{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T09:00:12Z","timestamp":1693213212489},"reference-count":14,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Educ. Resour. Comput."],"published-print":{"date-parts":[[2006,9]]},"abstract":"This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as other humanities, to force students to apply or derive principles of computer security in unusual and unexpected situations. Our experience shows that students find the process enjoyable, stimulating, and effective.<\/jats:p>","DOI":"10.1145\/1243481.1243484","type":"journal-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:11Z","timestamp":1181140631000},"page":"3","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Teaching context in information security"],"prefix":"10.1145","volume":"6","author":[{"given":"Matt","family":"Bishop","sequence":"first","affiliation":[{"name":"University of California, Davis, CA"}]}],"member":"320","published-online":{"date-parts":[[2006,9]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Rules for Radicals","author":"Alinsky S.","unstructured":"Alinsky , S. 1972. Rules for Radicals . Random House , New York . Alinsky, S. 1972. Rules for Radicals. Random House, New York."},{"key":"e_1_2_1_2_1","volume-title":"The Winds of Change","author":"Asimov I.","unstructured":"Asimov , I. 1984. Belief . In The Winds of Change , Ballantine Books , New York , 12-46. Asimov, I. 1984. Belief. In The Winds of Change, Ballantine Books, New York, 12-46."},{"key":"e_1_2_1_3_1","volume-title":"Avoiding Fear, Uncertainty, and Doubt Through Effective Computer Security Education: Proceedings of the Sixth Workshop on Education in Computer Security (Monterey, CA, July)","author":"Bishop M.","unstructured":"Bishop , M. 2004. Teaching context in information security . In Avoiding Fear, Uncertainty, and Doubt Through Effective Computer Security Education: Proceedings of the Sixth Workshop on Education in Computer Security (Monterey, CA, July) , Center for Information Systems Security , Naval Postgraduate School, Monterey, CA, 29-36. Bishop, M. 2004. Teaching context in information security. In Avoiding Fear, Uncertainty, and Doubt Through Effective Computer Security Education: Proceedings of the Sixth Workshop on Education in Computer Security (Monterey, CA, July), Center for Information Systems Security, Naval Postgraduate School, Monterey, CA, 29-36."},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Bishop M. and Frincke D. 2004. Teaching robust programming. IEEE Security&Privacy 2 54-57. 10.1109\/MSECP.2004.1281247 Bishop M. and Frincke D. 2004. Teaching robust programming. IEEE Security&Privacy 2 54-57. 10.1109\/MSECP.2004.1281247","DOI":"10.1109\/MSECP.2004.1281247"},{"key":"e_1_2_1_5_1","volume-title":"2004 Statewide Primary Election","author":"California Secretary","year":"2004","unstructured":"California Secretary of State. 2004 a. Report on March 2 , 2004 Statewide Primary Election , April 20, 2004. Office of the Secretary of State, State of California, Sacramento, CA. California Secretary of State. 2004a. Report on March 2, 2004 Statewide Primary Election, April 20, 2004. Office of the Secretary of State, State of California, Sacramento, CA."},{"key":"e_1_2_1_6_1","volume-title":"April 30, 2004. Office of the Secretary of State, State of California","author":"California Secretary","year":"2004","unstructured":"California Secretary of State. 2004 b. Decertification and Withdrawal of Approval of AccuVote-TSx Voting System as Conditionally Approved November 20, 2003, and Recission of Conditional Approval , April 30, 2004. Office of the Secretary of State, State of California , Sacramento, CA. California Secretary of State. 2004b. Decertification and Withdrawal of Approval of AccuVote-TSx Voting System as Conditionally Approved November 20, 2003, and Recission of Conditional Approval, April 30, 2004. Office of the Secretary of State, State of California, Sacramento, CA."},{"key":"e_1_2_1_7_1","volume-title":"Version 1.0","author":"CIS (Center for Internet Security). 2002.","unstructured":"CIS (Center for Internet Security). 2002. Professional Operating System Benchmark Consensus Baseline Security Settings , Version 1.0 . Center for Internet Security , http:\/\/www.cisecurity.org\/. CIS (Center for Internet Security). 2002. Professional Operating System Benchmark Consensus Baseline Security Settings, Version 1.0. Center for Internet Security, http:\/\/www.cisecurity.org\/."},{"issue":"2","key":"e_1_2_1_8_1","first-page":"1","article-title":"Windows 2000 Professional Operating System Level 2 Benchmark Consensus Baseline Security Settings","volume":"2","author":"CIS (Center for Internet Security).","year":"2004","unstructured":"CIS (Center for Internet Security). 2004 . Windows 2000 Professional Operating System Level 2 Benchmark Consensus Baseline Security Settings , Version 2 . 2 . 1 . Center for Internet Security http:\/\/www.cisecurity.org\/bench_win2000.html. CIS (Center for Internet Security). 2004. Windows 2000 Professional Operating System Level 2 Benchmark Consensus Baseline Security Settings, Version 2.2.1. Center for Internet Security http:\/\/www.cisecurity.org\/bench_win2000.html.","journal-title":"Version"},{"key":"e_1_2_1_9_1","volume-title":"Corporate and Governmental Deviance: Problems of Organizational Behavior in Contemporary","author":"Glazer M.P.","unstructured":"Glazer , M.P. 2002. Ten whistleblowers: What they did and how they fared . In Corporate and Governmental Deviance: Problems of Organizational Behavior in Contemporary Society, 6 th ed. Oxford University Press , New York, 229-249. Glazer, M.P. 2002. Ten whistleblowers: What they did and how they fared. In Corporate and Governmental Deviance: Problems of Organizational Behavior in Contemporary Society, 6th ed. Oxford University Press, New York, 229-249.","edition":"6"},{"key":"e_1_2_1_10_1","volume-title":"The Prince","author":"Machiavelli N.","unstructured":"Machiavelli , N. (1995 translation). The Prince . Penguin Books , New York . Machiavelli, N. (1995 translation). The Prince. Penguin Books, New York."},{"key":"e_1_2_1_11_1","unstructured":"Raba Technologies Inc. 2004. Trusted Agent Report: Diebold AccuVote-TS Voting System. RABA Technologies Columbia MD. Raba Technologies Inc. 2004. Trusted Agent Report: Diebold AccuVote-TS Voting System. RABA Technologies Columbia MD."},{"key":"e_1_2_1_12_1","unstructured":"SAIC. 2003. Risk Assessment Report: Diebold AccuVote-TS Voting System and Processes Appendix B: Security Statements from the Rubin Report&State of Maryland Controls. SAIC-6099-2003-261. http:\/\/www.verifiedvoting.org\/downloads\/votingsystemreportfinal.pdf. SAIC. 2003. Risk Assessment Report: Diebold AccuVote-TS Voting System and Processes Appendix B: Security Statements from the Rubin Report&State of Maryland Controls. SAIC-6099-2003-261. http:\/\/www.verifiedvoting.org\/downloads\/votingsystemreportfinal.pdf."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_2_1_14_1","volume-title":"The Art of War","author":"Sun Tzu","unstructured":"Sun Tzu . (1983 translation). The Art of War . Dell Publishing , New York . Sun Tzu. (1983 translation). The Art of War. Dell Publishing, New York."}],"container-title":["Journal on Educational Resources in Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1243481.1243484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T21:24:14Z","timestamp":1672262654000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1243481.1243484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["10.1145\/1243481.1243484"],"URL":"https:\/\/doi.org\/10.1145\/1243481.1243484","relation":{},"ISSN":["1531-4278","1531-4278"],"issn-type":[{"value":"1531-4278","type":"print"},{"value":"1531-4278","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,9]]},"assertion":[{"value":"2006-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}