{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:01:24Z","timestamp":1725886884892},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319585529"},{"type":"electronic","value":"9783319585536"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58553-6_4","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:04:33Z","timestamp":1493813073000},"page":"39-48","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pathways in Cybersecurity: Translating Theory into Practice"],"prefix":"10.1007","author":[{"given":"Susanne","family":"Wetzel","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"4_CR1","unstructured":"Academic Catalog Stevens Institute of Technology\u2013B.S. in Cybersecurity. https:\/\/www.stevens.edu\/academics\/academic-catalog"},{"key":"4_CR2","unstructured":"Academic Catalog Union County College\u2013A.S. in Computer Science\/Engineering. http:\/\/onlinecatalog.ucc.edu\/preview_program.php?catoid=2&poid=381&returnto=128"},{"key":"4_CR3","unstructured":"Centers of Academic Excellence in Cyber Defense 2-Year Education. https:\/\/www.iad.gov\/NIETP\/reports\/cae_designated_institutions.cfm"},{"key":"4_CR4","unstructured":"Community colleges are new gateways to hot cybersecurity jobs. https:\/\/www.edsurge.com\/news\/2016-04-28-community-colleges-are-new-gateways-to-hot-cybersecurity-jobs"},{"key":"4_CR5","unstructured":"CSSIA National Center For Systems Security and Information Assurance Innovation in Cyber Security Education. http:\/\/www.cssia.org\/"},{"key":"4_CR6","unstructured":"Cyber-security skills shortage leaves companies vulnerable. http:\/\/www.informationweek.com\/strategic-cio\/security-and-risk-strategy\/cyber-security-skills-shortage-leaves-companies-vulnerable\/"},{"key":"4_CR7","unstructured":"CyberCorps$$^{\\textregistered }$$ Scholarship for Service (SFS) Defending America\u2019s Cyberspace, Program Solicitation National Science Foundation NSF 15-584. https:\/\/www.nsf.gov\/pubs\/2015\/nsf15584\/nsf15584.htm"},{"key":"4_CR8","unstructured":"Cyberwatch West. http:\/\/www.cyberwatchwest.org\/"},{"key":"4_CR9","unstructured":"Global study reveals businesses and countries vulnerable due to shortage of cybersecurity talent. https:\/\/newsroom.intel.com\/news-releases\/global-study-reveals-businesses-countries-vulnerable-due-shortage-cybersecurity-talent\/"},{"key":"4_CR10","unstructured":"National Cyberwatch Center. https:\/\/www.nationalcyberwatch.org\/"},{"key":"4_CR11","unstructured":"One million cybersecurity job openings in 2016. http:\/\/www.forbes.com\/sites\/stevemorgan\/2016\/01\/02\/one-million-cybersecurity-job-openings-in-2016\/"},{"key":"4_CR12","unstructured":"Protecting information-the role of community colleges in cybersecurity education. https:\/\/www.nationalcyberwatch.org\/ncw-content\/uploads\/2016\/03\/Workshop_Rpt-Role_of_CCs_in_Cyber_Ed-2002.pdf"},{"key":"4_CR13","unstructured":"Public Law 113\u2013274 - cybersecurity enhancement act of 2014. https:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-113publ274\/content-detail.html"},{"key":"4_CR14","unstructured":"The C5 project-catalyzing computing and cybersecurity in community colleges. http:\/\/www.c5colleges.org\/"},{"key":"4_CR15","unstructured":"U.S. Office of Personnel Management\u2014CyberCorps$$^{\\textregistered }$$ Scholarship for Service. http:\/\/www.sfs.opm.gov"},{"key":"4_CR16","unstructured":"Virginia\u2019s 21st century career pathway cybersecurity. http:\/\/www.doe.virginia.gov\/administrators\/superintendents_memos\/2016\/040-16a.pdf"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Joint Task Force on Computing Curricula Association for Computing Machinery (ACM) & IEEE Computer Society: Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. ACM, New York (2013)","DOI":"10.1145\/2534860"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"P\u00e9rez, L.C., Cooper, S., Hawthorne, E.K., Wetzel, S., Brynielsson, J., G\u00f6kce, A.G., Impagliazzo, J., Khmelevsky, Y., Klee, K., Leary, M., Philips, A., Pohlmann, N., Taylor, B., Upadhyaya, S.: Information assurance education in two- and four-year institutions. In: Proceedings of the 16th Annual Conference Reports on Innovation and Technology in Computer Science Education - Working Group Reports, pp. 39\u201353, NY, USA. ACM, New York (2011)","DOI":"10.1145\/2078856.2078860"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security Education for a Global Digital Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58553-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:10:54Z","timestamp":1621642254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58553-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319585529","9783319585536"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58553-6_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP World Conference on Information Security Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise-ifip2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifiptc11.org\/wg118-events\/wise10","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}