{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:44:52Z","timestamp":1761324292868,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-1433736 and DGE-1922169"],"award-info":[{"award-number":["DGE-1433736 and DGE-1922169"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,15]]},"DOI":"10.1145\/3341525.3387426","type":"proceedings-article","created":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T04:15:40Z","timestamp":1591157740000},"page":"82-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum"],"prefix":"10.1145","author":[{"given":"Jean R. S.","family":"Blair","sequence":"first","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Christa M.","family":"Chewar","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Rajendra K.","family":"Raj","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Edward","family":"Sobiesk","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Accessed","author":"Inc ABET","year":"2019","unstructured":"ABET , Inc . 2019 . Criteria for Accrediting Computing Programs, 2019--2020. http:\/\/www.abet.org\/wp-content\/uploads\/2018\/11\/C001--19--20-CAC-Criteria-11--24--18.pdf , Accessed : January 14, 2020. ABET, Inc. 2019. Criteria for Accrediting Computing Programs, 2019--2020. http:\/\/www.abet.org\/wp-content\/uploads\/2018\/11\/C001--19--20-CAC-Criteria-11--24--18.pdf, Accessed: January 14, 2020."},{"key":"e_1_3_2_1_2_1","volume-title":"Information Systems","author":"ACM\/AIS Task Group on Information Systems Curricula. 2010.","year":"2010","unstructured":"ACM\/AIS Task Group on Information Systems Curricula. 2010. Information Systems 2010 . Technical Report. ACM Press . https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/cc2005-march06final.pdf, Accessed November 06, 2018. ACM\/AIS Task Group on Information Systems Curricula. 2010. Information Systems 2010. Technical Report. ACM Press. https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/cc2005-march06final.pdf, Accessed November 06, 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"Computer Science Curricula","author":"ACM\/IEEE-CS Joint Task Force on Computing Curricula. 2013.","year":"2013","unstructured":"ACM\/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer Science Curricula 2013 . Technical Report. ACM Press and IEEE Computer Society Press . https:\/\/doi.org\/10.1145\/2534860 Accessed : November 14, 2017. 10.1145\/2534860 ACM\/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer Science Curricula 2013. Technical Report. ACM Press and IEEE Computer Society Press. https:\/\/doi.org\/10.1145\/2534860 Accessed: November 14, 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"Computer Engineering Curricula","author":"ACM\/IEEE-CS Task Group on Computer Engineering Curricula. 2016.","year":"2016","unstructured":"ACM\/IEEE-CS Task Group on Computer Engineering Curricula. 2016. Computer Engineering Curricula 2016 . Technical Report. ACM Press and IEEE Computer Society Press . https:\/\/doi.org\/10.1145\/3025098 https:\/\/dx.doi.org\/10.1145\/30325098, Accessed November 06, 2018. 10.1145\/3025098 ACM\/IEEE-CS Task Group on Computer Engineering Curricula. 2016. Computer Engineering Curricula 2016. Technical Report. ACM Press and IEEE Computer Society Press. https:\/\/doi.org\/10.1145\/3025098 https:\/\/dx.doi.org\/10.1145\/30325098, Accessed November 06, 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"Information Technology Curricula","author":"ACM\/IEEE-CS Task Group on Information Technology Curricula. 2017.","year":"2017","unstructured":"ACM\/IEEE-CS Task Group on Information Technology Curricula. 2017. Information Technology Curricula 2017 . Technical Report. ACM Press and IEEE Computer Society Press . https:\/\/doi.org\/10.1145\/3173161 https:\/\/dl.acm.org\/citation.cfm?id=3173161, Accessed November 06, 2018. 10.1145\/3173161 ACM\/IEEE-CS Task Group on Information Technology Curricula. 2017. Information Technology Curricula 2017. Technical Report. ACM Press and IEEE Computer Society Press. https:\/\/doi.org\/10.1145\/3173161 https:\/\/dl.acm.org\/citation.cfm?id=3173161, Accessed November 06, 2018."},{"key":"e_1_3_2_1_6_1","volume-title":"Accessed","author":"US National Security Agency.","year":"2019","unstructured":"US National Security Agency. 2019 . Academic Requirements for Designation as a CAE in Cyber Operations. https:\/\/www.nsa.gov\/Resources\/Students-Educators\/centers-academic-excellence\/cae-co-fundamental\/requirements\/#m8 , Accessed Jan 18, 2020. US National Security Agency. 2019. Academic Requirements for Designation as a CAE in Cyber Operations. https:\/\/www.nsa.gov\/Resources\/Students-Educators\/centers-academic-excellence\/cae-co-fundamental\/requirements\/#m8, Accessed Jan 18, 2020."},{"volume-title":"Proceedings. 1989 IEEE Symposium on Security and Privacy. IEEE","author":"Brewer D. F. C.","key":"e_1_3_2_1_7_1","unstructured":"D. F. C. Brewer and M. J. Nash . 1989. The Chinese Wall security policy . In Proceedings. 1989 IEEE Symposium on Security and Privacy. IEEE , Oakland, CA, 206--214. D. F. C. Brewer and M. J. Nash. 1989. The Chinese Wall security policy. In Proceedings. 1989 IEEE Symposium on Security and Privacy. IEEE, Oakland, CA, 206--214."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568195.2568210"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746407"},{"key":"e_1_3_2_1_11_1","volume-title":"Accessed","author":"Foundation OWASP","year":"2017","unstructured":"OWASP Foundation . 2017 . The Open Web Application Security Project (OWASP) Security by Design Principles. https:\/\/wiki.owasp.org\/index.php\/Security_by_Design_Principles . Accessed Jan 18, 2020. OWASP Foundation. 2017. The Open Web Application Security Project (OWASP) Security by Design Principles. https:\/\/wiki.owasp.org\/index.php\/Security_by_Design_Principles. Accessed Jan 18, 2020."},{"key":"e_1_3_2_1_12_1","volume-title":"Technical Report. ACM","author":"Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017.","year":"1845","unstructured":"Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017. Technical Report. ACM , IEEE-CS, AIS SIGSEC , and IFIP WG 11.8. https:\/\/doi.org\/10.1145\/3 1845 94 10.1145\/3184594 Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017. Technical Report. ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. https:\/\/doi.org\/10.1145\/3184594"},{"key":"e_1_3_2_1_13_1","first-page":"5","article-title":"Integrating Security across the Computer Science Curriculum","volume":"19","author":"Null Linda","year":"2004","unstructured":"Linda Null . 2004 . Integrating Security across the Computer Science Curriculum . J. Comput. Sci. Coll. , Vol. 19 , 5 (May 2004), 170--178. Linda Null. 2004. Integrating Security across the Computer Science Curriculum. J. Comput. Sci. Coll., Vol. 19, 5 (May 2004), 170--178.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_14_1","volume-title":"Software Engineering","author":"ACM\/IEEE-CS Task Group on Software Engineering Curricula. 2014.","year":"2014","unstructured":"ACM\/IEEE-CS Task Group on Software Engineering Curricula. 2014. Software Engineering 2014 . Technical Report. ACM Press and IEEE Computer Society Press . ACM\/IEEE-CS Task Group on Software Engineering Curricula. 2014. Software Engineering 2014. Technical Report. ACM Press and IEEE Computer Society Press."},{"key":"e_1_3_2_1_15_1","volume-title":"The Protection of Information in Computer Systems. In Proceedings of the IEEE","volume":"63","author":"Jerome","unstructured":"Jerome H. Saltzer and Michael .D. Schroeder. 1975 . The Protection of Information in Computer Systems. In Proceedings of the IEEE , Vol. 63 . IEEE, New York, 1278--1308. Jerome H. Saltzer and Michael .D. Schroeder. 1975. The Protection of Information in Computer Systems. In Proceedings of the IEEE, Vol. 63. IEEE, New York, 1278--1308."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766457"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2898240"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897441"},{"volume-title":"Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education","author":"Weiss Richard","key":"e_1_3_2_1_19_1","unstructured":"Richard Weiss , Ambareen Siraj , Jens Mache , Elizabeth Hawthorne , Blair Taylor , Siddharth Kaza , and Michael E. Locasto . 2017. Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only) . In Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education ( Seattle, Washington, USA) (SIGCSE '17). Association for Computing Machinery, New York, NY, USA, 732. https:\/\/doi.org\/10.1145\/3017680.3022370 10.1145\/3017680.3022370 Richard Weiss, Ambareen Siraj, Jens Mache, Elizabeth Hawthorne, Blair Taylor, Siddharth Kaza, and Michael E. Locasto. 2017. Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only). In Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education (Seattle, Washington, USA) (SIGCSE '17). Association for Computing Machinery, New York, NY, USA, 732. https:\/\/doi.org\/10.1145\/3017680.3022370"},{"volume-title":"Proceedings of the 49th ACM Technical Symposium on Computer Science Education","author":"Weiss Richard","key":"e_1_3_2_1_20_1","unstructured":"Richard Weiss , Ambareen Siraj , Jens Mache , Blair Taylor , Siddharth Kaza , Ankur Chattopadhyay , and Michael E. Locasto . 2018. Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only) . In Proceedings of the 49th ACM Technical Symposium on Computer Science Education ( Baltimore, Maryland, USA) (SIGCSE '18). Association for Computing Machinery, New York, NY, USA, 1070. https:\/\/doi.org\/10.1145\/3159450.3162195 10.1145\/3159450.3162195 Richard Weiss, Ambareen Siraj, Jens Mache, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay, and Michael E. Locasto. 2018. Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only). In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (Baltimore, Maryland, USA) (SIGCSE '18). Association for Computing Machinery, New York, NY, USA, 1070. https:\/\/doi.org\/10.1145\/3159450.3162195"},{"key":"e_1_3_2_1_21_1","volume-title":"Accessed","author":"Wolffe Josephine","year":"2016","unstructured":"Josephine Wolffe . 2016 . Why Computer Science Programs Don't Require Cybersecurity Classes. https:\/\/slate.com\/technology\/2016\/04\/why-computer-science-programs-dont-require-cybersecurity-classes.html , Accessed January 15, 2020. Josephine Wolffe. 2016. Why Computer Science Programs Don't Require Cybersecurity Classes. https:\/\/slate.com\/technology\/2016\/04\/why-computer-science-programs-dont-require-cybersecurity-classes.html, Accessed January 15, 2020."}],"event":{"name":"ITiCSE '20: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Trondheim Norway","acronym":"ITiCSE '20"},"container-title":["Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341525.3387426","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341525.3387426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:28Z","timestamp":1750200088000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341525.3387426"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,15]]},"references-count":20,"alternative-id":["10.1145\/3341525.3387426","10.1145\/3341525"],"URL":"https:\/\/doi.org\/10.1145\/3341525.3387426","relation":{},"subject":[],"published":{"date-parts":[[2020,6,15]]},"assertion":[{"value":"2020-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}