{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:23Z","timestamp":1750306523096,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T00:00:00Z","timestamp":1424736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF-DUE","award":["#1044745"],"award-info":[{"award-number":["#1044745"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,2,24]]},"DOI":"10.1145\/2676723.2677280","type":"proceedings-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T14:09:31Z","timestamp":1424786971000},"page":"60-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Embedding Secure Coding Instruction into the IDE"],"prefix":"10.1145","author":[{"given":"Michael","family":"Whitney","sequence":"first","affiliation":[{"name":"University of North Carolina Charlotte, Charlotte, NC, USA"}]},{"given":"Heather","family":"Lipford-Richter","sequence":"additional","affiliation":[{"name":"University of North Carolina Charlotte, Charlotte, NC, USA"}]},{"given":"Bill","family":"Chu","sequence":"additional","affiliation":[{"name":"University of North Carolina Charlotte, Charlotte, NC, USA"}]},{"given":"Jun","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of North Carolina Charlotte, Charlotte, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/961511.961568"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.133"},{"key":"e_1_3_2_1_3_1","volume-title":"ProQuest","author":"Brown Leonard B. J.","year":"2007","unstructured":"B. J. Brown Leonard . Integrative learning as a developmental process: A grounded theory of college students' experiences in integrative studies . ProQuest , 2007 . B. J. Brown Leonard. Integrative learning as a developmental process: A grounded theory of college students' experiences in integrative studies. ProQuest, 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193212"},{"key":"e_1_3_2_1_6_1","unstructured":"National Security Agency (NSA) Central Security Service (CSS). Centers of academic excellence institutions. http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/institutions.shtml 2013.  National Security Agency (NSA) Central Security Service (CSS). Centers of academic excellence institutions. http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/institutions.shtml 2013."},{"key":"e_1_3_2_1_7_1","first-page":"529","volume-title":"Professionalizing interdisciplinarity: Literature review and research agenda. Interdisciplinarity: Essays from the literature","author":"Newell W. H.","year":"1998","unstructured":"W. H. Newell . Professionalizing interdisciplinarity: Literature review and research agenda. Interdisciplinarity: Essays from the literature , pages 529 -- 563 , 1998 . W. H. Newell. Professionalizing interdisciplinarity: Literature review and research agenda. Interdisciplinarity: Essays from the literature, pages 529--563, 1998."},{"key":"e_1_3_2_1_8_1","volume-title":"OWASP enterprise security api. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Enterprise_Security_API","author":"Foundation WASP","year":"2013","unstructured":"O WASP Foundation . OWASP enterprise security api. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Enterprise_Security_API , 2013 . OWASP Foundation. OWASP enterprise security api. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Enterprise_Security_API, 2013."},{"key":"e_1_3_2_1_9_1","volume-title":"Jun","author":"Foundation WASP","year":"2013","unstructured":"O WASP Foundation . Top ten project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project , Jun 2013 . OWASP Foundation. Top ten project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project, Jun 2013."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the American Society for Engineering Education Annual Conference and Exhibition, ASEE","author":"Perrone L. F.","year":"2005","unstructured":"L. F. Perrone , M. Aburdene , and X. Meng . Approaches to undergraduate instruction in computer security . In Proceedings of the American Society for Engineering Education Annual Conference and Exhibition, ASEE , 2005 . L. F. Perrone, M. Aburdene, and X. Meng. Approaches to undergraduate instruction in computer security. In Proceedings of the American Society for Engineering Education Annual Conference and Exhibition, ASEE, 2005."},{"key":"e_1_3_2_1_11_1","first-page":"4","volume-title":"National Colloquium for Information Systems Security Education","author":"Taylor B.","year":"2007","unstructured":"B. Taylor and S. Azadegan . Using security checklists and scorecards in cs curriculum . In National Colloquium for Information Systems Security Education , pages 4 -- 9 . Citeseer , 2007 . B. Taylor and S. Azadegan. Using security checklists and scorecards in cs curriculum. In National Colloquium for Information Systems Security Education, pages 4--9. Citeseer, 2007."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352246"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/331795.331822"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076770"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445396"}],"event":{"name":"SIGCSE '15: The 46th ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Kansas City Missouri USA","acronym":"SIGCSE '15"},"container-title":["Proceedings of the 46th ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676723.2677280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2676723.2677280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:00Z","timestamp":1750227120000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676723.2677280"}},"subtitle":["A Field Study in an Advanced CS Course"],"short-title":[],"issued":{"date-parts":[[2015,2,24]]},"references-count":14,"alternative-id":["10.1145\/2676723.2677280","10.1145\/2676723"],"URL":"https:\/\/doi.org\/10.1145\/2676723.2677280","relation":{},"subject":[],"published":{"date-parts":[[2015,2,24]]},"assertion":[{"value":"2015-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}