{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:38Z","timestamp":1750307018859,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T00:00:00Z","timestamp":1332979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,29]]},"DOI":"10.1145\/2184512.2184535","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"95-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Developing and implementing an institution-wide introductory cyber-security course in record time"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Brown","sequence":"first","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Frederick","family":"Crabbe","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Rita","family":"Doerr","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Raymond","family":"Greenlaw","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Chris","family":"Hoffmeister","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Justin","family":"Monroe","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Donald","family":"Needham","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Andrew","family":"Phillips","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Stephen","family":"Schall","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"John","family":"Schultz","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Steven","family":"Simon","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"David","family":"Stahl","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Sarah","family":"Standard","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]}],"member":"320","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Brown M. H. 2011. Naval Academy Preparing Officers for Cyberwarfare. Baltimore Sun. DOI=http:\/\/www.baltimoresun.com\/news\/maryland\/education\/bs-md-naval-academy-cyber-security-20111019 0 2371754.story.  Brown M. H. 2011. Naval Academy Preparing Officers for Cyberwarfare. Baltimore Sun. DOI=http:\/\/www.baltimoresun.com\/news\/maryland\/education\/bs-md-naval-academy-cyber-security-20111019 0 2371754.story."},{"key":"e_1_3_2_1_2_1","unstructured":"Carroll C. 2011. Cyberwarfare Joins the Curriculum at Service Academies. Stars and Stripes. DOI=http:\/\/www.stripes.com\/news\/cyberwarfare-joins-the-curriculum-at-service-academies-1.158642.  Carroll C. 2011. Cyberwarfare Joins the Curriculum at Service Academies. Stars and Stripes. DOI=http:\/\/www.stripes.com\/news\/cyberwarfare-joins-the-curriculum-at-service-academies-1.158642."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953174"},{"key":"e_1_3_2_1_4_1","unstructured":"Montalbano E. 2011. Navy Adds Cybersecurity Academy Requirements. DOI=http:\/\/www.informationweek.com\/news\/government\/security\/229300570.  Montalbano E. 2011. Navy Adds Cybersecurity Academy Requirements. DOI=http:\/\/www.informationweek.com\/news\/government\/security\/229300570."},{"key":"e_1_3_2_1_5_1","unstructured":"Naval Academy to Add Cyber-Security Classes. DOI=http:\/\/thedailyrecord.com\/2011\/03\/07\/naval-academy-to-add-cybersecurity-classes\/.  Naval Academy to Add Cyber-Security Classes. DOI=http:\/\/thedailyrecord.com\/2011\/03\/07\/naval-academy-to-add-cybersecurity-classes\/."},{"key":"e_1_3_2_1_6_1","volume-title":"USNA-CS-TR-2011-02","author":"Needham D.","year":"2011","unstructured":"Needham , D. and Vincent , P . Initial Report of the Dean's Cyber Warfare Ad Hoc Committee , USNA-CS-TR-2011-02 . U. S. Naval Academy Computer Science Department , Annapolis, MD , 2011 Needham, D. and Vincent, P. Initial Report of the Dean's Cyber Warfare Ad Hoc Committee, USNA-CS-TR-2011-02. U. S. Naval Academy Computer Science Department, Annapolis, MD, 2011"},{"key":"e_1_3_2_1_7_1","volume-title":"May","author":"President's Cyberspace Policy Review","year":"2009","unstructured":"President's Cyberspace Policy Review : Assuring a Trusted and Resilient Information and Communications Infrastructure , May 2009 . DOI=http:\/\/www.whitehouse.gov\/assets\/documents\/Cyberspace_Policy_Review_final.pdf. President's Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, May 2009. DOI=http:\/\/www.whitehouse.gov\/assets\/documents\/Cyberspace_Policy_Review_final.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"VMware Vsphere#8482; for Enterprise. DOI=http:\/\/www.vmware.com\/products\/vsphere\/mid-size-and-enterprise-business\/overview.html.  VMware Vsphere#8482; for Enterprise. DOI=http:\/\/www.vmware.com\/products\/vsphere\/mid-size-and-enterprise-business\/overview.html."}],"event":{"name":"ACM SE '12: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Tuscaloosa Alabama","acronym":"ACM SE '12"},"container-title":["Proceedings of the 50th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184535","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184512.2184535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:11Z","timestamp":1750236551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184535"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":8,"alternative-id":["10.1145\/2184512.2184535","10.1145\/2184512"],"URL":"https:\/\/doi.org\/10.1145\/2184512.2184535","relation":{},"subject":[],"published":{"date-parts":[[2012,3,29]]},"assertion":[{"value":"2012-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}