{"id":"https://openalex.org/W2040325833","doi":"https://doi.org/10.1145/1940941.1940973","title":"Sworn to protect...implementing the security systems development life cycle into local law enforcement","display_name":"Sworn to protect...implementing the security systems development life cycle into local law enforcement","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W2040325833","doi":"https://doi.org/10.1145/1940941.1940973","mag":"2040325833"},"language":"en","primary_location":{"id":"doi:10.1145/1940941.1940973","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1940941.1940973","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Information Security Curriculum Development Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046530387","display_name":"Brett W. Brubaker","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Brett W. Brubaker","raw_affiliation_strings":["Kennesaw State University, MS, Kennesaw, GA","Kennesaw State University, MS, Kennesaw, GA#TAB#"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University, MS, Kennesaw, GA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Kennesaw State University, MS, Kennesaw, GA#TAB#","institution_ids":["https://openalex.org/I172980758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5046530387"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14293473,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"163","last_page":"172"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9538000226020813,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.7828453779220581},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6059905290603638},{"id":"https://openalex.org/keywords/agency","display_name":"Agency (philosophy)","score":0.5723362565040588},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5618403553962708},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48125573992729187},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.4574432075023651},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.39813172817230225},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.3606953024864197},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2097080945968628},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.18341800570487976},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.13797375559806824}],"concepts":[{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.7828453779220581},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6059905290603638},{"id":"https://openalex.org/C108170787","wikidata":"https://www.wikidata.org/wiki/Q3951828","display_name":"Agency (philosophy)","level":2,"score":0.5723362565040588},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5618403553962708},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48125573992729187},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.4574432075023651},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.39813172817230225},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3606953024864197},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2097080945968628},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.18341800570487976},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.13797375559806824},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1940941.1940973","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1940941.1940973","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Information Security Curriculum Development Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W26839374","https://openalex.org/W1553979608","https://openalex.org/W2180713941","https://openalex.org/W2741260397","https://openalex.org/W2944959796","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4392337488","https://openalex.org/W2102271161","https://openalex.org/W4313425421","https://openalex.org/W4388714791","https://openalex.org/W2361883455","https://openalex.org/W2952832228","https://openalex.org/W2909324362","https://openalex.org/W2372868951","https://openalex.org/W570712888","https://openalex.org/W1555990437"],"abstract_inverted_index":{"This":[0],"paper":[1],"sets":[2],"out":[3],"to":[4,13,17,30,76,89,93,110,113,139,172,179,185,210],"provide":[5],"an":[6],"example":[7],"for":[8,57,206,226,238],"local":[9,104,141,146,192,213],"law":[10,105,142,147,193,214],"enforcement":[11,106,143,148,194,215],"agencies":[12,107],"use":[14],"in":[15,116],"order":[16],"develop":[18,111],"a":[19,51,90,170,200,220,239],"basic":[20],"information":[21,61,79,131,152,175,180,242],"security":[22,243],"program.":[23,244],"In":[24],"conjunction":[25],"with":[26],"outside":[27,63],"sources":[28,64],"used":[29,53],"parallel":[31],"some":[32],"key":[33],"points":[34],"between":[35],"other":[36],"organizations,":[37,103],"such":[38],"as":[39,54,123,162],"universities":[40,67],"and":[41,68,83,129,160,167,188,204,223],"non-profit":[42,69],"agencies,":[43],"the":[44,55,77,95,186,197,207,212,236],"Security":[45,230],"Systems":[46,231],"Development":[47,232],"Life":[48,233],"Cycle":[49,234],"is":[50],"methodology":[52],"basis":[56],"this":[58],"paper.":[59],"The":[60],"from":[62,73],"suggests":[65],"that":[66,99,132],"businesses":[70],"have":[71,169,173],"suffered":[72],"massive":[74],"attacks":[75],"vital":[78],"of":[80,190,199],"their":[81,174,227],"students":[82],"personnel.":[84],"To":[85],"avoid":[86],"falling":[87],"victim":[88],"predator":[91],"waiting":[92,205],"induce":[94],"same":[96],"systemic":[97],"damage":[98],"has":[100],"plagued":[101],"these":[102,124],"must":[108],"begin":[109],"plans":[112],"protect":[114],"themselves":[115],"ways":[117],"not":[118,154],"traditionally":[119],"thought":[120,198],"of.":[121],"Just":[122],"two":[125],"organizations":[126],"house":[127],"personal":[128],"organizational":[130],"could":[133,181],"be":[134,182,218],"damaging":[135,184],"if":[136],"compromised,":[137],"so":[138],"do":[140],"agencies.":[144],"A":[145,177],"agency":[149,216],"concerns":[150],"vast":[151],"on,":[153],"only":[155],"personnel":[156],"but,":[157],"defendants,":[158,165],"victims,":[159,166],"witnesses":[161,168],"well.":[163],"These":[164],"right":[171],"protected.":[176],"compromise":[178],"severely":[183],"reputation":[187],"morale":[189],"any":[191],"agency.":[195],"With":[196],"possible":[201],"deviant":[202],"lurking":[203],"opportune":[208],"moment":[209],"strike,":[211],"should":[217],"approaching":[219],"sound,":[221],"viable,":[222],"holistic":[224],"program":[225],"defensive":[228],"strategy---the":[229],"offers":[235],"framework":[237],"much":[240],"needed":[241]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
