{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:10:48Z","timestamp":1755839448273,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,8]]},"DOI":"10.1109\/fie56618.2022.9962399","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T19:32:45Z","timestamp":1669750365000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Expanding the cybersecurity pipeline through early exposure in undergraduate programs"],"prefix":"10.1109","author":[{"given":"Dilma","family":"Da Silva","sequence":"first","affiliation":[{"name":"Texas A&#x0026;M University,Department of Computer Science and Engineering,College Station,US"}]},{"given":"Maristela","family":"Holanda","sequence":"additional","affiliation":[{"name":"University of Brasilia,Department of Computer Science,Bras&#x00ED;lia,Brazil"}]},{"given":"Nina","family":"Miner","sequence":"additional","affiliation":[{"name":"United States Military Academy,Department of Electrical Engineering and Computer Science,West Point,US"}]}],"member":"263","reference":[{"journal-title":"Qualtrics","article-title":"Three Tips for Effectively Designing Rating Scales","year":"2021","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.9734\/BJAST\/2015\/14975"},{"year":"2016","key":"ref30","article-title":"Which emails students read&#x2014;and which ones they ignore"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2493394.2493404"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287500"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445395"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3344429.3372507"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--32481"},{"journal-title":"Introduction to Computer Security","year":"2011","author":"goodrich","key":"ref15"},{"journal-title":"Principles of Computer Security Security+ and Beyond","year":"2018","author":"conklin","key":"ref16"},{"journal-title":"This Is How They Tell Me The World Ends The Cyber-Weapons Arms Race","year":"2020","author":"perlroth","key":"ref17"},{"key":"ref18","article-title":"The Era of &#x2018;Move Fast and Break Things&#x2019; Is Over","author":"taneja","year":"2019","journal-title":"Harvard Business Review"},{"key":"ref19","article-title":"Chapter 15: Types of Attacks and Malicious Software","author":"conklin","year":"2018","journal-title":"Principles of Computer Security CompTIA Security+ and Beyond Fifth Edition"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2015.00189"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/3328778.3366816","article-title":"What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences","author":"\u0161v\u00e1bensk\u00fd","year":"2020","journal-title":"Proceedings of the 51st ACM Technical Symposium on Computer Science Education"},{"year":"2018","key":"ref27","article-title":"Privacy and Security Enforcement"},{"year":"0","key":"ref3","article-title":"2020 (ISC)2 Cybersecurity Perception Study"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734387"},{"key":"ref29","first-page":"27a","article-title":"E-mail is for old people","volume":"53","author":"carnevale","year":"2006","journal-title":"The Chronicle of Higher Education"},{"year":"0","key":"ref5","article-title":"cybersecurity - Glossary | CSRC"},{"key":"ref8","first-page":"8","article-title":"This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates","author":"flushman","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3304221.3319760"},{"key":"ref2","first-page":"4","article-title":"Cybersecurity Education: The need for a top-driven, multidisciplinary, school-wide approach","author":"tsado","year":"2019","journal-title":"Journal of Cybersecurity Education Research and Practice"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844619"},{"journal-title":"The White House","article-title":"Executive Order on Improving the Nation&#x2019;s Cybersecurity","year":"2021","key":"ref1"},{"key":"ref20","article-title":"Enterprise internet attack surface is growing, report shows","author":"constantin","year":"2020","journal-title":"CSO Online"},{"article-title":"H.R.3763 - 107th Congress (2001-2002): Sarbanes-Oxley Act of 2002","year":"2002","author":"oxley","key":"ref22"},{"key":"ref21","article-title":"European, U.S. regulators tell banks to prepare for Russian cyberattack threat","author":"o\u2019donnell","year":"2022","journal-title":"Reuters"},{"journal-title":"Federal Trade Commission","article-title":"A Brief Overview of the Federal Trade Commission&#x2019;s Investigative, Law Enforcement, and Rulemaking Authority","year":"2013","key":"ref24"},{"article-title":"S.900 - 106th Congress (1999-2000): Gramm-Leach-Bliley Act","year":"1999","author":"gramm","key":"ref23"},{"year":"2019","key":"ref26","article-title":"Health Insurance Portability and Accountability Act of 1996 (HIPAA) | CDC"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-020-01161-7"}],"event":{"name":"2022 IEEE Frontiers in Education Conference (FIE)","start":{"date-parts":[[2022,10,8]]},"location":"Uppsala, Sweden","end":{"date-parts":[[2022,10,11]]}},"container-title":["2022 IEEE Frontiers in Education Conference (FIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9962306\/9962373\/09962399.pdf?arnumber=9962399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T20:03:17Z","timestamp":1671480197000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9962399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,8]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/fie56618.2022.9962399","relation":{},"subject":[],"published":{"date-parts":[[2022,10,8]]}}}