{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:34:28Z","timestamp":1730270068951,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/iri.2012.6303071","type":"proceedings-article","created":{"date-parts":[[2012,9,19]],"date-time":"2012-09-19T20:50:59Z","timestamp":1348087859000},"page":"653-658","source":"Crossref","is-referenced-by-count":5,"title":["First use: Introducing information security in high school oracle academy courses"],"prefix":"10.1109","author":[{"given":"RoxAnn H.","family":"Stalvey","sequence":"first","affiliation":[]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[]},{"given":"Caroline","family":"Eastman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/950566.950596"},{"key":"17","article-title":"London Conference on CyberSpace: The Biggest Cyber Attacks of All Time","author":"palmer","year":"2011","journal-title":"UK Business News"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.06.004"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971328"},{"year":"2011","key":"16"},{"journal-title":"10 Biggest Cyber Attacks in June","year":"2011","author":"hoffman","key":"13"},{"journal-title":"MIT to Make Nearly All Course Materials Available Free on the World Wide Web - MIT News Office","year":"2001","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1324302.1324356"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1409908.1409914"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231089"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1562877.1562909"},{"key":"22","article-title":"Game Based Learning for Computer Science Education","author":"schmitz","year":"2011","journal-title":"Conference CSERC '2011 Heerlen The Netherlands"},{"journal-title":"Learning theories An educational perspective","year":"2012","author":"schunk","key":"23"},{"key":"24","first-page":"39","article-title":"Designing web labs for teaching security concepts","volume":"25","author":"schweitzer","year":"2009","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"25","article-title":"Using visualization to teach security","volume":"24","author":"schweitzer","year":"2009","journal-title":"Journal of Computing Sciences in Colleges"},{"journal-title":"Accelerated Learning in Practice Brainbased Methods for Accelerating Motivation and Achievement","year":"1999","author":"smith","key":"26"},{"journal-title":"Welcome to the PRISM Home Page! | PRISM","year":"2011","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1508865.1508954"},{"journal-title":"Animated DataBase Courseware","year":"2011","key":"3"},{"journal-title":"2011Threat Predictions","year":"2011","author":"alperovitch","key":"2"},{"journal-title":"First Annual Cost of Cyber Crime Study Benchmark Study of U S Companies","year":"2010","key":"10"},{"journal-title":"Alice An Educational Software That Teaches Students Computer Programming in A 3D Environment","year":"2011","key":"1"},{"key":"7","article-title":"Tuition-free MIT","author":"greenspun","year":"1998","journal-title":"Philip Greenspun's Home Page"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999801"},{"journal-title":"Computer Science Teachers Association - CSTA K-12 Standards","year":"2005","key":"5"},{"journal-title":"Braingle Brain Teasers Puzzles Riddles Trivia and Games","article-title":"Braingle: Caesar Cipher","year":"2011","key":"4"},{"key":"9","article-title":"U.K. Cyber Attacks on Government Happen 600 Times Per Day","author":"finkle","year":"2011","journal-title":"Breaking News and Opinion on the Huffington Post"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1508865.1508980"}],"event":{"name":"2012 IEEE 13th International Conference on Information Reuse & Integration (IRI)","start":{"date-parts":[[2012,8,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2012,8,10]]}},"container-title":["2012 IEEE 13th International Conference on Information Reuse &amp; Integration (IRI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294629\/6302564\/06303071.pdf?arnumber=6303071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:22:36Z","timestamp":1490142156000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6303071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iri.2012.6303071","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}