{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:14:39Z","timestamp":1771467279956,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T00:00:00Z","timestamp":1530489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US National Science Foundation","award":["DGE-1433736"],"award-info":[{"award-number":["DGE-1433736"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,2]]},"DOI":"10.1145\/3293881.3295778","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T18:42:31Z","timestamp":1547059351000},"page":"36-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Global perspectives on cybersecurity education for 2030: a case for a meta-discipline"],"prefix":"10.1145","author":[{"given":"Allen","family":"Parrish","sequence":"first","affiliation":[{"name":"Mississippi State University, USA"}]},{"given":"John","family":"Impagliazzo","sequence":"additional","affiliation":[{"name":"Hofstra University, USA"}]},{"given":"Rajendra K.","family":"Raj","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, USA"}]},{"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[{"name":"University of Minho, Portugal"}]},{"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[{"name":"University of Auckland, New Zealand"}]},{"given":"Audun","family":"J\u00f8sang","sequence":"additional","affiliation":[{"name":"University of Oslo, Norway"}]},{"given":"Teresa","family":"Pereira","sequence":"additional","affiliation":[{"name":"Instituto Polit\u00e9cnico de Viana do Castelo, Portugal"}]},{"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[{"name":"UCLan Cyprus, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2018,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ABET Inc. 2017. Criteria for Accrediting Computing Programs Effective for Review During the 2019-20 Accreditation Cycle. http:\/\/www.abet.org\/wp-content\/ uploads\/2017\/12\/C001-18-19-CAC-Criteria-Version-2.0-11-29-17-FINAL.pdf Accessed November 06 2018.  ABET Inc. 2017. Criteria for Accrediting Computing Programs Effective for Review During the 2019-20 Accreditation Cycle. http:\/\/www.abet.org\/wp-content\/ uploads\/2017\/12\/C001-18-19-CAC-Criteria-Version-2.0-11-29-17-FINAL.pdf Accessed November 06 2018."},{"key":"e_1_3_2_1_2_1","volume-title":"Accessed","author":"Inc ABET","year":"2017","unstructured":"ABET , Inc . 2017 . Proposed Accreditation Criteria for Cybersecurity Academic Programs. http:\/\/www.abet.org\/wp-content\/uploads\/2018\/02\/ C001-18-19-CAC-Criteria-Version-2.0-updated-02-12-18.pdf , Accessed November 06, 2018. ABET, Inc. 2017. Proposed Accreditation Criteria for Cybersecurity Academic Programs. http:\/\/www.abet.org\/wp-content\/uploads\/2018\/02\/ C001-18-19-CAC-Criteria-Version-2.0-updated-02-12-18.pdf, Accessed November 06, 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"Accessed","author":"Inc ABET","year":"2018","unstructured":"ABET , Inc . 2018 . ABET Web site. urlhttp:\/\/abet.org , Accessed November 06, 2018. ABET, Inc. 2018. ABET Web site. urlhttp:\/\/abet.org, Accessed November 06, 2018."},{"key":"e_1_3_2_1_4_1","unstructured":"ACM. 2018. ACM Education Curriculum Recommendations. http:\/\/www.acm. org\/education\/curricula-recommendations Accessed 29 June 2018.  ACM. 2018. ACM Education Curriculum Recommendations. http:\/\/www.acm. org\/education\/curricula-recommendations Accessed 29 June 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"Information Systems","author":"ACM\/AIS Task Group on Information Systems Curricula. 2010.","year":"2010","unstructured":"ACM\/AIS Task Group on Information Systems Curricula. 2010. Information Systems 2010 . Technical Report. ACM Press . ACM\/AIS Task Group on Information Systems Curricula. 2010. Information Systems 2010. Technical Report. ACM Press."},{"key":"e_1_3_2_1_6_1","unstructured":"https:\/\/www.acm.org\/binaries\/content\/ assets\/education\/curricula-recommendations\/cc2005-march06final.pdf Accessed November 06 2018.  https:\/\/www.acm.org\/binaries\/content\/ assets\/education\/curricula-recommendations\/cc2005-march06final.pdf Accessed November 06 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"Computer Science Curricula","author":"ACM\/IEEE-CS Joint Task Force on Computing Curricula. 2013.","year":"2013","unstructured":"ACM\/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer Science Curricula 2013 . Technical Report. ACM Press and IEEE Computer Society Press . ACM\/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer Science Curricula 2013. Technical Report. ACM Press and IEEE Computer Society Press."},{"key":"e_1_3_2_1_8_1","unstructured":"Accessed Novemner 06 2018.  Accessed Novemner 06 2018."},{"key":"e_1_3_2_1_9_1","volume-title":"Computer Engineering Curricula","author":"ACM\/IEEE-CS Task Group on Computer Engineering Curricula. 2016.","year":"2016","unstructured":"ACM\/IEEE-CS Task Group on Computer Engineering Curricula. 2016. Computer Engineering Curricula 2016 . Technical Report. ACM Press and IEEE Computer Society Press . ACM\/IEEE-CS Task Group on Computer Engineering Curricula. 2016. Computer Engineering Curricula 2016. Technical Report. ACM Press and IEEE Computer Society Press."},{"key":"e_1_3_2_1_10_1","unstructured":"Accessed November 06 2018.  Accessed November 06 2018."},{"key":"e_1_3_2_1_11_1","volume-title":"Information Technology Curricula","author":"ACM\/IEEE-CS Task Group on Information Technology Curricula. 2017.","year":"2017","unstructured":"ACM\/IEEE-CS Task Group on Information Technology Curricula. 2017. Information Technology Curricula 2017 . Technical Report. ACM Press and IEEE Computer Society Press . ACM\/IEEE-CS Task Group on Information Technology Curricula. 2017. Information Technology Curricula 2017. Technical Report. ACM Press and IEEE Computer Society Press."},{"key":"e_1_3_2_1_12_1","unstructured":"https:\/\/dl.acm.org\/citation.cfm? id=3173161 Accessed November 06 2018.  https:\/\/dl.acm.org\/citation.cfm? id=3173161 Accessed November 06 2018."},{"key":"e_1_3_2_1_13_1","volume-title":"Accessed","author":"AQA.","year":"2016","unstructured":"AQA. 2016 . Tech-level IT: Cyber Security. http:\/\/www.aqa.org.uk\/subjects\/ computer-science-and-it\/tech-level\/it-cyber-security-2016 , Accessed November 06, 2018. AQA. 2016. Tech-level IT: Cyber Security. http:\/\/www.aqa.org.uk\/subjects\/ computer-science-and-it\/tech-level\/it-cyber-security-2016, Accessed November 06, 2018."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159489"},{"key":"e_1_3_2_1_15_1","volume-title":"Australia\u2019s Cyber Security Strategy: Enabling innovation, growth &amp","author":"Government Australian","year":"2018","unstructured":"Australian Government . 2016. Australia\u2019s Cyber Security Strategy: Enabling innovation, growth &amp ; prosperity. https:\/\/cybersecuritystrategy.pmc.gov.au\/ assets\/img\/PMC-Cyber-Strategy.pdf Accessed : June 14, 2018 . Australian Government. 2016. Australia\u2019s Cyber Security Strategy: Enabling innovation, growth &amp; prosperity. https:\/\/cybersecuritystrategy.pmc.gov.au\/ assets\/img\/PMC-Cyber-Strategy.pdf Accessed: June 14, 2018."},{"key":"e_1_3_2_1_16_1","unstructured":"Australian Government. 2017.  Australian Government. 2017."},{"key":"e_1_3_2_1_17_1","volume-title":"Enabling innovation, growth &amp","author":"Security Strategy Australia\u2019s Cyber","year":"2017","unstructured":"Australia\u2019s Cyber Security Strategy : Enabling innovation, growth &amp ; prosperity, First Annual Update 2017 . Australia\u2019s Cyber Security Strategy: Enabling innovation, growth &amp; prosperity, First Annual Update 2017."},{"key":"e_1_3_2_1_18_1","volume-title":"June 14","year":"2018","unstructured":"https:\/\/cybersecuritystrategy.pmc.gov.au\/ cyber-security-strategy-first-annual-update-2017.pdf Accessed : June 14 , 2018 . https:\/\/cybersecuritystrategy.pmc.gov.au\/ cyber-security-strategy-first-annual-update-2017.pdf Accessed: June 14, 2018."},{"key":"e_1_3_2_1_19_1","volume-title":"The Classification of Educational Goals, Handbook I: Cognitive Domain. Longmans","author":"Bloom Benjamin Samuel","unstructured":"Benjamin Samuel Bloom , Max D Engelhart , Edward J Furst , Walker H Hill , and David R Krathwohl . 1956. Taxonomy of Educational Objectives , The Classification of Educational Goals, Handbook I: Cognitive Domain. Longmans , Green and Company , New York . Benjamin Samuel Bloom, Max D Engelhart, Edward J Furst, Walker H Hill, and David R Krathwohl. 1956. Taxonomy of Educational Objectives, The Classification of Educational Goals, Handbook I: Cognitive Domain. Longmans, Green and Company, New York."},{"key":"e_1_3_2_1_20_1","volume-title":"Journal for the Colloquium for Information Systems Security Education","volume":"5","author":"Caelli William J","year":"2018","unstructured":"William J Caelli and Vicky Liu . 2018 . Cybersecurity education at formal university level: An Australian perspective . In Journal for the Colloquium for Information Systems Security Education , Vol. 5 . CISSE, New Orleans, 26\u201344. William J Caelli and Vicky Liu. 2018. Cybersecurity education at formal university level: An Australian perspective. In Journal for the Colloquium for Information Systems Security Education, Vol. 5. CISSE, New Orleans, 26\u201344."},{"key":"e_1_3_2_1_21_1","volume-title":"Weide","author":"Cassel Lillian","year":"2008","unstructured":"Lillian Cassel , Alan Clements , Gordon Davies , Mark Guzdial , Ren\u00e9e McCauley , Andrew McGettrick , Bob Sloan , Larry Snyder , Paul Tymann , and Bruce W . Weide . 2008 . Computer Science Curriculum 2008: An Interim Revision of CS 2001. Technical Report. ACM, New York, NY, USA. Lillian Cassel, Alan Clements, Gordon Davies, Mark Guzdial, Ren\u00e9e McCauley, Andrew McGettrick, Bob Sloan, Larry Snyder, Paul Tymann, and Bruce W. Weide. 2008. Computer Science Curriculum 2008: An Interim Revision of CS 2001. Technical Report. ACM, New York, NY, USA."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017690"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971681.1971686"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1709424.1709457"},{"key":"e_1_3_2_1_25_1","unstructured":"1709457  1709457"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00744"},{"key":"e_1_3_2_1_27_1","volume-title":"Mireille Snels, Mark Van Leeuwen, Sergei Boeke, Leo van de Koppen, Jan der Lubbe, Bibi den","author":"den Berg Jan","year":"2014","unstructured":"Jan den Berg , Jacqueline Van Zoggel , Mireille Snels, Mark Van Leeuwen, Sergei Boeke, Leo van de Koppen, Jan der Lubbe, Bibi den Berg , and Tony De Bos. 2014 . Jan den Berg, Jacqueline Van Zoggel, Mireille Snels, Mark Van Leeuwen, Sergei Boeke, Leo van de Koppen, Jan der Lubbe, Bibi den Berg, and Tony De Bos. 2014."},{"key":"e_1_3_2_1_28_1","volume-title":"Cyber Security Science and Engineering Symposium. NATO Science and Technology Organization, Tallinn, Estonia, 10","author":"Cyber Security On","unstructured":"On (the Emergence of) Cyber Security Science and its Challenges for Cyber Global Perspectives on Cybersecurity Education for 2030 ITiCSE \u201918 Companion, July 2\u20134, 2018, Larnaca, Cyprus Security Education. In The NATO IST-122 Cyber Security Science and Engineering Symposium. NATO Science and Technology Organization, Tallinn, Estonia, 10 . On (the Emergence of) Cyber Security Science and its Challenges for Cyber Global Perspectives on Cybersecurity Education for 2030 ITiCSE \u201918 Companion, July 2\u20134, 2018, Larnaca, Cyprus Security Education. In The NATO IST-122 Cyber Security Science and Engineering Symposium. NATO Science and Technology Organization, Tallinn, Estonia, 10."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125697"},{"key":"e_1_3_2_1_30_1","volume-title":"Accessed","author":"ENISA.","year":"2016","unstructured":"ENISA. 2016 . NCSS Good Practice Guide. https:\/\/www.enisa.europa.eu\/ publications\/ncss-good-practice-guide , Accessed November 06, 2018. ENISA. 2016. NCSS Good Practice Guide. https:\/\/www.enisa.europa.eu\/ publications\/ncss-good-practice-guide, Accessed November 06, 2018."},{"key":"e_1_3_2_1_31_1","unstructured":"ENISA. 2018. National Cyber Security Strategies. https:\/\/www.enisa.europa.eu\/ topics\/national-cyber-security-strategies\/  ENISA. 2018. National Cyber Security Strategies. https:\/\/www.enisa.europa.eu\/ topics\/national-cyber-security-strategies\/"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/368424.368427"},{"key":"e_1_3_2_1_34_1","unstructured":"https:\/\/www.acm.org\/binaries\/content\/assets\/education\/ curricula-recommendations\/cc2005-march06final.pdf Accessed November 06 2018.  https:\/\/www.acm.org\/binaries\/content\/assets\/education\/ curricula-recommendations\/cc2005-march06final.pdf Accessed November 06 2018."},{"key":"e_1_3_2_1_35_1","volume-title":"2014 Global Business and Technology Association Conference. Global Business and Technology Association","author":"Fourie Leon","year":"2014","unstructured":"Leon Fourie , Shaoning Pang , Tamsin Kingston , Hinne Hettema , Paul Watters , and Hossein Sarrafzadeh . 2014 . The global cyber security workforce: an ongoing human capital crisis . In 2014 Global Business and Technology Association Conference. Global Business and Technology Association , Auckland, New Zealand. Leon Fourie, Shaoning Pang, Tamsin Kingston, Hinne Hettema, Paul Watters, and Hossein Sarrafzadeh. 2014. The global cyber security workforce: an ongoing human capital crisis. In 2014 Global Business and Technology Association Conference. Global Business and Technology Association, Auckland, New Zealand."},{"key":"e_1_3_2_1_37_1","volume-title":"Software Engineering Competency Model","author":"IEEE Computer Society","unstructured":"IEEE Computer Society . 2014. Software Engineering Competency Model . IEEE Press , Washington, DC . Paperback ISBN-10: 0-7695-5373-7. IEEE Computer Society. 2014. Software Engineering Competency Model. IEEE Press, Washington, DC. Paperback ISBN-10: 0-7695-5373-7."},{"key":"e_1_3_2_1_38_1","volume-title":"European Union and NATO global cybersecurity challenges: a way forward. Prism: a Journal of the Center for Complex Operations 6, 2","author":"Ilves Luukas K","year":"2016","unstructured":"Luukas K Ilves , Timothy J Evans , Frank J Cilluffo , and Alec A Nadeau . 2016. European Union and NATO global cybersecurity challenges: a way forward. Prism: a Journal of the Center for Complex Operations 6, 2 ( 2016 ), 126. Luukas K Ilves, Timothy J Evans, Frank J Cilluffo, and Alec A Nadeau. 2016. European Union and NATO global cybersecurity challenges: a way forward. Prism: a Journal of the Center for Complex Operations 6, 2 (2016), 126."},{"key":"e_1_3_2_1_39_1","volume-title":"Accessed","author":"Institute of Information Security Professionals.","year":"2018","unstructured":"Institute of Information Security Professionals. 2018 . IISP Skills Framework. https:\/\/www.iisp.org\/iisp\/About_Us\/Our_Frameworks\/Our_ Skills_Framework\/iispv2\/Accreditation\/Our_Skills_Framework.aspx?hkey= e77a6f03-9498-423e-aa7b-585381290ec4 , Accessed November 06, 2018. Institute of Information Security Professionals. 2018. IISP Skills Framework. https:\/\/www.iisp.org\/iisp\/About_Us\/Our_Frameworks\/Our_ Skills_Framework\/iispv2\/Accreditation\/Our_Skills_Framework.aspx?hkey= e77a6f03-9498-423e-aa7b-585381290ec4, Accessed November 06, 2018."},{"key":"e_1_3_2_1_40_1","volume-title":"Accessed","author":"Joint Task Force on Cybersecurity Education.","year":"2018","unstructured":"Joint Task Force on Cybersecurity Education. 2018 . Cybersecurity Curricula 2017, Version 1.0. ACM, IEEE Computer Society, AIS SIGSEC, and IFIPS WG 11.8 ., Accessed November 06, 2018. Joint Task Force on Cybersecurity Education. 2018. Cybersecurity Curricula 2017, Version 1.0. ACM, IEEE Computer Society, AIS SIGSEC, and IFIPS WG 11.8., Accessed November 06, 2018."},{"key":"e_1_3_2_1_41_1","volume-title":"http:\/\/academiamilitar.pt\/images\/site_images\/Eventos\/3rd_ Conference\/Day_1\/CD_Competency_Framework_and_Training_needs_-_ Allard_Kernkamp_and_Josine.pdf Accessed","author":"Kernkamp Allard","year":"2018","unstructured":"Allard Kernkamp and Josine van de Ven . 2017. MNCDE&amp; T Cyber Defense Competencies . http:\/\/academiamilitar.pt\/images\/site_images\/Eventos\/3rd_ Conference\/Day_1\/CD_Competency_Framework_and_Training_needs_-_ Allard_Kernkamp_and_Josine.pdf Accessed November 06, 2018 . Allard Kernkamp and Josine van de Ven. 2017. MNCDE&amp;T Cyber Defense Competencies. http:\/\/academiamilitar.pt\/images\/site_images\/Eventos\/3rd_ Conference\/Day_1\/CD_Competency_Framework_and_Training_needs_-_ Allard_Kernkamp_and_Josine.pdf Accessed November 06, 2018."},{"key":"e_1_3_2_1_42_1","volume-title":"Accessed","author":"Information Directorate Labour Market","year":"2016","unstructured":"Labour Market Information Directorate , Government of Canada . 2016 . National Occupational Classification 2016. http:\/\/noc.esdc.gc.ca\/English\/noc\/welcome. aspx?ver=16 , Accessed November 06, 2018. Labour Market Information Directorate, Government of Canada. 2016. National Occupational Classification 2016. http:\/\/noc.esdc.gc.ca\/English\/noc\/welcome. aspx?ver=16, Accessed November 06, 2018."},{"key":"e_1_3_2_1_44_1","volume-title":"Accessed","author":"National Security Agency College of Cyber.","year":"2018","unstructured":"National Security Agency College of Cyber. 2018 . National Centers of Academic Excellence for Cyber Defense. https:\/\/www.iad.gov\/nietp\/CAERequirements.cfm , Accessed November 06, 2018. National Security Agency College of Cyber. 2018. National Centers of Academic Excellence for Cyber Defense. https:\/\/www.iad.gov\/nietp\/CAERequirements.cfm, Accessed November 06, 2018."},{"key":"e_1_3_2_1_45_1","volume-title":"Accessed","author":"National Security Agency College of Cyber.","year":"2018","unstructured":"National Security Agency College of Cyber. 2018 . National Centers of Academic Excellence for Cyber Operations. https:\/\/www.nsa.gov\/resources\/ students-educators\/centers-academic-excellence\/cae-co-fundamental\/index. shtml , Accessed November 06, 2018. National Security Agency College of Cyber. 2018. National Centers of Academic Excellence for Cyber Operations. https:\/\/www.nsa.gov\/resources\/ students-educators\/centers-academic-excellence\/cae-co-fundamental\/index. shtml, Accessed November 06, 2018."},{"key":"e_1_3_2_1_46_1","unstructured":"NATO. 2018. Multinational Cyber Defence Education and Training Project (MN CD E&amp;T). http:\/\/mncdet.wixsite.com\/mncdet-nato Accessed November 06 2018.  NATO. 2018. Multinational Cyber Defence Education and Training Project (MN CD E&amp;T). http:\/\/mncdet.wixsite.com\/mncdet-nato Accessed November 06 2018."},{"key":"e_1_3_2_1_47_1","volume-title":"Accessed","author":"Review NATO","year":"2018","unstructured":"NATO Review . 2018 . The history of cyber attacks - a timeline. https:\/\/www. nato.int\/docu\/review\/2013\/cyber\/timeline\/en\/index.htm , Accessed November 06, 2018. NATO Review. 2018. The history of cyber attacks - a timeline. https:\/\/www. nato.int\/docu\/review\/2013\/cyber\/timeline\/en\/index.htm, Accessed November 06, 2018."},{"key":"e_1_3_2_1_48_1","unstructured":"New Zealand Qualifications Authority (NZQA). 2017. Draft NZ Diploma in Cybersecurity (Level 6) 120 Credits. http:\/\/www.nzqa.govt.nz\/ assets\/qualifications-and-standards\/qualifications\/ICT-quals-review\/ Security-and-Testing\/NZ-Dip-Cybersecurity-L6-Nov2017-AtD.doc Accessed November 06 2018.  New Zealand Qualifications Authority (NZQA). 2017. Draft NZ Diploma in Cybersecurity (Level 6) 120 Credits. http:\/\/www.nzqa.govt.nz\/ assets\/qualifications-and-standards\/qualifications\/ICT-quals-review\/ Security-and-Testing\/NZ-Dip-Cybersecurity-L6-Nov2017-AtD.doc Accessed November 06 2018."},{"key":"e_1_3_2_1_49_1","volume-title":"National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework","author":"Newhouse William","year":"2018","unstructured":"William Newhouse , Stephanie Keith , Benjamin Scribner , and Greg Witte . 2012. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework . US National Institute of Standards and Technology . Accessed November 06, 2018 . William Newhouse, Stephanie Keith, Benjamin Scribner, and Greg Witte. 2012. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. US National Institute of Standards and Technology. Accessed November 06, 2018."},{"key":"e_1_3_2_1_50_1","first-page":"181","article-title":"National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework","volume":"800","author":"Newhouse William","year":"2017","unstructured":"William Newhouse , Stephanie Keith , Benjamin Scribner , and Greg Witte . 2017 . National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework . NIST Special Publication 800 (2017), 181 . William Newhouse, Stephanie Keith, Benjamin Scribner, and Greg Witte. 2017. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. NIST Special Publication 800 (2017), 181.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_51_1","volume-title":"National Cybersecurity Workforce Framework. https:\/\/www.nist.gov\/file\/359261 Accessed","author":"NIST.","year":"2018","unstructured":"NIST. 2017. National Initiative for Cybersecurity Education , National Cybersecurity Workforce Framework. https:\/\/www.nist.gov\/file\/359261 Accessed November 06, 2018 . NIST. 2017. National Initiative for Cybersecurity Education, National Cybersecurity Workforce Framework. https:\/\/www.nist.gov\/file\/359261 Accessed November 06, 2018."},{"key":"e_1_3_2_1_52_1","unstructured":"The Norwegian Data Protection Authority. 2017. Software development with Data Protection by Design and by Default. https:\/\/www.datatilsynet.no\/en\/ regulations-and-tools\/guidelines\/data-protection-by-design-and-by-default\/  The Norwegian Data Protection Authority. 2017. Software development with Data Protection by Design and by Default. https:\/\/www.datatilsynet.no\/en\/ regulations-and-tools\/guidelines\/data-protection-by-design-and-by-default\/"},{"key":"e_1_3_2_1_53_1","volume-title":"Software Engineering","author":"ACM\/IEEE-CS Task Group on Software Engineering Curricula. 2014.","year":"2014","unstructured":"ACM\/IEEE-CS Task Group on Software Engineering Curricula. 2014. Software Engineering 2014 . ACM\/IEEE-CS Task Group on Software Engineering Curricula. 2014. Software Engineering 2014."},{"key":"e_1_3_2_1_54_1","volume-title":"22nd Colloquium for Information Systems Security Education (CISSE","author":"Parrish Allen","year":"2018","unstructured":"Allen Parrish , Rajendra Raj , Edward Sobiesk , Andrew Hall , J.J. Ekstrom , and Shannon Gorman . 2018. The Evolution of Cybersecurity Education in Four-Year Undergraduate Programs . In 22nd Colloquium for Information Systems Security Education (CISSE 2018 ). CISSE , New Orleans , 1. Allen Parrish, Rajendra Raj, Edward Sobiesk, Andrew Hall, J.J. Ekstrom, and Shannon Gorman. 2018. The Evolution of Cybersecurity Education in Four-Year Undergraduate Programs. In 22nd Colloquium for Information Systems Security Education (CISSE 2018). CISSE, New Orleans, 1."},{"key":"e_1_3_2_1_55_1","unstructured":"PRIPARE Project. 2016. PRIPARE Handbook: Privacy and Security by Design Methodology. http:\/\/pripareproject.eu\/wp-content\/uploads\/2013\/11\/ PRIPARE-Methodology-Handbook-Final-Feb-24-2016.pdf  PRIPARE Project. 2016. PRIPARE Handbook: Privacy and Security by Design Methodology. http:\/\/pripareproject.eu\/wp-content\/uploads\/2013\/11\/ PRIPARE-Methodology-Handbook-Final-Feb-24-2016.pdf"},{"key":"e_1_3_2_1_56_1","volume-title":"Accessed","author":"Canada Public Safety","year":"2018","unstructured":"Public Safety Canada . 2018 . National Cyber Security Strategy: Canada\u2019s Vision for Security and Prosperity in the Digital Age. https:\/\/www.publicsafety.gc. ca\/cnt\/rsrcs\/pblctns\/ntnl-cbr-scrt-strtg\/index-en.aspx , Accessed November 06, 2018. Public Safety Canada. 2018. National Cyber Security Strategy: Canada\u2019s Vision for Security and Prosperity in the Digital Age. https:\/\/www.publicsafety.gc. ca\/cnt\/rsrcs\/pblctns\/ntnl-cbr-scrt-strtg\/index-en.aspx, Accessed November 06, 2018."},{"key":"e_1_3_2_1_57_1","volume-title":"New Zealand\u2019s Cyber Security Strategy","author":"Security and Intelligence Group (SIG). 2011.","year":"2011","unstructured":"Security and Intelligence Group (SIG). 2011. New Zealand\u2019s Cyber Security Strategy 2011 . Security and Intelligence Group (SIG). 2011. New Zealand\u2019s Cyber Security Strategy 2011."},{"key":"e_1_3_2_1_58_1","unstructured":"https:\/\/www.dpmc.govt.nz\/publications\/ new-zealands-cyber-security-strategy-2011 Accessed November 06 2018.  https:\/\/www.dpmc.govt.nz\/publications\/ new-zealands-cyber-security-strategy-2011 Accessed November 06 2018."},{"key":"e_1_3_2_1_59_1","volume-title":"Accessed","author":"Security and Intelligence Group (SIG).","year":"2015","unstructured":"Security and Intelligence Group (SIG). 2015 . New Zealand\u2019s Cyber Security Strategy 2015: Action Plan. https:\/\/www.dpmc.govt.nz\/sites\/default\/files\/2017-03\/ nz-cyber-security-action-plan-december-2015.pdf , Accessed November 06, 2018. Security and Intelligence Group (SIG). 2015. New Zealand\u2019s Cyber Security Strategy 2015: Action Plan. https:\/\/www.dpmc.govt.nz\/sites\/default\/files\/2017-03\/ nz-cyber-security-action-plan-december-2015.pdf, Accessed November 06, 2018."},{"key":"e_1_3_2_1_60_1","volume-title":"New Zealand\u2019s Cyber Security Strategy 2016: Action Plan Annual Report. https:\/\/www.dpmc.govt.nz\/sites\/default\/ files\/2017-06\/nzcss-action-plan-annual-report-2016.pdf Accessed","author":"Security and Intelligence Group (SIG). 2016.","year":"2018","unstructured":"Security and Intelligence Group (SIG). 2016. New Zealand\u2019s Cyber Security Strategy 2016: Action Plan Annual Report. https:\/\/www.dpmc.govt.nz\/sites\/default\/ files\/2017-06\/nzcss-action-plan-annual-report-2016.pdf Accessed November 06, 2018 . Security and Intelligence Group (SIG). 2016. New Zealand\u2019s Cyber Security Strategy 2016: Action Plan Annual Report. https:\/\/www.dpmc.govt.nz\/sites\/default\/ files\/2017-06\/nzcss-action-plan-annual-report-2016.pdf Accessed November 06, 2018."},{"key":"e_1_3_2_1_61_1","volume-title":"Professionalizing Cybersecurity: A Path to Universal Standards and Status. Technical Report","author":"Spidalieri F.","year":"2014","unstructured":"F. Spidalieri and S. Kern . 2014 . Professionalizing Cybersecurity: A Path to Universal Standards and Status. Technical Report . Pell Center for International Relations and Public Policy . F. Spidalieri and S. Kern. 2014. Professionalizing Cybersecurity: A Path to Universal Standards and Status. Technical Report. Pell Center for International Relations and Public Policy."},{"key":"e_1_3_2_1_62_1","volume-title":"Accessed","author":"Partnership The Tech","year":"2016","unstructured":"The Tech Partnership . 2016 . Information Security Standards. https: \/\/www.thetechpartnership.com\/standards-and-quality\/it-industry-standards\/ it-professional-standards\/information-security\/ , Accessed November 06, 2018. The Tech Partnership. 2016. Information Security Standards. https: \/\/www.thetechpartnership.com\/standards-and-quality\/it-industry-standards\/ it-professional-standards\/information-security\/, Accessed November 06, 2018."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078307"},{"key":"e_1_3_2_1_64_1","volume-title":"Accessed","author":"UK National Cyber Security Centre.","year":"2017","unstructured":"UK National Cyber Security Centre. 2017 . Certification of Bachelors\u2019 Degrees in Cyber Security. https:\/\/www.ncsc.gov.uk\/content\/files\/protected_files\/article_ files\/Certification-Bachelors-2_0-20171214.pdf , Accessed November 06, 2018. UK National Cyber Security Centre. 2017. Certification of Bachelors\u2019 Degrees in Cyber Security. https:\/\/www.ncsc.gov.uk\/content\/files\/protected_files\/article_ files\/Certification-Bachelors-2_0-20171214.pdf, Accessed November 06, 2018."},{"key":"e_1_3_2_1_65_1","volume-title":"Accessed","author":"US Bureau of Labor Statistics.","year":"2016","unstructured":"US Bureau of Labor Statistics. 2016 -\u00e2\u0102\u015e2017. Occupational Outlook Handbook: Information Security Analysts. US Department of Labor. http:\/\/www.bls.gov\/ooh\/ computer-and-inforrnation-technology\/information-security-analysis.html , Accessed November 06, 2018. US Bureau of Labor Statistics. 2016-\u00e2\u0102\u015e2017. Occupational Outlook Handbook: Information Security Analysts. US Department of Labor. http:\/\/www.bls.gov\/ooh\/ computer-and-inforrnation-technology\/information-security-analysis.html, Accessed November 06, 2018."},{"key":"e_1_3_2_1_66_1","volume-title":"Accessed","author":"US Department of Education.","year":"2018","unstructured":"US Department of Education. 2018 . Integrated Postsecondary Education Data System. https:\/\/nces.ed.gov\/ipeds , Accessed November 06, 2018. US Department of Education. 2018. Integrated Postsecondary Education Data System. https:\/\/nces.ed.gov\/ipeds, Accessed November 06, 2018."},{"key":"e_1_3_2_1_67_1","volume-title":"Centers of Academic Excellence in Cybersecurity. https:\/\/www.nsa.gov\/ resources\/educators\/centers-academic-excellence Accessed","author":"US National Security Agency and the Department of Homeland Security. 2018.","year":"2018","unstructured":"US National Security Agency and the Department of Homeland Security. 2018. Centers of Academic Excellence in Cybersecurity. https:\/\/www.nsa.gov\/ resources\/educators\/centers-academic-excellence Accessed November 06, 2018 . US National Security Agency and the Department of Homeland Security. 2018. Centers of Academic Excellence in Cybersecurity. https:\/\/www.nsa.gov\/ resources\/educators\/centers-academic-excellence Accessed November 06, 2018."},{"key":"e_1_3_2_1_68_1","volume-title":"Accessed","author":"US President\u2019s Council of Advisors on Science and Technology.","year":"2012","unstructured":"US President\u2019s Council of Advisors on Science and Technology. 2012 . Engage to Excel: Producing One Million Additional College Graduates with Degrees in Science, Technology, Engineering, and Mathematics. http:\/\/files.eric.ed.gov\/ fulltext\/ED541511.pdf , Accessed November 06, 2018. US President\u2019s Council of Advisors on Science and Technology. 2012. Engage to Excel: Producing One Million Additional College Graduates with Degrees in Science, Technology, Engineering, and Mathematics. http:\/\/files.eric.ed.gov\/ fulltext\/ED541511.pdf, Accessed November 06, 2018."},{"key":"e_1_3_2_1_69_1","first-page":"32","article-title":"Closing the cybersecurity skills gap","volume":"4","author":"Rebecca Vogel","year":"2016","unstructured":"Rebecca Vogel et al. 2016 . Closing the cybersecurity skills gap . Salus Journal 4 , 2 (2016), 32 . Rebecca Vogel et al. 2016. Closing the cybersecurity skills gap. Salus Journal 4, 2 (2016), 32.","journal-title":"Salus Journal"},{"key":"e_1_3_2_1_70_1","volume-title":"The EU General Data Protection Regulation (GDPR): A Practical Guide","author":"Voigt Paul","unstructured":"Paul Voigt and Axel von dem Bussche . 2017. The EU General Data Protection Regulation (GDPR): A Practical Guide ( 1 st ed.). Springer Publishing Company, Inc orporated. Paul Voigt and Axel von dem Bussche. 2017. The EU General Data Protection Regulation (GDPR): A Practical Guide (1st ed.). Springer Publishing Company, Incorporated.","edition":"1"}],"event":{"name":"ITiCSE '18: 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education","location":"Larnaca Cyprus","acronym":"ITiCSE '18","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293881.3295778","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3293881.3295778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:50Z","timestamp":1750207430000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293881.3295778"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,2]]},"references-count":67,"alternative-id":["10.1145\/3293881.3295778","10.1145\/3293881"],"URL":"https:\/\/doi.org\/10.1145\/3293881.3295778","relation":{},"subject":[],"published":{"date-parts":[[2018,7,2]]},"assertion":[{"value":"2018-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}