{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:12Z","timestamp":1750306392089,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2015,5,29]],"date-time":"2015-05-29T00:00:00Z","timestamp":1432857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2015,5,29]]},"DOI":"10.1145\/2743024","type":"journal-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T15:13:25Z","timestamp":1433258005000},"page":"84-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Experiential cybersecurity learning"],"prefix":"10.1145","volume":"6","author":[{"given":"Renee","family":"Dopplick","sequence":"first","affiliation":[{"name":"Washington, DC"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2015,5,29]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"CyberCompEx.org Competition List; http:\/\/www.cybercompex.org\/competitions.html  CyberCompEx.org Competition List; http:\/\/www.cybercompex.org\/competitions.html"},{"key":"e_1_2_1_2_1","unstructured":"CyberFoundations; https:\/\/www.cyberfoundations.org  CyberFoundations; https:\/\/www.cyberfoundations.org"},{"key":"e_1_2_1_3_1","unstructured":"DETER Project -- Education; http:\/\/deter-project.org\/deterlab_education  DETER Project -- Education; http:\/\/deter-project.org\/deterlab_education"},{"key":"e_1_2_1_4_1","unstructured":"Global Cyberlympics; http:\/\/cyberlympics.org  Global Cyberlympics; http:\/\/cyberlympics.org"},{"key":"e_1_2_1_5_1","unstructured":"National Cyber League; http:\/\/www.nationalcyberleague.org  National Cyber League; http:\/\/www.nationalcyberleague.org"},{"key":"e_1_2_1_6_1","unstructured":"National Initiative for Cybersecurity Careers and Studies Cybersecurity Careers; http:\/\/niccs.us-cert.gov\/careers\/cybersecurity-careers  National Initiative for Cybersecurity Careers and Studies Cybersecurity Careers; http:\/\/niccs.us-cert.gov\/careers\/cybersecurity-careers"},{"key":"e_1_2_1_7_1","unstructured":"NETLAB+ Cyber Security Training; http:\/\/www.netdevgroup.com\/content\/cybersecurity\/  NETLAB+ Cyber Security Training; http:\/\/www.netdevgroup.com\/content\/cybersecurity\/"},{"key":"e_1_2_1_8_1","unstructured":"U.K. Cyber Security Challenge; http:\/\/cybersecuritychallenge.org.uk  U.K. Cyber Security Challenge; http:\/\/cybersecuritychallenge.org.uk"},{"key":"e_1_2_1_9_1","unstructured":"U.K. Cyber Security Challenge School Programme; http:\/\/cybersecuritychallenge.org.uk\/education\/schools\/  U.K. Cyber Security Challenge School Programme; http:\/\/cybersecuritychallenge.org.uk\/education\/schools\/"},{"key":"e_1_2_1_10_1","unstructured":"U.S. Cyber Challenge Cyber Quests; http:\/\/www.uscc.cyberquests.org  U.S. Cyber Challenge Cyber Quests; http:\/\/www.uscc.cyberquests.org"},{"key":"e_1_2_1_11_1","unstructured":"U.S. National Collegiate Cyber Defense Competition; http:\/\/www.nationalccdc.org  U.S. National Collegiate Cyber Defense Competition; http:\/\/www.nationalccdc.org"}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2743024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2743024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:15Z","timestamp":1750223235000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2743024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,29]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,5,29]]}},"alternative-id":["10.1145\/2743024"],"URL":"https:\/\/doi.org\/10.1145\/2743024","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"type":"print","value":"2153-2184"},{"type":"electronic","value":"2153-2192"}],"subject":[],"published":{"date-parts":[[2015,5,29]]},"assertion":[{"value":"2015-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}