{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:21:22Z","timestamp":1730323282624,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T00:00:00Z","timestamp":1646438400000},"content-version":"vor","delay-in-days":367,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1548315"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,3]]},"DOI":"10.1145\/3408877.3432471","type":"proceedings-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T18:45:27Z","timestamp":1614969927000},"page":"597-603","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Piloting the Air Force JROTC Cyber Academy for High School Students"],"prefix":"10.1145","author":[{"given":"Monica M.","family":"McGill","sequence":"first","affiliation":[{"name":"CSEdResearch.org & Knox College, Peoria, IL, USA"}]},{"given":"Sarah B.","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Southern Mississippi, Hattiesburg, MS, USA"}]},{"given":"Litany","family":"Lineberry","sequence":"additional","affiliation":[{"name":"Mississippi State University, Mississippi State, MS, USA"}]},{"given":"John","family":"Sands","sequence":"additional","affiliation":[{"name":"Moraine Valley Community College, Palos Hills, IL, USA"}]},{"given":"Leigh Ann","family":"DeLyser","sequence":"additional","affiliation":[{"name":"CSforALL, New York City, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"L.C. Amo M. Zhuo S. Wilde D. Murray K. Cleary C. Amo S. Upadhyaya and H.R. Roa. 2015. Cybersecurity Engagement and Self-Efficacy Scale. https:\/\/sites.google.com\/site\/amoceses\/home L.C. Amo M. Zhuo S. Wilde D. Murray K. Cleary C. Amo S. Upadhyaya and H.R. Roa. 2015. Cybersecurity Engagement and Self-Efficacy Scale. https:\/\/sites.google.com\/site\/amoceses\/home"},{"key":"e_1_3_2_1_2_1","unstructured":"C(ISC)\u00b2. 2017. Global Cybersecurity Workforce Shortage to Reach 1.8 Million as Threats Loom Larger and Stakes Rise Higher. https:\/\/www.isc2.org\/News-and-Events\/Press-Room\/Posts\/2017\/06\/07\/2017-06-07-Workforce-Shortage C(ISC)\u00b2. 2017. Global Cybersecurity Workforce Shortage to Reach 1.8 Million as Threats Loom Larger and Stakes Rise Higher. https:\/\/www.isc2.org\/News-and-Events\/Press-Room\/Posts\/2017\/06\/07\/2017-06-07-Workforce-Shortage"},{"key":"e_1_3_2_1_3_1","unstructured":"CompTIA. 2020. CompTIA. https:\/\/www.comptia.org\/landing\/aplus\/index.html?msclkid=9bab3657de521ad2078f691271d4a090&utm_source=bing&utm_medium=cpc&utm_campaign=A%2B%20Brand-Only%20_Tablet&utm_term=%2Bcomptia%20%2Ba%2B&utm_content=A%2B%20Brand-Only CompTIA. 2020. CompTIA. https:\/\/www.comptia.org\/landing\/aplus\/index.html?msclkid=9bab3657de521ad2078f691271d4a090&utm_source=bing&utm_medium=cpc&utm_campaign=A%2B%20Brand-Only%20_Tablet&utm_term=%2Bcomptia%20%2Ba%2B&utm_content=A%2B%20Brand-Only"},{"key":"e_1_3_2_1_4_1","unstructured":"CSforAll. 2020a. JROTC-CS. https:\/\/www.csforall.org\/projects_and_programs\/jrotc\/ CSforAll. 2020a. JROTC-CS. https:\/\/www.csforall.org\/projects_and_programs\/jrotc\/"},{"key":"e_1_3_2_1_5_1","unstructured":"CSforAll. 2020b. SCRIPT Program. https:\/\/www.csforall.org\/projects_and_programs\/script\/ CSforAll. 2020b. SCRIPT Program. https:\/\/www.csforall.org\/projects_and_programs\/script\/"},{"key":"e_1_3_2_1_6_1","article-title":"Bulldog Bytes","volume":"2018","author":"Lineberry Litany","year":"2018","unstructured":"Litany Lineberry , Sarah Lee , Jessica Ivy , and Heather Bostick . 2018 . Bulldog Bytes : Engaging Elementary Girls with Computer Science and Cybersecurity. Journal of Transactions on Techniques in STEM Education. 2018 ( January-September ); 3 (2): 76--81. ISSN: 2381--649X. Transactions on techniques in STEM education, Vol. 3, 2 (2018). Litany Lineberry, Sarah Lee, Jessica Ivy, and Heather Bostick. 2018. Bulldog Bytes: Engaging Elementary Girls with Computer Science and Cybersecurity. Journal of Transactions on Techniques in STEM Education. 2018 (January-September); 3 (2): 76--81. ISSN: 2381--649X. Transactions on techniques in STEM education, Vol. 3, 2 (2018).","journal-title":"Journal of Transactions on Techniques in STEM Education."},{"key":"e_1_3_2_1_7_1","unstructured":"National Center for Women & Information Technology. 2020a. Counselors for Computing (C4C). https:\/\/www.ncwit.org\/project\/counselors-computing-c4c National Center for Women & Information Technology. 2020a. Counselors for Computing (C4C). https:\/\/www.ncwit.org\/project\/counselors-computing-c4c"},{"key":"e_1_3_2_1_8_1","unstructured":"National Center for Women & Information Technology. 2020b. Military Pathway to IT and Computing Careers. https:\/\/www.ncwit.org\/resources\/military-pathway-it-and-computing-careers\/military-pathway-it-and-computing-careers National Center for Women & Information Technology. 2020b. Military Pathway to IT and Computing Careers. https:\/\/www.ncwit.org\/resources\/military-pathway-it-and-computing-careers\/military-pathway-it-and-computing-careers"},{"key":"e_1_3_2_1_9_1","unstructured":"National Institute of Standards and Technology. 2017. NIST Special Publication 800--181: The NICECybersecurity Workforce Framework. https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/nice-cybersecurity-workforce-framework-resource-center\/current National Institute of Standards and Technology. 2017. NIST Special Publication 800--181: The NICECybersecurity Workforce Framework. https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/nice-cybersecurity-workforce-framework-resource-center\/current"},{"key":"e_1_3_2_1_10_1","unstructured":"Michael Qaissaunee Jaime Mahoney and Malcolm Johnstone. 2020. E-Mate 2.0 Cybersecurity. https:\/\/mirrorlearning.org\/emate2\/web\/ematecybersec.html Michael Qaissaunee Jaime Mahoney and Malcolm Johnstone. 2020. E-Mate 2.0 Cybersecurity. https:\/\/mirrorlearning.org\/emate2\/web\/ematecybersec.html"},{"volume-title":"2020 a","author":"United States Air Force.","key":"e_1_3_2_1_11_1","unstructured":"United States Air Force. 2020 a . Air Force Association's CyberPatriot : The National Youth Cyber Education Program. https:\/\/www.uscyberpatriot.org\/ United States Air Force. 2020 a. Air Force Association's CyberPatriot: The National Youth Cyber Education Program. https:\/\/www.uscyberpatriot.org\/"},{"volume-title":"2020 b","author":"United States Air Force.","key":"e_1_3_2_1_12_1","unstructured":"United States Air Force. 2020 b . Air University (AU) . https:\/\/www.airuniversity.af.edu\/Holm-Center\/AFJROTC\/Flight-Academy\/ United States Air Force. 2020 b. Air University (AU). https:\/\/www.airuniversity.af.edu\/Holm-Center\/AFJROTC\/Flight-Academy\/"},{"key":"e_1_3_2_1_13_1","unstructured":"U.S. Office of Personnel Management. 2020. Start your cybersecurity career with the U.S. government. https:\/\/www.sfs.opm.gov\/ U.S. Office of Personnel Management. 2020. Start your cybersecurity career with the U.S. government. https:\/\/www.sfs.opm.gov\/"}],"event":{"name":"SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Virtual Event USA","acronym":"SIGCSE '21"},"container-title":["Proceedings of the 52nd ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3408877.3432471","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3408877.3432471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T08:12:37Z","timestamp":1673424757000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408877.3432471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,3]]},"references-count":13,"alternative-id":["10.1145\/3408877.3432471","10.1145\/3408877"],"URL":"https:\/\/doi.org\/10.1145\/3408877.3432471","relation":{},"subject":[],"published":{"date-parts":[[2021,3,3]]},"assertion":[{"value":"2021-03-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}