{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:39:13Z","timestamp":1751387953628,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T00:00:00Z","timestamp":1506470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,27]]},"DOI":"10.1145\/3125659.3125687","type":"proceedings-article","created":{"date-parts":[[2017,9,29]],"date-time":"2017-09-29T12:48:56Z","timestamp":1506689336000},"page":"103-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Cybersecurity Should be Taught Top-Down and Case-Driven"],"prefix":"10.1145","author":[{"given":"Yu","family":"Cai","sequence":"first","affiliation":[{"name":"Michigan Technological University, Houghton, MI, USA"}]},{"given":"Todd","family":"Arney","sequence":"additional","affiliation":[{"name":"Michigan Technological University, Houghton, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CloudPassage. Cloudpassage study finds u.s. universities failing in cybersecurity education 2016. Available at https:\/\/www.cloudpassage.com\/company\/press-releases\/cloudpassage-study-finds-u-s-universities-failing-cybersecurity-education\/.  CloudPassage. Cloudpassage study finds u.s. universities failing in cybersecurity education 2016. Available at https:\/\/www.cloudpassage.com\/company\/press-releases\/cloudpassage-study-finds-u-s-universities-failing-cybersecurity-education\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Darkreading. Fewer than one-fourth of cybersecurity job candidates are qualified 2017. Available at http:\/\/www.darkreading.com\/vulnerabilities-threats\/fewer-than-one-fourth-of-cybersecurity-job-candidates-are-qualified\/d\/d-id\/1328244.  Darkreading. Fewer than one-fourth of cybersecurity job candidates are qualified 2017. Available at http:\/\/www.darkreading.com\/vulnerabilities-threats\/fewer-than-one-fourth-of-cybersecurity-job-candidates-are-qualified\/d\/d-id\/1328244."},{"key":"e_1_3_2_1_3_1","unstructured":"US Senate Report. A kill chain analysis of the 2013 target data breach 2014.  US Senate Report. A kill chain analysis of the 2013 target data breach 2014."},{"key":"e_1_3_2_1_4_1","unstructured":"Wiki. Anthem medical data breach 2015. Available at https:\/\/en.wikipedia.org\/wiki\/Anthem_medical_data_breach.  Wiki. Anthem medical data breach 2015. Available at https:\/\/en.wikipedia.org\/wiki\/Anthem_medical_data_breach."},{"key":"e_1_3_2_1_5_1","unstructured":"Blackhat USA. Lessons from surviving a 300gbps denial of service attack 2013. Available at https:\/\/www.youtube.com\/watch?v=w04ZAXftQ_Y.  Blackhat USA. Lessons from surviving a 300gbps denial of service attack 2013. Available at https:\/\/www.youtube.com\/watch?v=w04ZAXftQ_Y."},{"key":"e_1_3_2_1_6_1","unstructured":"DDoS Attacks. Mirai IOT bonet 2016. Available at https:\/\/www.incapsula.com\/blog\/malware-analysis-mirai-ddos-botnet.html.  DDoS Attacks. Mirai IOT bonet 2016. Available at https:\/\/www.incapsula.com\/blog\/malware-analysis-mirai-ddos-botnet.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2003.07.001"},{"volume-title":"Harvard Business School","year":"1981","author":"Christensen C. R.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.101"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/EduCon.2013.6530097"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076740"},{"key":"e_1_3_2_1_12_1","unstructured":"NCCDC. Collegiate Cyber Defense Competition 2016. Available at http:\/\/nationalccdc.org.  NCCDC. Collegiate Cyber Defense Competition 2016. Available at http:\/\/nationalccdc.org."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.139"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677290"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Proceedings of the 3rd International Conference on Cyber Security Experimentation and Test","author":"Peter A.","year":"2010"},{"key":"e_1_3_2_1_16_1","first-page":"978","article-title":"Corporate Computer Security (4rd Edition)","volume":"13","author":"Boyle Randall J.","year":"2014","journal-title":"Pearson"},{"key":"e_1_3_2_1_17_1","unstructured":"Michael Kassner. Anatomy of the target data breach 2015. Available at http:\/\/www.zdnet.com\/article\/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned\/.  Michael Kassner. Anatomy of the target data breach 2015. Available at http:\/\/www.zdnet.com\/article\/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned\/."},{"key":"e_1_3_2_1_18_1","unstructured":"KrebsonSecurity. Verizon security report on target 2015. Available at https:\/\/krebsonsecurity.com\/2015\/09\/inside-target-corp-days-after-2013-breach\/.  KrebsonSecurity. Verizon security report on target 2015. Available at https:\/\/krebsonsecurity.com\/2015\/09\/inside-target-corp-days-after-2013-breach\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Mark Zuckerberg Was Hacked Because Passwords Are Hard 2016. Available at https:\/\/theringer.com\/mark-zuckerberg-was-hacked-because-hes-bad-at-passwords-3c38514398b6.  Mark Zuckerberg Was Hacked Because Passwords Are Hard 2016. Available at https:\/\/theringer.com\/mark-zuckerberg-was-hacked-because-hes-bad-at-passwords-3c38514398b6."},{"key":"e_1_3_2_1_20_1","unstructured":"Jason Bloomberg. Cybersecurity lessons learned from 'panama papers' breach 2016. Available at http:\/\/www.forbes.com\/sites\/jasonbloomberg\/2016\/04\/21\/cybersecurity-lessons-learned-from-panama-papers-breach\/.  Jason Bloomberg. Cybersecurity lessons learned from 'panama papers' breach 2016. Available at http:\/\/www.forbes.com\/sites\/jasonbloomberg\/2016\/04\/21\/cybersecurity-lessons-learned-from-panama-papers-breach\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Wiki. Openssl heartbleed 2014. Available at https:\/\/en.wikipedia.org\/wiki\/Heartbleed.  Wiki. Openssl heartbleed 2014. Available at https:\/\/en.wikipedia.org\/wiki\/Heartbleed."},{"key":"e_1_3_2_1_22_1","unstructured":"Ransomware locks up San Francisco public transportation ticket machines 2016. Available at http:\/\/arstechnica.com\/security\/2016\/11\/san-francisco-muni-hit-by-black-friday-ransomware-attack\/.  Ransomware locks up San Francisco public transportation ticket machines 2016. Available at http:\/\/arstechnica.com\/security\/2016\/11\/san-francisco-muni-hit-by-black-friday-ransomware-attack\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Wiki. 2014 JPMorgan Chase data breach 2014. Available at https:\/\/en.wikipedia.org\/wiki\/2014_JPMorgan_Chase_data_breach.  Wiki. 2014 JPMorgan Chase data breach 2014. Available at https:\/\/en.wikipedia.org\/wiki\/2014_JPMorgan_Chase_data_breach."},{"key":"e_1_3_2_1_24_1","unstructured":"Wiki. SWIFT banking hack 2016. Available at https:\/\/en.wikipedia.org\/wiki\/2015%E2%80%9316_SWIFT_banking_hack.  Wiki. SWIFT banking hack 2016. Available at https:\/\/en.wikipedia.org\/wiki\/2015%E2%80%9316_SWIFT_banking_hack."}],"event":{"name":"SIGITE\/RIIT 2017: The 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Rochester New York USA","acronym":"SIGITE\/RIIT 2017"},"container-title":["Proceedings of the 18th Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125659.3125687","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3125659.3125687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:54Z","timestamp":1750212834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125659.3125687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,27]]},"references-count":24,"alternative-id":["10.1145\/3125659.3125687","10.1145\/3125659"],"URL":"https:\/\/doi.org\/10.1145\/3125659.3125687","relation":{},"subject":[],"published":{"date-parts":[[2017,9,27]]},"assertion":[{"value":"2017-09-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}