{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T22:46:55Z","timestamp":1751755615297,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:00:00Z","timestamp":1572220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,28]]},"DOI":"10.1145\/3369255.3369266","type":"proceedings-article","created":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T23:06:01Z","timestamp":1579647961000},"page":"3-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Design Model for a Degree Programme in Cyber Security"],"prefix":"10.1145","author":[{"given":"Karo","family":"Saharinen","sequence":"first","affiliation":[{"name":"JAMK University of Applied Sciences, Piippukatu, Jyv\u00e4skyl\u00e4"}]},{"given":"Mika","family":"Karjalainen","sequence":"additional","affiliation":[{"name":"JAMK University of Applied Sciences, Piippukatu, Jyv\u00e4skyl\u00e4"}]},{"given":"Tero","family":"Kokkonen","sequence":"additional","affiliation":[{"name":"JAMK University of Applied Sciences, Piippukatu, Jyv\u00e4skyl\u00e4"}]}],"member":"320","published-online":{"date-parts":[[2020,1,21]]},"reference":[{"volume-title":"Current Trends in Workforce Development","year":"2019","author":"State of Cybersecurity 2019","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"(ISC)2 Cybersecurity Workforce Study. 2018. (ISC)2.  (ISC)2 Cybersecurity Workforce Study. 2018. (ISC)2."},{"volume-title":"Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity","year":"2015","author":"Burley D.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSSP.2018040102"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.31686\/ijier.Vol7.Iss1.1291"},{"key":"e_1_3_2_1_6_1","unstructured":"The Cybersecurity Workforce Gap. 2019. CSIS.  The Cybersecurity Workforce Gap. 2019. CSIS."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.1451658"},{"volume-title":"Retrieved","year":"2017","author":"May","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Government Decree on the National Framework for Qualifications and Other Competence Modules. 2017. Finland. Retrieved April 2 2019 from https:\/\/www.oph.fi\/download\/182107_Government_Decree_120-2017_27.2.2017_.pdf  Government Decree on the National Framework for Qualifications and Other Competence Modules. 2017. Finland. Retrieved April 2 2019 from https:\/\/www.oph.fi\/download\/182107_Government_Decree_120-2017_27.2.2017_.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"ECTS Users' Guide. Publicatins Office of the European Union. DOI=https:\/\/www.doi.org\/10.2766\/87192  ECTS Users' Guide. Publicatins Office of the European Union. DOI=https:\/\/www.doi.org\/10.2766\/87192"},{"key":"e_1_3_2_1_11_1","unstructured":"EUR-ACE\u00ae Framework Standards and Guidelines. 2015. ENAEE. Retrieved April 1 2019 from https:\/\/www.enaee.eu\/wp-assets-enaee\/uploads\/2017\/11\/EAFSG-Doc-Full-status-8-Sept-15-on-web-fm.pdf  EUR-ACE\u00ae Framework Standards and Guidelines. 2015. ENAEE. Retrieved April 1 2019 from https:\/\/www.enaee.eu\/wp-assets-enaee\/uploads\/2017\/11\/EAFSG-Doc-Full-status-8-Sept-15-on-web-fm.pdf"},{"volume-title":"Retrieved","year":"2013","author":"Finland's Cyber","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Proposed Accreditation Criteria for Cybersecurity Academic Programs ABET Inc. Nov. 2017 [online] Available: www.abet.org\/blog\/news\/abet-seeks-feedback-on-proposed-accreditation-criteria-for-cybersecurity-academic-programs  Proposed Accreditation Criteria for Cybersecurity Academic Programs ABET Inc. Nov. 2017 [online] Available: www.abet.org\/blog\/news\/abet-seeks-feedback-on-proposed-accreditation-criteria-for-cybersecurity-academic-programs"},{"volume-title":"Comprehensive National Cybersecurity Initiative","year":"2010","author":"United States.","key":"e_1_3_2_1_14_1"},{"volume-title":"NICE: Creating a Cybersecurity Workforce and Aware Public,\" in IEEE Security & Privacy","author":"Paulsen E.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. 2017. NIST. DOI=https:\/\/doi.org\/10.6028\/NIST.SP. 800--181  National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. 2017. NIST. DOI=https:\/\/doi.org\/10.6028\/NIST.SP. 800--181"},{"key":"e_1_3_2_1_17_1","unstructured":"Centers of Academic Excellence in Cybersecurity. Retrieved April 2 2019 from https:\/\/www.caecommunity.org\/content\/what-is-a-cae  Centers of Academic Excellence in Cybersecurity. Retrieved April 2 2019 from https:\/\/www.caecommunity.org\/content\/what-is-a-cae"},{"key":"e_1_3_2_1_18_1","unstructured":"Centers of Academic Excellence Cyber Defence Knowledge Units. Retrieved March 27 2019 from https:\/\/www.iad.gov\/NIETP\/documents\/Requirements\/CAE-CD_2019_Knowledge_Units.pdf  Centers of Academic Excellence Cyber Defence Knowledge Units. Retrieved March 27 2019 from https:\/\/www.iad.gov\/NIETP\/documents\/Requirements\/CAE-CD_2019_Knowledge_Units.pdf"},{"key":"e_1_3_2_1_19_1","unstructured":"Criteria for Measurement for CAE in Cyber Operations Fundamental. NSA. Retrieved March 27 2019 from https:\/\/www.nsa.gov\/resources\/students-educators\/centers-academic-excellence\/cae-co-fundamental\/  Criteria for Measurement for CAE in Cyber Operations Fundamental. NSA. Retrieved March 27 2019 from https:\/\/www.nsa.gov\/resources\/students-educators\/centers-academic-excellence\/cae-co-fundamental\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Criteria for Measurement for CAE in Cyber Operations Advanced. NSA. Retrieved March 27 2019 from https:\/\/www.nsa.gov\/resources\/students-educators\/centers-academic-excellence\/cae-co-advanced\/  Criteria for Measurement for CAE in Cyber Operations Advanced. NSA. Retrieved March 27 2019 from https:\/\/www.nsa.gov\/resources\/students-educators\/centers-academic-excellence\/cae-co-advanced\/"},{"volume-title":"Retrieved","year":"2019","author":"Guide","key":"e_1_3_2_1_21_1"},{"volume-title":"Retrieved","year":"2019","author":"Olson R.","key":"e_1_3_2_1_22_1"},{"volume-title":"Retrieved","year":"2019","author":"Master's Degree Programme","key":"e_1_3_2_1_23_1"},{"volume-title":"Course Information","year":"2019","author":"Cyber Security Implementation","key":"e_1_3_2_1_24_1"},{"volume-title":"Taxonomy of educational objectives Handbook 1: cognitive domain","year":"1956","author":"Bloom B. S.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"Biggs J. and Collis K. 1982. Evaluating the Quality of Learning The SOLO Taxonomy (Structure of Observed Learning Outcome). Academic Press.  Biggs J. and Collis K. 1982. Evaluating the Quality of Learning The SOLO Taxonomy (Structure of Observed Learning Outcome). Academic Press."},{"volume-title":"Course Information","year":"2019","author":"Security Management","key":"e_1_3_2_1_27_1"},{"volume-title":"Course Information","year":"2019","author":"Auditing","key":"e_1_3_2_1_28_1"},{"volume-title":"Course Information","year":"2019","author":"Cyber Security Exercise","key":"e_1_3_2_1_29_1"}],"event":{"name":"ICETC 2019: 2019 11th International Conference on Education Technology and Computers","sponsor":["University of Twente University of Twente"],"location":"Amsterdam Netherlands","acronym":"ICETC 2019"},"container-title":["Proceedings of the 2019 11th International Conference on Education Technology and Computers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3369255.3369266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3369255.3369266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:10Z","timestamp":1750201990000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3369255.3369266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,28]]},"references-count":29,"alternative-id":["10.1145\/3369255.3369266","10.1145\/3369255"],"URL":"https:\/\/doi.org\/10.1145\/3369255.3369266","relation":{},"subject":[],"published":{"date-parts":[[2019,10,28]]},"assertion":[{"value":"2020-01-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}