{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T06:08:53Z","timestamp":1763705333255,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T00:00:00Z","timestamp":1506470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,27]]},"DOI":"10.1145\/3125659.3125697","type":"proceedings-article","created":{"date-parts":[[2017,9,29]],"date-time":"2017-09-29T12:48:56Z","timestamp":1506689336000},"page":"33-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Information Technology as a Cyber Science"],"prefix":"10.1145","author":[{"given":"Joseph J.","family":"Ekstrom","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"given":"Barry M.","family":"Lunt","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"given":"Allen","family":"Parrish","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, MD, USA"}]},{"given":"Rajendra K.","family":"Raj","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Edward","family":"Sobiesk","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Criteria for Accrediting Computing Programs","author":"ABET","year":"2017","unstructured":"ABET , Criteria for Accrediting Computing Programs , 2017 -2018. on the Internet at http:\/\/www.abet.org\/accreditation\/accreditation-criteria\/criteria-for-accrediting-computing-programs-2017--2018\/, accessed: August 7, 2017. ABET, Criteria for Accrediting Computing Programs, 2017-2018. on the Internet at http:\/\/www.abet.org\/accreditation\/accreditation-criteria\/criteria-for-accrediting-computing-programs-2017--2018\/, accessed: August 7, 2017."},{"key":"e_1_3_2_1_2_1","volume-title":"on the Internet at http:\/\/www.cybereducationproject.org\/ accessed","author":"Project Cyber Education","year":"2017","unstructured":"Cyber Education Project , on the Internet at http:\/\/www.cybereducationproject.org\/ accessed : August 7, 2017 . Cyber Education Project, on the Internet at http:\/\/www.cybereducationproject.org\/ accessed: August 7, 2017."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121482"},{"key":"e_1_3_2_1_4_1","volume-title":"on the Internet at https:\/\/www.csec2017.org\/, accessed","author":"Burley Diana L.","year":"2017","unstructured":"Diana L. Burley , Matt Bishop , Scott Buck , Joseph J. Ekstrom , Lynn Futcher , David Gibson , Elizabeth Hawthorne , Siddharth Kaza , Yair Levy , Herbert Mattord , and Allen Parrish , Cybersecurity Curricula 2017, Version 0.75 Report , 12 June 2017. on the Internet at https:\/\/www.csec2017.org\/, accessed : August 7, 2017 . Diana L. Burley, Matt Bishop, Scott Buck, Joseph J. Ekstrom, Lynn Futcher, David Gibson, Elizabeth Hawthorne, Siddharth Kaza, Yair Levy, Herbert Mattord, and Allen Parrish, Cybersecurity Curricula 2017, Version 0.75 Report, 12 June 2017. on the Internet at https:\/\/www.csec2017.org\/, accessed: August 7, 2017."},{"key":"e_1_3_2_1_5_1","volume-title":"Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology","author":"Lunt Barry M.","year":"2008","unstructured":"Barry M. Lunt , Joseph J. Ekstrom , Sandra Gorka , Gregory Hislop , Reza Kamali , Eydie Lawson , Richard LeBlanc , Jacob Miller and Han Reichgelt , Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology , November 2008 . on the Internet at http:\/\/www.acm.org\/education\/curricula\/IT2008%20Curriculum.pdf, accessed: August 7, 2017. Barry M. Lunt, Joseph J. Ekstrom, Sandra Gorka, Gregory Hislop, Reza Kamali, Eydie Lawson, Richard LeBlanc, Jacob Miller and Han Reichgelt, Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology, November 2008. on the Internet at http:\/\/www.acm.org\/education\/curricula\/IT2008%20Curriculum.pdf, accessed: August 7, 2017."},{"key":"e_1_3_2_1_6_1","volume-title":"21st Colloquium for Information Systems Security Education (CISSE","author":"Blair Jean","year":"2017","unstructured":"Jean Blair , J. J. Ekstrom , and Mark Stockman . Breakout: Developing Accreditation Criteria for Undergraduate Cybersecurity Programs . In 21st Colloquium for Information Systems Security Education (CISSE 2017 ), Las Vegas . June 2017. Jean Blair, J. J. Ekstrom, and Mark Stockman. Breakout: Developing Accreditation Criteria for Undergraduate Cybersecurity Programs. In 21st Colloquium for Information Systems Security Education (CISSE 2017), Las Vegas. June 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"Technology, Engineering, and Mathematics.","author":"US President's Council of Advisors on Science and Technology","year":"2012","unstructured":"US President's Council of Advisors on Science and Technology , Engage to Excel: Producing One Million Additional College Graduates with Degrees in Science , Technology, Engineering, and Mathematics. 2012 , on the Internet at http:\/\/files.eric.ed.gov\/fulltext\/ED541511.pdf, accessed: August 7, 2017. US President's Council of Advisors on Science and Technology, Engage to Excel: Producing One Million Additional College Graduates with Degrees in Science, Technology, Engineering, and Mathematics. 2012, on the Internet at http:\/\/files.eric.ed.gov\/fulltext\/ED541511.pdf, accessed: August 7, 2017."},{"key":"e_1_3_2_1_8_1","volume-title":"accessed","author":"National Centers of Academic Excellence in Cyber Defense (CAE-CD) Designation Program Guidance on the Internet at https:\/\/www.iad.gov\/NIETP\/documents\/Requirements\/CAE_Program_ Guidance.pdf","year":"2017","unstructured":"National Centers of Academic Excellence in Cyber Defense (CAE-CD) Designation Program Guidance on the Internet at https:\/\/www.iad.gov\/NIETP\/documents\/Requirements\/CAE_Program_ Guidance.pdf , accessed : August 7, 2017 National Centers of Academic Excellence in Cyber Defense (CAE-CD) Designation Program Guidance on the Internet at https:\/\/www.iad.gov\/NIETP\/documents\/Requirements\/CAE_Program_ Guidance.pdf, accessed: August 7, 2017"},{"key":"e_1_3_2_1_9_1","volume-title":"on the Internet at http:\/\/csrc.nist.gov\/nice\/framework\/, accessed","author":"National Initiative for Cybersecurity Education","year":"2017","unstructured":"National Initiative for Cybersecurity Education , on the Internet at http:\/\/csrc.nist.gov\/nice\/framework\/, accessed : August 7, 2017 National Initiative for Cybersecurity Education, on the Internet at http:\/\/csrc.nist.gov\/nice\/framework\/, accessed: August 7, 2017"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978192.2978241"}],"event":{"name":"SIGITE\/RIIT 2017: The 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Rochester New York USA","acronym":"SIGITE\/RIIT 2017"},"container-title":["Proceedings of the 18th Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125659.3125697","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3125659.3125697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:54Z","timestamp":1750212834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125659.3125697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,27]]},"references-count":10,"alternative-id":["10.1145\/3125659.3125697","10.1145\/3125659"],"URL":"https:\/\/doi.org\/10.1145\/3125659.3125697","relation":{},"subject":[],"published":{"date-parts":[[2017,9,27]]},"assertion":[{"value":"2017-09-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}