{"id":"https://openalex.org/W4294903903","doi":"https://doi.org/10.1145/3537674.3555787","title":"Virtual Cybersecurity Camps: Lessons Learned","display_name":"Virtual Cybersecurity Camps: Lessons Learned","publication_year":2022,"publication_date":"2022-09-07","ids":{"openalex":"https://openalex.org/W4294903903","doi":"https://doi.org/10.1145/3537674.3555787"},"language":"en","primary_location":{"id":"doi:10.1145/3537674.3555787","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3537674.3555787","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23rd Annual Conference on Information Technology Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102725128","display_name":"Marc Dupuis","orcid":"https://orcid.org/0000-0002-5303-2511"},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Marc Dupuis","raw_affiliation_strings":["Division of Computing and Software Systems, University of Washington, USA"],"affiliations":[{"raw_affiliation_string":"Division of Computing and Software Systems, University of Washington, USA","institution_ids":["https://openalex.org/I201448701"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060654239","display_name":"Joshua Bee","orcid":null},"institutions":[{"id":"https://openalex.org/I314562951","display_name":"Columbia Basin College","ror":"https://ror.org/02394tn51","country_code":"US","type":"education","lineage":["https://openalex.org/I314562951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joshua Bee","raw_affiliation_strings":["Columbia Basin College, USA"],"affiliations":[{"raw_affiliation_string":"Columbia Basin College, USA","institution_ids":["https://openalex.org/I314562951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046338214","display_name":"Ann Wright-Mockler","orcid":null},"institutions":[{"id":"https://openalex.org/I142606810","display_name":"Pacific Northwest National Laboratory","ror":"https://ror.org/05h992307","country_code":"US","type":"facility","lineage":["https://openalex.org/I1325736334","https://openalex.org/I1330989302","https://openalex.org/I142606810","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ann Wright-Mockler","raw_affiliation_strings":["Pacific Northwest National Laboratory, USA"],"affiliations":[{"raw_affiliation_string":"Pacific Northwest National Laboratory, USA","institution_ids":["https://openalex.org/I142606810"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102725128"],"corresponding_institution_ids":["https://openalex.org/I201448701"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09994944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"130","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6906558871269226},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4884418547153473},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4206109941005707}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6906558871269226},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4884418547153473},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4206109941005707}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3537674.3555787","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3537674.3555787","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 23rd Annual Conference on Information Technology Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/3","display_name":"Good health and well-being","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2341358235","https://openalex.org/W2728677437","https://openalex.org/W2745388631","https://openalex.org/W3091949768","https://openalex.org/W3092160044","https://openalex.org/W3094617583","https://openalex.org/W3196859328"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Cybersecurity":[0],"camps":[1,61],"provide":[2],"participants":[3],"with":[4],"an":[5,35],"opportunity":[6,36],"to":[7,37,54,64,79,82,98,107],"learn":[8],"about":[9],"cybersecurity":[10,42,100],"in":[11,87],"a":[12,41,55,84,99,108],"fun":[13],"and":[14,33,51,73],"safe":[15],"environment.":[16],"Traditionally,":[17],"such":[18,60],"camps,":[19,48],"like":[20],"many":[21],"others,":[22,52],"are":[23],"held":[24],"in-person.":[25],"However,":[26],"the":[27,88,92],"COVID-19":[28],"pandemic":[29],"created":[30],"unique":[31],"challenges":[32],"also":[34],"counter":[38],"those":[39],"challenges\u2014holding":[40],"camp":[43,86],"virtually.":[44],"While":[45],"countless":[46],"other":[47],"both":[49],"cybersecurity-related":[50],"moved":[53],"virtual":[56,85],"environment":[57],"so":[58],"that":[59,75],"could":[62],"continue":[63],"be":[65,77,96,105],"held,":[66],"this":[67],"paper":[68],"presents":[69],"some":[70],"lessons":[71,93],"learned":[72,94],"suggestions":[74],"may":[76,95],"helpful":[78],"others":[80],"deciding":[81],"hold":[83],"future.":[89],"Some":[90],"of":[91],"specific":[97],"camp,":[101],"but":[102],"most":[103],"would":[104],"applicable":[106],"broad":[109],"audience.":[110]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
