{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:40:42Z","timestamp":1763642442390,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T00:00:00Z","timestamp":1530489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000108","name":"National Science Digital Library","doi-asserted-by":"publisher","award":["DGE-1433736"],"award-info":[{"award-number":["DGE-1433736"]}],"id":[{"id":"10.13039\/100000108","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,2]]},"DOI":"10.1145\/3197091.3205840","type":"proceedings-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T20:15:46Z","timestamp":1529525746000},"page":"340-341","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Global perspectives on cybersecurity education"],"prefix":"10.1145","author":[{"given":"Allen","family":"Parrish","sequence":"first","affiliation":[{"name":"Mississippi State University, USA"}]},{"given":"John","family":"Impagliazzo","sequence":"additional","affiliation":[{"name":"Hofstra University, USA"}]},{"given":"Rajendra K.","family":"Raj","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, USA"}]},{"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[{"name":"University of Minho, Portugal"}]},{"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[{"name":"University of Auckland, New Zealand"}]},{"given":"Audun","family":"J\u00f8sang","sequence":"additional","affiliation":[{"name":"University of Oslo, Norway"}]},{"given":"Teresa","family":"Pereira","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of Viana do Castelo, Portugal"}]},{"given":"V\u00edtor J.","family":"S\u00e1","sequence":"additional","affiliation":[{"name":"Universidade Catolica Portugesa, Portugal"}]},{"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[{"name":"UCLan Cyprus, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2018,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Cybersecurity Talent Shortage Is Here, and It\u2019s a Big Threat to Companies. (April 12","author":"Chant I.","year":"2017","unstructured":"I. Chant . 2017. The Cybersecurity Talent Shortage Is Here, and It\u2019s a Big Threat to Companies. (April 12 2017 ). http:\/\/theinstitute.ieee.org\/ieee-roundup\/blogs\/blog\/ the-cybersecurity-talent-shortage-is-here-and-its-a-big-threat-to-companies I. Chant. 2017. The Cybersecurity Talent Shortage Is Here, and It\u2019s a Big Threat to Companies. (April 12 2017). http:\/\/theinstitute.ieee.org\/ieee-roundup\/blogs\/blog\/ the-cybersecurity-talent-shortage-is-here-and-its-a-big-threat-to-companies"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971681.1971686"},{"volume-title":"Label France Cybersecurity. (2018). https:\/\/www. francecybersecurity.fr\/en\/the-label\/ Accessed","year":"2018","key":"e_1_3_2_1_3_1","unstructured":"France Cybersecurity. 2018. Label France Cybersecurity. (2018). https:\/\/www. francecybersecurity.fr\/en\/the-label\/ Accessed : April 2, 2018 . France Cybersecurity. 2018. Label France Cybersecurity. (2018). https:\/\/www. francecybersecurity.fr\/en\/the-label\/ Accessed: April 2, 2018."},{"volume-title":"Technical Report. ACM","author":"Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017.","key":"e_1_3_2_1_4_1","unstructured":"Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017. Technical Report. ACM , IEEE-CS, AIS SIGSEC , and IFIP WG 11.8. Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017. Technical Report. ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078856.2078860"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"UK National Cyber Security Centre (NCSC). 2018. Certified Bachelor\u00e2\u0102\u0179s in Cyber Security. (2018).  UK National Cyber Security Centre (NCSC). 2018. Certified Bachelor\u00e2\u0102\u0179s in Cyber Security. (2018).","DOI":"10.1016\/S1353-4858(18)30108-9"},{"volume-title":"April 02","year":"2018","key":"e_1_3_2_1_7_1","unstructured":"https:\/\/www.ncsc.gov.uk\/content\/files\/protected_files\/ article_files\/Certification-Bachelors-2_0-20171214.pdf Accessed : April 02 , 2018 . https:\/\/www.ncsc.gov.uk\/content\/files\/protected_files\/ article_files\/Certification-Bachelors-2_0-20171214.pdf Accessed: April 02, 2018."},{"key":"e_1_3_2_1_8_1","unstructured":"US National Security Agency and the Department of Homeland Security. 2018. Centers of Academic Excellence in Cybersecurity. (2018).  US National Security Agency and the Department of Homeland Security. 2018. Centers of Academic Excellence in Cybersecurity. (2018)."},{"volume-title":"April 02","year":"2018","key":"e_1_3_2_1_9_1","unstructured":"https:\/\/www.nsa.gov\/ resources\/educators\/centers-academic-excellence Accessed : April 02 , 2018 . https:\/\/www.nsa.gov\/ resources\/educators\/centers-academic-excellence Accessed: April 02, 2018."},{"key":"e_1_3_2_1_10_1","unstructured":"Abstract 1 Introduction 2 Working Group Objectives 3 Working Group Participants References  Abstract 1 Introduction 2 Working Group Objectives 3 Working Group Participants References"}],"event":{"name":"ITiCSE '18: 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Larnaca Cyprus","acronym":"ITiCSE '18"},"container-title":["Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3197091.3205840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3197091.3205840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:16Z","timestamp":1750212436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3197091.3205840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,2]]},"references-count":10,"alternative-id":["10.1145\/3197091.3205840","10.1145\/3197091"],"URL":"https:\/\/doi.org\/10.1145\/3197091.3205840","relation":{},"subject":[],"published":{"date-parts":[[2018,7,2]]},"assertion":[{"value":"2018-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}