{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:13Z","timestamp":1750307053532,"version":"3.41.0"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1145\/2339055.2339072","type":"journal-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T19:22:23Z","timestamp":1350328943000},"page":"50-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A freshman level course on information assurance"],"prefix":"10.1145","volume":"3","author":[{"given":"Robin","family":"Gandhi","sequence":"first","affiliation":[{"name":"University of Nebraska at Omaha, Omaha, Nebraska"}]},{"given":"Connie","family":"Jones","sequence":"additional","affiliation":[{"name":"University of Nebraska at Omaha, Omaha, Nebraska"}]},{"given":"William","family":"Mahoney","sequence":"additional","affiliation":[{"name":"University of Nebraska at Omaha, Omaha, Nebraska"}]}],"member":"320","published-online":{"date-parts":[[2012,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Computer Science Curriculum 2008: An Interim Revision of CS 2001 Curriculum Guidelines for Undergraduate Degree Programs in Computer Science (2008) Interim Review Task Force from Association for Computing Machinery and IEEE Computer Society.  Computer Science Curriculum 2008: An Interim Revision of CS 2001 Curriculum Guidelines for Undergraduate Degree Programs in Computer Science (2008) Interim Review Task Force from Association for Computing Machinery and IEEE Computer Society."},{"key":"e_1_2_1_2_1","volume-title":"The Joint Task Force on Computing Curricula IEEE Computer Society and Association for Computing Machinery, (Ed.). Engel G., &amp","author":"Computing Curricula","year":"2001","unstructured":"Computing Curricula 2001 Computer Science , ( 2001 ), The Joint Task Force on Computing Curricula IEEE Computer Society and Association for Computing Machinery, (Ed.). Engel G., &amp ; Roberts , E. Computing Curricula 2001 Computer Science, (2001), The Joint Task Force on Computing Curricula IEEE Computer Society and Association for Computing Machinery, (Ed.). Engel G., &amp; Roberts, E."},{"key":"e_1_2_1_3_1","volume-title":"The Joint Task Force on Computing Curricula","author":"Computing Curricula","year":"2005","unstructured":"Computing Curricula , The Overview Report, (2005) , The Joint Task Force on Computing Curricula 2005 , The Association for Computing Machinery (ACM) , The Association for Information Systems (AIS) and The Computer Society (IEEE-CS), (Ed.). Shackelford R. Computing Curricula, The Overview Report, (2005), The Joint Task Force on Computing Curricula 2005, The Association for Computing Machinery (ACM), The Association for Information Systems (AIS) and The Computer Society (IEEE-CS), (Ed.). Shackelford R."},{"key":"e_1_2_1_4_1","volume-title":"Hughes E. A., Impagliazzo J., McGettrick A.","author":"Curriculum Guidelines","year":"2004","unstructured":"Curriculum Guidelines for Undergraduate Degree Programs in Computer Engineering , ( 2004 ), The Joint Task Force on Computing Curricula IEEE Computer Society and Association for Computing Machinery, (Ed.). Soldan D ., Hughes E. A., Impagliazzo J., McGettrick A. , Nelson V P. , Srimani P.K. , Theys M.D. Curriculum Guidelines for Undergraduate Degree Programs in Computer Engineering, (2004), The Joint Task Force on Computing Curricula IEEE Computer Society and Association for Computing Machinery, (Ed.). Soldan D., Hughes E. A., Impagliazzo J., McGettrick A., Nelson V P., Srimani P.K., Theys M.D."},{"key":"e_1_2_1_5_1","volume-title":"Joint IS 2010 Curriculum Task Force, Association for Computing Machinery and Association for Information Systems.","author":"Curriculum Guidelines","year":"2010","unstructured":"Curriculum Guidelines for Undergraduate Degree Programs in Information Systems , ( 2010 ), Joint IS 2010 Curriculum Task Force, Association for Computing Machinery and Association for Information Systems. Curriculum Guidelines for Undergraduate Degree Programs in Information Systems, (2010), Joint IS 2010 Curriculum Task Force, Association for Computing Machinery and Association for Information Systems."},{"key":"e_1_2_1_6_1","volume-title":"Association for Computing Machinery and IEEE Computer Society","author":"Curriculum Guidelines","year":"2008","unstructured":"Curriculum Guidelines for Undergraduate Degree Programs in Information Technology , ( 2008 ), Association for Computing Machinery and IEEE Computer Society . Curriculum Guidelines for Undergraduate Degree Programs in Information Technology, (2008), Association for Computing Machinery and IEEE Computer Society."},{"key":"e_1_2_1_7_1","volume-title":"August","author":"Curriculum Guidelines","year":"2004","unstructured":"Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering , ( 2004 ) The Joint Task Force on Computing Curricula IEEE Computer Society and Association for Computing Machinery , August 2004. Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering, (2004) The Joint Task Force on Computing Curricula IEEE Computer Society and Association for Computing Machinery, August 2004."},{"key":"e_1_2_1_8_1","volume-title":"Retrieved","author":"Federal Cyber Service","year":"2011","unstructured":"Federal Cyber Service : Scholarship for Service (SfS), (2011) , Retrieved December 13, 2011 , from https:\/\/www.sfs.opm.gov\/ Federal Cyber Service: Scholarship for Service (SfS), (2011), Retrieved December 13, 2011, from https:\/\/www.sfs.opm.gov\/"},{"key":"e_1_2_1_9_1","first-page":"28","volume-title":"Social, Economic, and Political,\" IEEE Technology and Society Magazine","author":"Gandhi R.A.","year":"2011","unstructured":"Gandhi , R.A. , Sharma , A. , Mahoney , W. , Sousan , W. , Zhu , Q. , Laplante , P. , ( 2011 ) \" Dimensions of Cyber-Attacks: Cultural , Social, Economic, and Political,\" IEEE Technology and Society Magazine , vol. 30 , no.1, pp. 28 -- 38 , Spring 2011 Gandhi, R.A., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P., (2011) \"Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political,\" IEEE Technology and Society Magazine, vol.30, no.1, pp.28--38, Spring 2011"},{"key":"e_1_2_1_10_1","volume-title":"Retrieved","author":"Gaudin S.","year":"2011","unstructured":"Gaudin , S. , \"College Hacking Course Kindles Fiery Debate\" , eSecurity Planet, (2003) , Retrieved December 13, 2011 , from http:\/\/www.esecurityplanet.com\/trends\/article.php\/2217781\/College-Hacking-Course-Kindles-Fiery-Debate.htm Gaudin, S., \"College Hacking Course Kindles Fiery Debate\", eSecurity Planet, (2003), Retrieved December 13, 2011, from http:\/\/www.esecurityplanet.com\/trends\/article.php\/2217781\/College-Hacking-Course-Kindles-Fiery-Debate.htm"},{"key":"e_1_2_1_11_1","first-page":"978","volume":"13","author":"Lehtinen R","year":"2006","unstructured":"Lehtinen , R , Gangemi Sr . G.T. , Computer Security Basics , O'Reilly Media; Second Edition , ISBN-13 : 978 - 0596006693 , June 20, 2006 . Lehtinen, R, Gangemi Sr. G.T., Computer Security Basics, O'Reilly Media; Second Edition, ISBN-13: 978-0596006693, June 20, 2006.","journal-title":"Second Edition"},{"key":"e_1_2_1_12_1","volume-title":"The Register, (2007","author":"Lemos R.","year":"2011","unstructured":"Lemos , R. , \" Teaching hacking helps students, professors say \", The Register, (2007 ), Retrieved December 13, 2011 , from http:\/\/www.theregister.co.uk\/2007\/08\/07\/teaching_students_hacking\/ Lemos, R., \"Teaching hacking helps students, professors say\", The Register, (2007), Retrieved December 13, 2011, from http:\/\/www.theregister.co.uk\/2007\/08\/07\/teaching_students_hacking\/"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047405"},{"key":"e_1_2_1_14_1","volume-title":"Retrieved","author":"Nmap","year":"2011","unstructured":"Nmap security scanner , ( 2011 ), Retrieved December 13, 2011, from http:\/\/nmap.org\/ Nmap security scanner, (2011), Retrieved December 13, 2011, from http:\/\/nmap.org\/"},{"key":"e_1_2_1_15_1","volume-title":"Retrieved","author":"Research Experience","year":"2011","unstructured":"NSF Research Experience for Undergraduates (REU) in Computer Science and Information Technology , ( 2011 ), Retrieved December 13, 2011, from http:\/\/reu.ist.unomaha.edu\/ NSF Research Experience for Undergraduates (REU) in Computer Science and Information Technology, (2011), Retrieved December 13, 2011, from http:\/\/reu.ist.unomaha.edu\/"},{"key":"e_1_2_1_16_1","unstructured":"Paros-for web application security assessment http:\/\/www.parosproxy.org\/  Paros-for web application security assessment http:\/\/www.parosproxy.org\/"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231088"},{"key":"e_1_2_1_18_1","volume-title":"Retrieved","author":"The Walter Scott Jr.","year":"2011","unstructured":"The Walter Scott , Jr. Scholarship , ( 2011 ), Retrieved December 13, 2011, from http:\/\/pki.nebraska.edu\/new\/admissions\/scholarships-financial-aid.php The Walter Scott, Jr. Scholarship, (2011), Retrieved December 13, 2011, from http:\/\/pki.nebraska.edu\/new\/admissions\/scholarships-financial-aid.php"},{"key":"e_1_2_1_19_1","volume-title":"Retrieved","author":"Wireshark","year":"2011","unstructured":"Wireshark network protocol analyzer, (2011) , Retrieved December 13, 2011 , from http:\/\/www.wireshark.org Wireshark network protocol analyzer, (2011), Retrieved December 13, 2011, from http:\/\/www.wireshark.org"}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2339055.2339072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2339055.2339072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:08Z","timestamp":1750238468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2339055.2339072"}},"subtitle":["can it be done?\n            <i>here's how<\/i>"],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["10.1145\/2339055.2339072"],"URL":"https:\/\/doi.org\/10.1145\/2339055.2339072","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"type":"print","value":"2153-2184"},{"type":"electronic","value":"2153-2192"}],"subject":[],"published":{"date-parts":[[2012,9]]},"assertion":[{"value":"2012-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}