{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:39:30Z","timestamp":1769726370358,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319585529","type":"print"},{"value":"9783319585536","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58553-6_1","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:04:33Z","timestamp":1493813073000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Cybersecurity Curricular Guidelines"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0989-092X","authenticated-orcid":false,"given":"Matt","family":"Bishop","sequence":"first","affiliation":[]},{"given":"Diana","family":"Burley","sequence":"additional","affiliation":[]},{"given":"Scott","family":"Buck","sequence":"additional","affiliation":[]},{"given":"Joseph J.","family":"Ekstrom","sequence":"additional","affiliation":[]},{"given":"Lynn","family":"Futcher","sequence":"additional","affiliation":[]},{"given":"David","family":"Gibson","sequence":"additional","affiliation":[]},{"given":"Elizabeth K.","family":"Hawthorne","sequence":"additional","affiliation":[]},{"given":"Siddharth","family":"Kaza","sequence":"additional","affiliation":[]},{"given":"Yair","family":"Levy","sequence":"additional","affiliation":[]},{"given":"Herbert","family":"Mattord","sequence":"additional","affiliation":[]},{"given":"Allen","family":"Parrish","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"1_CR1","unstructured":"Computing curricula 2005: the overview report. Technical report, ACM, New York (2005). http:\/\/www.acm.org\/education\/education\/curric_vols\/CC2005-March06Final.pdf"},{"key":"1_CR2","unstructured":"Cybersecurity curricula 2017: curriculum guidelines for undergraduate degree programs in cybersecurity. Technical report Draft version 0.5, ACM Joint Task Force on Cybersecurity Education (2017). http:\/\/www.csec2017.org\/csec2017-v-0-5"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MC.2010.53","volume":"43","author":"WW Agresti","year":"2010","unstructured":"Agresti, W.W.: The four forces shaping cybersecurity. IEEE Comput. 43(2), 101\u2013104 (2010)","journal-title":"IEEE Comput."},{"key":"1_CR4","unstructured":"Anderson, J.: Computer security technology planning study. Technical report ESD-TR-73-51, ESD\/AFSC, Hanscom AFB, Bedford, MA, October 1972"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer system: Unified exposition and multics interpretation. Technical report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA, USA, March 1976","DOI":"10.21236\/ADA023588"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/361284.361287","volume":"15","author":"RW Conway","year":"1972","unstructured":"Conway, R.W., Maxwell, W.L., Morgan, H.L.: On the implementation of security measures in information systems. Commun. ACM 15(4), 211\u2013220 (1972)","journal-title":"Commun. ACM"},{"issue":"10","key":"1_CR7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.22215\/timreview\/835","volume":"4","author":"D Craigen","year":"2014","unstructured":"Craigen, D., Diakun-Thibault, N., Purse, R.: Defining cybersecurity. Technol. Innov. Manage. Rev. 4(10), 13\u201321 (2014). https:\/\/timreview.ca\/article\/835","journal-title":"Technol. Innov. Manage. Rev."},{"issue":"5","key":"1_CR8","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D Denning","year":"1976","unstructured":"Denning, D.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"1_CR9","unstructured":"Dukes, C.W.: Committee on national security systems (CNSS) glossary. Technical report CNSSI No. 4009, Committee on National Security Systems, National Security Agency, Ft. George G. Meade, MD, USA. https:\/\/cryptosmith.files.wordpress.com\/2015\/08\/glossary-2015-cnss.pdf"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Graham, G.S., Denning, P.J.: Protection: principles and practice. In: AFIPS Conference Proceedings: 1971 Fall Joint Computer Conference, vol. 39, pp. 417\u2013429. ACM, New York, November 1971","DOI":"10.1145\/1478873.1478928"},{"issue":"8","key":"1_CR11","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M Harrison","year":"1976","unstructured":"Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Commun. ACM 19(8), 461\u2013471 (1976)","journal-title":"Commun. ACM"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Hoffman, L.J.: The formulary model for flexible privacy and access controls. In: AFIPS Conference Proceedings: 1972 Spring Joint Computer Conference, vol. 40, pp. 587\u2013601. ACM, New York, May 1972","DOI":"10.1145\/1479064.1479168"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Kemmerer, R.A.: Cybersecurity. In: Proceedings of the 25th International Conference on Software Engineering, pp. 1\u201311 (2003)","DOI":"10.1109\/ICSE.2003.1201257"},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"BW Lampson","year":"1974","unstructured":"Lampson, B.W.: Protection. ACM SIGOPS Operating Syst. Rev. 8(1), 18\u201324 (1974)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"issue":"7","key":"1_CR15","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1145\/361011.361067","volume":"17","author":"J Saltzer","year":"1974","unstructured":"Saltzer, J.: Protection and the control of information sharing in multics. Commun. ACM 17(7), 388\u2013402 (1974)","journal-title":"Commun. ACM"},{"key":"1_CR16","unstructured":"Ware, W.: Security controls for computer systems: report of Defense Science Board Task Force on computer security. Technical report R609\u20131, Rand Corporation, Santa Monica, CA, February 1970"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Weissman, C.: Security controls in the ADEPT-50 time-sharing system. In: Proceedings of the 1969 Fall Joint Computer Conference, pp. 119\u2013133. ACM, New York, November 1969","DOI":"10.1145\/1478559.1478574"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security Education for a Global Digital Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58553-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:10:05Z","timestamp":1621642205000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58553-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319585529","9783319585536"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58553-6_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP World Conference on Information Security Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise-ifip2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifiptc11.org\/wg118-events\/wise10","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}