{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:12:57Z","timestamp":1723029177668},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/securware.2008.63","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T16:43:14Z","timestamp":1221583394000},"source":"Crossref","is-referenced-by-count":1,"title":["Infusing Information Assurance into an Undergraduate CS Curriculum"],"prefix":"10.1109","author":[{"given":"Cynthia Y.","family":"Lester","sequence":"first","affiliation":[]},{"given":"Hira","family":"Narang","sequence":"additional","affiliation":[]},{"given":"Chung-Han","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","year":"0"},{"key":"2","year":"0"},{"key":"10","author":"johnson","year":"2001","journal-title":"Computer Ethics"},{"key":"1","year":"0"},{"key":"7","author":"stallings","year":"1999","journal-title":"Cryptography and Network Security"},{"key":"6","author":"schnieder","year":"1996","journal-title":"Applied Cryptography"},{"key":"5","year":"0"},{"key":"4","author":"viega","year":"2001","journal-title":"Building Secure Software How to Avoid Security Problems the Right Way"},{"key":"9","author":"basse","year":"2003","journal-title":"A Gift of Fire"},{"key":"8","year":"2001","journal-title":"Computing Curricula 2001 Computer Science"},{"key":"11","author":"quinn","year":"2006","journal-title":"Ethics for the Information Age"}],"event":{"name":"2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE)","location":"Cap Esterel, France","start":{"date-parts":[[2008,8,25]]},"end":{"date-parts":[[2008,8,31]]}},"container-title":["2008 Second International Conference on Emerging Security Information, Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4622544\/4622545\/04622598.pdf?arnumber=4622598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T12:11:41Z","timestamp":1489752701000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4622598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/securware.2008.63","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}