{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:08Z","timestamp":1750306388867,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,29]],"date-time":"2015-09-29T00:00:00Z","timestamp":1443484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,29]]},"DOI":"10.1145\/2808006.2808035","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T19:31:27Z","timestamp":1442950287000},"page":"173-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Cyber Education Project and IT IAS Curriculum"],"prefix":"10.1145","author":[{"given":"Jessica M.","family":"Richards","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"given":"Joseph J.","family":"Ekstrom","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"American Society for Engineering Education. 2010. Engineering Education for a Changing World. Retrieved from ASEE: https:\/\/www.asee.org\/papers-and-publications\/publications\/The-Green-Report.pdf  American Society for Engineering Education. 2010. Engineering Education for a Changing World. Retrieved from ASEE: https:\/\/www.asee.org\/papers-and-publications\/publications\/The-Green-Report.pdf"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"30","article-title":"English Teachers and Engineers: A New Learning Community","volume":"14","author":"Arms V. M.","year":"1998","journal-title":"International Journal of Engineering Education"},{"key":"e_1_3_2_1_3_1","unstructured":"Audit My PC. 2012. Glossary of Internet Security Terms. Retrieved from http:\/\/www.auditmypc.com\/glossary-of-internet-security-terms.asp  Audit My PC. 2012. Glossary of Internet Security Terms. Retrieved from http:\/\/www.auditmypc.com\/glossary-of-internet-security-terms.asp"},{"key":"e_1_3_2_1_4_1","unstructured":"Connet Inc. 2014 February. IT Terminology. Retrieved from http:\/\/www.consp.com\/it-information-technology-terminology-dictionary  Connet Inc. 2014 February. IT Terminology. Retrieved from http:\/\/www.consp.com\/it-information-technology-terminology-dictionary"},{"key":"e_1_3_2_1_5_1","unstructured":"Gibson D. S. 2015 April 11. Interview. CEP LOWG Taxonomy Approach.  Gibson D. S. 2015 April 11. Interview. CEP LOWG Taxonomy Approach."},{"key":"e_1_3_2_1_6_1","unstructured":"Investopedia. 2015 March. Investopedia Dictionary. Retrieved from http:\/\/www.investopedia.com\/terms\/s\/spoofing.asp  Investopedia. 2015 March. Investopedia Dictionary. Retrieved from http:\/\/www.investopedia.com\/terms\/s\/spoofing.asp"},{"key":"e_1_3_2_1_7_1","unstructured":"ISLINC. 2015 January. Glossary of Information Security Terms. Retrieved from http:\/\/www.islinc.com\/cyber_security_evaluations\/nist_glossary.php  ISLINC. 2015 January. Glossary of Information Security Terms. Retrieved from http:\/\/www.islinc.com\/cyber_security_evaluations\/nist_glossary.php"},{"key":"e_1_3_2_1_8_1","unstructured":"ISO 17799 \/ BS7799. 2009 October. Information Security Glossary. Retrieved from http:\/\/www.yourwindow.to\/information-security\/  ISO 17799 \/ BS7799. 2009 October. Information Security Glossary. Retrieved from http:\/\/www.yourwindow.to\/information-security\/"},{"volume-title":"A Framework for Understanding Systems Engineering","author":"Kasser J. E.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"KeyCorp Information Security. 2010 July. Information Security from A-Z. Retrieved from https:\/\/www.key.com\/about\/security\/bank-information-security-glossary.jsp  KeyCorp Information Security. 2010 July. Information Security from A-Z. Retrieved from https:\/\/www.key.com\/about\/security\/bank-information-security-glossary.jsp"},{"key":"e_1_3_2_1_11_1","unstructured":"Maryland Institute College of Art. 2010 September. Glossary of Computer Security Terms. Retrieved from http:\/\/www.mica.edu\/Academic_Services_and_Libraries\/Technology_Systems_and_Services\/Help_and_Resources\/Knowledge_Base\/Safe_Computing\/Glossary_of_Computer_Security_Terms.html  Maryland Institute College of Art. 2010 September. Glossary of Computer Security Terms. Retrieved from http:\/\/www.mica.edu\/Academic_Services_and_Libraries\/Technology_Systems_and_Services\/Help_and_Resources\/Knowledge_Base\/Safe_Computing\/Glossary_of_Computer_Security_Terms.html"},{"volume-title":"Ontologies and Metadata. Semantic Web Technologies Workshop.","year":"2000","author":"Miller L.","key":"e_1_3_2_1_12_1"},{"volume-title":"Explore Terms: A Glossary of Common Cybersecurity Terminology. (National Initiative for Cybersecurity Careers and Studies)","year":"2015","author":"NICCS.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Reisman A. 2010. Nine Tips and Technologies for Network WAN Optimization. NetEqualizer News. Retrieved from http:\/\/netequalizernews.com\/2010\/06\/16\/nine-tips-and-technologies-for-network-wan-optimization\/  Reisman A. 2010. Nine Tips and Technologies for Network WAN Optimization. NetEqualizer News. Retrieved from http:\/\/netequalizernews.com\/2010\/06\/16\/nine-tips-and-technologies-for-network-wan-optimization\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1999)50:12%3C1119::AID-ASI12%3E3.0.CO;2-I"},{"volume-title":"Gender-Linked Miscommunication in \"Hills Like White Elephants","author":"Smiley P.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"TechTerms. 2015. TechTerms Computer Dictionary. Retrieved from http:\/\/techterms.com  TechTerms. 2015. TechTerms Computer Dictionary. Retrieved from http:\/\/techterms.com"},{"key":"e_1_3_2_1_18_1","unstructured":"The Cyber Education Project. 2015 April 15. The Cyber Education Project. Retrieved from The Cyber Education Project: http:\/\/www.cybereducationproject.org  The Cyber Education Project. 2015 April 15. The Cyber Education Project. Retrieved from The Cyber Education Project: http:\/\/www.cybereducationproject.org"},{"key":"e_1_3_2_1_19_1","unstructured":"University of Texas at Austin. 2001. Cyber Security Glossary Terms. Retrieved from http:\/\/www.utexas.edu\/its\/glossary\/secure  University of Texas at Austin. 2001. Cyber Security Glossary Terms. Retrieved from http:\/\/www.utexas.edu\/its\/glossary\/secure"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1041410.1041420"},{"key":"e_1_3_2_1_21_1","unstructured":"WAN Optimization. 2013. Protocol Spoofing. Retrieved from Cyber Glossary of Terms and Concepts: http:\/\/www.wanoptimization.org\/protocol_spoofing.php  WAN Optimization. 2013. Protocol Spoofing. Retrieved from Cyber Glossary of Terms and Concepts: http:\/\/www.wanoptimization.org\/protocol_spoofing.php"},{"key":"e_1_3_2_1_22_1","unstructured":"Westnet Learning. 2011. Workflow IT Glossary. Retrieved from http:\/\/glossary.westnetinc.com\/glossary.php  Westnet Learning. 2011. Workflow IT Glossary. Retrieved from http:\/\/glossary.westnetinc.com\/glossary.php"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333115"},{"volume-title":"Handbook of Terminology Management: Basic Aspects of Terminology Management","series-title":"Vol. 1","author":"Wright S.","key":"e_1_3_2_1_24_1"}],"event":{"name":"SIGITE\/RIIT '15: The 16th Annual Conference on Information Technology Education and the 4th Annual Conference on Research in Information Technology","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Chicago Illinois USA","acronym":"SIGITE\/RIIT '15"},"container-title":["Proceedings of the 16th Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808006.2808035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808006.2808035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:11Z","timestamp":1750223231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808006.2808035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,29]]},"references-count":24,"alternative-id":["10.1145\/2808006.2808035","10.1145\/2808006"],"URL":"https:\/\/doi.org\/10.1145\/2808006.2808035","relation":{},"subject":[],"published":{"date-parts":[[2015,9,29]]},"assertion":[{"value":"2015-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}