{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:06:39Z","timestamp":1773921999016,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662593509","type":"print"},{"value":"9783662593516","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-662-59351-6_9","type":"book-chapter","created":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T23:38:02Z","timestamp":1556321882000},"page":"93-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Cybersecurity Curriculum Design: A Survey"],"prefix":"10.1007","author":[{"given":"Djedjiga","family":"Mouheb","sequence":"first","affiliation":[]},{"given":"Sohail","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Madjid","family":"Merabti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,27]]},"reference":[{"key":"9_CR1","unstructured":"Symantec Corporation. \n                      http:\/\/www.symantec.com"},{"key":"9_CR2","unstructured":"National Training Standard for Information Systems Security (INFOSEC) Professionals (1994). \n                      http:\/\/www.sis.pitt.edu\/jjoshi\/courses\/IS2150\/Fall11\/nstissi_4011.pdf"},{"key":"9_CR3","unstructured":"National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation (2011). \n                      http:\/\/www.cssia.org\/pdf\/20000168-NationalInitiativeforCybersecurityEducationStrategicPlan.pdf"},{"key":"9_CR4","unstructured":"DHS Task Force on CyberSkills: CyberSkills Taks Force Report. D.o.H, Security, Washington, DC (2012)"},{"key":"9_CR5","unstructured":"International Information Systems Audit and Control Association (ISACA) (2017). \n                      https:\/\/www.isaca.org\/"},{"key":"9_CR6","unstructured":"The Fast-Growing Job With A Huge Skills Gap: Cyber Security (Forbes article) (2017). \n                      https:\/\/www.forbes.com\/sites\/jeffkauflin\/2017\/03\/16\/the-fast-growing-job-with-a-huge-skills-gap-cyber-security\/#465297be5163"},{"key":"9_CR7","unstructured":"Cyber Security Challenge UK (2018). \n                      https:\/\/www.cybersecuritychallenge.org.uk\/"},{"key":"9_CR8","unstructured":"CyberQuest Competition (2018). \n                      https:\/\/cyberquest.ae\/en"},{"key":"9_CR9","unstructured":"SEED Labs (2018). \n                      http:\/\/www.cis.syr.edu\/~wedu\/seed\/lab_env.html"},{"key":"9_CR10","unstructured":"Tele-Lab (2018). \n                      https:\/\/hpi.de\/meinel\/security-tech\/security-awareness\/tele-lab-it-security.html"},{"key":"9_CR11","unstructured":"The International Capture The Flag (\u201ciCTF\u201d) Competition (2018). \n                      https:\/\/ictf.cs.ucsb.edu\/"},{"key":"9_CR12","unstructured":"Cyber Security Breaches Survey 2017, April 2017. \n                      https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2017"},{"issue":"3","key":"9_CR13","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/1595496.1562967","volume":"41","author":"BR Anderson","year":"2009","unstructured":"Anderson, B.R., Joines, A.K., Daniels, T.E.: Xen worlds: leveraging virtualization in distance education. SIGCSE Bull. 41(3), 293\u2013297 (2009). \n                      http:\/\/doi.acm.org\/10.1145\/1595496.1562967","journal-title":"SIGCSE Bull."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Azadegan, S., O\u2019Leary, M.: An undergraduate cyber operations curriculum in the making: a 10+ year report. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 251\u2013254. IEEE (2016)","DOI":"10.1109\/ISI.2016.7745484"},{"issue":"3","key":"9_CR15","first-page":"99","volume":"13","author":"A Bicak","year":"2015","unstructured":"Bicak, A., Liu, X.M., Murphy, D.: Cybersecurity curriculum development: introducing specialties in a graduate program. Inf. Syst. Educ. J. 13(3), 99 (2015)","journal-title":"Inf. Syst. Educ. J."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Carlsson, A., Gustavsson, R., Truksans, L., Balodis, M.: Remote security labs in the cloud ReSeLa. In: 2015 IEEE Global Engineering Education Conference (EDUCON), pp. 199\u2013206, March 2015","DOI":"10.1109\/EDUCON.2015.7095971"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Conklin, W.A., Cline, R.E., Roosa, T.: Re-engineering cybersecurity education in the US: an analysis of the critical factors. In: 2014 47th Hawaii International Conference on System Sciences (HICSS), pp. 2006\u20132014. IEEE (2014)","DOI":"10.1109\/HICSS.2014.254"},{"key":"9_CR18","unstructured":"Faily, S.: Ethical hacking assessment as a vehicle for undergraduate cyber-security education. In: BCS 19th Annual INSPIRE Conference (2014)"},{"key":"9_CR19","unstructured":"Howles, T., Romanowski, C., Mishra, S., Raj, R.K.: A holistic, modular approach to infuse cybersecurity into undergraduate computing degree programs. In: Annual Symposium On Information Assurance (ASIA), Albany, NY, pp. 7\u20138 (2011)"},{"issue":"3","key":"9_CR20","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2005.64","volume":"3","author":"CE Irvine","year":"2005","unstructured":"Irvine, C.E., Thompson, M.F., Allen, K.: Cyberciege: gaming for information assurance. IEEE Secur. Priv. 3(3), 61\u201364 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"9_CR21","unstructured":"Iv, A.L.Z.: Cyber-Security Curricula for Basic Users. Thesis at Naval Postgraduate School, Monterey, California (2013)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Kessler, G.C., Ramsay, J.D.: A proposed curriculum in cybersecurity education targeting homeland security students. In: 2014 47th Hawaii International Conference on System Sciences (HICSS), pp. 4932\u20134937. IEEE (2014)","DOI":"10.1109\/HICSS.2014.605"},{"key":"9_CR23","unstructured":"LaPiedra, J.: The Information Security Process Prevention, Detection and Response (2002). \n                      https:\/\/www.giac.org\/paper\/gsec\/501\/information-security-process-prevention-detection-response\/101197"},{"key":"9_CR24","unstructured":"Lo, D.C.T., North, M., North, S.: Hardware Components in Cybersecurity Education. DigitalCommons@ Kennesaw State University (2014)"},{"issue":"1","key":"9_CR25","first-page":"2","volume":"14","author":"M Lukowiak","year":"2014","unstructured":"Lukowiak, M., Radziszowski, S., Vallino, J., Wood, C.: Cybersecurity education: bridging the gap between hardware and software domains. ACM Trans. Comput. Educ. (TOCE) 14(1), 2 (2014)","journal-title":"ACM Trans. Comput. Educ. (TOCE)"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Nagarajan, A., Allbeck, J.M., Sood, A., Janssen, T.L.: Exploring game design for cybersecurity training. In: 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 256\u2013262, May 2012","DOI":"10.1109\/CYBER.2012.6392562"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Patterson, W., Winston, C.E., Fleming, L.: Behavioral cybersecurity: a needed aspect of the security curriculum. In: SoutheastCon 2016, pp. 1\u20137 (2016)","DOI":"10.1109\/SECON.2016.7506767"},{"key":"9_CR28","unstructured":"Powell, V.J.H., Davis, C.T., Johnson, R.S., Wu, P.Y., Turchek, J.C., Parker, I.W.: VLabNet: the integrated design of hands-on learning in information security and networking. In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, pp. 9:1\u20139:7. ACM, New York (2007). \n                      http:\/\/doi.acm.org\/10.1145\/1409908.1409918"},{"key":"9_CR29","first-page":"6","volume":"1","author":"CD Ramirez","year":"2012","unstructured":"Ramirez, C.D., Rioux, G.A.: Advancing curricula development for homeland security education through a survey of DHS personnel. J. Homeland Secur. Educ. 1, 6\u201325 (2012)","journal-title":"J. Homeland Secur. Educ."},{"key":"9_CR30","unstructured":"Rowe, D.C., Lunt, B.M., Ekstrom, J.J.: The role of cyber-security in information technology education. In: Proceedings of the 2011 Conference on Information Technology Education, SIGITE 2011, pp. 113\u2013122. ACM, New York (2011). \n                      http:\/\/doi.acm.org\/10.1145\/2047594.2047628"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Santos, H., Pereira, T., Mendes, I.: Challenges and reflections in designing cyber security curriculum. In: 2017 IEEE World Engineering Education Conference (EDUNINE), pp. 47\u201351, March 2017","DOI":"10.1109\/EDUNINE.2017.7918179"},{"issue":"2","key":"9_CR32","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/2766457","volume":"6","author":"A Siraj","year":"2015","unstructured":"Siraj, A., Taylor, B., Kaza, S., Ghafoor, S.: Integrating security in the computer science curriculum. ACM Inroads 6(2), 77\u201381 (2015)","journal-title":"ACM Inroads"},{"issue":"1","key":"9_CR33","first-page":"410","volume":"XI","author":"T Smith","year":"2010","unstructured":"Smith, T., Alex Koohang, R.B.: Formulating an effective cybersecurity curriculum. Issues Inf. Syst. XI(1), 410\u2013416 (2010)","journal-title":"Issues Inf. Syst."},{"key":"9_CR34","doi-asserted-by":"publisher","first-page":"299","DOI":"10.28945\/1920","volume":"12","author":"Z Trabelsi","year":"2013","unstructured":"Trabelsi, Z., Ibrahim, W.: A hands-on approach for teaching denial of service attacks: a case study. J. Inf. Technol. Educ. Innovations Pract. 12, 299\u2013319 (2013)","journal-title":"J. Inf. Technol. Educ. Innovations Pract."}],"container-title":["Lecture Notes in Computer Science","Transactions on Edutainment XV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-59351-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T11:06:58Z","timestamp":1558350418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-59351-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783662593509","9783662593516"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-59351-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"27 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}