{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:59:43Z","timestamp":1755838783052,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:00:00Z","timestamp":1550793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1547793"],"award-info":[{"award-number":["1547793"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,22]]},"DOI":"10.1145\/3287324.3287500","type":"proceedings-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T22:12:13Z","timestamp":1550873533000},"page":"726-730","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["From Midshipmen to Cyber Pros"],"prefix":"10.1145","author":[{"given":"Naja A.","family":"Mack","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Kevin","family":"Womack","sequence":"additional","affiliation":[{"name":"Morehouse College, Atlanta, GA, USA"}]},{"given":"Earl W.","family":"Huff Jr.","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Robert","family":"Cummings","sequence":"additional","affiliation":[{"name":"Morehouse College, Atlanta, GA, USA"}]},{"given":"Negus","family":"Dowling","sequence":"additional","affiliation":[{"name":"Morehouse College, Atlanta, GA, USA"}]},{"given":"Kinnis","family":"Gosha","sequence":"additional","affiliation":[{"name":"Morehouse College, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"45","article-title":"Constructivism in computer science education","volume":"20","author":"Ben-Ari Mordechai","year":"2001","journal-title":"Journal of Computers in Mathematics and Science Teaching"},{"volume-title":"What You Need To Know About Cybersecurity In","year":"2018","author":"Bradford Laurence","key":"e_1_3_2_1_2_1"},{"volume-title":"Rebekah Lin and Bob Rudis","year":"2018","author":"Brown Kwan","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107627"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.254"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721933.1721934"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2004.842924"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505261"},{"key":"e_1_3_2_1_9_1","unstructured":"Nate Lord. 2018. What is Cyber Security? https:\/\/digitalguardian.com\/blog\/what-cyber-security   Nate Lord. 2018. What is Cyber Security? https:\/\/digitalguardian.com\/blog\/what-cyber-security"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808006.2808038"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Zo\u00eb J Wood John Clements Zachary Peterson David Janzen Hugh Smith Michael Haungs Julie Workman John Bellardo and Bruce DeBruhl. 2018. Mixed Approaches to CS0. (2018).  Zo\u00eb J Wood John Clements Zachary Peterson David Janzen Hugh Smith Michael Haungs Julie Workman John Bellardo and Bruce DeBruhl. 2018. Mixed Approaches to CS0. (2018).","DOI":"10.1145\/3159450.3159592"}],"event":{"name":"SIGCSE '19: The 50th ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Minneapolis MN USA","acronym":"SIGCSE '19"},"container-title":["Proceedings of the 50th ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287324.3287500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287324.3287500","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287324.3287500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:55Z","timestamp":1750208515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287324.3287500"}},"subtitle":["Training Minority Naval Reserve Officer Training Corp Students for Cybersecurity"],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":11,"alternative-id":["10.1145\/3287324.3287500","10.1145\/3287324"],"URL":"https:\/\/doi.org\/10.1145\/3287324.3287500","relation":{},"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"2019-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}