{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:05:32Z","timestamp":1771045532077,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-1241576, 1753681, 1819521, 1820531"],"award-info":[{"award-number":["DGE-1241576, 1753681, 1819521, 1820531"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Department of Defense","award":["H98230-15-1-0294, H98230-15-1-0273, H98230-17-1-0349, H98230-17-1-0347"],"award-info":[{"award-number":["H98230-15-1-0294, H98230-15-1-0273, H98230-17-1-0349, H98230-17-1-0347"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,2]]},"DOI":"10.1145\/3545945.3569762","type":"proceedings-article","created":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T23:40:27Z","timestamp":1677886827000},"page":"228-234","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Psychometric Evaluation of the Cybersecurity Curriculum Assessment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9501-2295","authenticated-orcid":false,"given":"Geoffrey L.","family":"Herman","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5358-720X","authenticated-orcid":false,"given":"Shan","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3285-496X","authenticated-orcid":false,"given":"Peter A.","family":"Peterson","sequence":"additional","affiliation":[{"name":"University of Minnesota, Duluth, Duluth, MN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0056-7819","authenticated-orcid":false,"given":"Linda","family":"Oliva","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0814-9956","authenticated-orcid":false,"given":"Enis","family":"Golaszewski","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1130-4678","authenticated-orcid":false,"given":"Alan T.","family":"Sherman","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,3,3]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2022. UMBC Cyber Defense Lab. https:\/\/cisa.umbc.edu\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2017.1414364"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366865"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366829"},{"key":"e_1_3_2_2_5_1","volume-title":"Loose-Leaf Version","author":"Ciampa Mark","unstructured":"Mark Ciampa. 2017. CompTIA Security Guide to Network Security Fundamentals, Loose-Leaf Version (6th ed.). Course Technology Press, Boston, MA, USA.","edition":"6"},{"key":"e_1_3_2_2_6_1","unstructured":"CompTIA. [n.d.]. CASP (CAS-003) Certification Study Guide: CompTIA IT Certifications. https:\/\/www.comptia.org\/training\/books\/casp-cas-003-study-guide"},{"key":"e_1_3_2_2_7_1","unstructured":"International Information System Security Certification Consortium. [n.d.]. Cer- tified Information Systems Security Professional. https:\/\/www.isc2.org\/cissp\/default.aspx. [accessed 3-14-17]."},{"key":"e_1_3_2_2_8_1","unstructured":"International Information Systems Security Certification Consortium. [n.d.]. GIAC Certifications: The Highest Standard in Cyber Security Certifications. https:\/\/www.giac.org\/."},{"key":"e_1_3_2_2_9_1","unstructured":"CyberCorps. 2019. Participating Institutions. https:\/\/www.sfs.opm.gov\/ ContactsPI.aspx"},{"key":"e_1_3_2_2_10_1","unstructured":"Cybersecurity and Infrastructure Security Agency. [n.d.]. The National Initiative for Cybersecurity Careers & Studies. URL: https:\/\/niccs.us-cert.gov\/featured-stories\/take-cybersecurity-certification-prep-course."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287393"},{"key":"e_1_3_2_2_12_1","volume-title":"Technical Report. CSEC2017 Joint Task Force.","author":"CSEC2017 Joint Task Force","year":"2017","unstructured":"CSEC2017 Joint Task Force. 2017. Cybersecurity Curricula 2017. Technical Report. CSEC2017 Joint Task Force."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1119\/1.18809"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2010.5673591"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2014.970781"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1119\/1.2343497"},{"key":"e_1_3_2_2_17_1","unstructured":"CAE in Cybersecurity Community. 2019. CAE Institution Map. https: \/\/www.caecommunity.org\/content\/cae-institution-map"},{"key":"e_1_3_2_2_18_1","volume-title":"Computing Curricula 2020 Paradigms for Global Computing Education","author":"Association for Computing Machinery (ACM) Joint Task Force on Computing Curricula and IEEE Computer Society. 2020.","year":"2020","unstructured":"Association for Computing Machinery (ACM) Joint Task Force on Computing Curricula and IEEE Computer Society. 2020. Computing Curricula 2020 Paradigms for Global Computing Education. Association for Computing Machinery, New York, NY, USA. https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula- recommendations\/cc2020.pdf"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/jee.20104"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Martin C. Libicki David Senty and Julia Pollak. 2014. Hackers wanted: an exami- nation of the cybersecurity labor market. RAND.","DOI":"10.7249\/RR430"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2018.1562145"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470479216.corpsy0524"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105726.3106178"},{"key":"e_1_3_2_2_24_1","volume-title":"http:\/\/csrc.nist.gov\/nice\/framework\/. [Online","author":"Framework NIST.","year":"2016","unstructured":"NIST. [n.d.]. NICE Framework. http:\/\/csrc.nist.gov\/nice\/framework\/. [Online; accessed 8-October-2016]."},{"key":"e_1_3_2_2_25_1","volume-title":"The cybersecurity skills shortage is getting worse. https:\/\/www.csoonline.com\/article\/3571734\/the-cybersecurity-skills-shortage-is-getting-worse.html [Online","author":"Oltsik Jon","year":"2020","unstructured":"Jon Oltsik. 2020. The cybersecurity skills shortage is getting worse. https:\/\/www.csoonline.com\/article\/3571734\/the-cybersecurity-skills-shortage-is-getting-worse.html [Online; accessed 21-August-2020]."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5964\/ejop.v9i4.653"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2017.2715174"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2960310.2960316"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291279.3339404"},{"key":"e_1_3_2_2_30_1","first-page":"1","article-title":"Psychometric evaluation of the Cybersecurity Concept Inventory","volume":"22","author":"Poulsen Seth","year":"2021","unstructured":"Seth Poulsen, Geoffrey L. Herman, Peter AH Peterson, Enis Golaszewski, Akshita Gorti, Linda Oliva, Travis Scheponik, and Alan T Sherman. 2021. Psychometric evaluation of the Cybersecurity Concept Inventory. ACM Transactions on Computing Education (TOCE) 22, 1 (November 2021), 1--18.","journal-title":"ACM Transactions on Computing Education (TOCE)"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.17226\/10019"},{"key":"e_1_3_2_2_32_1","volume-title":"Sherman","author":"Scheponik Travis","year":"2020","unstructured":"Travis Scheponik, Enis Golaszewski, Geoffrey Herman, Spencer Offenberger, Linda Oliva, Peter A. H. Peterson, and Alan T. Sherman. 2020. Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments. In National Cyber Summit (NCS) Research Track, Kim-Kwang Raymond Choo, Thomas H. Morris, and Gilbert L. Peterson (Eds.). Springer International Publishing, Cham, 185--201. https:\/\/arxiv.org\/pdf\/1909.04230.pdf."},{"key":"e_1_3_2_2_33_1","unstructured":"Offensive Security. [n.d.]. Penetration Testing with Kali Linux (PWK). https: \/\/www.offensive-security.com\/pwk-oscp\/."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/52.3-4.591"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2017.1362063"},{"key":"e_1_3_2_2_36_1","volume-title":"Seth Poulsen, Travis Scheponik, and Akshita Gorti.","author":"Sherman Alan T.","year":"2021","unstructured":"Alan T. Sherman, Geoffrey L. Herman, Linda Oliva, Peter A. H. Peterson, Enis Go- laszewski, Seth Poulsen, Travis Scheponik, and Akshita Gorti. 2021. Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity. In National Cyber Summit (NCS) Research Track 2020, Kim-Kwang Raymond Choo, Tommy Morris, Gilbert L. Peterson, and Eric Imsand (Eds.). Springer Inter- national Publishing, Cham, 3--34."},{"key":"e_1_3_2_2_37_1","volume-title":"The 15 biggest data breaches of the 21st cen- tury. https:\/\/www.csoonline.com\/article\/2130877\/the-biggest-data-breaches-of-the-21st-century.html [Online","author":"Swinhoe Dan","year":"2020","unstructured":"Dan Swinhoe. 2020. The 15 biggest data breaches of the 21st cen- tury. https:\/\/www.csoonline.com\/article\/2130877\/the-biggest-data-breaches-of-the-21st-century.html [Online; accessed 21-August-2020]."},{"key":"e_1_3_2_2_38_1","volume-title":"Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project. 2017 National Cyber Summit (06","author":"Sherman Alan T.","year":"2017","unstructured":"Alan T. Sherman, Linda Oliva, David DeLatte, Enis Golaszewski, Michael Neary, Konstantinos Patsourakos, Dhananjay Phatak, Travis Scheponik, Geoffrey Herman, and Julia Thompson. 2017. Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project. 2017 National Cyber Summit (06 2017)."},{"key":"e_1_3_2_2_39_1","volume-title":"Geoffrey Herman, Dong San Choi, Spencer Offenberger, Peter Peterson, Josiah Dykstra, Gregory Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh Verma, and Ryan Vrecenar.","author":"Sherman Alan T.","year":"2019","unstructured":"Alan T. Sherman, Linda Oliva, Enis Golaszewski, Dhananjay Phatak, Travis Schep- onik, Geoffrey Herman, Dong San Choi, Spencer Offenberger, Peter Peterson, Josiah Dykstra, Gregory Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh Verma, and Ryan Vrecenar. 2019. The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories. In IEEE Security and Privacy."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"A. E. Tew and M. Guzdial. 2011. The FCS1: A language independent assessment of CS1 knowledge. (2011) 111--116.","DOI":"10.1145\/1953163.1953200"},{"key":"e_1_3_2_2_41_1","volume-title":"Student misconceptions about cybersecurity concepts: Analysis of think-aloud interviews. Journal of Cybersecurity Education, Research and Practice (07","author":"Thompson Julia","year":"2018","unstructured":"Julia Thompson, Geoffrey Herman, Travis Scheponik, Linda Oliva, Alan T. Sherman, and Ennis Golaszewski. 2018. Student misconceptions about cybersecurity concepts: Analysis of think-aloud interviews. Journal of Cybersecurity Education, Research and Practice (07 2018)."},{"key":"e_1_3_2_2_42_1","volume-title":"CEH Certified Ethical Hacker All-in-One Exam Guide","author":"Walker Matt","unstructured":"Matt Walker. 2011. CEH Certified Ethical Hacker All-in-One Exam Guide (1st ed.). McGraw-Hill Osborne Media.","edition":"1"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.18260\/p.24575"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287370"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159527"}],"event":{"name":"SIGCSE 2023: The 54th ACM Technical Symposium on Computer Science Education","location":"Toronto ON Canada","acronym":"SIGCSE 2023","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545945.3569762","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545945.3569762","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545945.3569762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:00Z","timestamp":1750183800000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545945.3569762"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,2]]},"references-count":45,"alternative-id":["10.1145\/3545945.3569762","10.1145\/3545945"],"URL":"https:\/\/doi.org\/10.1145\/3545945.3569762","relation":{},"subject":[],"published":{"date-parts":[[2023,3,2]]},"assertion":[{"value":"2023-03-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}