{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T14:22:59Z","timestamp":1756995779972,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:00:00Z","timestamp":1733356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["2216492"],"award-info":[{"award-number":["2216492"]}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2216485"],"award-info":[{"award-number":["2216485"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,5]]},"DOI":"10.1145\/3649409.3691088","type":"proceedings-article","created":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T18:22:09Z","timestamp":1733163729000},"page":"325-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Developing a Modular Cloud-Based Kubernetes Powered Framework for Scalable Cybersecurity Education"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8660-8902","authenticated-orcid":false,"given":"Ryder","family":"Selikow","sequence":"first","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0125-6312","authenticated-orcid":false,"given":"Nate","family":"Berol","sequence":"additional","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2452-2878","authenticated-orcid":false,"given":"Jack","family":"Cook","sequence":"additional","affiliation":[{"name":"The Evergreen State College, Olympia, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6610-5197","authenticated-orcid":false,"given":"Richard","family":"Weiss","sequence":"additional","affiliation":[{"name":"The Evergreen State College, Olympia, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2927-7436","authenticated-orcid":false,"given":"Jens","family":"Mache","sequence":"additional","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"10","article-title":"An authoring process to construct docker containers to help instructors develop cybersecurity exercises","volume":"37","author":"Cook Jack","year":"2022","unstructured":"Jack Cook, Richard Weiss, Jens Mache, Carlos Garc\u00eda Mor\u00e1n, and Justin Wang. 2022. An authoring process to construct docker containers to help instructors develop cybersecurity exercises. J. Comput. Sci. Coll. 37, 10 (apr 2022), 37--47.","journal-title":"J. Comput. Sci. Coll."},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"117","article-title":"Enhancing Cybersecurity Education Through Interactive Learning Environments","volume":"15","author":"Jones A.","year":"2020","unstructured":"A. Jones, M. Vagle, and L. Brunner. 2020. Enhancing Cybersecurity Education Through Interactive Learning Environments. Journal of Information Security Education 15(3), 117--134.","journal-title":"Journal of Information Security Education"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/3626252.3630836"},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"200","article-title":"The Role of Gamification in Cybersecurity Education","volume":"6","author":"Smith J.","year":"2021","unstructured":"J. Smith and P. Doe. 2021. The Role of Gamification in Cybersecurity Education. International Journal of Cyber Education 6(2), 200--215.","journal-title":"International Journal of Cyber Education"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"233","article-title":"Bridging the Cybersecurity Skills Gap: A Comprehensive Review of Effective Education and Training Practices","volume":"4","author":"Thompson R.","year":"2018","unstructured":"R. Thompson and M. Lee. 2018. Bridging the Cybersecurity Skills Gap: A Comprehensive Review of Effective Education and Training Practices. Cybersecurity Workforce Journal 4(4), 233--248.","journal-title":"Cybersecurity Workforce Journal"},{"unstructured":"R. Weiss F. Turbak J. Mache and M. Locasto. 2017. Cybersecurity Education and Assessment in EDURange. IEEE Security & Privacy May\/June (2017). https: \/\/www.computer.org\/csdl\/mags\/sp\/2017\/03\/msp2017030090-abs.html","key":"e_1_3_2_1_6_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"SIGCSE Virtual 2024","name":"SIGCSE Virtual 2024: 1st ACM Virtual Global Computing Education Conference","location":"Virtual Event NC USA"},"container-title":["Proceedings of the 2024 on ACM Virtual Global Computing Education Conference V. 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649409.3691088","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649409.3691088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:21:49Z","timestamp":1755915709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649409.3691088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,5]]},"references-count":6,"alternative-id":["10.1145\/3649409.3691088","10.1145\/3649409"],"URL":"https:\/\/doi.org\/10.1145\/3649409.3691088","relation":{},"subject":[],"published":{"date-parts":[[2024,12,5]]},"assertion":[{"value":"2024-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}