{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:03Z","timestamp":1750220883302,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340336","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Learning Software Security in Context"],"prefix":"10.1145","author":[{"given":"Shao-Fang","family":"Wen","sequence":"first","affiliation":[{"name":"Norwegian University of Science and Technology, Gj\u00f8vik, Norway"}]},{"given":"Basel","family":"Katt","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology, Gj\u00f8vik, Norway"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.62"},{"volume-title":"Building secure software: how to avoid security problems the right way\". volume: Pearson Education","year":"2001","author":"Viega J.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.45"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1991.0032"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2000.854063"},{"volume-title":"Software security: building security","year":"2006","author":"McGraw G.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9375-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.10.001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2017.8250205"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368130"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.103"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721933.1721934"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869746.1869747"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2401796.2401823"},{"key":"e_1_3_2_1_15_1","article-title":"Teaching computing for everyone","volume":"21","author":"Guzdial M.","year":"2006","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_3_2_1_16_1","article-title":"Towards a Context-Based Approach for Software Security Learning","volume":"15","author":"Wen S.","year":"2019","journal-title":"Journal of Applied Security Research"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319008.3319017"},{"volume-title":"Contextual Teaching and Learning: Preparing Students for the New Economy. The Highlight Zone: Research@ Work No. 5","year":"2001","author":"Berns R.G.","key":"e_1_3_2_1_18_1"},{"volume-title":"Fifth Pan-Commonwealth Forum on Open Learning.","year":"2008","author":"Naidu S.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","first-page":"2848","volume-title":"Primary contextualization of science learning through immersion in content-rich settings","author":"Giamellaro M.J.I.J.o.S.E.","year":"2014"},{"key":"e_1_3_2_1_21_1","first-page":"347","volume-title":"Bringing science to life: A synthesis of the research evidence on the effects of context-based and STS approaches to science teaching","author":"Bennett J.","year":"2007"},{"key":"e_1_3_2_1_22_1","first-page":"1041","volume-title":"Chemie im Kontext\": A symbiotic implementation of a context-based teaching and learning approach","author":"Parchmann I.","year":"2006"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74155-8_6"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","DOI":"10.1002\/tea.20203","article-title":"Contextualizing instruction: Leveraging students' prior knowledge and experiences to foster understanding of middle school science","volume":"45","author":"Rivet A.E.","year":"2008","journal-title":"Journal of Research in Science Teaching: The Official Journal of the National Association for Research in Science Teaching"},{"volume-title":"ASEE 2014 Zo. 1 Conf.","year":"2014","author":"Davtyan R.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","first-page":"349","volume-title":"On looking into the black box: Prospects and limits in the search for mental models\". Psychological bulletin","author":"Rouse W.B.","year":"1986"},{"key":"e_1_3_2_1_27_1","first-page":"255","volume-title":"The role of a mental model in learning to operate a device","author":"Kieras D.E.","year":"1984"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327809jls1401_4"},{"volume-title":"Proceedings of the Northeastern Educational Research Association (NERA)","year":"2009","author":"Kamina P.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1995.1081"},{"key":"e_1_3_2_1_31_1","first-page":"89","volume-title":"WebProt\u00e9g\u00e9: A collaborative ontology editor","author":"Tudorache T.","year":"2013"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/23796529.1995.11687714"},{"volume-title":"https:\/\/www.owasp.org\/index.php\/Top_10-2017_Top_10. (Accessed on","year":"2019","author":"Top 0","key":"e_1_3_2_1_33_1"},{"volume-title":"Psychology at work: An introduction to industrial and organizational psychology\". volume: Brown & Benchmark\/Wm. C. Brown Publ","year":"1993","author":"Berry L.M.","key":"e_1_3_2_1_34_1"},{"volume-title":"https:\/\/github.com\/search?q=type:user&type=Users. (Accessed on","year":"2019","author":"GitHub","key":"e_1_3_2_1_35_1"},{"volume-title":"https:\/\/github.com\/blog\/2345-celebrating-nine-years-of-github-with-an-anniversary-sale. (Accessed on","year":"2019","author":"GitHub","key":"e_1_3_2_1_36_1"},{"volume-title":"Psychometric theory","year":"1978","author":"Numally J.C.","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","first-page":"39","volume-title":"Responding to thechallenges of developmental education, issue","author":"Kozeracki C.A.","year":"2005"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/10668920600859657"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.88.4.715"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178158.3178202"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340336","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340336"}},"subtitle":["An Evaluation in Open Source Software Development Environment"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":41,"alternative-id":["10.1145\/3339252.3340336","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340336","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}