{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:10Z","timestamp":1750306450080,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,4]],"date-time":"2015-06-04T00:00:00Z","timestamp":1433376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Department of Homeland Security","award":["FA8750-10-2-0234"],"award-info":[{"award-number":["FA8750-10-2-0234"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,4]]},"DOI":"10.1145\/2751957.2751963","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"31-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["A Vignette-based Method for Improving Cybersecurity Talent Management through Cyber Defense Competition Design"],"prefix":"10.1145","author":[{"given":"David H.","family":"Tobey","sequence":"first","affiliation":[{"name":"Holy Cross College, Notre Dame, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,4]]},"reference":[{"volume-title":"Longman","year":"2001","author":"Anderson L.W.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/MITP.2011.6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1097\/00000446-198412000-00027"},{"volume-title":"Green","year":"1956","author":"Bloom B.S.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.2307\/2393432"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"997","DOI":"10.2307\/256618","article-title":"Stories of the storytelling organization: A postmodern analysis of Disney as Tamara-land","volume":"38","author":"Boje D.M","year":"1995","journal-title":"Academy of Management Journal"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.4135\/9781849209496"},{"volume-title":"The competent manager: A model for effective performance","year":"1982","author":"Boyatzis R.E.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.3102\/0013189X018001032"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1111\/j.1744-6570.2010.01207.x"},{"volume-title":"Toward a general theory of expertise: Prospects and Limits","year":"1991","author":"Charness N.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1002\/(SICI)1098-2736(200002)37:2<109::AID-TEA3>3.0.CO;2-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1080\/1367886042000338227"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1518\/001872095779049543"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1037\/h0061470"},{"key":"e_1_3_2_1_16_1","first-page":"2","article-title":"Decision-making under uncertainty: Using case studies for teaching strategy in complex environments","volume":"13","author":"Franke V","year":"2011","journal-title":"Journal of Military and Strategic Studies"},{"key":"e_1_3_2_1_17_1","first-page":"16","article-title":"Studying software vulnerabilities. Crosstalk","author":"Gandhi R.A.","year":"2010","journal-title":"The Journal of Defense Software Engineering, ("},{"volume-title":"Games, motivation, and learning: A research and practice model. Simulation & gaming 33, 4","year":"2002","author":"Garris R.","key":"e_1_3_2_1_18_1"},{"volume-title":"Heads We Win-the Cognitive Side of Counterinsurgency (COIN): RAND Counterinsurgency Study-Paper 1","year":"2007","author":"Gompert D.C.","key":"e_1_3_2_1_19_1"},{"volume-title":"Build Security In","year":"2012","author":"Goodenough J.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1037\/h0040755"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/MSP.2005.120"},{"volume-title":"Get there early: Sensing the future to compete in the present","year":"2007","author":"Johansen R.","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1007\/978-1-4471-0997-6_5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1016\/S0951-8320(00)00079-X"},{"volume-title":"Proceedings of the dependable systems and networks 2004 workshop on assurance cases","year":"2004","author":"Kelly T.P.","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1016\/j.iheduc.2004.12.001"},{"volume-title":"Sources of Power: How people make decisions","year":"1998","author":"Klein","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1017\/CBO9780511815355"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1093\/acprof:oso\/9780195170979.001.0001"},{"key":"e_1_3_2_1_31_1","first-page":"3","article-title":"On the structure of educational assessments","volume":"1","author":"Mislevy R.J.","year":"2003","journal-title":"Measurement"},{"volume-title":"National Technical Information Service","year":"2012","author":"O'Neil L.R.","key":"e_1_3_2_1_32_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.2172\/1108988"},{"volume-title":"Huffington Post","year":"2013","author":"Phillips V.","key":"e_1_3_2_1_34_1"},{"volume-title":"Digital game-based learning","year":"2001","author":"Prensky M.","key":"e_1_3_2_1_35_1"},{"volume-title":"Man and Cybernetics, 2003. IEEE International Conference on","year":"2003","author":"Schepens W.J.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","first-page":"2","article-title":"The Cyber Defense Exercise: An evaluation of the effectiveness of information assurance education","volume":"1","author":"Schepens W.J.","year":"2002","journal-title":"The Journal of Information Security"},{"key":"e_1_3_2_1_38_1","first-page":"201","article-title":"Task analysis. In The Cambridge handbook of expertise and expert performance. Cambridge University Press, Cambridge","volume":"185","author":"Schraagen J.M","year":"2006","journal-title":"UK"},{"volume-title":"Proceedings of the Second Annual Conference on Privacy, Security and Trust","year":"2004","author":"Seddigh N.","key":"e_1_3_2_1_39_1"},{"volume-title":"Psychological investigations of competence in decision making","year":"2004","author":"Smith K.","key":"e_1_3_2_1_40_1"},{"volume-title":"Standing Conference on Management and Organizational Inquiry","year":"2007","author":"Tobey D.H.","key":"e_1_3_2_1_41_1"},{"volume-title":"A competency model of advanced threat response","author":"Tobey D.H.","key":"e_1_3_2_1_42_1"},{"volume-title":"ADAPTS: An evidence-based cyberlearning network for accelerating proficiency","year":"2013","author":"Tobey D.H.","key":"e_1_3_2_1_43_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/2568195.2568213"},{"volume-title":"Predictive Performance Modeling: An innovative approach to defining critical competencies that distinguish levels of performance","author":"Tobey D.H.","key":"e_1_3_2_1_45_1"},{"volume-title":"Handbook of Research on Knowledge-Intensive Organizations. Information Science Reference","year":"2008","author":"Tyler J.A.","key":"e_1_3_2_1_46_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.2190\/FLHV-K4WA-WPVQ-H0YM"},{"volume-title":"Thought and language","year":"1966","author":"Vygotsky L.S.","key":"e_1_3_2_1_48_1"},{"volume-title":"Proceedings of the 20th International System Safety Conference (ISSC 2002)","year":"2002","author":"Weaver R.A.","key":"e_1_3_2_1_49_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1287\/orsc.1050.0133"},{"volume-title":"Michael Assante And Tim Conway Offer Security Suggestions For Plant Operators. Control Engineering","year":"2013","author":"Welander P.","key":"e_1_3_2_1_51_1"},{"volume-title":"Proceedings of the 9th Colloquium for Information Systems Security Education","year":"2005","author":"White G.B.","key":"e_1_3_2_1_52_1"},{"unstructured":"Wouters P. van Nimwegen C. van Oostendorp H. and van der Spek E.D. A meta-analysis of the cognitive and motivational effects of serious games. Journal of Educational Psychology (in press).  Wouters P. van Nimwegen C. van Oostendorp H. and van der Spek E.D. A meta-analysis of the cognitive and motivational effects of serious games. Journal of Educational Psychology (in press).","key":"e_1_3_2_1_53_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_54_1","DOI":"10.4018\/978-1-60566-360-9.ch014"},{"volume-title":"Developing interpersonal abilties with interactive vignettes","year":"2004","author":"Zbylut M.L.","key":"e_1_3_2_1_55_1"},{"volume-title":"Washington, D.C.","year":"2012","author":"Homeland Security Advisory Council CyberSkills Task Force Report. U.S.","key":"e_1_3_2_1_56_1"}],"event":{"sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"acronym":"SIGMIS-CPR '15","name":"SIGMIS-CPR '15: 2015 Computers and People Research Conference","location":"Newport Beach California USA"},"container-title":["Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2751957.2751963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:07Z","timestamp":1750225387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,4]]},"references-count":56,"alternative-id":["10.1145\/2751957.2751963","10.1145\/2751957"],"URL":"https:\/\/doi.org\/10.1145\/2751957.2751963","relation":{},"subject":[],"published":{"date-parts":[[2015,6,4]]},"assertion":[{"value":"2015-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}