{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:48:59Z","timestamp":1730292539568,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T00:00:00Z","timestamp":1583798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T00:00:00Z","timestamp":1583798400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T00:00:00Z","timestamp":1583798400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3,10]]},"DOI":"10.1109\/respect49803.2020.9272508","type":"proceedings-article","created":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T21:50:54Z","timestamp":1607118654000},"page":"1-2","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating a Cybersecurity Training Program for Non-Computing Major Undergraduate ROTC Students"],"prefix":"10.1109","author":[{"given":"Naja A.","family":"Mack","sequence":"first","affiliation":[]},{"given":"Kaylah","family":"Mackroy","sequence":"additional","affiliation":[]},{"given":"Chassidy","family":"Cook","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Cummings","sequence":"additional","affiliation":[]},{"given":"Tristian","family":"Pittman","sequence":"additional","affiliation":[]},{"given":"Kinnis","family":"Gosha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2808006.2808038"},{"journal-title":"Cybersecurity professionals focus on developing new skills","year":"2019","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159592"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866764"},{"journal-title":"&#x201C;i can actually be a super sleuth&#x201D; Promising practices for engaging adolescent girls in cybersecurity education - monique m jethwani nasir memon won seo ariel richer 2017","year":"0","author":"jethwani","key":"ref7"},{"key":"ref2","article-title":"Commanding the trend: Social media as information warfare","volume":"11","author":"prier","year":"2017","journal-title":"Strategic Studies Quarterly"},{"journal-title":"LikeWar The Weaponization of Social Media","year":"2018","author":"singer","key":"ref1"}],"event":{"name":"2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)","start":{"date-parts":[[2020,3,10]]},"location":"Portland, OR, USA","end":{"date-parts":[[2020,3,11]]}},"container-title":["2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9272398\/9272408\/09272508.pdf?arnumber=9272508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:53:30Z","timestamp":1656438810000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9272508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,10]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/respect49803.2020.9272508","relation":{},"subject":[],"published":{"date-parts":[[2020,3,10]]}}}