{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:13Z","timestamp":1750220593910,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,13]],"date-time":"2020-05-13T00:00:00Z","timestamp":1589328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,13]]},"DOI":"10.1145\/3399871.3399872","type":"proceedings-article","created":{"date-parts":[[2020,7,4]],"date-time":"2020-07-04T01:42:18Z","timestamp":1593826938000},"page":"113-119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Risk Management Plan. Student Portal - Case Study"],"prefix":"10.1145","author":[{"given":"Gabriela","family":"Mogos","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong-Liverpool University Computer Science and Software Engineering Department, Suzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"6 Tips to Keep Your Website Safe. (n.d.)","author":"How S","year":"2019","unstructured":"How to Prevent DDo S Attacks : 6 Tips to Keep Your Website Safe. (n.d.) , 2019 . https:\/\/www.esecurityplanet.com\/network-security\/how-to-prevent-ddos-attacks.html. How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe. (n.d.), 2019. https:\/\/www.esecurityplanet.com\/network-security\/how-to-prevent-ddos-attacks.html."},{"key":"e_1_3_2_1_2_1","volume-title":"How to Protect Yourself from Email Bombing","author":"Ivanova A","year":"2017","unstructured":"Ivanova , A , How to Protect Yourself from Email Bombing , 2017 . https:\/\/www.maketecheasier.com\/protect-yourself-from-email-bombing\/. Ivanova, A, How to Protect Yourself from Email Bombing, 2017. https:\/\/www.maketecheasier.com\/protect-yourself-from-email-bombing\/."},{"key":"e_1_3_2_1_3_1","volume-title":"10 tips for reducing insider security threats","author":"Matteson S.","year":"2019","unstructured":"Matteson , S. , 10 tips for reducing insider security threats , 2019 . https:\/\/www.techrepublic.com\/article\/10-tips-for-reducing-insider-security-threats\/. Matteson, S., 10 tips for reducing insider security threats, 2019. https:\/\/www.techrepublic.com\/article\/10-tips-for-reducing-insider-security-threats\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Risk Impact\/Probability Charts Learning to Prioritize Risks 2019. https:\/\/www.mindtools.com\/pages\/article\/newPPM78.html.  Risk Impact\/Probability Charts Learning to Prioritize Risks 2019. https:\/\/www.mindtools.com\/pages\/article\/newPPM78.html."},{"key":"e_1_3_2_1_5_1","volume-title":"Cyber Terrorism: Understanding and preventing acts of terror within our cyber space","author":"Littlefield R.","year":"2017","unstructured":"Littlefield R. , Cyber Terrorism: Understanding and preventing acts of terror within our cyber space , 2017 . Littlefield R., Cyber Terrorism: Understanding and preventing acts of terror within our cyber space, 2017."},{"key":"e_1_3_2_1_6_1","volume-title":"6 Steps To Prevent Electronic Eavesdropping","author":"Webtrade Ltd","year":"2019","unstructured":"Webtrade Ltd . , 6 Steps To Prevent Electronic Eavesdropping , 2019 . https:\/\/www.resilientdefence.com\/blog\/6-steps-to-prevent-electronic-eavesdropping. Webtrade Ltd., 6 Steps To Prevent Electronic Eavesdropping, 2019. https:\/\/www.resilientdefence.com\/blog\/6-steps-to-prevent-electronic-eavesdropping."},{"key":"e_1_3_2_1_7_1","volume-title":"10 Ways to Avoid Phishing Scams","author":"KnowBe","year":"2019","unstructured":"KnowBe 4 , 10 Ways to Avoid Phishing Scams , 2019 . http:\/\/www.phishing.org\/10-ways-to-avoid-phishing-scams. KnowBe4, 10 Ways to Avoid Phishing Scams, 2019. http:\/\/www.phishing.org\/10-ways-to-avoid-phishing-scams."},{"key":"e_1_3_2_1_8_1","unstructured":"How to Prevent SQL Injection Attacks 2019. https:\/\/www.esecurityplanet.com\/threats\/how-to-prevent-sql-injection-attacks.html.  How to Prevent SQL Injection Attacks 2019. https:\/\/www.esecurityplanet.com\/threats\/how-to-prevent-sql-injection-attacks.html."},{"key":"e_1_3_2_1_9_1","volume-title":"How Spammers Spoof Your Email Address (and How to Protect Yourself)","author":"Henry A.","year":"2015","unstructured":"Henry A. , & Henry A. , How Spammers Spoof Your Email Address (and How to Protect Yourself) , 2015 . https:\/\/lifehacker.com\/how-spammers-spoof-your-ernail-address-and-how-to-prote-1579478914 Henry A., & Henry A., How Spammers Spoof Your Email Address (and How to Protect Yourself), 2015. https:\/\/lifehacker.com\/how-spammers-spoof-your-ernail-address-and-how-to-prote-1579478914"},{"key":"e_1_3_2_1_10_1","first-page":"297","volume-title":"Security and Privacy in Biometrics: Standards for Biometric Data Protection","author":"Tilton C. J.","year":"2019","unstructured":"Tilton C. J. , Young M. , Security and Privacy in Biometrics: Standards for Biometric Data Protection , Springer , pp. 297 -- 310 , 2019 Tilton C. J., Young M., Security and Privacy in Biometrics: Standards for Biometric Data Protection, Springer, pp.297--310, 2019"}],"event":{"name":"ASSE '20: 2020 Asia Service Sciences and Software Engineering Conference","sponsor":["Nanyang Technological University"],"location":"Nagoya Japan","acronym":"ASSE '20"},"container-title":["Proceedings of the 2020 Asia Service Sciences and Software Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399871.3399872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3399871.3399872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:49Z","timestamp":1750195909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399871.3399872"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,13]]},"references-count":10,"alternative-id":["10.1145\/3399871.3399872","10.1145\/3399871"],"URL":"https:\/\/doi.org\/10.1145\/3399871.3399872","relation":{},"subject":[],"published":{"date-parts":[[2020,5,13]]},"assertion":[{"value":"2020-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}