{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T15:18:03Z","timestamp":1767453483721},"publisher-location":"Boston, MA","reference-count":14,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387334059"},{"type":"electronic","value":"9780387334066"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/0-387-33406-8_37","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T08:55:55Z","timestamp":1153731355000},"page":"431-436","source":"Crossref","is-referenced-by-count":19,"title":["Cyber Security Training and Awareness Through Game Play"],"prefix":"10.1007","author":[{"given":"Benjamin D.","family":"Cone","sequence":"first","affiliation":[]},{"given":"Michael F.","family":"Thompson","sequence":"additional","affiliation":[]},{"given":"Cynthia E.","family":"Irvine","sequence":"additional","affiliation":[]},{"given":"Thuy D.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","unstructured":"National Institute of Standards and Technology, People: An Important Asset in Computer Security, NIST-CSL Bulletin, October 1993."},{"key":"37_CR2","volume-title":"Digital Game-Based Learning","author":"M. Prenski","year":"2001","unstructured":"Prenski, M., Digital Game-Based Learning. New York: McGraw-Hill, 2001."},{"key":"37_CR3","unstructured":"DoD Directive 8500.1, Information Assurance. October 24, 2002."},{"key":"37_CR4","unstructured":"DoD Instruction 8500.2, Information Assurance (IA) Implementation. February 6, 2003."},{"key":"37_CR5","unstructured":"DoD Directive 8570.1, Information Assurance Training, Certification, and Workforce Management. August 15, 2004."},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Irvine, C.E., and Thompson, M.F.: Teaching Objectives of a Simulation Game for Computer Security. Proc. Informing Science and Information Technology Joint Conference, Pori, Finland, June 2003, pp. 779\u2013791.","DOI":"10.21236\/ADA435221"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Irvine, C.E. and Thompson, M.F.: Expressing an Information Security Policy Within a Security Simulation Game, Proc. of the 6th Workshop on Education in Computer Security, Naval Postgraduate School, Monterey, CA, July 2004, pp. 43\u201349.","DOI":"10.21236\/ADA435316"},{"key":"37_CR8","unstructured":"Irvine, C.E., Thompson, M.F.: and Allen, K., CyberCIEGE: An Information Assurance Teaching Tool for Training and Awareness. Federal Information Systems Security Educators\u2019 Association Conference, North Bethesda, MD, March, 2005."},{"key":"37_CR9","unstructured":"Irvine, C. E., Thompson, M. F.: and Allen, K., CyberCIEGE: An Extensible Tool for Information Assurance Education. Proc. 9th Colloquium for Information Systems Security Education, Atlanta, GA, June 2005, pp. 130\u2013138."},{"key":"37_CR10","unstructured":"Navy Staff Office Pub. 5239-04, Information Systems Security Manager (ISSM) Guidebook. September 1995."},{"key":"37_CR11","unstructured":"Navy Staff Office Pub. 5239-07, Information Systems Security Officer (ISSO) Guidebook. February, 1996."},{"key":"37_CR12","unstructured":"Navy Staff Office Pub. 5239-08, Network Security Officer (NSO) Guidebook. March, 1996."},{"key":"37_CR13","unstructured":"DOD Information Assurance Awareness CBT Version 2.0. December 2004."},{"key":"37_CR14","volume-title":"Identity Theft Prevention in CyberCIEGE","author":"C. Ruppar","year":"2005","unstructured":"Ruppar, C., Identity Theft Prevention in CyberCIEGE, Masters Thesis, Naval Postgraduate School, Monterey, CA, December 2005."}],"container-title":["IFIP International Federation for Information Processing","Security and Privacy in Dynamic Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-33406-8_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T17:51:57Z","timestamp":1558374717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-33406-8_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9780387334059","9780387334066"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/0-387-33406-8_37","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2006]]}}}