{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T14:23:28Z","timestamp":1771856608952,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030587024","type":"print"},{"value":"9783030587031","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-58703-1_6","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:02:47Z","timestamp":1599544967000},"page":"92-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["TWOPD: A Novel Approach to Teaching an Introductory Cybersecurity Course"],"prefix":"10.1007","author":[{"given":"Chola","family":"Chhetri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"6_CR1","unstructured":"A third of Americans live in a household with three or more smartphones. Pew Research Center. \nhttps:\/\/pewrsr.ch\/2r0o6he\n\n. Accessed 19 July 2019"},{"key":"6_CR2","unstructured":"Hung, M.: Leading the IoT. Gartner, Inc. (2017)"},{"key":"6_CR3","unstructured":"Breach Level Index. \nhttps:\/\/breachlevelindex.com\/\n\n. Accessed 19 Jul 2019"},{"key":"6_CR4","unstructured":"Privacy Rights Clearinghouse. \nhttps:\/\/www.privacyrights.org\/\n\n. Accessed 19 Jul 2019"},{"key":"6_CR5","unstructured":"Antonakakis, M., April, T., Bailey, M., Bursztein, E., Cochran, J., Durumeric, Z., Alex Halderman, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K., Zhou, Y.: Understanding the Mirai botnet. In: Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, pp. 1093\u20131110 (2017)"},{"key":"6_CR6","unstructured":"CompTIA Security+ Certification. \nhttps:\/\/certification.comptia.org\/certifications\/security\n\n. Accessed 20 Jul 2019"},{"key":"6_CR7","unstructured":"Winkelmes, M.-A.: Transparent assignment template. Transparency in Teaching (2013). \nhttps:\/\/tilthighered.com\/assets\/pdffiles\/Transparent Assignment Template.pdf"},{"key":"6_CR8","first-page":"31","volume":"18","author":"M-A Winkelmes","year":"2016","unstructured":"Winkelmes, M.A., Bernacki, M., Butler, J., Zochowski, M., Golanics, J., Weavil, K.H.: A Teaching Intervention that Increases Underserved College Students\u2019 Success. Peer Rev. 18, 31\u201336 (2016)","journal-title":"Peer Rev."},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s10763-007-9082-y","volume":"5","author":"M Gunel","year":"2007","unstructured":"Gunel, M., Hand, B., Prain, V.: Writing for learning in science: a secondary analysis of six studies. Int. J. Sci. Math. Educ. 5, 615\u2013637 (2007). \nhttps:\/\/doi.org\/10.1007\/s10763-007-9082-y","journal-title":"Int. J. Sci. Math. Educ."},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"Glance, D., Forsey, M., Riley, M.: The pedagogical foundations of massive open online courses. First Monday 18 (2013). \nhttps:\/\/doi.org\/10.5210\/fm.v18i5.4350","DOI":"10.5210\/fm.v18i5.4350"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1177\/1365480216659733","volume":"19","author":"D Kokotsaki","year":"2016","unstructured":"Kokotsaki, D., Menzies, V., Wiggins, A.: Project-based learning: a review of the literature. Improv. Sch. 19, 267\u2013277 (2016)","journal-title":"Improv. Sch."},{"key":"6_CR12","first-page":"1","volume":"18","author":"J Kirk","year":"2016","unstructured":"Kirk, J., Mininger, A., Laird, J.: Learning task goals interactively with visual demonstrations. Biol. Inspired Cogn. Archit. 18, 1\u20138 (2016)","journal-title":"Biol. Inspired Cogn. Archit."},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Jackson, A., Northcutt, B.D., Sukthankar, G.: The benefits of immersive demonstrations for teaching robots. In: 2019 14th ACM\/IEEE International Conference on Human-Robot Interaction (HRI), pp. 326\u2013334 (2019)","DOI":"10.1109\/HRI.2019.8673270"},{"key":"6_CR14","volume-title":"Watch What I Do Programming by Demonstration","author":"A Cypher","year":"1993","unstructured":"Cypher, A.: Watch What I Do Programming by Demonstration. MIT Press, Cambridge (1993)"},{"key":"6_CR15","volume-title":"Naming What We Know","author":"L Adler-Kassner","year":"2016","unstructured":"Adler-Kassner, L., Wardle, E.: Naming What We Know. Utah State University Press, Boulder (2016)"}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58703-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:04:10Z","timestamp":1599545050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58703-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9783030587024","9783030587031"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58703-1_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}