{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:00:14Z","timestamp":1742983214076,"version":"3.40.3"},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587024"},{"type":"electronic","value":"9783030587031"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-58703-1_14","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:02:47Z","timestamp":1599544967000},"page":"235-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Warfare and Cyber Education: Issues and Recommendations"],"prefix":"10.1007","author":[{"given":"Joshua A.","family":"Sipper","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"issue":"3","key":"14_CR1","first-page":"70","volume":"12","author":"M Ajir","year":"2018","unstructured":"Ajir, M., Vailliant, B.: Russian information warfare: implications for deterrence theory. Strat. Stud. Q. 12(3), 70\u201389 (2018)","journal-title":"Strat. Stud. Q."},{"issue":"2","key":"14_CR2","first-page":"49","volume":"1","author":"C Arney","year":"2016","unstructured":"Arney, C., Vanatta, N., Nelson, T.: Cyber education via mathematical education. Cyber Def. Rev. 1(2), 49\u201360 (2016)","journal-title":"Cyber Def. Rev."},{"issue":"2","key":"14_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.11610\/Connections.16.2.01","volume":"16","author":"Y Danyk","year":"2017","unstructured":"Danyk, Y., Maliarchuk, T., Briggs, C.: Hybrid WAR: high-tech, information and cyber conflicts. Connections 16(2), 5\u201324 (2017)","journal-title":"Connections"},{"issue":"2","key":"14_CR4","first-page":"55","volume":"3","author":"K Dill","year":"2018","unstructured":"Dill, K.: Cybersecurity for the nation: workforce development. Cyber Def. Rev. 3(2), 55\u201364 (2018)","journal-title":"Cyber Def. Rev."},{"issue":"3","key":"14_CR5","first-page":"79","volume":"2","author":"KT Jabbour","year":"2017","unstructured":"Jabbour, K.T., Devendorf, E.: Cyber threat characterization. Cyber Def. Rev. 2(3), 79\u201394 (2017)","journal-title":"Cyber Def. Rev."},{"issue":"1","key":"14_CR6","first-page":"49","volume":"11","author":"MC Libicki","year":"2017","unstructured":"Libicki, M.C.: The convergence of information warfare. Strat. Stud. Q. 11(1), 49\u201365 (2017)","journal-title":"Strat. Stud. Q."}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58703-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:07:31Z","timestamp":1599545251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58703-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9783030587024","9783030587031"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58703-1_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Opinions, conclusions, and recommendations expressed or implied within are solely those of the author and do not necessarily represent the views of the Air University, the United States Air Force, the Department of Defense, or any other US government agency.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimers"}},{"value":"DoD School Policy. DoD gives its personnel in its school environments the widest latitude to express their views. To ensure a climate of academic freedom and to encourage intellectual expression, students and faculty members of an academy, college, university, or DoD school are not required to submit papers or material that are prepared in response to academic requirements and not intended for release outside the academic institution. Information proposed for public release or made available in libraries or databases or on web sites to which the public has access shall be submitted for review.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimers"}},{"value":"This is a shortened version of the paper titled \u201cIt\u2019s Not Just About Cyber Anymore: Multidisciplinary Cyber Education and Training under the New Information Warfare Paradigm\u201d originally published in Joint Forces Quarterly. Express permission for this condensed version granted by JFQ.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimers"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}