{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:31:34Z","timestamp":1743118294438,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_36","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"518-528","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Impact of Changing Technology on International Cybersecurity Curricula"],"prefix":"10.1007","author":[{"given":"Huw","family":"Read","sequence":"first","affiliation":[]},{"given":"Iain","family":"Sutherland","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Xynos","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Drange","sequence":"additional","affiliation":[]},{"given":"Ernst","family":"Sundt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"36_CR1","unstructured":"ACM: Cybersecurity Curricula 2017, Curriculum Guidelines for Undergraduate Degree Programs in Cybersecurity (2017). http:\/\/www.csec2017.org\/csec2017-v-0-5"},{"key":"36_CR35","unstructured":"Amazon: Smart Home (2017). https:\/\/www.amazon.com\/smart-home\/b?node=6563140011. Accessed 18 Apr 2017"},{"key":"36_CR2","unstructured":"Chartered Society of Forensic Sciences: Component Standards (2016). http:\/\/www.csofs.org\/Digital-Forensics. Accessed 10 Nov 2016"},{"key":"36_CR4","unstructured":"Conklin, A.: The design of an information security practicum course. In: Proceedings of the AIS SIG-ED IAIM 2007 Conference (2007)"},{"key":"36_CR5","unstructured":"Cyberedwiki: 2017. http:\/\/cyberedwiki.org\/mediawiki\/index.php?title=Welcome_to_CyberEd_Wiki. Accessed 31 Jan 2017"},{"key":"36_CR6","unstructured":"Disney Food Blog: Disney Refillable Mugs (2016). http:\/\/www.disneyfoodblog.com\/disney-refillable-mugs\/. Accessed 12 Nov 2016"},{"issue":"2","key":"36_CR7","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/2743024","volume":"6","author":"R Dopplick","year":"2015","unstructured":"Dopplick, R.: Experiential cybersecurity learning. ACM Inroads 6(2), 84 (2015). http:\/\/dx.doi.org\/10.1145\/2743024","journal-title":"Experiential cybersecurity learning. ACM Inroads"},{"key":"36_CR8","unstructured":"GCHQ: Scheme to Recognise Academic Centres of Excellence in Cyber Security Research (2011). https:\/\/www.epsrc.ac.uk\/files\/funding\/calls\/2011\/scheme-to-recognise-academic-centres-of-excellence-in-cyber-security-research\/. Accessed 15 Nov 2016"},{"key":"36_CR9","unstructured":"GCHQ: Can you crack it (2011b). http:\/\/www.canyoucrackit.co.uk\/. Accessed 15 Nov 2016"},{"key":"36_CR10","unstructured":"GCHQ: Working with academic to increase the UK\u2019s capability in cyber security (2014). http:\/\/www.nationalarchives.gov.uk\/documents\/information-management\/cesg-aces-partnerships.pdf. Accessed 31 Jan 2017"},{"key":"36_CR11","unstructured":"GCHQ: GCHQ certifies six more Masters\u2019 degrees in Cyber Security (2016). https:\/\/www.gchq.gov.uk\/news-article\/gchq-certifies-six-more-masters-degrees-cyber-security. Accessed 15 Nov 2016"},{"key":"36_CR12","unstructured":"GCHQ: New call to certify Cyber Security Degrees (2016b). https:\/\/www.gchq.gov.uk\/news-article\/new-call-certify-cyber-security-degrees. Accessed 31 Jan 2017"},{"key":"36_CR13","unstructured":"GCHQ: Certification of Bachelor\u2019s and Master\u2019s Degrees in Cyber Security\u2026 is your degree in scope? (2016c). https:\/\/www.ncsc.gov.uk\/content\/files\/protected_files\/article_files\/degrees-at-a-glance.pdf"},{"key":"36_CR14","unstructured":"Glassify: The Smart Glass (2016). http:\/\/www.glassify.me\/. Accessed 12 Nov 2016"},{"key":"36_CR15","unstructured":"Hexoskin Wearable Body Metrics (2016). http:\/\/www.hexoskin.com\/collections\/all. Accessed 13 Nov 2016"},{"key":"36_CR16","first-page":"35","volume":"2","author":"GC Kessler","year":"2013","unstructured":"Kessler, G.C., Ramsay, J.: Paradigms for cybersecurity education in a homeland security program. J. Homel. Secur. Educ. 2, 35\u201344 (2013). http:\/\/www.journalhse.org\/v2-kesslerramsay.html","journal-title":"J. Homel. Secur. Educ."},{"key":"36_CR36","unstructured":"Keystone Academic Solutions (2017). https:\/\/www.bachelorstudies.com\/BSc\/IT\/Cyber-Security\/. Accessed 18 Apr 2017"},{"key":"36_CR17","unstructured":"Malmedal, B., R\u00f8islien, H.E.: The Norwegian Cyber Security Culture, Norsk senter for informasjonssikring (Norsis) (2016). https:\/\/norsis.no\/wp-content\/uploads\/2016\/09\/The-Norwegian-Cybersecurity-culture-web.pdf"},{"key":"36_CR18","unstructured":"Morgan, S.: One Million Cybersecurity Job Openings in 2016, Forbes (2016). http:\/\/www.forbes.com\/sites\/stevemorgan\/2016\/01\/02\/one-million-cybersecurity-job-openings-in-2016\/#209e17d77d27. Accessed 11 Nov 2016"},{"key":"36_CR19","unstructured":"National Science Foundation: https:\/\/www.nsf.gov\/statistics\/seind14\/index.cfm\/chapter-2\/c2s1.htm. Accessed 11 Nov 2016"},{"key":"36_CR20","unstructured":"NCSC: GCHQ Degree Certification - Call for New Applications (2016). https:\/\/www.ncsc.gov.uk\/articles\/gchq-degree-certification-call-new-applicants. Accessed 31 Jan 2017"},{"key":"36_CR21","unstructured":"NIETP: Current CAE Designated Institutions (2017a). https:\/\/www.iad.gov\/nietp\/reports\/current_cae_designated_institutions. Accessed 11 Nov 2016"},{"key":"36_CR22","unstructured":"NIETP: NSA\/DHS National Centers of Academic Excellence for Cyber Defense (2017b). https:\/\/www.iad.gov\/NIETP\/documents\/Requirements\/CAE-CD_Focus_Areas.pdf. Accessed 11 Nov 2016"},{"key":"36_CR24","unstructured":"NIST: DRAFT NICE Cybersecurity Workforce Framework (NCWF): National Initiative for Cybersecurity Education, SP 800-181 (2016). http:\/\/csrc.nist.gov\/publications\/PubsDrafts.html#SP-800-181"},{"key":"36_CR25","unstructured":"NSA: National Centers of Academic Excellence in Cyber Defense (2016). https:\/\/www.nsa.gov\/resources\/educators\/centers-academic-excellence\/cyber-defense\/. Accessed 10 Nov 2016"},{"key":"36_CR26","unstructured":"NSA: 2016 NSA Codebreaker Challenge (2016b). https:\/\/codebreaker.ltsnet.net\/home. Accessed 10 Nov 2016"},{"key":"36_CR27","unstructured":"Rege, A.: Multidisciplinary experiential learning for holistic cybersecurity education, research and evaluation. In: Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education, Washington DC, 11 August 2015 (2015)"},{"issue":"1","key":"36_CR28","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.cose.2004.01.003","volume":"23","author":"M Rodgers","year":"2004","unstructured":"Rodgers, M., Siegfried, K.: The future of computer forensics: a needs analysis survey. Comput. Secur. 23(1), 12\u201316 (2004). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404804000100","journal-title":"Comput. Secur."},{"key":"36_CR29","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-39377-8_9","volume-title":"Information Assurance and Security Education and Training","author":"E Sitnikova","year":"2013","unstructured":"Sitnikova, E., Foo, E., Vaughn, R.B.: The power of hands-on exercises in SCADA cyber security education. In: Dodge, R.C., Futcher, L. (eds.) WISE 2009. IAICT, vol. 406, pp. 83\u201394. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39377-8_9"},{"key":"36_CR30","unstructured":"Stranden, R.: Sikkerhet \u2013 en profesjon? N\u00e6ringslivets Sikkerhetsr\u00e5d (NSR) (Norwegian Business and Industry Security Council (2010). https:\/\/www.nsa.gov\/resources\/educators\/centers-academic-excellence\/cyber-defense\/"},{"key":"36_CR31","unstructured":"The Telegraph: GCHQ spy recruitment code solved (2011). http:\/\/www.telegraph.co.uk\/news\/uknews\/defence\/8928088\/GCHQ-spy-recruitment-code-solved.html. Accessed 11 Nov 2016"},{"key":"36_CR32","unstructured":"University of Abertay: Ethical Hacking Degree (2017). http:\/\/www.abertay.ac.uk\/studying\/undergraduate\/bsc-ethical-hacking\/"},{"key":"36_CR33","doi-asserted-by":"crossref","unstructured":"Verisure: 2016. https:\/\/www.verisure.no\/. Accessed 11 Nov 2016","DOI":"10.5962\/p.385173"},{"key":"36_CR34","doi-asserted-by":"crossref","unstructured":"Willems, C., Meinel, C.: Online assessment for hands-on cybersecurity training in a virtual lab. In: Proceedings of the 3rd IEEE Global Engineering Education Conference (EDUCON 2012).\u2029 IEEE Press, Marrakesh, Morocco (2012)","DOI":"10.1109\/EDUCON.2012.6201149"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T02:46:35Z","timestamp":1719197195000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}