{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T01:41:26Z","timestamp":1772847686125,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,29]],"date-time":"2013-06-29T00:00:00Z","timestamp":1372464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,29]]},"DOI":"10.1145\/2543882.2543883","type":"proceedings-article","created":{"date-parts":[[2013,12,20]],"date-time":"2013-12-20T19:50:52Z","timestamp":1387569052000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Cybersecurity, women and minorities"],"prefix":"10.1145","author":[{"given":"Rose","family":"Shumba","sequence":"first","affiliation":[{"name":"University of Maryland University College"}]},{"given":"Kirsten","family":"Ferguson-Boucher","sequence":"additional","affiliation":[{"name":"Aberystwyth University, Wales"}]},{"given":"Elizabeth","family":"Sweedyk","sequence":"additional","affiliation":[{"name":"Harvey Mudd College"}]},{"given":"Carol","family":"Taylor","sequence":"additional","affiliation":[{"name":"Eastern Washington University"}]},{"given":"Guy","family":"Franklin","sequence":"additional","affiliation":[{"name":"Capitol College"}]},{"given":"Claude","family":"Turner","sequence":"additional","affiliation":[{"name":"Bowie State University"}]},{"given":"Corrine","family":"Sande","sequence":"additional","affiliation":[{"name":"Whatcom Community College, Bellingham, WA"}]},{"given":"Gbemi","family":"Acholonu","sequence":"additional","affiliation":[{"name":"University of Maryland and University College"}]},{"given":"Rebecca","family":"Bace","sequence":"additional","affiliation":[{"name":"University of South Alabama, Mobile, AL"}]},{"given":"Laura","family":"Hall","sequence":"additional","affiliation":[{"name":"University of Texas at El Paso"}]}],"member":"320","published-online":{"date-parts":[[2013,6,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"August 6","author":"AAAS","year":"2013","unstructured":"AAAS , Broadening Participation in Computing (BPC) Program,http:\/\/php.aaas.org\/programs\/centers\/capacity\/07_ Engagement\/07_BPCProgram.php , August 6 , 2013 AAAS, Broadening Participation in Computing (BPC) Program,http:\/\/php.aaas.org\/programs\/centers\/capacity\/07_ Engagement\/07_BPCProgram.php, August 6, 2013"},{"key":"e_1_3_2_1_2_1","unstructured":"ACM-W Supporting Celebrating and Advocating Women in Computing. http:\/\/women.acm.org\/regional  ACM-W Supporting Celebrating and Advocating Women in Computing. http:\/\/women.acm.org\/regional"},{"key":"e_1_3_2_1_3_1","unstructured":"ACM-W Supporting Celebrating and Advocating Women in Computing http:\/\/women.acm.org\/  ACM-W Supporting Celebrating and Advocating Women in Computing http:\/\/women.acm.org\/"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"ACSA","year":"2013","unstructured":"ACSA , Scholarship for Women , Retrieved October 14, 2013 , from:, http:\/\/www.acsac.org\/acsa\/scholarship.html ACSA, Scholarship for Women, Retrieved October 14, 2013, from:, http:\/\/www.acsac.org\/acsa\/scholarship.html"},{"key":"e_1_3_2_1_5_1","unstructured":"Advanced Technological Education Centers. Retrieved July 28 2013 from ATE Centers: http:\/\/atecenters.org\/#t-slidefour  Advanced Technological Education Centers. Retrieved July 28 2013 from ATE Centers: http:\/\/atecenters.org\/#t-slidefour"},{"key":"e_1_3_2_1_6_1","volume-title":"August 6","author":"Agile Security Forum P.","year":"2013","unstructured":"Agile Security Forum , Robert P. Abbott , http:\/\/www.agilesecurityforum.com\/biosS\/BioAbbottRobert.htm , August 6 , 2013 . Agile Security Forum, Robert P. Abbott, http:\/\/www.agilesecurityforum.com\/biosS\/BioAbbottRobert.htm, August 6, 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.39"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.123"},{"key":"e_1_3_2_1_9_1","unstructured":"Blum L and Frieze C. In a more balanced CS environment similarity is the difference and CS is the winner Computing Research News 17(3). See: http:\/\/www.cra.org\/CRN\/articles\/may05\/blum.frieze.html.  Blum L and Frieze C. In a more balanced CS environment similarity is the difference and CS is the winner Computing Research News 17(3). See: http:\/\/www.cra.org\/CRN\/articles\/may05\/blum.frieze.html."},{"key":"e_1_3_2_1_10_1","volume-title":"August 6","author":"Brito H.","year":"2013","unstructured":"Brito , H. , Reverse Engineering Challenge, https:\/\/www.mandiant.com\/blog\/interview-halvar-flakecarrie-jung-reverse-engineering-challenge-women\/ , August 6 , 2013 . Brito, H., Reverse Engineering Challenge, https:\/\/www.mandiant.com\/blog\/interview-halvar-flakecarrie-jung-reverse-engineering-challenge-women\/, August 6, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/262793.262813"},{"key":"e_1_3_2_1_12_1","volume-title":"Information Security Analysts Jobless Rate: Zilch. Retrieved on","author":"Chabrow E.","year":"2013","unstructured":"Chabrow , E. Information Security Analysts Jobless Rate: Zilch. Retrieved on 14 June , 2013 from Govinfo Security : http:\/\/www.govinfosecurity.com\/information-securityanalysts-jobless-rate-zilch-a-3499 Chabrow, E. Information Security Analysts Jobless Rate: Zilch. Retrieved on 14 June, 2013 from Govinfo Security: http:\/\/www.govinfosecurity.com\/information-securityanalysts-jobless-rate-zilch-a-3499"},{"key":"e_1_3_2_1_13_1","unstructured":"CISSE Colloquium for Information Security Education http:\/\/www.cisse.info\/ August 6 2013.  CISSE Colloquium for Information Security Education http:\/\/www.cisse.info\/ August 6 2013."},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved on","author":"Comptia The IT Industry Association","year":"2013","unstructured":"Comptia The IT Industry Association . Retrieved on July 28, 2013 from Comptia : http:\/\/www.comptia.org\/membership\/communities\/women\/a Comptia The IT Industry Association. Retrieved on July 28, 2013 from Comptia: http:\/\/www.comptia.org\/membership\/communities\/women\/a"},{"key":"e_1_3_2_1_15_1","volume-title":"Towards Information Assurance Curricular Guidelines, retrieved","author":"Cooper S.","year":"2013","unstructured":"Cooper S. , Towards Information Assurance Curricular Guidelines, retrieved October 14, 2013 from http:\/\/dl.acm.org\/citation.cfm?id=1971681.1971686 Cooper S.et al, Towards Information Assurance Curricular Guidelines, retrieved October 14, 2013 from http:\/\/dl.acm.org\/citation.cfm?id=1971681.1971686"},{"key":"e_1_3_2_1_16_1","unstructured":"Cooper S. et. al An Exploration of the Current State of Information Assurance Education retrieved October 14 2013 from: http:\/\/wit_program  Cooper S. et. al An Exploration of the Current State of Information Assurance Education retrieved October 14 2013 from: http:\/\/wit_program"},{"key":"e_1_3_2_1_17_1","volume-title":"Computer Research Association's Committee on the Status of Women in Computing Research (CRA-W)","year":"2013","unstructured":"CRA-W2 , Computer Research Association's Committee on the Status of Women in Computing Research (CRA-W) , 2013 , Retrieved July 28, 2013: http:\/\/cra-w.org\/about-craw\/all-projects CRA-W2, Computer Research Association's Committee on the Status of Women in Computing Research (CRA-W), 2013, Retrieved July 28, 2013: http:\/\/cra-w.org\/about-craw\/all-projects"},{"key":"e_1_3_2_1_18_1","volume-title":"Broadening Participation inComputing Research and Education Report of a Workshop","year":"2004","unstructured":"CRA-W , Broadening Participation inComputing Research and Education Report of a Workshop October 20-21, 2004 , http:\/\/archive.cra.org\/Activities\/workshops\/broadening.participation\/broadening.participation.pdf, 2004. CRA-W, Broadening Participation inComputing Research and Education Report of a Workshop October 20-21, 2004, http:\/\/archive.cra.org\/Activities\/workshops\/broadening.participation\/broadening.participation.pdf, 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","author":"CyberCorps","year":"2013","unstructured":"CyberCorps : Scholarship for Service . Retrieved July 28, 2013 from CyberCorps : https:\/\/www.sfs.opm.gov CyberCorps: Scholarship for Service. Retrieved July 28, 2013 from CyberCorps: https:\/\/www.sfs.opm.gov"},{"key":"e_1_3_2_1_20_1","volume-title":"Retrieved","author":"CyberPatriot Competition","year":"2013","unstructured":"CyberPatriot Competition : Retrieved July 28, 2013 from CyberPatriot Competition : http:\/\/www.uscyberpatriot.org\/CP5\/Training.aspx CyberPatriot Competition: Retrieved July 28, 2013 from CyberPatriot Competition: http:\/\/www.uscyberpatriot.org\/CP5\/Training.aspx"},{"key":"e_1_3_2_1_21_1","volume-title":"Cool Careers in CyberSecurity Workshops . Retrieved from CyberWatch: http:\/\/www.edtechpolicy.org\/cyberk12\/c3workforcecareers.html","author":"CyberWatch","year":"2013","unstructured":"CyberWatch , 2013 CyberWatch. (2013, May 1) . Cool Careers in CyberSecurity Workshops . Retrieved from CyberWatch: http:\/\/www.edtechpolicy.org\/cyberk12\/c3workforcecareers.html CyberWatch, 2013 CyberWatch. (2013, May 1). Cool Careers in CyberSecurity Workshops . Retrieved from CyberWatch: http:\/\/www.edtechpolicy.org\/cyberk12\/c3workforcecareers.html"},{"key":"e_1_3_2_1_22_1","volume-title":"Pacific Rim Regional Cyberdefense Competition: Post Survey","author":"Cyberwatch West","unstructured":"Cyberwatch West . Pacific Rim Regional Cyberdefense Competition: Post Survey . Ontario, CA : Unpublished . Cyberwatch West. Pacific Rim Regional Cyberdefense Competition: Post Survey. Ontario, CA: Unpublished."},{"key":"e_1_3_2_1_23_1","volume-title":"K. Increasing Participation of Women in Cyber Security. ASEE-SE Regional Conference","author":"Dampier D.","unstructured":"Dampier , D. , Kelly , K. , & Carr , K. Increasing Participation of Women in Cyber Security. ASEE-SE Regional Conference , Starkville, MS. Dampier, D., Kelly, K., & Carr, K. Increasing Participation of Women in Cyber Security. ASEE-SE Regional Conference, Starkville, MS."},{"key":"e_1_3_2_1_25_1","volume-title":"DEFCON Hacker Convention","author":"DEFCON","year":"2013","unstructured":"DEFCON , DEFCON Hacker Convention , Retrieved July 16, 2013 , from http:\/\/www.defcon.org\/, August 6, 2013. DEFCON, DEFCON Hacker Convention, Retrieved July 16, 2013, from http:\/\/www.defcon.org\/, August 6, 2013."},{"key":"e_1_3_2_1_26_1","volume-title":"August 6","author":"DOD","year":"2013","unstructured":"DOD , Department of Defense IA Portal, https:\/\/www.fbo.gov\/?s=opportunity&mode=form&id=42f11e50f13b4a866f7a4b58f156a76b&tab=core&_cview=1 , August 6 , 2013 . DOD, Department of Defense IA Portal, https:\/\/www.fbo.gov\/?s=opportunity&mode=form&id=42f11e50f13b4a866f7a4b58f156a76b&tab=core&_cview=1, August 6, 2013."},{"key":"e_1_3_2_1_27_1","unstructured":"Finkle.J. and Randewich.N. Retrieved July 16 2013 from Reuters US. http:\/\/www.reuters.com\/article\/2012\/06\/13\/usmedia-tech-summit-symantec-idUSBRE85B1E220120613  Finkle.J. and Randewich.N. Retrieved July 16 2013 from Reuters US. http:\/\/www.reuters.com\/article\/2012\/06\/13\/usmedia-tech-summit-symantec-idUSBRE85B1E220120613"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/268084.268127"},{"key":"e_1_3_2_1_29_1","volume-title":"Retrieved on","author":"Fung B.","year":"2013","unstructured":"Fung , B. You Call This an Army? The Terrifying Shortage of U.S Cyber warriors . Retrieved on July 22, 2013 from the National Journal : http:\/\/www.nationaljournal.com\/tech\/you-call-this-anarmy-the-terrifying-shortage-of-u-s-cyberwarriors-20130225 Fung, B.You Call This an Army? The Terrifying Shortage of U.S Cyber warriors. Retrieved on July 22, 2013 from the National Journal: http:\/\/www.nationaljournal.com\/tech\/you-call-this-anarmy-the-terrifying-shortage-of-u-s-cyberwarriors-20130225"},{"key":"e_1_3_2_1_30_1","volume-title":"Can more women in IT bridge skills gap? Retrieved on","author":"GB","year":"2013","unstructured":"GB , Can more women in IT bridge skills gap? Retrieved on July 21, 2013 from The Potsdam eGovernment Competence Center : http:\/\/www.ifg.cc\/index.php?option=com_content&task=view&id=43911 GB, Can more women in IT bridge skills gap? Retrieved on July 21, 2013 from The Potsdam eGovernment Competence Center: http:\/\/www.ifg.cc\/index.php?option=com_content&task=view&id=43911"},{"key":"e_1_3_2_1_31_1","unstructured":"Global Women Leadership Retrieved July 16 2013 from http:\/\/www.globalwomenln.org\/.  Global Women Leadership Retrieved July 16 2013 from http:\/\/www.globalwomenln.org\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Gosler J. \"Cyber warrior Shortage Threatens U.S. Security \" Retrieved July 19 2012 from National Radio: http:\/\/www.npr.org\/templates\/story\/story.php?storyId=128574055.  Gosler J. \"Cyber warrior Shortage Threatens U.S. Security \" Retrieved July 19 2012 from National Radio: http:\/\/www.npr.org\/templates\/story\/story.php?storyId=128574055."},{"key":"e_1_3_2_1_33_1","unstructured":"Grace Hopper Grace Hopper Celebration of Women in Computing http:\/\/gracehopper.org\/2013\/ August 6 2013  Grace Hopper Grace Hopper Celebration of Women in Computing http:\/\/gracehopper.org\/2013\/ August 6 2013"},{"key":"e_1_3_2_1_34_1","volume-title":"Building Information Assurance Education Partnerships with Minority Institutions. Retrieved on","author":"Hamilton J.A","year":"2013","unstructured":"Hamilton J.A , Owor R.S. , Dajani K. , Building Information Assurance Education Partnerships with Minority Institutions. Retrieved on October 14, 2013 from: http:\/\/dl.acm.org\/citation.cfm?id=1565799.1565813 Hamilton J.A, Owor R.S., Dajani K., Building Information Assurance Education Partnerships with Minority Institutions. Retrieved on October 14, 2013 from: http:\/\/dl.acm.org\/citation.cfm?id=1565799.1565813"},{"key":"e_1_3_2_1_35_1","volume-title":"UK Lacking IT Experts to Prevent Attacks: Retrieved","author":"Huffington Post United Kingdom","year":"2013","unstructured":"Huffington Post United Kingdom , UK Lacking IT Experts to Prevent Attacks: Retrieved July 22, 2013 from: http:\/\/www.huffingtonpost.co.uk\/2013\/02\/11\/uk-lacking-itexperts-to-prevent-cyber-attacks_n_2663143.html Huffington Post United Kingdom, UK Lacking IT Experts to Prevent Attacks: Retrieved July 22, 2013 from: http:\/\/www.huffingtonpost.co.uk\/2013\/02\/11\/uk-lacking-itexperts-to-prevent-cyber-attacks_n_2663143.html"},{"key":"e_1_3_2_1_36_1","volume-title":"2006 Retrieved from","author":"Survey","year":"2013","unstructured":"IDC Survey , 2006 Retrieved from July 28, 2013 from ISC 2: http:\/\/www.isc2.org\/uploadedFiles\/Industry_Resources\/wfs_gov.pdf IDC Survey, 2006 Retrieved from July 28, 2013 from ISC2: http:\/\/www.isc2.org\/uploadedFiles\/Industry_Resources\/wfs_gov.pdf"},{"key":"e_1_3_2_1_37_1","volume-title":"Retrieved on","author":"Infosecurity","year":"2013","unstructured":"Infosecurity , (ISC)2 kicks off Women in Security mentoring program . Retrieved on June 20, 2013 , from Infosecurity, UK. http:\/\/www.infosecurity magazine.com\/view\/33102\/isc-kicks-off-women-insecurity-mentoring-program\/ Infosecurity, (ISC)2 kicks off Women in Security mentoring program. Retrieved on June 20, 2013, from Infosecurity, UK. http:\/\/www.infosecurity magazine.com\/view\/33102\/isc-kicks-off-women-insecurity-mentoring-program\/"},{"key":"e_1_3_2_1_38_1","volume-title":"August 6","author":"Infragard","year":"2013","unstructured":"Infragard , https:\/\/www.infragard.org\/ , August 6 , 2013 . Infragard, https:\/\/www.infragard.org\/, August 6, 2013."},{"key":"e_1_3_2_1_39_1","volume-title":"Retrieved on","author":"Foundation","year":"2013","unstructured":"ISC2 Foundation , Women in Security Scholarships , Retrieved on October 29, 2013 from: https:\/\/www.isc2cares.org\/scholarships\/womensscholarship\/ ISC2 Foundation, Women in Security Scholarships, Retrieved on October 29, 2013 from: https:\/\/www.isc2cares.org\/scholarships\/womensscholarship\/"},{"key":"e_1_3_2_1_40_1","volume-title":"August 6","author":"ISSA","year":"2013","unstructured":"ISSA , http:\/\/www.issa.org\/ , August 6 , 2013 . ISSA, http:\/\/www.issa.org\/, August 6, 2013."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0101_3"},{"key":"e_1_3_2_1_42_1","volume-title":"Retrieved on","author":"Lance C.","year":"2013","unstructured":"Lance C. , Information assurance education in two- and four-year institutions . Retrieved on October 14, 2013 from: http:\/\/dl.acm.org\/citation.cfm?id=2078856.2078860 Lance C., et al Information assurance education in two- and four-year institutions. Retrieved on October 14, 2013 from: http:\/\/dl.acm.org\/citation.cfm?id=2078856.2078860"},{"key":"e_1_3_2_1_43_1","unstructured":"LPFI Level Playing Field Institute Dissecting the Data 2012: Examining STEM Opportunities and Outcomes for Underrepresented Students in California http:\/\/www.lpfi.org\/sites\/default\/files\/dissecting_the_data_2012_final.pdf  LPFI Level Playing Field Institute Dissecting the Data 2012: Examining STEM Opportunities and Outcomes for Underrepresented Students in California http:\/\/www.lpfi.org\/sites\/default\/files\/dissecting_the_data_2012_final.pdf"},{"key":"e_1_3_2_1_44_1","volume-title":"Computer Pioneer,\" Retrieved","author":"Lewis J.J.","year":"2013","unstructured":"Lewis , J.J. \" Ada Lovelace , Mathematician , Computer Pioneer,\" Retrieved July 28, 2013 from About .com: http:\/\/womenshistory.about.com\/cs\/sciencemath1\/a\/bio_lovelace.htm Lewis, J.J. \"Ada Lovelace, Mathematician, Computer Pioneer,\" Retrieved July 28, 2013 from About.com: http:\/\/womenshistory.about.com\/cs\/sciencemath1\/a\/bio_lovelace.htm"},{"key":"e_1_3_2_1_45_1","unstructured":"Maisel M. \"Meet Grace Hopper \" Retrieved July 28 2013 from About.com: http:\/\/gracehopper.org\/2009\/about\/about-grace-hopper\/  Maisel M. \"Meet Grace Hopper \" Retrieved July 28 2013 from About.com: http:\/\/gracehopper.org\/2009\/about\/about-grace-hopper\/"},{"key":"e_1_3_2_1_46_1","unstructured":"Maller T. Half the Homeland -- Mobilizing Women for Cybersecurity. Retrieved on July 25 from Blogs of War. http:\/\/blogsofwar.com\/2013\/05\/28\/tara-maller-half-thehomeland-mobilizing-women-for-cybersecurity\/  Maller T. Half the Homeland -- Mobilizing Women for Cybersecurity. Retrieved on July 25 from Blogs of War. http:\/\/blogsofwar.com\/2013\/05\/28\/tara-maller-half-thehomeland-mobilizing-women-for-cybersecurity\/"},{"key":"e_1_3_2_1_47_1","volume-title":"Stuck in the Shallow End: Education, Race, and Computing","author":"Margolis J.","year":"2008","unstructured":"Margolis , J. Stuck in the Shallow End: Education, Race, and Computing . The MIT Press . ( 2008 ) Margolis, J. Stuck in the Shallow End: Education, Race, and Computing. The MIT Press. (2008)"},{"key":"e_1_3_2_1_48_1","volume-title":"Unlocking the Clubhouse: Women in Computing","author":"Margolis","year":"2003","unstructured":"Margolis & Fisher Jane Margolis, Allan Fischer , Unlocking the Clubhouse: Women in Computing , MIT Press , 2003 . Margolis & Fisher Jane Margolis, Allan Fischer, Unlocking the Clubhouse: Women in Computing, MIT Press, 2003."},{"key":"e_1_3_2_1_49_1","volume-title":"Conference Proceedings of 2010 NAMEPA\/WEPAN 4th Joint Conference Setting Sail for the Future: Leveraging Diversity for a Stronger Crew. (pp. 1--5).","author":"Milgram D.","unstructured":"Milgram , D. The CalWomenTech Project: Using Surveys to Inform Retention Strategies of Female Technology Students . Conference Proceedings of 2010 NAMEPA\/WEPAN 4th Joint Conference Setting Sail for the Future: Leveraging Diversity for a Stronger Crew. (pp. 1--5). Austin : Women in Engineering ProActive Network (WEPAN) . Milgram, D. The CalWomenTech Project: Using Surveys to Inform Retention Strategies of Female Technology Students. Conference Proceedings of 2010 NAMEPA\/WEPAN 4th Joint Conference Setting Sail for the Future: Leveraging Diversity for a Stronger Crew. (pp. 1--5). Austin: Women in Engineering ProActive Network (WEPAN)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1108\/09649420610643385"},{"key":"e_1_3_2_1_51_1","unstructured":"NCWIT National Center for Women and Information Technology http:\/\/www.ncwit.org\/ August 6 2013.  NCWIT National Center for Women and Information Technology http:\/\/www.ncwit.org\/ August 6 2013."},{"key":"e_1_3_2_1_52_1","volume-title":"Retrieved on","author":"National Collegiate Cyber Defense Competition","year":"2013","unstructured":"National Collegiate Cyber Defense Competition , Retrieved on July 28, 2013 from National CCDE : http:\/\/www.nationalccdc.org\/. National Collegiate Cyber Defense Competition, Retrieved on July 28, 2013 from National CCDE: http:\/\/www.nationalccdc.org\/."},{"key":"e_1_3_2_1_53_1","volume-title":"About Us: The National Cyberleague. Retrieved on","author":"National Cyberleague","year":"2013","unstructured":"National Cyberleague , ( 2013 , May) . About Us: The National Cyberleague. Retrieved on July 29, 2013 from National Cyber League (NCL): http:\/\/www.nationalcyberleague.org\/about.shtml National Cyberleague, (2013, May). About Us: The National Cyberleague. Retrieved on July 29, 2013 from National Cyber League (NCL): http:\/\/www.nationalcyberleague.org\/about.shtml"},{"key":"e_1_3_2_1_54_1","volume-title":"National Initiative for Cybersecurity Careers and Studies. Retrieved on","author":"NICCS","year":"2013","unstructured":"NICCS , National Initiative for Cybersecurity Careers and Studies. Retrieved on July 28, 2013 from NICCS : http:\/\/niccs.us-cert.gov\/ NICCS, National Initiative for Cybersecurity Careers and Studies. Retrieved on July 28, 2013 from NICCS: http:\/\/niccs.us-cert.gov\/"},{"key":"e_1_3_2_1_55_1","unstructured":"NSF1 National Scienhttp:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ ID=1241541&HistoricalAwards=falsece Foundation. (2012 August). Award Abstract #1241541 . Retrieved from Awards:  NSF1 National Scienhttp:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ ID=1241541&HistoricalAwards=falsece Foundation. (2012 August). Award Abstract #1241541 . Retrieved from Awards:"},{"key":"e_1_3_2_1_56_1","unstructured":"NSF2 National Science Foundation Statistics http:\/\/www.nsf.gov\/statistics\/nsf08321\/pdf\/tab28.pdf  NSF2 National Science Foundation Statistics http:\/\/www.nsf.gov\/statistics\/nsf08321\/pdf\/tab28.pdf"},{"key":"e_1_3_2_1_57_1","volume-title":"National Science Foundation: Retrieved on","year":"2013","unstructured":"NSF3 , National Science Foundation: Retrieved on July 28, 2013 from US National Science Foundation : http:\/\/www.nsf.gov\/statistics\/seind06\/toc.htm NSF3, National Science Foundation: Retrieved on July 28, 2013 from US National Science Foundation: http:\/\/www.nsf.gov\/statistics\/seind06\/toc.htm"},{"key":"e_1_3_2_1_58_1","volume-title":"National Science Foundation","year":"2012","unstructured":"NSF4 , National Science Foundation . ( 2012 , October). CyberCorps: Scholarship for Service (SFS). Retrieved from Program Announcements & Information nsf12585:http:\/\/www.nsf.gov\/pubs\/2012\/nsf12585\/nsf12585.htm NSF4, National Science Foundation. (2012, October). CyberCorps: Scholarship for Service (SFS). Retrieved from Program Announcements & Information nsf12585:http:\/\/www.nsf.gov\/pubs\/2012\/nsf12585\/nsf12585.htm"},{"key":"e_1_3_2_1_59_1","unstructured":"NSA Centers for Academic Excellence http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/ August 6 2013.  NSA Centers for Academic Excellence http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/ August 6 2013."},{"key":"e_1_3_2_1_60_1","unstructured":"NCES-1 National Center for Education Statistics http:\/\/nces.ed.gov\/fastfacts\/display.asp?id=72  NCES-1 National Center for Education Statistics http:\/\/nces.ed.gov\/fastfacts\/display.asp?id=72"},{"key":"e_1_3_2_1_61_1","unstructured":"Online Educa Berlin Interview with Baroness Neville-Jones http:\/\/www.onlineeduca.com\/OEB_Newsportal\/cyber-security\/ August 6 2013.  Online Educa Berlin Interview with Baroness Neville-Jones http:\/\/www.onlineeduca.com\/OEB_Newsportal\/cyber-security\/ August 6 2013."},{"key":"e_1_3_2_1_62_1","unstructured":"Personal communication with Working Group member Dr. Claude Turner BSU Faculty July 3 2013.  Personal communication with Working Group member Dr. Claude Turner BSU Faculty July 3 2013."},{"key":"e_1_3_2_1_63_1","volume-title":"Enhancing CS awareness among K-12 students in central Arkansas. J. Comput. Sci. Coll. 28, 5 (May","author":"Paruchuri V.","year":"2013","unstructured":"Paruchuri , V. Enhancing CS awareness among K-12 students in central Arkansas. J. Comput. Sci. Coll. 28, 5 (May 2013 ), 17--23. Paruchuri, V. Enhancing CS awareness among K-12 students in central Arkansas. J. Comput. Sci. Coll. 28, 5 (May 2013), 17--23."},{"key":"e_1_3_2_1_64_1","unstructured":"Security Watch Security Certification List http:\/\/bhconsulting.ie\/securitywatch\/?p=104 August 6 2013.  Security Watch Security Certification List http:\/\/bhconsulting.ie\/securitywatch\/?p=104 August 6 2013."},{"key":"e_1_3_2_1_65_1","volume-title":"Frost and Sullivan Market Survey","author":"Suby M.","year":"2013","unstructured":"Suby , M. The 2013 (ISC)2 Global Information Security Workforce Study , Frost and Sullivan Market Survey , February 2013. Suby, M. The 2013 (ISC)2 Global Information Security Workforce Study, Frost and Sullivan Market Survey, February 2013."},{"key":"e_1_3_2_1_66_1","unstructured":"Taulbee Computing Research Association 2013 Taulbee Report http:\/\/cra.org\/govaffairs\/blog\/2013\/03\/taulbeereport\/  Taulbee Computing Research Association 2013 Taulbee Report http:\/\/cra.org\/govaffairs\/blog\/2013\/03\/taulbeereport\/"},{"key":"e_1_3_2_1_67_1","volume-title":"Retrieved on","author":"U.S. Department of Homeland Security.","year":"2013","unstructured":"U.S. Department of Homeland Security. Retrieved on July 28, 2013 from U.S. Department of Homeland Security : http:\/\/www.dhs.gov\/interweb\/assetlibrary\/National_Cyberspace_Strategy.pdf U.S. Department of Homeland Security. Retrieved on July 28, 2013 from U.S. Department of Homeland Security: http:\/\/www.dhs.gov\/interweb\/assetlibrary\/National_Cyberspace_Strategy.pdf"},{"key":"e_1_3_2_1_68_1","volume-title":"Research Experience for Undergraduates (REU) Cybersecurity Scholars Program : Retrieved on","author":"University of Maryland","year":"2013","unstructured":"University of Maryland , Research Experience for Undergraduates (REU) Cybersecurity Scholars Program : Retrieved on October 28, 2013 from:http:\/\/cyber.umd.edu\/education\/reu University of Maryland, Research Experience for Undergraduates (REU) Cybersecurity Scholars Program : Retrieved on October 28, 2013 from:http:\/\/cyber.umd.edu\/education\/reu"},{"key":"e_1_3_2_1_69_1","volume-title":"Cybersecurity Skills Shortage need urgent attention, says DoHS: Retrieved on","author":"Warwick A.","year":"2013","unstructured":"Warwick , A. Cybersecurity Skills Shortage need urgent attention, says DoHS: Retrieved on July 23, 2013 from: http:\/\/www.computerweekly.com\/news\/2240178584\/RSA-2013-Cyber-security-skills-shortage-needs-urgentattention-says-DoHS, February 26,2013. Warwick, A. Cybersecurity Skills Shortage need urgent attention, says DoHS: Retrieved on July 23, 2013 from: http:\/\/www.computerweekly.com\/news\/2240178584\/RSA-2013-Cyber-security-skills-shortage-needs-urgentattention-says-DoHS, February 26,2013."},{"key":"e_1_3_2_1_71_1","volume-title":"Retrieved","author":"Whatcom Community College","year":"2013","unstructured":"Whatcom Community College . Whatcom Community College receives 500K grant for cyber-security . Retrieved July 28, 2013 from The Bellingham Business Journal : http:\/\/bbjtoday.com\/blog\/whatcom-community-collegereceives-500k-grant-forcybersecurity\/18103#.Uc88wfm1GSo Whatcom Community College. Whatcom Community College receives 500K grant for cyber-security. Retrieved July 28, 2013 from The Bellingham Business Journal: http:\/\/bbjtoday.com\/blog\/whatcom-community-collegereceives-500k-grant-forcybersecurity\/18103#.Uc88wfm1GSo"},{"key":"e_1_3_2_1_72_1","unstructured":"Whatcom Community College. Cyber Camps Year 1 Evaluation Report. Bellingham: Unpublished. 2012  Whatcom Community College. Cyber Camps Year 1 Evaluation Report. Bellingham: Unpublished. 2012"},{"key":"e_1_3_2_1_73_1","volume-title":"Cybersecurity. Women in Cyberscurity Conference. Retrieved","author":"Women","year":"2013","unstructured":"Women In Cybersecurity. Women in Cyberscurity Conference. Retrieved October 28, 2013 from: http:\/\/www.csc.tntech.edu\/wicys\/ Women In Cybersecurity. Women in Cyberscurity Conference. Retrieved October 28, 2013 from: http:\/\/www.csc.tntech.edu\/wicys\/"},{"key":"e_1_3_2_1_74_1","volume-title":"Retrieved","author":"Witi","year":"2013","unstructured":"Witi , Women in Technology , Retrieved July 28, 2013 from: http:\/\/www.witi.com\/ Witi, Women in Technology, Retrieved July 28, 2013 from: http:\/\/www.witi.com\/"},{"key":"e_1_3_2_1_75_1","volume-title":"Womens Society of Cyberjutsu,Retrieved","author":"WSCJ","year":"2013","unstructured":"WSCJ , Womens Society of Cyberjutsu,Retrieved July 28, 2013 from: http:\/\/womenscyberjutsu.com\/ WSCJ, Womens Society of Cyberjutsu,Retrieved July 28, 2013 from: http:\/\/womenscyberjutsu.com\/"},{"key":"e_1_3_2_1_76_1","volume-title":"Cybersecurity mainly male domain, geek image deters girls Retrieved","author":"Zakaria T.","year":"2013","unstructured":"Zakaria , T. Cybersecurity mainly male domain, geek image deters girls Retrieved July 28, 2013 from: Reuters Canada : http:\/\/ca.reuters.com\/article\/idCATRE79Q5SX20111027 Zakaria, T. Cybersecurity mainly male domain, geek image deters girls Retrieved July 28, 2013 from: Reuters Canada: http:\/\/ca.reuters.com\/article\/idCATRE79Q5SX20111027"}],"event":{"name":"ITiCSE '13: Innovation and Technology in Computer Science Education conference 2013","location":"Canterbury England United Kingdom","acronym":"ITiCSE '13","sponsor":["Bilkent University Bilkent University","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reports"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2543882.2543883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2543882.2543883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:15Z","timestamp":1750234215000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2543882.2543883"}},"subtitle":["findings and recommendations from a preliminary investigation"],"short-title":[],"issued":{"date-parts":[[2013,6,29]]},"references-count":74,"alternative-id":["10.1145\/2543882.2543883","10.1145\/2543882"],"URL":"https:\/\/doi.org\/10.1145\/2543882.2543883","relation":{},"subject":[],"published":{"date-parts":[[2013,6,29]]},"assertion":[{"value":"2013-06-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}