{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:20:12Z","timestamp":1775470812465,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T00:00:00Z","timestamp":1686873600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,16]]},"DOI":"10.1145\/3606305.3606325","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T16:18:41Z","timestamp":1694535521000},"page":"123-128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Enhancing a cybersecurity curriculum development tool with a competence framework to meet industry needs for cybersecurity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0340-775X","authenticated-orcid":false,"given":"Anne-Maarit","family":"Majanoja","sequence":"first","affiliation":[{"name":"Department of Computing, University of Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0932-7814","authenticated-orcid":false,"given":"Antti","family":"Hakkala","sequence":"additional","affiliation":[{"name":"Department of Computing, University of Turku, Finland"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366918"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3573205"},{"key":"e_1_3_2_1_3_1","unstructured":"S Bosworth ME Kabay and E Whyne. 2014. Professional certification and training. In Computer Security Handbook. Vol.\u00a01.  S Bosworth ME Kabay and E Whyne. 2014. Professional certification and training. In Computer Security Handbook. Vol.\u00a01."},{"issue":"3","key":"e_1_3_2_1_4_1","first-page":"2023","article-title":"European Cybersecurity Skills Framework. Available online at https:\/\/www.enisa.europa.eu\/topics\/education\/european-cybersecurity-skills-framework","volume":"25","author":"ENISA.","year":"2022","unstructured":"ENISA. 2022 . European Cybersecurity Skills Framework. Available online at https:\/\/www.enisa.europa.eu\/topics\/education\/european-cybersecurity-skills-framework , Accessed 25 . 3 . 2023 . ENISA. 2022. European Cybersecurity Skills Framework. Available online at https:\/\/www.enisa.europa.eu\/topics\/education\/european-cybersecurity-skills-framework, Accessed 25.3.2023.","journal-title":"Accessed"},{"key":"e_1_3_2_1_5_1","first-page":"03","article-title":"European Cybersecurity Taxonomy. Available online at https:\/\/cybersecurity-atlas.ec.europa.eu\/cybersecurity-taxonomy","volume":"25","author":"European Commission Joint Research Centre (JRC).","year":"2021","unstructured":"European Commission Joint Research Centre (JRC). 2021 . European Cybersecurity Taxonomy. Available online at https:\/\/cybersecurity-atlas.ec.europa.eu\/cybersecurity-taxonomy , Accessed 25 . 03 .2023. European Commission Joint Research Centre (JRC). 2021. European Cybersecurity Taxonomy. Available online at https:\/\/cybersecurity-atlas.ec.europa.eu\/cybersecurity-taxonomy, Accessed 25.03.2023.","journal-title":"Accessed"},{"key":"e_1_3_2_1_6_1","unstructured":"European Committee for Standardization. 2019. SFS-EN 16234-1 : 2019 : en (e-CF). A common European Framework for ICT Professionals e-Competence Framework (e-CF). A common European Framework.  European Committee for Standardization. 2019. SFS-EN 16234-1 : 2019 : en (e-CF). A common European Framework for ICT Professionals e-Competence Framework (e-CF). A common European Framework."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318396.3318432"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3543799"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 19th International CDIO Conference, hosted by NTNU","author":"Hakkala Antti","year":"2023","unstructured":"Antti Hakkala , Anne-Maarit Majanoja , Ville Lepp\u00e4nen , and Seppo Virtanen . 2023 . Framework for the Evaluation of Cybersecurity Curriculum Educational Content . In Proceedings of the 19th International CDIO Conference, hosted by NTNU , Trondheim, Norway, June 26\u201429 , 2023. Antti Hakkala, Anne-Maarit Majanoja, Ville Lepp\u00e4nen, and Seppo Virtanen. 2023. Framework for the Evaluation of Cybersecurity Curriculum Educational Content. In Proceedings of the 19th International CDIO Conference, hosted by NTNU, Trondheim, Norway, June 26\u201429, 2023."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583086"},{"key":"e_1_3_2_1_11_1","unstructured":"Martti Lehto (Ed.). 2022. Kyberturvallisuuden koulutusohjelman muutostarpeiden tutkimus \u2013 hankkeen loppuraportti. Informaatioteknologian tiedekunnan julkaisuja93 (2022). https:\/\/jyx.jyu.fi\/handle\/123456789\/82709  Martti Lehto (Ed.). 2022. Kyberturvallisuuden koulutusohjelman muutostarpeiden tutkimus \u2013 hankkeen loppuraportti. Informaatioteknologian tiedekunnan julkaisuja93 (2022). https:\/\/jyx.jyu.fi\/handle\/123456789\/82709"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472634.3472649"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 19th International CDIO Conference, hosted by NTNU","author":"Majanoja Anne-Maarit","year":"2023","unstructured":"Anne-Maarit Majanoja , Antti Hakkala , Seppo Virtanen , and Ville Lepp\u00e4nen . 2023 . Motivation for Continuous Software Engineering Expertise Development Through Lifelong Learning . In Proceedings of the 19th International CDIO Conference, hosted by NTNU , Trondheim, Norway, June 26\u201429 , 2023. Anne-Maarit Majanoja, Antti Hakkala, Seppo Virtanen, and Ville Lepp\u00e4nen. 2023. Motivation for Continuous Software Engineering Expertise Development Through Lifelong Learning. In Proceedings of the 19th International CDIO Conference, hosted by NTNU, Trondheim, Norway, June 26\u201429, 2023."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3344429.3372507"},{"key":"e_1_3_2_1_15_1","unstructured":"NIST. 2020. NICE Framework Supplemental Material.https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/nice-framework-resource-center\/nice-framework-supplemental-material.  NIST. 2020. NICE Framework Supplemental Material.https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/nice-framework-resource-center\/nice-framework-supplemental-material."},{"key":"e_1_3_2_1_16_1","unstructured":"NIST. 2020. NIST Special Publication 800-181 Revision 1: Workforce Frame-work for Cybersecurity (NICE Framework). https:\/\/cybersecurity.att.com\/resource-center\/solution-briefs\/nist-compliance-usm-anywhere  NIST. 2020. NIST Special Publication 800-181 Revision 1: Workforce Frame-work for Cybersecurity (NICE Framework). https:\/\/cybersecurity.att.com\/resource-center\/solution-briefs\/nist-compliance-usm-anywhere"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293881.3295778"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3436756.3437041"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369255.3369266"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474359"},{"key":"e_1_3_2_1_21_1","unstructured":"University of Bristol Cyber Security Group. 2021. CyBOK \u2013 The Cyber Security Body of Knowledge. https:\/\/www.cybok.org\/  University of Bristol Cyber Security Group. 2021. CyBOK \u2013 The Cyber Security Body of Knowledge. https:\/\/www.cybok.org\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340527"}],"event":{"name":"CompSysTech '23: International Conference on Computer Systems and Technologies 2023","location":"Ruse Bulgaria","acronym":"CompSysTech '23"},"container-title":["Proceedings of the 24th International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606305.3606325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3606305.3606325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:08Z","timestamp":1750178828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606305.3606325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,16]]},"references-count":22,"alternative-id":["10.1145\/3606305.3606325","10.1145\/3606305"],"URL":"https:\/\/doi.org\/10.1145\/3606305.3606325","relation":{},"subject":[],"published":{"date-parts":[[2023,6,16]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}