{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T23:02:28Z","timestamp":1754262148954},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,5]]},"DOI":"10.1109\/besc51023.2020.9348329","type":"proceedings-article","created":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T23:32:32Z","timestamp":1617665552000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Eliciting Requirements for a Student-focussed Capture The Flag"],"prefix":"10.1109","author":[{"given":"David","family":"Szedlak","sequence":"first","affiliation":[{"name":"Bournemouth University,Department of Computing,Poole,Uk"}]},{"given":"Andrew","family":"M'manga","sequence":"additional","affiliation":[{"name":"Bournemouth University,Department of Computing,Poole,Uk"}]}],"member":"263","reference":[{"journal-title":"Rolling Meadows IL Tech Rep","article-title":"State of Cyber Security 2017: Part 1: Current Trends in Workforce Development","year":"2017","key":"ref10"},{"journal-title":"Schaumburg IL Tech Rep","article-title":"State of cybersecurity 2018 Part 1: Workforce Development","year":"2018","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.677"},{"journal-title":"National Cyber Security Alliance Sterling VA Tech Rep 2016 Survey Results","article-title":"Securing Our Future: Closing the Cybersecurity Talent Gap","year":"2016","key":"ref13"},{"key":"ref14","article-title":"COMMENTS OF T-MOBILE USA, INC","author":"sharkey","year":"2017","journal-title":"NIST Washington Tech Rep"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11162-004-1598-1"},{"key":"ref16","article-title":"Finding the Balance Between Guidance and Independence in Cybersecurity Exercises","author":"weiss","year":"2016","journal-title":"2016 USENIX Workshop on Advances in Security Education (ASE 16)"},{"journal-title":"McAfee Santa Clara CA Tech Rep","article-title":"Hacking the Skills Shortage","year":"2016","key":"ref4"},{"key":"ref3","article-title":"The Cybersecurity Workforce Gap","author":"crumpler","year":"2019","journal-title":"Washington Tech Report"},{"journal-title":"Human capital crisis in cybersecurity technical proficiency matters Place of publication not identified Ctr For Strat & Intl Stds","year":"2010","author":"evans","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2478\/raft-2020-0009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/10494820.2018.1495653"},{"journal-title":"UK Government London UK Tech Rep","article-title":"NATIONAL CYBER SECURITY STRATEGY 2016&#x2013;2021","year":"2016","key":"ref7"},{"key":"ref2","first-page":"1","article-title":"Effectiveness of cybersecurity competitions","author":"cheung","year":"2012","journal-title":"Proceedings of the International Conference on Security and Management (SAM) The Steering Committee of The World Congress in Computer Science Computer &#x2026;"},{"key":"ref1","article-title":"Anal-ysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education","author":"burns","year":"2017","journal-title":"2017 USENIX Workshop on Advances in Security Education (ASE 17)"},{"journal-title":"ISACA San Francisco Tech Rep","article-title":"State of Cybersecurity: Implications for 2015 - An ISACA and RSA Conference Survey","year":"0","key":"ref9"}],"event":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","start":{"date-parts":[[2020,11,5]]},"location":"Bournemouth, United Kingdom","end":{"date-parts":[[2020,11,7]]}},"container-title":["2020 7th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9348100\/9348278\/09348329.pdf?arnumber=9348329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:48:59Z","timestamp":1656452939000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9348329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/besc51023.2020.9348329","relation":{},"subject":[],"published":{"date-parts":[[2020,11,5]]}}}