{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:35Z","timestamp":1750220855407,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T00:00:00Z","timestamp":1574294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,21]]},"DOI":"10.1145\/3364510.3366158","type":"proceedings-article","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T13:35:33Z","timestamp":1575898533000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Learning Activities and Outcomes of an Information Security Course"],"prefix":"10.1145","author":[{"given":"Timo","family":"Hynninen","sequence":"first","affiliation":[{"name":"South-Eastern Finland University of Applied Sciences, Mikkeli, Finland"}]}],"member":"320","published-online":{"date-parts":[[2019,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. John the Ripper password cracker. https:\/\/www.openwall.com\/john\/  [n. d.]. John the Ripper password cracker. https:\/\/www.openwall.com\/john\/"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. MalDuino. https:\/\/malduino.com\/  [n. d.]. MalDuino. https:\/\/malduino.com\/"},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Ophcrack. https:\/\/ophcrack.sourceforge.io\/  [n. d.]. Ophcrack. https:\/\/ophcrack.sourceforge.io\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1940941.1940943"},{"key":"e_1_3_2_1_5_1","unstructured":"Microsoft Official Academic Course. 2011. Exam 98-367 Security Fundamentals. Wiley.  Microsoft Official Academic Course. 2011. Exam 98-367 Security Fundamentals. Wiley."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3144687.3144710"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1940941.1940946"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656450.2656479"},{"volume-title":"Proceeding of the 44th ACM technical symposium on Computer science education. ACM, 347--352.","author":"Pournaghshband Vahab","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Lassi Riihel\u00e4. 2019. Teaching information security: A systematic mapping study. Master's thesis. LUT University Finland.  Lassi Riihel\u00e4. 2019. Teaching information security: A systematic mapping study. Master's thesis. LUT University Finland."},{"key":"e_1_3_2_1_11_1","unstructured":"Bruce Schneier. 2011. Secrets and lies: digital security in a networked world. John Wiley & Sons.  Bruce Schneier. 2011. Secrets and lies: digital security in a networked world. John Wiley & Sons."},{"key":"e_1_3_2_1_12_1","unstructured":"The Joint Task Force on Computing Curricula. 2015. Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering. Technical Report. New York NY USA.  The Joint Task Force on Computing Curricula. 2015. Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering. Technical Report. New York NY USA."},{"key":"e_1_3_2_1_13_1","unstructured":"The Joint Task Force on Computing Curricula. 2017. Curriculum Guidelines for Baccalaureate Degree Programs in Information Technology. Technical Report. New York NY USA.  The Joint Task Force on Computing Curricula. 2017. Curriculum Guidelines for Baccalaureate Degree Programs in Information Technology. Technical Report. New York NY USA."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656450.2656462"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1940941.1940947"}],"event":{"name":"Koli Calling '19: 19th Koli Calling International Conference on Computing Education Research","sponsor":["University of Helsinki","Univ. Eastern Finland University of Eastern Finland","The University of Adelaide, Australia","SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Koli Finland","acronym":"Koli Calling '19"},"container-title":["Proceedings of the 19th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364510.3366158","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364510.3366158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:23Z","timestamp":1750202603000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364510.3366158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,21]]},"references-count":15,"alternative-id":["10.1145\/3364510.3366158","10.1145\/3364510"],"URL":"https:\/\/doi.org\/10.1145\/3364510.3366158","relation":{},"subject":[],"published":{"date-parts":[[2019,11,21]]},"assertion":[{"value":"2019-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}