survey. In Communication and networking (pp. 234--241). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-10844-0_29"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijieeb.2012.03.05"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"IDC","year":"2016","unstructured":"IDC Predicts that by 2020 . Retrieved May 12, 2016 , from http:\/\/www.idc.com\/prodserv\/3rd-platform\/ IDC Predicts that by 2020. Retrieved May 12, 2016, from http:\/\/www.idc.com\/prodserv\/3rd-platform\/"},{"volume-title":"Building the data warehouse","author":"Inmon W. H.","key":"e_1_3_2_1_10_1","unstructured":"Inmon , W. H. 2005. Building the data warehouse . John Wiley & Sons . Inmon, W. H. 2005. Building the data warehouse. John Wiley & Sons."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656450.2656460"},{"key":"e_1_3_2_1_12_1","unstructured":"Kimball R. Reeves L. Ross M. and Thornthwaite W. 1998. The Data Warehouse Lifecycle Toolkit. John Wiley & Sons.   Kimball R. Reeves L. Ross M. and Thornthwaite W. 1998. The Data Warehouse Lifecycle Toolkit. John Wiley & Sons."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2010.52"},{"key":"e_1_3_2_1_14_1","unstructured":"Mitrokotsa A. and Karygiannis A. 2008. Intrusion detection techniques in sensor networks. Wireless Sensor Network Security ed. J. Lopez and J. Zhou 251--272.  Mitrokotsa A. and Karygiannis A. 2008. Intrusion detection techniques in sensor networks. Wireless Sensor Network Security ed. J. Lopez and J. Zhou 251--272."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0831-5"},{"key":"e_1_3_2_1_16_1","volume-title":"An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar","author":"Forman G.","year":"2003","unstructured":"Forman , G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar . 2003 ), 1289--1305. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289--1305."},{"volume-title":"Proceedings of the American Society for Engineering Education Annual Conference and Exhibition, ASEE.","author":"Perrone L.","key":"e_1_3_2_1_17_1","unstructured":"Perrone , L. , Aburdene , M. , and Meng , X . 2005. Approaches to undergraduate instruction in computer security . In Proceedings of the American Society for Engineering Education Annual Conference and Exhibition, ASEE. Perrone, L., Aburdene, M., and Meng, X. 2005. Approaches to undergraduate instruction in computer security. In Proceedings of the American Society for Engineering Education Annual Conference and Exhibition, ASEE."},{"key":"e_1_3_2_1_18_1","unstructured":"Prentice S. 2014. \"The Five SMART Technologies to Watch\" Gartner.  Prentice S. 2014. \"The Five SMART Technologies to Watch\" Gartner."},{"key":"e_1_3_2_1_19_1","unstructured":"Privacy Rights Clearinghouse (PRC) Chronology of Data Breaches. https:\/\/www.privacyrights.org\/data-breach  Privacy Rights Clearinghouse (PRC) Chronology of Data Breaches. https:\/\/www.privacyrights.org\/data-breach"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"issue":"8","key":"e_1_3_2_1_21_1","first-page":"131","article-title":"Beyond the Security Track: Embed Security Education across Undergraduate Computing Curricula Using M-Thread Approach","volume":"11","author":"Ray L.","year":"2011","unstructured":"Ray , L. , and Yang , J. 2011 . Beyond the Security Track: Embed Security Education across Undergraduate Computing Curricula Using M-Thread Approach . IJCSNS , 11 ( 8 ), 131 . Ray, L., and Yang, J. 2011. Beyond the Security Track: Embed Security Education across Undergraduate Computing Curricula Using M-Thread Approach. IJCSNS, 11(8), 131.","journal-title":"IJCSNS"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.6"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"The Critical Thinking Community","year":"2014","unstructured":"The Critical Thinking Community : Elements and Standards Learning Tool . Retrieved May 12, 2014 , from http:\/\/www.criticalthinking.org\/pages\/elements-and-standards-learning-tool\/783. The Critical Thinking Community: Elements and Standards Learning Tool. Retrieved May 12, 2014, from http:\/\/www.criticalthinking.org\/pages\/elements-and-standards-learning-tool\/783."},{"key":"e_1_3_2_1_24_1","volume-title":"2012 IEEE International Conference on: 1082--1089: IEEE.","author":"Tianfield H.","year":"2012","unstructured":"Tianfield , H. 2012 . Security issues in cloud computing, Systems, Man, and Cybernetics (SMC) , 2012 IEEE International Conference on: 1082--1089: IEEE. Tianfield, H. 2012. Security issues in cloud computing, Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on: 1082--1089: IEEE."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Walters J. P. Liang Z. Shi W. and Chaudhary V. 2007. Wireless sensor network security: A survey. Security in distributed grid mobile and pervasive computing 1 367.  Walters J. P. Liang Z. Shi W. and Chaudhary V. 2007. Wireless sensor network security: A survey. Security in distributed grid mobile and pervasive computing 1 367.","DOI":"10.1201\/9780849379253-20"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1059524.1059526"}],"event":{"name":"SIGITE\/RIIT 2016: The 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Boston Massachusetts USA","acronym":"SIGITE\/RIIT 2016"},"container-title":["Proceedings of the 17th Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2978192.2978235","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2978192.2978235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:30Z","timestamp":1750217970000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2978192.2978235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,28]]},"references-count":26,"alternative-id":["10.1145\/2978192.2978235","10.1145\/2978192"],"URL":"https:\/\/doi.org\/10.1145\/2978192.2978235","relation":{},"subject":[],"published":{"date-parts":[[2016,9,28]]},"assertion":[{"value":"2016-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}