{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:54:21Z","timestamp":1755838461758,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,29]],"date-time":"2015-09-29T00:00:00Z","timestamp":1443484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,29]]},"DOI":"10.1145\/2808006.2808038","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T19:31:27Z","timestamp":1442950287000},"page":"43-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Cyber Education"],"prefix":"10.1145","author":[{"given":"Edward","family":"Sobiesk","sequence":"first","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Jean","family":"Blair","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Gregory","family":"Conti","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Michael","family":"Lanham","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Howard","family":"Taylor","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.cisse.info\/. Accessed","author":"Information Systems Security The Colloquium","year":"2015","unstructured":"The Colloquium for Information Systems Security Education (CISSE). http:\/\/www.cisse.info\/. Accessed 25 May 2015 . The Colloquium for Information Systems Security Education (CISSE). http:\/\/www.cisse.info\/. Accessed 25 May 2015."},{"key":"e_1_3_2_1_2_1","volume-title":"National Initiative for Cybersecurity Education (NICE) Annual Conference and Expo. http:\/\/csrc.nist.gov\/nice\/. Accessed","author":"The","year":"2015","unstructured":"The National Initiative for Cybersecurity Education (NICE) Annual Conference and Expo. http:\/\/csrc.nist.gov\/nice\/. Accessed 25 May 2015 . The National Initiative for Cybersecurity Education (NICE) Annual Conference and Expo. http:\/\/csrc.nist.gov\/nice\/. Accessed 25 May 2015."},{"key":"e_1_3_2_1_3_1","volume-title":"Georgia Tech International Security Education Workshop. https:\/\/www.gtisc.gatech.edu\/. Accessed","author":"The","year":"2015","unstructured":"The Georgia Tech International Security Education Workshop. https:\/\/www.gtisc.gatech.edu\/. Accessed 25 May 2015 . The Georgia Tech International Security Education Workshop. https:\/\/www.gtisc.gatech.edu\/. Accessed 25 May 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Information Technology 2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology","author":"Association for Computing Machinery and IEEE Computer Society.","year":"2008","unstructured":"Association for Computing Machinery and IEEE Computer Society. Information Technology 2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology . November 2008 . https:\/\/www.acm.org\/education\/curricula\/. Accessed 25 May 2015. Association for Computing Machinery and IEEE Computer Society. Information Technology 2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology. November 2008. https:\/\/www.acm.org\/education\/curricula\/. Accessed 25 May 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml. Accessed","author":"National Security Agency and the Department of Homeland Security National Centers of Academic Excellence in Information Assurance (IA)\/Cyber Defense (CD).","year":"2015","unstructured":"National Security Agency and the Department of Homeland Security National Centers of Academic Excellence in Information Assurance (IA)\/Cyber Defense (CD). https:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml. Accessed 25 May 2015 . National Security Agency and the Department of Homeland Security National Centers of Academic Excellence in Information Assurance (IA)\/Cyber Defense (CD). https:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml. Accessed 25 May 2015."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/cybereducationproject.org\/. Accessed","author":"Project Cyber Education","year":"2015","unstructured":"Cyber Education Project . http:\/\/cybereducationproject.org\/. Accessed 25 May 2015 . Cyber Education Project. http:\/\/cybereducationproject.org\/. Accessed 25 May 2015."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/www.dtic.mil\/doctrine\/new_pubs\/jp3_12R.pdf. Accessed","author":"United States Department of Defense. Joint Publication 3--12 (R) Cyberspace Operations (5 Feb 13).","year":"2015","unstructured":"United States Department of Defense. Joint Publication 3--12 (R) Cyberspace Operations (5 Feb 13). http:\/\/www.dtic.mil\/doctrine\/new_pubs\/jp3_12R.pdf. Accessed 25 May 2015 . United States Department of Defense. Joint Publication 3--12 (R) Cyberspace Operations (5 Feb 13). http:\/\/www.dtic.mil\/doctrine\/new_pubs\/jp3_12R.pdf. Accessed 25 May 2015."},{"key":"e_1_3_2_1_8_1","unstructured":"Military Academy CYBER Education Working Group. Draft Cyber Body of Knowledge. http:\/\/computingportal.org\/sites\/default\/files\/CEWG%20-%20Draft%20Body%20of%20Knowledge.pdf. Accessed 25 May 2015.  Military Academy CYBER Education Working Group. Draft Cyber Body of Knowledge. http:\/\/computingportal.org\/sites\/default\/files\/CEWG%20-%20Draft%20Body%20of%20Knowledge.pdf. Accessed 25 May 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"Computer Science Curricula 2013 Curriculum Guidelines for Undergraduate Degree Programs in Computer Science","author":"Association for Computing Machinery and IEEE Computer Society.","year":"2013","unstructured":"Association for Computing Machinery and IEEE Computer Society. Computer Science Curricula 2013 Curriculum Guidelines for Undergraduate Degree Programs in Computer Science . December 2013 . http:\/\/dl.acm.org\/citation.cfm?id=2534860. Accessed 25 May 2015. Association for Computing Machinery and IEEE Computer Society. Computer Science Curricula 2013 Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. December 2013. http:\/\/dl.acm.org\/citation.cfm?id=2534860. Accessed 25 May 2015."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047594.2047628"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2325296.2325367"},{"key":"e_1_3_2_1_12_1","unstructured":"ACM Inroads. Volume 5 No. 1. March 2014.  ACM Inroads. Volume 5 No. 1. March 2014."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"ACM Inroads. Volume 6 No. 2. June 2015.  ACM Inroads. Volume 6 No. 2. June 2015.","DOI":"10.1145\/2756557"},{"key":"e_1_3_2_1_14_1","unstructured":"The National Initiative for Cybersecurity Education (NICE) Careers and Studies. DRAFT National Cybersecurity Workforce Framework Version 2.0. http:\/\/niccs.us-cert.gov\/research\/draft-national-cybersecurity-workforce-framework-version-20. Accessed 25 May 2015.  The National Initiative for Cybersecurity Education (NICE) Careers and Studies. DRAFT National Cybersecurity Workforce Framework Version 2.0. http:\/\/niccs.us-cert.gov\/research\/draft-national-cybersecurity-workforce-framework-version-20. Accessed 25 May 2015."},{"key":"e_1_3_2_1_15_1","unstructured":"U.S. Department of Labor. Cybersecurity Competency Model. http:\/\/www.careeronestop.org\/competencymodel\/competency-models\/cybersecurity.aspx. Accessed 25 May 2015.  U.S. Department of Labor. Cybersecurity Competency Model. http:\/\/www.careeronestop.org\/competencymodel\/competency-models\/cybersecurity.aspx. Accessed 25 May 2015."},{"key":"e_1_3_2_1_16_1","unstructured":"U.S. Department of Energy. Essential Body of Knowledge -- A Competency and Functional Framework for Cyber Security Workforce Development. http:\/\/www.energy.gov\/sites\/prod\/files\/2014\/04\/f15\/DOEEBK_1-2013Revision_NICEv01_SCRM_clean_v04.pdf. Accessed 25 May 2015.  U.S. Department of Energy. Essential Body of Knowledge -- A Competency and Functional Framework for Cyber Security Workforce Development. http:\/\/www.energy.gov\/sites\/prod\/files\/2014\/04\/f15\/DOEEBK_1-2013Revision_NICEv01_SCRM_clean_v04.pdf. Accessed 25 May 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/www.sans.org\/. Accessed","author":"The SANS Institute","year":"2015","unstructured":"The SANS Institute . https:\/\/www.sans.org\/. Accessed 25 May 2015 . The SANS Institute. https:\/\/www.sans.org\/. Accessed 25 May 2015."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/www.isaca.org\/. Accessed","author":"ISACA.","year":"2015","unstructured":"ISACA. https:\/\/www.isaca.org\/. Accessed 25 May 2015 . ISACA. https:\/\/www.isaca.org\/. Accessed 25 May 2015."}],"event":{"name":"SIGITE\/RIIT '15: The 16th Annual Conference on Information Technology Education and the 4th Annual Conference on Research in Information Technology","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Chicago Illinois USA","acronym":"SIGITE\/RIIT '15"},"container-title":["Proceedings of the 16th Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808006.2808038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808006.2808038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:11Z","timestamp":1750223231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808006.2808038"}},"subtitle":["A Multi-Level, Multi-Discipline Approach"],"short-title":[],"issued":{"date-parts":[[2015,9,29]]},"references-count":18,"alternative-id":["10.1145\/2808006.2808038","10.1145\/2808006"],"URL":"https:\/\/doi.org\/10.1145\/2808006.2808038","relation":{},"subject":[],"published":{"date-parts":[[2015,9,29]]},"assertion":[{"value":"2015-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}