{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:10:42Z","timestamp":1771045842935,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:00:00Z","timestamp":1739318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,12]]},"DOI":"10.1145\/3641554.3701834","type":"proceedings-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:33:41Z","timestamp":1739903621000},"page":"875-881","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Bridging the Community College Cybersecurity Classroom and Workplace with the CyberSim Lab"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9194-6701","authenticated-orcid":false,"given":"Judeth","family":"Oden Choi","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6645-2851","authenticated-orcid":false,"given":"Rotem","family":"Guttman","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0620-2600","authenticated-orcid":false,"given":"Matthew","family":"Kisow","sequence":"additional","affiliation":[{"name":"Community College of Allegheny Co., Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1128-5155","authenticated-orcid":false,"given":"Carolyn","family":"Ros\u00e9","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1668-6882","authenticated-orcid":false,"given":"William","family":"Nichols","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7844-7773","authenticated-orcid":false,"given":"James","family":"Winyard","sequence":"additional","affiliation":[{"name":"Community College of Allegheny Co., Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5608-4681","authenticated-orcid":false,"given":"Bruce","family":"Li","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7835-0527","authenticated-orcid":false,"given":"Lee","family":"Branstetter","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3177-2412","authenticated-orcid":false,"given":"Lauren","family":"Herckis","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,2,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40593-013-0012-6"},{"key":"e_1_3_2_1_2_1","unstructured":"Biden-Harris Administration. 2023. National Cyber Workforce and Education Strategy. https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2023\/07\/31\/fact-sheet-biden-harris-administration-announces-national-cyber-workforce-and-education-strategy-unleashing-americas-cyber-talent\/"},{"key":"e_1_3_2_1_3_1","volume-title":"Making Change Last","author":"Andersson Niclas","unstructured":"Niclas Andersson and Pernille Hammar Andersson. 2010. Teaching Professional Engineering Skills: Industry Participation in Realistic Role Play Simulation. In Making Change Last, Vol. Proceedings of the 6th International CDIO Conference. \u00c9cole Polytechnique. Making Change Last : Sustaining and Globalizing Engineering Educational Reform ; Conference date: 01-01--2010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3421254"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5546-3_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Community colleges in context: Exploring financing of two-and four-year institutions","author":"Baum Sandy","year":"2013","unstructured":"Sandy Baum and Charles Kurose. 2013. Community colleges in context: Exploring financing of two-and four-year institutions. Century Foundation Task Force, Bridging the higher education divide. Strengthening community colleges and restoring the American dream (2013), 73--108."},{"key":"e_1_3_2_1_7_1","volume-title":"Washington, DC: National academy press.","author":"Bransford John D","year":"2000","unstructured":"John D Bransford, Ann L Brown, Rodney R Cocking, et al. 2000. How people learn. Vol. 11. Washington, DC: National academy press."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017811"},{"key":"e_1_3_2_1_9_1","unstructured":"Microsoft Corporation. [n. d.]. Azure Lab Services. https:\/\/labs.azure.com\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630757"},{"key":"e_1_3_2_1_11_1","volume-title":"Alyssa Friend Wise, and Jun Oshima","author":"Cress Ulrike","year":"2021","unstructured":"Ulrike Cress, Carolyn Ros\u00e9, Alyssa Friend Wise, and Jun Oshima. 2021. International handbook of computer-supported collaborative learning. Vol. 19. Springer."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--35399"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00744"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.2012.696438"},{"key":"e_1_3_2_1_15_1","volume-title":"The growing importance of social skills in the labor market. The quarterly journal of economics","author":"Deming David J","year":"2017","unstructured":"David J Deming. 2017. The growing importance of social skills in the labor market. The quarterly journal of economics, Vol. 132, 4 (2017), 1593--1640."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"David J Deming. 2021. The growing importance of decision-making on the job. Technical Report. National Bureau of Economic Research.","DOI":"10.3386\/w28733"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/qje\/qjaa021"},{"key":"e_1_3_2_1_18_1","unstructured":"Department of Homeland Security. [n. d.]. Supporting the Growth and Sustainment of the Nation's Cybersecurity Workforce textbar CISA. https:\/\/www.cisa.gov\/resources-tools\/resources\/supporting-growth-and-sustainment-nations-cybersecurity-workforce"},{"key":"e_1_3_2_1_19_1","volume-title":"Enhancing knowledge transfer. Handbook of Research in Educational Communications and Technology: Learning Design","author":"Dohn Nina Bonderup","year":"2020","unstructured":"Nina Bonderup Dohn, Lina Markauskaite, and Roland Hachmann. 2020. Enhancing knowledge transfer. Handbook of Research in Educational Communications and Technology: Learning Design (2020), 73--96."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1353\/rus.2016.0007"},{"key":"e_1_3_2_1_21_1","volume-title":"Teaching machines: Learning from the intersection of education and technology","author":"Ferster Bill","unstructured":"Bill Ferster. 2014. Teaching machines: Learning from the intersection of education and technology. JHU Press."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/medu.14871"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1257\/pol.20170506"},{"key":"e_1_3_2_1_24_1","volume-title":"Cybersecurity curricular guidance for associate-degree programs","author":"Cyber2yr2020 Task Group","unstructured":"Cyber2yr2020 Task Group. 2020. Cybersecurity curricular guidance for associate-degree programs. Association for Computing Machinery."},{"key":"e_1_3_2_1_25_1","volume-title":"The international handbook of collaborative learning","author":"Hmelo-Silver Cindy E","unstructured":"Cindy E Hmelo-Silver. 2013. The international handbook of collaborative learning. Routledge."},{"key":"e_1_3_2_1_26_1","volume-title":"Policies to reduce high-tenured displaced workers' earnings losses through retraining","author":"Jacobson Louis","year":"2011","unstructured":"Louis Jacobson, Robert LaLonde, and Daniel Sullivan. 2011. Policies to reduce high-tenured displaced workers' earnings losses through retraining. Washington, DC: Brookings (2011)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jeconom.2004.04.010"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/00091383.2014.905417"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1108\/JWL-04--2012-0036"},{"key":"e_1_3_2_1_30_1","volume-title":"A cognitive load approach to collaborative learning: United brains for complex tasks. Educational psychology review","author":"Kirschner Femke","year":"2009","unstructured":"Femke Kirschner, Fred Paas, and Paul A Kirschner. 2009. A cognitive load approach to collaborative learning: United brains for complex tasks. Educational psychology review, Vol. 21 (2009), 31--42."},{"key":"e_1_3_2_1_31_1","first-page":"101","article-title":"Maintaining a cybersecurity curriculum: Professional certifications as valuable guidance","volume":"28","author":"Knapp Kenneth J","year":"2017","unstructured":"Kenneth J Knapp, Christopher Maurer, and Miloslava Plachkinova. 2017. Maintaining a cybersecurity curriculum: Professional certifications as valuable guidance. Journal of Information Systems Education, Vol. 28, 2 (2017), 101.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_3_2_1_32_1","volume-title":"The Knowledge-Learning-Instruction framework: Bridging the science-practice chasm to enhance robust student learning. Cognitive science","author":"Koedinger Kenneth R","year":"2012","unstructured":"Kenneth R Koedinger, Albert T Corbett, and Charles Perfetti. 2012. The Knowledge-Learning-Instruction framework: Bridging the science-practice chasm to enhance robust student learning. Cognitive science, Vol. 36, 5 (2012), 757--798."},{"key":"e_1_3_2_1_33_1","volume-title":"Experiential learning: Experience as the source of learning and development","author":"Kolb David A","unstructured":"David A Kolb. 2014. Experiential learning: Experience as the source of learning and development. FT press."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9922.2012.00740.x"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmwh.2007.03.018"},{"key":"e_1_3_2_1_36_1","volume-title":"How Learning Works: Eight Research-based Principles for Smart Teaching","author":"Lovett Marsha C","unstructured":"Marsha C Lovett, Michael W Bridges, Michele DiPietro, Susan A Ambrose, and Marie K Norman. 2023. How Learning Works: Eight Research-based Principles for Smart Teaching. John Wiley & Sons."},{"key":"e_1_3_2_1_37_1","first-page":"37","article-title":"Simulations: Bringing the benefits of situated learning to the traditional classroom","volume":"3","author":"Lunce Les M","year":"2006","unstructured":"Les M Lunce. 2006. Simulations: Bringing the benefits of situated learning to the traditional classroom. Journal of Applied Educational Technology, Vol. 3, 1 (2006), 37--45.","journal-title":"Journal of Applied Educational Technology"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10488-005-3264-0"},{"key":"e_1_3_2_1_39_1","volume-title":"Social reality in roleplaying games","author":"Montola Markus","year":"2014","unstructured":"Markus Montola. 2014. Social reality in roleplaying games. The Foundation Stone of Nordic Larp, Vol. 103 (2014)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcs.54"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181"},{"key":"e_1_3_2_1_42_1","volume-title":"Immersive learning: Designing for authentic practice","author":"Pagano Koreen Olbrish","unstructured":"Koreen Olbrish Pagano. 2013. Immersive learning: Designing for authentic practice. Association for Talent Development."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.62915\/2472-2707.1071"},{"key":"e_1_3_2_1_44_1","volume-title":"Natasha May, Michael Boni, Justeena Zaki-Azat, Raya Gurevich-Gal, and Loriann Hynes.","author":"Peisachovich Eva","year":"2020","unstructured":"Eva Peisachovich, Celina Da Silva, Natasha May, Michael Boni, Justeena Zaki-Azat, Raya Gurevich-Gal, and Loriann Hynes. 2020. Understanding learners' experiences of simulated person methodology in an athletic therapy program. Cureus, Vol. 12, 3 (2020)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Rodney Petersen Danielle Santos Matthew Smith and Gregory Witte. 2020. Workforce framework for cybersecurity (NICE framework). Technical Report. National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.800-181r1-draft"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11436"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10956-020-09866-0"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2021.104320"},{"key":"e_1_3_2_1_49_1","unstructured":"M. D. Reinhold. 2018. Guidance for Identifying Addressing and Reporting Cybersecurity Work Roles of Critical Need. https:\/\/chcoc.gov\/content\/guidance-identifying-addressing-and-reporting-cybersecurity-work-roles-critical-need"},{"key":"e_1_3_2_1_50_1","volume-title":"Rolf Robertsen, P Haukeberg, Martin Rasmussen, and Catharina Lindheim.","author":"S\u00e6tren Gunhild Birgitte","year":"2018","unstructured":"Gunhild Birgitte S\u00e6tren, P\u00e5l Andreas Pedersen, Rolf Robertsen, P Haukeberg, Martin Rasmussen, and Catharina Lindheim. 2018. Simulator training in driver education-Potential gains and challenges. In Safety and reliability--Safe societies in a changing world. CRC Press, 2045--2049."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-023-04215-1"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1108\/ILS-04-2020-0095"},{"key":"e_1_3_2_1_53_1","volume-title":"Design of simulation-based medical education and advantages and disadvantages of in situ simulation versus off-site simulation. BMC medical education","author":"S\u00f8rensen Jette Led","year":"2017","unstructured":"Jette Led S\u00f8rensen, Doris \u00d8stergaard, Vicki LeBlanc, Bent Ottesen, Lars Konge, Peter Dieckmann, and Cees Van der Vleuten. 2017. Design of simulation-based medical education and advantages and disadvantages of in situ simulation versus off-site simulation. BMC medical education, Vol. 17 (2017), 1--9."},{"key":"e_1_3_2_1_54_1","first-page":"30","article-title":"Thinking inclusive science education from two perspectives: Inclusive pedagogy and science education","volume":"3","author":"Stinken-R\u00f6sner Lisa","year":"2020","unstructured":"Lisa Stinken-R\u00f6sner, Lisa Rott, Sarah Hundertmark, Thomas Baumann, J\u00fcrgen Menthe, Thomas Hoffmann, Andreas Nehring, and Simone Abels. 2020. Thinking inclusive science education from two perspectives: Inclusive pedagogy and science education. Research in Subject-matter Teaching and Learning (RISTAL), Vol. 3, 1 (2020), 30--45.","journal-title":"Research in Subject-matter Teaching and Learning (RISTAL)"},{"key":"e_1_3_2_1_55_1","unstructured":"PEO STRI. [n. d.]. Persistent Cyber Training Environment (PCTE) - PEO STRI. https:\/\/www.peostri.army.mil\/persistent-cyber-training-environment-pcte"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366816"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA18461"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Karen Wetzel. 2023. NICE Framework Competency Areas: Preparing a Job-Ready Cybersecurity Workforce. Technical Report NIST Internal or Interagency Report (NISTIR) 8355. National Institute of Standards and Technology. https:\/\/doi.org\/10.6028\/NIST.IR.8355","DOI":"10.6028\/NIST.IR.8355"},{"key":"e_1_3_2_1_59_1","unstructured":"Grant P Wiggins and Jay McTighe. 2005. Understanding by design. Ascd."}],"event":{"name":"SIGCSE TS 2025: The 56th ACM Technical Symposium on Computer Science Education","location":"Pittsburgh PA USA","acronym":"SIGCSE TS 2025","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701834","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641554.3701834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T06:27:02Z","timestamp":1755757622000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,12]]},"references-count":59,"alternative-id":["10.1145\/3641554.3701834","10.1145\/3641554"],"URL":"https:\/\/doi.org\/10.1145\/3641554.3701834","relation":{},"subject":[],"published":{"date-parts":[[2025,2,12]]},"assertion":[{"value":"2025-02-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}