{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:20Z","timestamp":1750221320887,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T00:00:00Z","timestamp":1506470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1623525"],"award-info":[{"award-number":["1623525"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,27]]},"DOI":"10.1145\/3125659.3125715","type":"proceedings-article","created":{"date-parts":[[2017,9,29]],"date-time":"2017-09-29T12:48:56Z","timestamp":1506689336000},"page":"183-183","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Improving the Pipeline"],"prefix":"10.1145","author":[{"given":"Sandra","family":"Gorka","sequence":"first","affiliation":[{"name":"Pennsylvania College of Technology, Williamsport, PA, USA"}]},{"given":"Alicia","family":"McNett","sequence":"additional","affiliation":[{"name":"Pennsylvania College of Technology, Williamsport, PA, USA"}]},{"given":"Jacob R.","family":"Miller","sequence":"additional","affiliation":[{"name":"Pennsylvania College of Technology, Williamsport, PA, USA"}]},{"given":"Bradley M.","family":"Webb","sequence":"additional","affiliation":[{"name":"Pennsylvania College of Technology, Williamsport, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Workforce Management: Is There a Cyberseucirty Workforce Crisis? FCW: The Business of Federal Technology","author":"Corrin A.","year":"2003","unstructured":"A. Corrin . 2003 . Workforce Management: Is There a Cyberseucirty Workforce Crisis? FCW: The Business of Federal Technology (2003). http:\/\/fcw.com\/articles\/2013\/10\/15\/cybersecurity-workforce-crisis.aspx. A. Corrin. 2003. Workforce Management: Is There a Cyberseucirty Workforce Crisis? FCW: The Business of Federal Technology (2003). http:\/\/fcw.com\/articles\/2013\/10\/15\/cybersecurity-workforce-crisis.aspx."},{"key":"e_1_3_2_1_2_1","volume-title":"Cybersecurity: Technical Proficiency Matters. A Report of the CSIS Commission on Cybersecurity for the 44th Presidency","author":"Evans K.","year":"2010","unstructured":"K. Evans and F. Reeder . 2010 . A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters. A Report of the CSIS Commission on Cybersecurity for the 44th Presidency . Center for Strategic and International Studies ( 2010). http:\/\/csis.org\/files\/publication\/101111_Evans_HumanCapital_Web.pdf. K. Evans and F. Reeder. 2010. A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters. A Report of the CSIS Commission on Cybersecurity for the 44th Presidency. Center for Strategic and International Studies (2010). http:\/\/csis.org\/files\/publication\/101111_Evans_HumanCapital_Web.pdf."},{"key":"e_1_3_2_1_3_1","volume-title":"Shortage of IT Security Professionals not Unique to Government","author":"Golden H.","year":"2015","unstructured":"H. Golden . 2015. Shortage of IT Security Professionals not Unique to Government . Government Executive Media Group (April 2015 ). http:\/\/www.nextgov.com\/ciobriefing\/wired-workplace\/2015\/04\/calling-all-information-security-professionals-world-needsyou\/110338\/. H. Golden. 2015. Shortage of IT Security Professionals not Unique to Government. Government Executive Media Group (April 2015). http:\/\/www.nextgov.com\/ciobriefing\/wired-workplace\/2015\/04\/calling-all-information-security-professionals-world-needsyou\/110338\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Cybersecurity Talent: Worse than a Skills Shortage, It's a Critical Gap. The Hill (April","author":"Loeb M.","year":"2015","unstructured":"M. Loeb . 2015 . Cybersecurity Talent: Worse than a Skills Shortage, It's a Critical Gap. The Hill (April 2015). http:\/\/thehill.com\/blogs\/congressblog\/technology\/239113-cybersecurity-talent-worse-than-a-skills-shortage-its-a. M. Loeb. 2015. Cybersecurity Talent: Worse than a Skills Shortage, It's a Critical Gap. The Hill (April 2015). http:\/\/thehill.com\/blogs\/congressblog\/technology\/239113-cybersecurity-talent-worse-than-a-skills-shortage-its-a."},{"unstructured":"Bureau of Labor Statistics. 2012. Fastest growing occupations. (2012). http:\/\/www.bls.gov\/emp\/ep_table_103.htm.  Bureau of Labor Statistics. 2012. Fastest growing occupations. (2012). http:\/\/www.bls.gov\/emp\/ep_table_103.htm.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Occupational Outlook Handbook","author":"Bureau of Labor Statistics. 2015.","year":"2014","unstructured":"Bureau of Labor Statistics. 2015. Occupational Outlook Handbook , 2014 -2015 Edition, Information Security Analysts . (2015). http:\/\/www.bls.gov\/ooh\/computer-andinformation-technology\/information-security-analysts.htm. Bureau of Labor Statistics. 2015. Occupational Outlook Handbook, 2014-2015 Edition, Information Security Analysts. (2015). http:\/\/www.bls.gov\/ooh\/computer-andinformation-technology\/information-security-analysts.htm."},{"volume-title":"Job Market Intelligence: Cybersecurity Jobs","year":"2015","unstructured":"Burning Glass Technologies. 2015. Job Market Intelligence: Cybersecurity Jobs , 2015 . (2015). http:\/\/burning-glass.com\/wp-content\/uploads\/Cybersecurity_Jobs_Report_2015.pdf Burning Glass Technologies. 2015. Job Market Intelligence: Cybersecurity Jobs, 2015. (2015). http:\/\/burning-glass.com\/wp-content\/uploads\/Cybersecurity_Jobs_Report_2015.pdf","key":"e_1_3_2_1_7_1"}],"event":{"sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"acronym":"SIGITE\/RIIT 2017","name":"SIGITE\/RIIT 2017: The 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology","location":"Rochester New York USA"},"container-title":["Proceedings of the 18th Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125659.3125715","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3125659.3125715","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3125659.3125715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:54Z","timestamp":1750212834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3125659.3125715"}},"subtitle":["Modules for an After-School Program for Preparing Information Assurance and Cyber Defense Professionals"],"short-title":[],"issued":{"date-parts":[[2017,9,27]]},"references-count":7,"alternative-id":["10.1145\/3125659.3125715","10.1145\/3125659"],"URL":"https:\/\/doi.org\/10.1145\/3125659.3125715","relation":{},"subject":[],"published":{"date-parts":[[2017,9,27]]},"assertion":[{"value":"2017-09-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}