{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T06:56:22Z","timestamp":1764399382390,"version":"3.46.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1109\/snpd65828.2025.11254532","type":"proceedings-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:40:29Z","timestamp":1764355229000},"page":"893-898","source":"Crossref","is-referenced-by-count":0,"title":["Innovative Approaches to Cybersecurity Education: Tools and Strategies for Training the Next Generation of Professionals"],"prefix":"10.1109","author":[{"given":"Sikder M.","family":"Kamruzzaman","sequence":"first","affiliation":[{"name":"St. Clair College,Zekelman School of Information Technology,Windsor,Canada"}]},{"given":"Ishrat Z.","family":"Sikder","sequence":"additional","affiliation":[{"name":"St. Clair College,Zekelman School of Information Technology,Windsor,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102754"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2023.3340868"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/jarhe-02-2024-0072"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17083\/ijsg.v11i1.719"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA57911.2022.9974714"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICFTSS61109.2024.10690269"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73110-5_41"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s40692-024-00328-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5220\/0007918306230626"},{"key":"ref11","article-title":"Towards scalable and secure virtual laboratory for cybersecurity e-learning","volume-title":"Ph.D. dissertation","author":"Sianipar","year":"2020"},{"key":"ref12","first-page":"98","article-title":"Development of virtual laboratories and innovative cybersecurity courses for distance learning","volume-title":"Proc. CPITS II (2)","author":"Lemeshko"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35017-7_28"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxac177"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1040027"},{"journal-title":"Cybereducation-by-design\u2122: Developing a framework for cybersecurity education at secondary education institutions in AZ","year":"2023","author":"Wagner","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.62915\/2472-2707.1071"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/OI.2018.8535939"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2024.0413"},{"journal-title":"NSA Centers of Excellence in Information Assurance Education and the Certified Information Systems Security Prof. Domains.","author":"Compare","key":"ref20"},{"issue":"1","key":"ref21","first-page":"888","article-title":"Introducing leading IT technologies into curricula via the IBM academic initiative","volume-title":"Proc. ASBBS Annu. Conf","volume":"17","author":"Wang"},{"issue":"5.01","key":"ref22","first-page":"4","article-title":"The role industry-academia partnerships play in cybersecurity: Exploring collaborative approaches to address cybercrime","volume-title":"Proc. 19th Int. Conf. Cyber Warfare Secur. (ICCWS)","volume":"5","author":"Berkoh"},{"issue":"5","key":"ref23","first-page":"16","article-title":"Digital badges and e-portfolios in cybersecurity education","volume":"18","author":"Pike","year":"2020","journal-title":"Inf. Syst. Educ. J."},{"issue":"2","key":"ref24","first-page":"220","article-title":"The role of micro-credentials in professional development of skills in employees: A qualitative study from an emerging economy","volume":"12","author":"Batool","year":"2023","journal-title":"Bull. Bus. Econ. (BBE)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.34306\/bfront.v3i2.467"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/RESPECT49803.2020.9272458"},{"key":"ref27","first-page":"22","article-title":"Cyber defense competitions\u2014Educating for prevention","volume-title":"Proc. 2010 ASCUE Summer Conf","author":"Albert"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-6011-8.ch006"},{"key":"ref29","article-title":"The Future of Cyber Is Female\u2014Girl Scouts on a Path to Cyber Awareness","volume-title":"Doctoral dissertation","author":"Daniel","year":"2021"},{"issue":"1","key":"ref30","article-title":"Diversity and inclusion curriculum: Addressing culturally relevant pedagogy and the achievement gap at a racially diverse university","volume":"11","author":"Austin","year":"2019","journal-title":"Currents in Teaching & Learning"},{"key":"ref31","article-title":"Gamification of cyber security awareness training for phishing against university students","volume-title":"Bachelor\u2019s thesis","author":"Nijland","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.62273\/COGS3790"},{"key":"ref33","first-page":"121","article-title":"Western Governors University: A competency-based virtual university","volume-title":"Proc. Leadership for 21st Century Learning","author":"Albrecht"},{"key":"ref34","article-title":"Examining the Divide: Measuring the Inequitable Penetration and Access to K-12 Cybersecurity Education","volume-title":"Doctoral dissertation","author":"Jacob","year":"2024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2538029"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_9"}],"event":{"name":"2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2025,6,25]]},"location":"Busan, Korea, Republic of","end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11251382\/11252538\/11254532.pdf?arnumber=11254532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T06:52:13Z","timestamp":1764399133000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11254532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/snpd65828.2025.11254532","relation":{},"subject":[],"published":{"date-parts":[[2025,6,25]]}}}