iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/2614512.2614527
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T05:23:14Z","timestamp":1672464194342},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"2","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1145\/2614512.2614527","type":"journal-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:17Z","timestamp":1402404617000},"page":"50-54","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The colloquium for information system security education (CISSE)--the adventure continues"],"prefix":"10.1145","volume":"5","author":[{"given":"Daniel P.","family":"Shoemaker","sequence":"first","affiliation":[{"name":"The Colloquium for Information Systems Security Education, Belleville, Michigan"}]}],"member":"320","published-online":{"date-parts":[[2014,6]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Association for Computing Machinery (ACM). \"ACM History.\" http:\/\/www.acm.org\/about\/history. Accessed 2014 January 1. Association for Computing Machinery (ACM). \"ACM History.\" http:\/\/www.acm.org\/about\/history. Accessed 2014 January 1."},{"key":"e_1_2_1_2_1","unstructured":"Burley D. M. Bishop P. Pusey. 2013. Implementation of Recommendations from the Summit on Education in Secure Software. Report prepared for National Science Foundation. Burley D. M. Bishop P. Pusey. 2013. Implementation of Recommendations from the Summit on Education in Secure Software. Report prepared for National Science Foundation."},{"key":"e_1_2_1_3_1","unstructured":"CAE institutions. http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml. Accessed 2014 April 27. CAE institutions. http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml. Accessed 2014 April 27."},{"key":"e_1_2_1_4_1","unstructured":"CAE\/IAE Program. http:\/\/www.nsa.gov\/ia\/academic_outreach\/index.shtml. Accessed 2014 April 27. CAE\/IAE Program. http:\/\/www.nsa.gov\/ia\/academic_outreach\/index.shtml. Accessed 2014 April 27."},{"key":"e_1_2_1_5_1","unstructured":"CISSE. http:\/\/cisse.info\/. Accessed 2014 April 27. CISSE. http:\/\/cisse.info\/. Accessed 2014 April 27."},{"key":"e_1_2_1_6_1","unstructured":"Committee on National Security Systems. https:\/\/www.cnss.gov\/CNSS\/index.cfm. Accessed 2014 January 1. Committee on National Security Systems. https:\/\/www.cnss.gov\/CNSS\/index.cfm. Accessed 2014 January 1."},{"key":"e_1_2_1_7_1","unstructured":"Dubner S. \"Why Has There Been So Much Hacking Lately? Or Is It Just Reported More? A Freakonomics Quorum\" Freakonomics July 19 2011. http:\/\/freakonomics.com\/2011\/07\/19\/why-has-there-been-so-much-hacking-lately-or-is-it-just-reported-more-a-freakonomics-quorum\/. Accessed 2014 January 1. Dubner S. \"Why Has There Been So Much Hacking Lately? Or Is It Just Reported More? A Freakonomics Quorum\" Freakonomics July 19 2011. http:\/\/freakonomics.com\/2011\/07\/19\/why-has-there-been-so-much-hacking-lately-or-is-it-just-reported-more-a-freakonomics-quorum\/. Accessed 2014 January 1."},{"key":"e_1_2_1_8_1","unstructured":"National IA Education and Training Program National Centers of Academic Excellence. (2009.) http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml. Accessed 2014 January 1. National IA Education and Training Program National Centers of Academic Excellence. (2009.) http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml. Accessed 2014 January 1."},{"key":"e_1_2_1_9_1","unstructured":"PDD 63. http:\/\/www.fas.org\/irp\/offdocs\/pdd\/pdd-63.htm. Accessed 2014 April 27. PDD 63. http:\/\/www.fas.org\/irp\/offdocs\/pdd\/pdd-63.htm. Accessed 2014 April 27."},{"key":"e_1_2_1_10_1","unstructured":"Schou C. and D. Shoemaker \"Information Assurance for the Enterprise\" McGraw-Hill. 2006. Schou C. and D. Shoemaker \"Information Assurance for the Enterprise\" McGraw-Hill. 2006."},{"key":"e_1_2_1_11_1","volume-title":"Meeting Designations of Excellence CAE2y and CDFAE\" Presented at National Initiative for Cybersecurity Education Workshop","author":"Zdravkovich V.","year":"2013"}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2614512.2614527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T19:41:08Z","timestamp":1672429268000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2614512.2614527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["10.1145\/2614512.2614527"],"URL":"https:\/\/doi.org\/10.1145\/2614512.2614527","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"value":"2153-2184","type":"print"},{"value":"2153-2192","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6]]},"assertion":[{"value":"2014-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}