{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T12:00:42Z","timestamp":1769169642715,"version":"3.49.0"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2014,3]]},"abstract":"<jats:p>Educators and sponsors endorse competitions as a strong, positive influence on career choice. However, empirical studies of cybersecurity competitions are lacking, and evidence from computer science and mathematics competitions has been mixed. Here we report initial results from an ongoing study of the National Cyber League to provide a glimpse of the role of competitions in fostering cybersecurity career engagement. Preliminary results suggest that cyber competitions attract experienced individuals who will remain in the profession for the long-term, but future research is needed to understand how cyber competitions may engage women and those new to the field.<\/jats:p>","DOI":"10.1145\/2568195.2568213","type":"journal-article","created":{"date-parts":[[2014,3,11]],"date-time":"2014-03-11T12:10:30Z","timestamp":1394539830000},"page":"53-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Engaging learners in cybersecurity careers"],"prefix":"10.1145","volume":"5","author":[{"given":"David H.","family":"Tobey","sequence":"first","affiliation":[{"name":"VivoWorks, Inc., Shenandoah, Virginia"}]},{"given":"Portia","family":"Pusey","sequence":"additional","affiliation":[{"name":"National CyberWatch Center, Largo, Maryland"}]},{"given":"Diana L.","family":"Burley","sequence":"additional","affiliation":[{"name":"George Washington University, Ashburn, Virginia"}]}],"member":"320","published-online":{"date-parts":[[2014,3]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Economics and Statistics Administration, (August","author":"Beede D.","year":"2011"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/106907270000800301"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"e_1_2_1_4_1","volume-title":"Simulation & Education Conference (I\/ITSEC), (Orlando: Florida","author":"Cooper K.","year":"2009"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Dede C. \"Immersive interfaces for engagement and learning.\" Science 323 5910 (January 2009): 66--69.  Dede C. \"Immersive interfaces for engagement and learning.\" Science 323 5910 (January 2009): 66--69.","DOI":"10.1126\/science.1167311"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01353280"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6916.2006.00019.x"},{"key":"e_1_2_1_8_1","volume-title":"IEEE","author":"Mountain J.","year":"2004"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.73"},{"key":"e_1_2_1_10_1","volume-title":"Suzzanne Hidi, & Andreas Krapp","author":"Prenzel M.","year":"1992"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2009.2024080"},{"key":"e_1_2_1_12_1","unstructured":"Saunders J. \"Simulation approaches in information security education \" presented at the 6th Annual National Colloquium for Information Systems Security Education (Redmond WA 2002).  Saunders J. \"Simulation approaches in information security education \" presented at the 6th Annual National Colloquium for Information Systems Security Education (Redmond WA 2002)."},{"key":"e_1_2_1_13_1","volume-title":"UWES - Utrecht Work Engagement Scale: Prelinary manual. (November","author":"Schaufeli W.","year":"2003"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/0013164405282471"},{"key":"e_1_2_1_15_1","volume-title":"Predictive Performance Modeling: An innovative approach to defining critical competencies that distinguish levels of performance","author":"Tobey D."}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568195.2568213","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568195.2568213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:29Z","timestamp":1750234229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568195.2568213"}},"subtitle":["lessons from the launch of the national cyber league"],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["10.1145\/2568195.2568213"],"URL":"https:\/\/doi.org\/10.1145\/2568195.2568213","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"value":"2153-2184","type":"print"},{"value":"2153-2192","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3]]},"assertion":[{"value":"2014-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}