{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:13:36Z","timestamp":1761621216349,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,4]],"date-time":"2015-06-04T00:00:00Z","timestamp":1433376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,4]]},"DOI":"10.1145\/2751957.2751958","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"23-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Video Games as a Training Tool to Prepare the Next Generation of Cyber Warriors"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Herr","sequence":"first","affiliation":[{"name":"Software Engineering Institute, Pittsburgh, PA, USA"}]},{"given":"Dennis","family":"Allen","sequence":"additional","affiliation":[{"name":"Software Engineering Institute, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,4]]},"reference":[{"volume-title":"First Quarter 2014 Results {PDF Document}.","year":"2014","author":"Activision","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Baldor Lolita C. & Jelinek Pauline (March 2014). \"Pentagon to triple cyber staff to thwart attacks\". Associated Press. Retrieved from http:\/\/news.yahoo.com\/pentagon-triple-cyber-staff-thwart-attacks-194534255--politics.html.  Baldor Lolita C. & Jelinek Pauline (March 2014). \"Pentagon to triple cyber staff to thwart attacks\". Associated Press. Retrieved from http:\/\/news.yahoo.com\/pentagon-triple-cyber-staff-thwart-attacks-194534255--politics.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Bureau of Labor Statistics. (Jan 8 2014).Occupational Outlook Handbook: Information Security Analysts. Retrieved from http:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm.  Bureau of Labor Statistics. (Jan 8 2014).Occupational Outlook Handbook: Information Security Analysts. Retrieved from http:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm."},{"volume-title":"The Economic Impact of Cybercrime and Cyber Espionage. {PDF Document}","year":"2013","author":"Center for Strategic and International Studies.","key":"e_1_3_2_1_4_1"},{"volume-title":"CISCO 2014 Annual Security Report. {PDF Document}","year":"2014","author":"CISCO.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8721.2009.01660.x"},{"key":"e_1_3_2_1_7_1","unstructured":"Dyer M. (2013 Nov 4). People Play 1900 Years of Call of Duty Multiplayer Every Day. Retrieved from http:\/\/www.ign.com\/articles\/2013\/11\/04\/people-play-1900-years-of-call-of-duty-multiplayer-every-day.  Dyer M. (2013 Nov 4). People Play 1900 Years of Call of Duty Multiplayer Every Day. Retrieved from http:\/\/www.ign.com\/articles\/2013\/11\/04\/people-play-1900-years-of-call-of-duty-multiplayer-every-day."},{"volume-title":"The 2013 (ISC)2 Global Information Security Workforce Study. {PDF Document}","year":"2013","author":"Frost","key":"e_1_3_2_1_8_1"},{"volume-title":"The (ISC)2 Global Information Security Workforce Subreport. {PDF Document}","year":"2013","author":"Frost","key":"e_1_3_2_1_9_1"},{"volume-title":"The benefits of playing video games","year":"2013","author":"Granic I.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Kennedy B. (2002 July 11). \"Uncle Sam Wants You (To Play This Game).\" New York Times. http:\/\/www.nytimes.com\/2002\/07\/11\/technology\/uncle-sam-wants-you-to-play-this-game.html.  Kennedy B. (2002 July 11). \"Uncle Sam Wants You (To Play This Game).\" New York Times. http:\/\/www.nytimes.com\/2002\/07\/11\/technology\/uncle-sam-wants-you-to-play-this-game.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2684054"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0019454"},{"volume-title":"Reality is Broken: Why Games Make Us Better and How They Can Change the World","year":"2011","author":"McGonigal J.","key":"e_1_3_2_1_14_1"},{"volume-title":"War Play: Video Games and the Future of Armed Conflict","year":"2011","author":"Mead C.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Merel T. (2011 July 6). The Big V: The great games market split. Retrieved from http:\/\/venturebeat.com\/2011\/07\/06\/the-big-v-the-great-games-market-split\/.  Merel T. (2011 July 6). The Big V: The great games market split. Retrieved from http:\/\/venturebeat.com\/2011\/07\/06\/the-big-v-the-great-games-market-split\/."},{"volume-title":"Report: Mobile gaming to become gaming's biggest market by","year":"2014","author":"Pearson D.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1197653"},{"volume-title":"Preparing Millennials to Lead in Cyberspace. {PDF Document}","year":"2013","author":"Raytheon","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Riddell R. (1994 April). Doom Goes to War. Wired 5.4 Retrieved from http:\/\/archive.wired.com\/wired\/archive\/5.04\/ff_doom_pr.html.  Riddell R. (1994 April). Doom Goes to War. Wired 5.4 Retrieved from http:\/\/archive.wired.com\/wired\/archive\/5.04\/ff_doom_pr.html."},{"volume-title":"Mobile-gaming revenue to hit $11.4 billion","year":"2014","author":"Rosenberg D.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Singer P. (2009 Nov 17). Video Games Veterans and the New American Politics. Washington Examiner. Retrieved from http:\/\/washingtonexaminer.com\/video-game-veterans-and-the-new-american-politics\/article\/20385.  Singer P. (2009 Nov 17). Video Games Veterans and the New American Politics. Washington Examiner. Retrieved from http:\/\/washingtonexaminer.com\/video-game-veterans-and-the-new-american-politics\/article\/20385."},{"key":"e_1_3_2_1_23_1","unstructured":"Turman L. (Sep 27 2010). \"Action video games speed up decision-making process.\" Washington Post. Retrieved from http:\/\/washingtonpost.com\/wp-dyn\/content\/article\/2010\/09\/27\/AR2010092705244.html.  Turman L. (Sep 27 2010). \"Action video games speed up decision-making process.\" Washington Post. Retrieved from http:\/\/washingtonpost.com\/wp-dyn\/content\/article\/2010\/09\/27\/AR2010092705244.html."},{"key":"e_1_3_2_1_24_1","unstructured":"United States Government Accountability Office. (Sep 2013). DHS Recruiting and Hiring: DHS is Generally Filling Mission-Critical Positions but Could Better Track Costs of Coordinated Recruiting Efforts. {PDF Document}. Retrieved from http:\/\/www.gao.gov\/assets\/660\/657902.pdf.  United States Government Accountability Office. (Sep 2013). DHS Recruiting and Hiring: DHS is Generally Filling Mission-Critical Positions but Could Better Track Costs of Coordinated Recruiting Efforts. {PDF Document}. Retrieved from http:\/\/www.gao.gov\/assets\/660\/657902.pdf."}],"event":{"name":"SIGMIS-CPR '15: 2015 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Newport Beach California USA","acronym":"SIGMIS-CPR '15"},"container-title":["Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2751957.2751958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:07Z","timestamp":1750225387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,4]]},"references-count":24,"alternative-id":["10.1145\/2751957.2751958","10.1145\/2751957"],"URL":"https:\/\/doi.org\/10.1145\/2751957.2751958","relation":{},"subject":[],"published":{"date-parts":[[2015,6,4]]},"assertion":[{"value":"2015-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}