{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T00:02:02Z","timestamp":1648512122378},"reference-count":0,"publisher":"Informing Science Institute","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JITE: DC"],"abstract":"<jats:p>A firm that specializes in setting up computer systems is asked by a potential client to guarantee 100% security. Knowing that is an impossible request, the owner considers what he might offer as a counter proposal that would make sense.<\/jats:p>","DOI":"10.28945\/3669","type":"journal-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T18:06:14Z","timestamp":1508954774000},"page":"12","source":"Crossref","is-referenced-by-count":0,"title":["THE QUEST FOR RELIABLE CYBER SECURITY"],"prefix":"10.28945","volume":"5","author":[{"given":"Eric","family":"Biel","sequence":"first","affiliation":[{"name":"University of South Florida"}]},{"given":"Norma","family":"Gonedes","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Darin","family":"Peachee","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Edgar","family":"Ramirez","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Jing","family":"Yang","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Brian","family":"Murphy","sequence":"additional","affiliation":[{"name":"ReliaQuest"}]}],"member":"11490","published-online":{"date-parts":[[2016]]},"container-title":["Journal of Information Technology Education: Discussion Cases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jite.org\/documents\/DCVol05\/v05-12-ReliaQuest.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.jite.org\/documents\/DCVol05\/v05-12-ReliaQuest.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/www.jite.org\/documents\/DCVol05\/v05-12-ReliaQuest.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T19:20:39Z","timestamp":1597173639000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.informingscience.org\/Publications\/3669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":0,"alternative-id":["3669"],"URL":"https:\/\/doi.org\/10.28945\/3669","relation":{},"ISSN":["2166-1316","2166-1324"],"issn-type":[{"value":"2166-1316","type":"print"},{"value":"2166-1324","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}