{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:44:40Z","timestamp":1772163880662,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6,27]]},"DOI":"10.1145\/1067445.1067504","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T04:31:47Z","timestamp":1123043507000},"page":"213-217","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Using a windows attack intRusion emulator (AWARE) to teach computer security awareness"],"prefix":"10.1145","author":[{"suffix":"Jr.","given":"Donald L.","family":"Tobin","sequence":"first","affiliation":[{"name":"Fairmont State University, Fairmont, WV"}]},{"given":"Michael S.","family":"Ware","sequence":"additional","affiliation":[{"name":"Fairmont State University, Fairmont, WV"}]}],"member":"320","published-online":{"date-parts":[[2005,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"America Online\/National Cyber Security Alliance Study &lt;http:\/\/www.staysafeonline.info\/news\/safety_study_v04.pdf&gt; Oct 2004.  America Online\/National Cyber Security Alliance Study &lt;http:\/\/www.staysafeonline.info\/news\/safety_study_v04.pdf&gt; Oct 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"Simulating Network Security. &lt;http:\/\/www.blacksheepnetworks.com\/security\/info \/misc\/9904.html&gt;.","author":"Cohen F.","year":"1999","unstructured":"Cohen , F. , Managing Network Security , Simulating Network Security. &lt;http:\/\/www.blacksheepnetworks.com\/security\/info \/misc\/9904.html&gt;. , 1999 . Cohen, F., Managing Network Security, Simulating Network Security. &lt;http:\/\/www.blacksheepnetworks.com\/security\/info \/misc\/9904.html&gt;., 1999."},{"key":"e_1_3_2_1_3_1","unstructured":"Colloquium for Information Systems Security Education 2005 &lt;http:\/\/www.ncisse.org&gt;.  Colloquium for Information Systems Security Education 2005 &lt;http:\/\/www.ncisse.org&gt;."},{"key":"e_1_3_2_1_4_1","unstructured":"Computing Technology Information Association 2005 http:\/\/www.comptia.org.  Computing Technology Information Association 2005 http:\/\/www.comptia.org."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.75"},{"key":"e_1_3_2_1_6_1","unstructured":"International Information Systems Security Certification Consortium Inc 2005 http:\/\/www.isc2.org.  International Information Systems Security Certification Consortium Inc 2005 http:\/\/www.isc2.org."},{"key":"e_1_3_2_1_7_1","unstructured":"National Centers of Excellence in Information Assurance Education 2005 &lt;http:\/\/www.nsa.gov\/ia\/academia\/caeiae.cfm&gt;.  National Centers of Excellence in Information Assurance Education 2005 &lt;http:\/\/www.nsa.gov\/ia\/academia\/caeiae.cfm&gt;."},{"key":"e_1_3_2_1_8_1","unstructured":"National Strategy to Secure Cyberspace 2003 &lt;http:\/\/www.us-cert.gov\/reading_room\/cyberspace_strategy.pdf&gt;.  National Strategy to Secure Cyberspace 2003 &lt;http:\/\/www.us-cert.gov\/reading_room\/cyberspace_strategy.pdf&gt;."},{"key":"e_1_3_2_1_9_1","volume-title":"Information: The Role of Community Colleges in Cybersecurity Education. Workshop Report","author":"Protecting","year":"2002","unstructured":"Protecting Information: The Role of Community Colleges in Cybersecurity Education. Workshop Report , June 2002 . Protecting Information: The Role of Community Colleges in Cybersecurity Education. Workshop Report, June 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-1315(98)00049-9"},{"key":"e_1_3_2_1_11_1","unstructured":"SANS Institute 2005 http:\/\/www.giac.org.  SANS Institute 2005 http:\/\/www.giac.org."},{"key":"e_1_3_2_1_12_1","volume-title":"J. The Case for Modeling and Simulation of Information Security Technology. Computer Security Institute Conference","author":"Saunders","year":"2001","unstructured":"Saunders , J. The Case for Modeling and Simulation of Information Security Technology. Computer Security Institute Conference , Oct , 2001 . Saunders, J. The Case for Modeling and Simulation of Information Security Technology. Computer Security Institute Conference, Oct, 2001."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.83"},{"key":"e_1_3_2_1_14_1","volume-title":"Workshop on Education in Computer Security (WECS6)","author":"Sixth","year":"2004","unstructured":"Sixth Workshop on Education in Computer Security (WECS6) , 2004 , &lt;http:\/\/cisr.nps.navy.mil\/WECS6\/overview.html&gt;. Sixth Workshop on Education in Computer Security (WECS6), 2004, &lt;http:\/\/cisr.nps.navy.mil\/WECS6\/overview.html&gt;."},{"key":"e_1_3_2_1_15_1","volume-title":"Conference","year":"2005","unstructured":"WISE4 Conference , 2005 , &lt;http:\/\/www.fis.mephi.edu\/wise4\/&gt;. WISE4 Conference, 2005, &lt;http:\/\/www.fis.mephi.edu\/wise4\/&gt;."}],"event":{"name":"ITiCSE05: Innovation and Technology in Computer Science Education","location":"Caparica Portugal","acronym":"ITiCSE05","sponsor":["ACM Association for Computing Machinery","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 10th annual SIGCSE conference on Innovation and technology in computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1067445.1067504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T10:09:13Z","timestamp":1693822153000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1067445.1067504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6,27]]},"references-count":15,"alternative-id":["10.1145\/1067445.1067504","10.1145\/1067445"],"URL":"https:\/\/doi.org\/10.1145\/1067445.1067504","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1151954.1067504","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2005,6,27]]},"assertion":[{"value":"2005-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}