{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:08:55Z","timestamp":1744207735330,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cyconus.2016.7836614","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T20:39:40Z","timestamp":1486499980000},"page":"1-6","source":"Crossref","is-referenced-by-count":17,"title":["Cyber workforce development using a behavioral cybersecurity paradigm"],"prefix":"10.1109","author":[{"given":"Bruce D.","family":"Caulkins","sequence":"first","affiliation":[]},{"given":"Karla","family":"Badillo-Urquiola","sequence":"additional","affiliation":[]},{"given":"Patricia","family":"Bockelman","sequence":"additional","affiliation":[]},{"given":"Rebecca","family":"Leis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Cyber Space Engineer Learning Lab: Facilitators Guide to Course Methodology and Innovation","year":"2013","author":"mcdade-morrison","key":"ref10"},{"key":"ref11","article-title":"Modeling and Simulation Education for Behavioral Cybersecurity","author":"leis","year":"2016","journal-title":"Interservice\/Industry Training Simulation and Education Conference (I\/ITSEC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1177\/1541931214581064"},{"year":"2015","key":"ref13","article-title":"The Department of Defense Cyber Strategy"},{"year":"2016","key":"ref14","article-title":"Graduate Catalog, M&S of Behavioral Cybersecurity"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"article-title":"FBI warns of cyber threat to electric grid","year":"2016","author":"gertz","key":"ref3"},{"article-title":"One Million Cybersecurity Job Openings in 2016. Forbes","year":"2016","author":"morgan","key":"ref6"},{"article-title":"Could we see an influx of cyber security job roles in 2016","year":"2016","author":"freeman","key":"ref5"},{"year":"2013","key":"ref8","article-title":"The National Cybersecurity Workforce Framework (NCWF)"},{"year":"2016","key":"ref7","article-title":"Most Common Degree Programs Associated with Cybersecurity Careers"},{"key":"ref2","article-title":"Inadvertent’ cyber breach hits 44,000 FDIC customers","volume":"2016","author":"davidson","year":"2016","journal-title":"ed Washington Post online Washington Post"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-013-0665-z"},{"year":"2016","key":"ref9","article-title":"Bureau of Labor Statistics Occupational Outlook Handbook"}],"event":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","start":{"date-parts":[[2016,10,21]]},"location":"Washington, DC, USA","end":{"date-parts":[[2016,10,23]]}},"container-title":["2016 International Conference on Cyber Conflict (CyCon U.S.)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7836073\/7836602\/07836614.pdf?arnumber=7836614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T20:46:53Z","timestamp":1513198013000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7836614\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cyconus.2016.7836614","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}