{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:40:07Z","timestamp":1750228807634,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,4]],"date-time":"2015-06-04T00:00:00Z","timestamp":1433376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,4]]},"DOI":"10.1145\/2751957.2751974","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"49-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Does Competitor Grade Level Influence Perception of Cybersecurity Competition Design Gender Inclusiveness?"],"prefix":"10.1145","author":[{"given":"Jason M.","family":"Pittman","sequence":"first","affiliation":[{"name":"California State Polytechnic University, Pomona, Pomona, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"All A. (2014 November 14). Programs aim to fill cybersecurity skills gap. eSecurity Planet. Retrieved from http:\/\/www.esecurityplanet.com\/network-security\/programs-aim-to-fill-cybersecurity-skills-gap.html  All A. (2014 November 14). Programs aim to fill cybersecurity skills gap. eSecurity Planet. Retrieved from http:\/\/www.esecurityplanet.com\/network-security\/programs-aim-to-fill-cybersecurity-skills-gap.html"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.39"},{"key":"e_1_3_2_1_3_1","volume-title":"Women in STEM: A gender gap to innovation. ESA Issue Brief 04--11","author":"Beede D.","year":"2011","unstructured":"Beede , D. , Julian , T. , Langdon , D. , McKittrick , G. , Khan , B. , & Doms , M. ( 2011 ). Women in STEM: A gender gap to innovation. ESA Issue Brief 04--11 . Beede, D., Julian, T., Langdon, D., McKittrick, G., Khan, B., & Doms, M. (2011). Women in STEM: A gender gap to innovation. ESA Issue Brief 04--11."},{"key":"e_1_3_2_1_4_1","volume-title":"DIMVA 2010, Bonn, Germany, July 8--9, 2010. Proceedings. Berlin Heidelberg: Springer-Verlag.","author":"Boe B.","year":"2010","unstructured":"Boe , B. , Cavallaro , L. , Cavedon , L. , Childers , N. , Cova , M. , Egele , M. , & Vigna , G. ( 2010 ). Organizing large scale hacking competitions. In Detection of intrusions and malware, and vulnerability assessment 7th International Conference , DIMVA 2010, Bonn, Germany, July 8--9, 2010. Proceedings. Berlin Heidelberg: Springer-Verlag. Boe, B., Cavallaro, L., Cavedon, L., Childers, N., Cova, M., Egele, M., & Vigna, G. (2010). Organizing large scale hacking competitions. In Detection of intrusions and malware, and vulnerability assessment 7th International Conference, DIMVA 2010, Bonn, Germany, July 8--9, 2010. Proceedings. Berlin Heidelberg: Springer-Verlag."},{"key":"e_1_3_2_1_5_1","first-page":"215","volume-title":"Pohl, R\u00fcdiger F. Cognitive Illusions: A Handbook on Fallacies and Biases in Thinking, Judgement and Memory.","author":"Bornstein F.","year":"2004","unstructured":"Bornstein , Robert F. ; Crave-Lemley , Catherine ( 2004 ). \" Mere exposure effect \". In Pohl, R\u00fcdiger F. Cognitive Illusions: A Handbook on Fallacies and Biases in Thinking, Judgement and Memory. Hove, UK : Psychology Press . pp. 215 -- 234 . Bornstein, Robert F.; Crave-Lemley, Catherine (2004). \"Mere exposure effect\". In Pohl, R\u00fcdiger F. Cognitive Illusions: A Handbook on Fallacies and Biases in Thinking, Judgement and Memory. Hove, UK: Psychology Press. pp. 215--234."},{"key":"e_1_3_2_1_6_1","unstructured":"Centers of Academic Excellence Institutions. (n.d.). Retrieved March 24 2015 from https:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/institutions.shtml  Centers of Academic Excellence Institutions. (n.d.). Retrieved March 24 2015 from https:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/institutions.shtml"},{"key":"e_1_3_2_1_7_1","volume-title":"picoCTF: Teaching 10,000 high school students to hack.","author":"Chapman P.","year":"2013","unstructured":"Chapman , P. , Brumley , D. ( 2013 ). picoCTF: Teaching 10,000 high school students to hack. Retrieved from http:\/\/www.cs.cmu.edu\/~pmchapma\/docs\/picoctf.pdf Chapman, P., Brumley, D. (2013). picoCTF: Teaching 10,000 high school students to hack. Retrieved from http:\/\/www.cs.cmu.edu\/~pmchapma\/docs\/picoctf.pdf"},{"volume-title":"The 2012 International Conference on Security and Management.","author":"Cheung R. S.","key":"e_1_3_2_1_8_1","unstructured":"Cheung , R. S. , Cohen , J. P. , Lo , H. Z. & Elia , F. (n.d.) Effectiveness of cybersecurity competitions . Presented at The 2012 International Conference on Security and Management. Retrieved from http:\/\/josephpcohen.com\/papers\/seccomp.pdf Cheung, R. S., Cohen, J. P., Lo, H. Z. & Elia, F. (n.d.) Effectiveness of cybersecurity competitions. Presented at The 2012 International Conference on Security and Management. Retrieved from http:\/\/josephpcohen.com\/papers\/seccomp.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"Cooke Jedeikin & Lepar (). MyWord: Testing female preferred gaming criteria (Technical Report). Retrieved from http:\/\/pubs.cs.uct.ac.za\/archive\/00000167\/01\/article.pdf  Cooke Jedeikin & Lepar (). MyWord: Testing female preferred gaming criteria (Technical Report). Retrieved from http:\/\/pubs.cs.uct.ac.za\/archive\/00000167\/01\/article.pdf"},{"key":"e_1_3_2_1_10_1","volume-title":"Educational research : planning, conducting, and evaluating quantitative and qualitative research","author":"Creswell J.","year":"2012","unstructured":"Creswell , J. ( 2012 ). Educational research : planning, conducting, and evaluating quantitative and qualitative research . Boston : Pearson . Creswell, J. (2012). Educational research : planning, conducting, and evaluating quantitative and qualitative research. Boston: Pearson."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.112"},{"key":"e_1_3_2_1_12_1","volume-title":"Technology, Engineering , and Mathematics (Research Report).","author":"Hill C.","year":"2010","unstructured":"Hill , C. , Corbett , & St. Rose , A. ( 2010 ). Why so Few? Women in Science , Technology, Engineering , and Mathematics (Research Report). Retrieved from http:\/\/www.aauw.org\/files\/2013\/02\/Why-So-Few-Women-in-Science-Technology-Engineering-and-Mathematics.pdf Hill, C., Corbett, & St. Rose, A. (2010). Why so Few? Women in Science, Technology, Engineering , and Mathematics (Research Report). Retrieved from http:\/\/www.aauw.org\/files\/2013\/02\/Why-So-Few-Women-in-Science-Technology-Engineering-and-Mathematics.pdf"},{"key":"e_1_3_2_1_13_1","volume-title":"IADIS International Conference: Games and Entertainment Technologies part of the IADIS Multiconference on Computer Science & Information Systems (MCCSIS","author":"Ibrahim","year":"2010","unstructured":"Ibrahim , Wills, & Gilbert ( 2010 ). Degendering games: Towards a gender inclusive framework for games . Presented at IADIS International Conference: Games and Entertainment Technologies part of the IADIS Multiconference on Computer Science & Information Systems (MCCSIS 2010). Ibrahim, Wills, & Gilbert (2010). Degendering games: Towards a gender inclusive framework for games. Presented at IADIS International Conference: Games and Entertainment Technologies part of the IADIS Multiconference on Computer Science & Information Systems (MCCSIS 2010)."},{"key":"e_1_3_2_1_14_1","volume-title":"Designing videogames for women (Master's thesis).","author":"Innholt K.","year":"2009","unstructured":"Innholt , K. ( 2009 ). Designing videogames for women (Master's thesis). Retrieved from https:\/\/www.duo.uio.no\/bitstream\/handle\/10852\/10115\/Innholt.pdf?sequence=1&isAllowed=y Innholt, K. (2009). Designing videogames for women (Master's thesis). Retrieved from https:\/\/www.duo.uio.no\/bitstream\/handle\/10852\/10115\/Innholt.pdf?sequence=1&isAllowed=y"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 5th USENIX Conference on Cyber Security Experimentation and Test. USENIX Assoc.","author":"Koch S.","year":"2012","unstructured":"Koch , S. , Schneider , J. , & Nordholz , J. ( 2012 ). Disturbed playing: Another kind of educational security games . In Proceedings of the 5th USENIX Conference on Cyber Security Experimentation and Test. USENIX Assoc. , Berkeley, CA, USA. Koch, S., Schneider, J., & Nordholz, J. (2012). Disturbed playing: Another kind of educational security games. In Proceedings of the 5th USENIX Conference on Cyber Security Experimentation and Test. USENIX Assoc., Berkeley, CA, USA."},{"key":"e_1_3_2_1_16_1","volume-title":"Sampling : design and analysis","author":"Lohr S.","year":"2010","unstructured":"Lohr , S. ( 2010 ). Sampling : design and analysis . Boston, Mass : Brooks\/Cole . Lohr, S. (2010). Sampling : design and analysis. Boston, Mass: Brooks\/Cole."},{"key":"e_1_3_2_1_17_1","volume-title":"NIST NICE Workshop","author":"Manson D.","year":"2013","unstructured":"Manson , D. ( 2013 ). National cybersecurity sports federation . Presented at NIST NICE Workshop 2013. Gaithersburg, MD. Manson, D. (2013). National cybersecurity sports federation. Presented at NIST NICE Workshop 2013. Gaithersburg, MD."},{"key":"e_1_3_2_1_18_1","volume-title":"Science and engineering indicators","author":"National Science Foundation","year":"2012","unstructured":"National Science Foundation ( 2012 ). Science and engineering indicators 2012. Retrieved from http:\/\/www.nsf.gov\/statistics\/seind12\/c2\/c2s2.htm National Science Foundation (2012). Science and engineering indicators 2012. Retrieved from http:\/\/www.nsf.gov\/statistics\/seind12\/c2\/c2s2.htm"},{"key":"e_1_3_2_1_19_1","unstructured":"Novak H Likarish D. M. & Moore E. (2013). Developing cyber competition infrastructure using the SCRUM framework. In Dodge R. and Futcher L. (Eds) Information assurance and security education and training 8th IFIP WG 11.8 World Conference on Information Security Education WISE 8 Auckland New Zealand July 8--10 2013 proceedings WISE 7 Lucerne Switzerland June 9--10 2011 and WISE 6 Bento Gon\u00e7alves RS Brazil July 27--31 2009 revised selected papers. Berlin New York: Springer.  Novak H Likarish D. M. & Moore E. (2013). Developing cyber competition infrastructure using the SCRUM framework. In Dodge R. and Futcher L. (Eds) Information assurance and security education and training 8th IFIP WG 11.8 World Conference on Information Security Education WISE 8 Auckland New Zealand July 8--10 2013 proceedings WISE 7 Lucerne Switzerland June 9--10 2011 and WISE 6 Bento Gon\u00e7alves RS Brazil July 27--31 2009 revised selected papers. Berlin New York: Springer."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2379703.2379710"},{"key":"e_1_3_2_1_21_1","volume-title":"NIST NICE Workshop","author":"Pittman J.","year":"2013","unstructured":"Pittman , J. ( 2013 ). Attitudes on the gender equal design of collegiate cybersecurity competitions . Presented at the NIST NICE Workshop 2013. Gaithersburg, MD. Pittman, J. (2013). Attitudes on the gender equal design of collegiate cybersecurity competitions. Presented at the NIST NICE Workshop 2013. Gaithersburg, MD."},{"key":"e_1_3_2_1_22_1","volume-title":"Gender inclusive game design expanding the market. Hingham","author":"Ray S.","year":"2004","unstructured":"Ray , S. ( 2004 ). Gender inclusive game design expanding the market. Hingham , Mass : Charles River Media . Ray, S. (2004). Gender inclusive game design expanding the market. Hingham, Mass: Charles River Media."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412961288"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3102\/0034654307309919"},{"key":"e_1_3_2_1_25_1","volume-title":"4th European Feminist Research Conference: Body gender subjectivity crossing disciplinary and institutional borders. Bologna Italy.","author":"Thomas A.","year":"2000","unstructured":"Thomas , A. , & Walkerdine , V. ( 2000 ). Girls and computer games . Presented at the 4th European Feminist Research Conference: Body gender subjectivity crossing disciplinary and institutional borders. Bologna Italy. Thomas, A., & Walkerdine, V. (2000). Girls and computer games. Presented at the 4th European Feminist Research Conference: Body gender subjectivity crossing disciplinary and institutional borders. Bologna Italy."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993400902819006"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2010.527697"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the International Conference on Gender in Educational Games and Gender Sensitive Approaches to E-Learning","author":"Yatim M.H.M.","year":"2006","unstructured":"Yatim , M.H.M. , Nacke , L. , & Masuch , M. ( 2006 ). Improving game design by understanding the gender differences: The cognitive approach . In Proceedings of the International Conference on Gender in Educational Games and Gender Sensitive Approaches to E-Learning 2006. Donau University Krems : Austria. Yatim, M.H.M., Nacke, L., & Masuch, M. (2006). Improving game design by understanding the gender differences: The cognitive approach. In Proceedings of the International Conference on Gender in Educational Games and Gender Sensitive Approaches to E-Learning 2006. Donau University Krems: Austria."}],"event":{"name":"SIGMIS-CPR '15: 2015 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Newport Beach California USA","acronym":"SIGMIS-CPR '15"},"container-title":["Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2751957.2751974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:21Z","timestamp":1750227381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,4]]},"references-count":28,"alternative-id":["10.1145\/2751957.2751974","10.1145\/2751957"],"URL":"https:\/\/doi.org\/10.1145\/2751957.2751974","relation":{},"subject":[],"published":{"date-parts":[[2015,6,4]]},"assertion":[{"value":"2015-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}