{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:39:42Z","timestamp":1763156382630},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,8]]},"DOI":"10.1109\/educon60312.2024.10578783","type":"proceedings-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T17:23:24Z","timestamp":1720459404000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Assessing the Consistency of Cyber Security Education"],"prefix":"10.1109","author":[{"given":"Steven","family":"Furnell","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Nottingham,Notingham,UK"}]},{"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[{"name":"Open University of Cyprus,Faculty of Pure and Applied Sciences,Nicosia,Cyprus"}]}],"member":"263","reference":[{"journal-title":"National Cyber Security Centre","article-title":"What is Cyber Security?","year":"2023","key":"ref1"},{"volume-title":"Cybersecurity","year":"2023","key":"ref2"},{"volume-title":"Definition of Cybersecurity: Gaps and overlaps in standardisation V1.0","year":"2015","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.12968\/S1361-3723(23)70048-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59291-2_3"},{"volume-title":"CyBOK - The Cyber Security Body of Knowledge, Version 1.1.0, 31","year":"2021","author":"Rashid","key":"ref6"},{"volume-title":"Cybersecurity Curricula 2017 \u2013 Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity","year":"2017","key":"ref7"},{"volume-title":"Mappings of University and Professional Training Programmes to CyBOK\u201d, Mapping Booklet Version 2","key":"ref8"},{"volume-title":"Cybersecurity Higher Education Database (CyberHEAD), European Union Agency for Cybersecurity, 2023","year":"2023","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_8"}],"event":{"name":"2024 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2024,5,8]]},"location":"Kos Island, Greece","end":{"date-parts":[[2024,5,11]]}},"container-title":["2024 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10578342\/10578320\/10578783.pdf?arnumber=10578783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T05:54:44Z","timestamp":1721282084000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10578783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,8]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/educon60312.2024.10578783","relation":{},"subject":[],"published":{"date-parts":[[2024,5,8]]}}}