{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:56:30Z","timestamp":1750308990213,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,9]],"date-time":"2011-03-09T00:00:00Z","timestamp":1299628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,9]]},"DOI":"10.1145\/1953163.1953175","type":"proceedings-article","created":{"date-parts":[[2011,3,15]],"date-time":"2011-03-15T16:37:50Z","timestamp":1300207070000},"page":"21-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Training students to steal"],"prefix":"10.1145","author":[{"given":"Trajce","family":"Dimkov","sequence":"first","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]},{"given":"Wolter","family":"Pieters","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]},{"given":"Pieter","family":"Hartel","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2011,3,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Insider threat study: Illicit cyber activity in the banking and finance sector","author":"Randazzo M.R.","year":"2004","unstructured":"M.R. Randazzo , M. Keeney , E. Kowalski , D. Cappelli , and A. Moore . Insider threat study: Illicit cyber activity in the banking and finance sector . U.S. Secret Service and CERT Coordination Center Software Engineering Institute , pages 1 -- 25 , 2004 . M.R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore. Insider threat study: Illicit cyber activity in the banking and finance sector. U.S. Secret Service and CERT Coordination Center Software Engineering Institute, pages 1--25, 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/S1363-4127(03)00007-4"},{"key":"e_1_3_2_1_3_1","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"Mitnick K.D.","year":"2002","unstructured":"K.D. Mitnick and W.L. Simon . The Art of Deception: Controlling the Human Element of Security . Wiley , 2002 . K.D. Mitnick and W.L. Simon. The Art of Deception: Controlling the Human Element of Security. Wiley, 2002."},{"key":"e_1_3_2_1_4_1","volume-title":"Unauthorised Access: Physical Penetration Testing For IT Security Teams","author":"Allsopp W.","year":"2009","unstructured":"W. Allsopp . Unauthorised Access: Physical Penetration Testing For IT Security Teams . Wiley , 2009 . W. Allsopp. Unauthorised Access: Physical Penetration Testing For IT Security Teams. Wiley, 2009."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"FIE'08: Frontiers in Education Conference","author":"DeLooze L.L.","year":"2008","unstructured":"L.L. DeLooze . Counter hack : Creating a context for a cyber forensics course . In FIE'08: Frontiers in Education Conference , pages 1 -- 6 , New York , 2008 . IEEE. L.L. DeLooze. Counter hack: Creating a context for a cyber forensics course. In FIE'08: Frontiers in Education Conference, pages 1--6, New York, 2008. IEEE."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1734263.1734302"},{"issue":"1","key":"e_1_3_2_1_7_1","first-page":"37","article-title":"A Social Engineering Project in a Computer Security Course","volume":"9","author":"Endicott-Popovski B.","year":"2006","unstructured":"B. Endicott-Popovski and D.L. Lockwood . A Social Engineering Project in a Computer Security Course . Academy of Information and Management Sciences Journal , 9 ( 1 ): 37 -- 44 , 2006 . B. Endicott-Popovski and D.L. Lockwood. A Social Engineering Project in a Computer Security Course. Academy of Information and Management Sciences Journal, 9(1):37--44, 2006.","journal-title":"Academy of Information and Management Sciences Journal"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1920261.1920319"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1214\/aoms\/1177705148"},{"key":"e_1_3_2_1_10_1","first-page":"45","volume-title":"USENIX Security","author":"Halderman J.A.","year":"2008","unstructured":"J.A. Halderman , S.D. Schoen , N. Heninger , W. Clarkson , W. Paul , J.A. Calandrino , A.J. Feldman , J. Appelbaum , and E.W. Felten . Lest we remember: Cold boot attacks on encryption keys . USENIX Security , pages 45 -- 60 , 2008 . J.A. Halderman, S.D. Schoen, N. Heninger, W. Clarkson, W. Paul, J.A. Calandrino, A.J. Feldman, J. Appelbaum, and E.W. Felten. Lest we remember: Cold boot attacks on encryption keys. USENIX Security, pages 45--60, 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1168812.1168825"},{"issue":"5","key":"e_1_3_2_1_12_1","first-page":"207","article-title":"A capstone exercise for a cybersecurity course","volume":"25","author":"Aman J. R.","year":"2010","unstructured":"J. R. Aman , J. E. Conway , and C. Harr . A capstone exercise for a cybersecurity course . Journal in Computing in Small Colleges , 25 ( 5 ): 207 -- 212 , 2010 . J. R. Aman, J. E. Conway, and C. Harr. A capstone exercise for a cybersecurity course. Journal in Computing in Small Colleges, 25(5):207--212, 2010.","journal-title":"Journal in Computing in Small Colleges"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/GreenCom-CPSCom.2010.165"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1231047.1231088"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1047344.1047405"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1037\/0003-066X.40.2.165"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"The Belmont report: Ethical principles and guidelines for the protection of human subjects of research","author":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.","year":"1978","unstructured":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont report: Ethical principles and guidelines for the protection of human subjects of research . pages 1 -- 18 , 1978 . National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont report: Ethical principles and guidelines for the protection of human subjects of research. pages 1--18, 1978."},{"key":"e_1_3_2_1_18_1","first-page":"87","volume-title":"Cases and Materials","author":"Finn P.R.","year":"1995","unstructured":"P.R. Finn . Research Ethics : Cases and Materials , chapter The ethics of deception in research, pages 87 -- 118 . Indiana University Press , 1995 . P.R. Finn. Research Ethics: Cases and Materials, chapter The ethics of deception in research, pages 87--118. Indiana University Press, 1995."},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Title 45: Public welfare department of health and human services. part 46: Protection of human subjects","author":"Federal Regulations Code","year":"2005","unstructured":"Code of Federal Regulations . Title 45: Public welfare department of health and human services. part 46: Protection of human subjects . pages 1 -- 12 . 2005 . Code of Federal Regulations. Title 45: Public welfare department of health and human services. part 46: Protection of human subjects. pages 1--12. 2005."}],"event":{"sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"acronym":"SIGCSE '11","name":"SIGCSE '11: The 42nd ACM Technical Symposium on Computer Science Education","location":"Dallas TX USA"},"container-title":["Proceedings of the 42nd ACM technical symposium on Computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1953163.1953175","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1953163.1953175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:16Z","timestamp":1750282876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1953163.1953175"}},"subtitle":["a practical assignment in computer security education"],"short-title":[],"issued":{"date-parts":[[2011,3,9]]},"references-count":19,"alternative-id":["10.1145\/1953163.1953175","10.1145\/1953163"],"URL":"https:\/\/doi.org\/10.1145\/1953163.1953175","relation":{},"subject":[],"published":{"date-parts":[[2011,3,9]]},"assertion":[{"value":"2011-03-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}