{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:43Z","timestamp":1750306723216,"version":"3.41.0"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2014,9,5]],"date-time":"2014-09-05T00:00:00Z","timestamp":1409875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2014,9,5]]},"DOI":"10.1145\/2655759.2655773","type":"journal-article","created":{"date-parts":[[2014,9,5]],"date-time":"2014-09-05T19:12:56Z","timestamp":1409944376000},"page":"44-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Is it time for ABET cybersecurity criteria?"],"prefix":"10.1145","volume":"5","author":[{"given":"Raymond","family":"Greenlaw","sequence":"first","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Andrew","family":"Phillips","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"Allen","family":"Parrish","sequence":"additional","affiliation":[{"name":"The University of Alabama, Tuscaloosa, Alabama"}]}],"member":"320","published-online":{"date-parts":[[2014,9,5]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"ABET Inc. www.abet.org Accessed 2014 May 13.  ABET Inc. www.abet.org Accessed 2014 May 13."},{"volume-title":"CS Joint Task Force. Computer Science Curricula 2013 (CS","year":"2013","key":"e_1_2_1_2_1","unstructured":"ACM\/IEEE : CS Joint Task Force. Computer Science Curricula 2013 (CS 2013 ). http:\/\/www.acm.org\/education\/CS2013-final-report.pdf Accessed 2014 July 3. ACM\/IEEE: CS Joint Task Force. Computer Science Curricula 2013 (CS 2013). http:\/\/www.acm.org\/education\/CS2013-final-report.pdf Accessed 2014 July 3."},{"key":"e_1_2_1_3_1","unstructured":"Association for Computing Machinery (ACM). www.acm.org Accessed 2014 May 13.  Association for Computing Machinery (ACM). www.acm.org Accessed 2014 May 13."},{"key":"e_1_2_1_4_1","volume-title":"July","author":"Background Information Technology Pilot ABET","year":"2004","unstructured":"Background Information Technology Pilot , ABET , PowerPoint slides , July 2004 . Background Information Technology Pilot, ABET, PowerPoint slides, July 2004."},{"key":"e_1_2_1_5_1","volume-title":"Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making","author":"Burley D.","year":"2013","unstructured":"Burley , D. , , Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making . National Research Council , 2013 . Burley, D., et al., Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making. National Research Council, 2013."},{"key":"e_1_2_1_6_1","unstructured":"CIP User Site---National Center for Education Statistics. nces.ed.gov\/ipeds\/cipcode\/ Accessed 2014 May 19.  CIP User Site---National Center for Education Statistics. nces.ed.gov\/ipeds\/cipcode\/ Accessed 2014 May 19."},{"key":"e_1_2_1_7_1","unstructured":"The Colloquium for Information Systems Security Education. www.cisse.info Accessed 2014 May 19.  The Colloquium for Information Systems Security Education. www.cisse.info Accessed 2014 May 19."},{"key":"e_1_2_1_8_1","unstructured":"Computerworld Cybercrime and Hacking Topic Center. www.computerworld.com\/s\/topic\/82\/Cybercrime+and+Hacking Accessed 2014 May 19.  Computerworld Cybercrime and Hacking Topic Center. www.computerworld.com\/s\/topic\/82\/Cybercrime+and+Hacking Accessed 2014 May 19."},{"key":"e_1_2_1_9_1","unstructured":"Computing Sciences Accreditation Board. www.csab.org Accessed 2014 May 13.  Computing Sciences Accreditation Board. www.csab.org Accessed 2014 May 13."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971681.1971686"},{"key":"e_1_2_1_11_1","volume-title":"IA","author":"Davis J.","year":"2003","unstructured":"Davis , J. and Dark , M. A . \" Curriculum Framework for the Emerging Discipline of Information Assurance.\" Proceedings of the 2003 American Society for Engineering North Midwest Regional Conference, (Ames , IA , 2003 ): 1 6. Davis, J. and Dark, M. A. \"Curriculum Framework for the Emerging Discipline of Information Assurance.\" Proceedings of the 2003 American Society for Engineering North Midwest Regional Conference, (Ames, IA, 2003): 1 6."},{"key":"e_1_2_1_12_1","unstructured":"FBI---Cyber Crimes. www.fbi.gov\/news\/stories\/story-index\/cyber-crimes Accessed 2014 May 19.  FBI---Cyber Crimes. www.fbi.gov\/news\/stories\/story-index\/cyber-crimes Accessed 2014 May 19."},{"key":"e_1_2_1_13_1","volume-title":"D.C.","author":"Cybersecurity","year":"2013","unstructured":"Cybersecurity : National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented. Government Accounting Office, report to United States Congress. GAO-13-187. (Washington , D.C. , February , 2013 ): 3. Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented. Government Accounting Office, report to United States Congress. GAO-13-187. (Washington, D.C., February, 2013): 3."},{"key":"e_1_2_1_15_1","unstructured":"Institute of Electrical and Electronics Engineers. www.ieee.org Accessed 2014 May 13.  Institute of Electrical and Electronics Engineers. www.ieee.org Accessed 2014 May 13."},{"key":"e_1_2_1_16_1","volume-title":"ACM","author":"McGettrick A.","year":"2013","unstructured":"McGettrick , A. et al. Toward Curricula Guidelines for Cybersecurity: Report of a Workshop on Cybersecurity Education and Training, (New York , ACM , 2013 August 30 ). McGettrick, A. et al. Toward Curricula Guidelines for Cybersecurity: Report of a Workshop on Cybersecurity Education and Training, (New York, ACM, 2013 August 30)."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538990"},{"key":"e_1_2_1_18_1","unstructured":"National Initiative for Cyber Security Education National Institute of Standards and Technology. csrc.nist.gov\/nice\/ Accessed 2014 May 13.  National Initiative for Cyber Security Education National Institute of Standards and Technology. csrc.nist.gov\/nice\/ Accessed 2014 May 13."},{"key":"e_1_2_1_19_1","unstructured":"National Centers of Academic Excellence---Cyber Operations National Security Agency. www.nsa.gov\/academia\/nat_cae_cyber_ops\/ Accessed 2014 May 13.  National Centers of Academic Excellence---Cyber Operations National Security Agency. www.nsa.gov\/academia\/nat_cae_cyber_ops\/ Accessed 2014 May 13."},{"key":"e_1_2_1_20_1","unstructured":"National Centers of Academic Excellence---Information Assurance National Security Agency. www.nsa.gov\/ia\/index.shtml Accessed 2014 May 13.  National Centers of Academic Excellence---Information Assurance National Security Agency. www.nsa.gov\/ia\/index.shtml Accessed 2014 May 13."},{"key":"e_1_2_1_21_1","unstructured":"The Robert Morris Internet Worm. groups.csail.mit.edu\/mac\/classes\/6.805\/articles\/morris-worm.html Accessed 2014 May 19.  The Robert Morris Internet Worm. groups.csail.mit.edu\/mac\/classes\/6.805\/articles\/morris-worm.html Accessed 2014 May 19."}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2655759.2655773","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2655759.2655773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:34Z","timestamp":1750231174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2655759.2655773"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,5]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9,5]]}},"alternative-id":["10.1145\/2655759.2655773"],"URL":"https:\/\/doi.org\/10.1145\/2655759.2655773","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"type":"print","value":"2153-2184"},{"type":"electronic","value":"2153-2192"}],"subject":[],"published":{"date-parts":[[2014,9,5]]},"assertion":[{"value":"2014-09-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}