{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T07:31:51Z","timestamp":1751009511314,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:00:00Z","timestamp":1657152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bayerisches Staatsministerium f\u00fcr Wissenschaft und Kunst","award":["AZ: 16-1541"],"award-info":[{"award-number":["AZ: 16-1541"]}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["01PL17022F"],"award-info":[{"award-number":["01PL17022F"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,7]]},"DOI":"10.1145\/3502718.3524823","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T10:28:30Z","timestamp":1657189710000},"page":"491-497","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Using or Misusing?"],"prefix":"10.1145","author":[{"given":"Sabrina","family":"Jahn","sequence":"first","affiliation":[{"name":"OTH Regensburg, Regensburg, Germany"}]},{"given":"Nicolas","family":"Kaul","sequence":"additional","affiliation":[{"name":"OTH Regensburg, Regensburg, Germany"}]},{"given":"J\u00fcrgen","family":"Mottok","sequence":"additional","affiliation":[{"name":"OTH Regensburg, Regensburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Collis","author":"Biggs John B.","year":"1981","unstructured":"John B. Biggs and Kevin F . Collis . 1981 . Evaluating the Quality of Learning: The SOLO Taxonomy (Structure of the Observed Learning Outcome) (1st ed.). Academic Press . 260 pages. John B. Biggs and Kevin F. Collis. 1981. Evaluating the Quality of Learning: The SOLO Taxonomy (Structure of the Observed Learning Outcome) (1st ed.). Academic Press. 260 pages."},{"unstructured":"Pierre Bourque and Richard E. Fairley (Eds.). 2014. Guide to the Software Engineering Body of Knowledge Version 3.0. IEEE Computer Society Washington DC USA. www.swebok.org  Pierre Bourque and Richard E. Fairley (Eds.). 2014. Guide to the Software Engineering Body of Knowledge Version 3.0. IEEE Computer Society Washington DC USA. www.swebok.org","key":"e_1_3_2_1_2_1"},{"unstructured":"Change Vision Inc. 2021. Astah. https:\/\/astah.net\/products\/free-student-license\/  Change Vision Inc. 2021. Astah. https:\/\/astah.net\/products\/free-student-license\/","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ICSE-SEET52601.2021.00019"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/SNPD.2012.65"},{"unstructured":"Twitch Interactive Inc. 2021. Updates on the Twitch Security Incident. Retrieved 19.01.2022 from https:\/\/blog.twitch.tv\/en\/2021\/10\/15\/updates-on-thetwitch-security-incident\/  Twitch Interactive Inc. 2021. Updates on the Twitch Security Incident. Retrieved 19.01.2022 from https:\/\/blog.twitch.tv\/en\/2021\/10\/15\/updates-on-thetwitch-security-incident\/","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"272","article-title":"Motivating Students to Engage in Learning: The MUSIC\u00ae Model of Academic Motivation","volume":"21","author":"Jones Brett D.","year":"2009","unstructured":"Brett D. Jones . 2009 . Motivating Students to Engage in Learning: The MUSIC\u00ae Model of Academic Motivation . International Journal of Teaching and Learning in Higher Education 21 , 2 (2009), 272 -- 285 . Brett D. Jones. 2009. Motivating Students to Engage in Learning: The MUSIC\u00ae Model of Academic Motivation. International Journal of Teaching and Learning in Higher Education 21, 2 (2009), 272--285.","journal-title":"International Journal of Teaching and Learning in Higher Education"},{"unstructured":"Brett D Jones. 2018. Motivating students by design: Practical strategies for professors (2 ed.). SC:CreateSpace Charleston. 238 pages.  Brett D Jones. 2018. Motivating students by design: Practical strategies for professors (2 ed.). SC:CreateSpace Charleston. 238 pages.","key":"e_1_3_2_1_8_1"},{"unstructured":"Brett D Jones. 2020. User guide for assessing the components of the MUSIC\u00ae Model of Motivation. Retrieved 20.03.2020 from http:\/\/www.themusicmodel.com  Brett D Jones. 2020. User guide for assessing the components of the MUSIC\u00ae Model of Motivation. Retrieved 20.03.2020 from http:\/\/www.themusicmodel.com","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"Jones and Gary Skaggs","author":"Brett","year":"2016","unstructured":"Brett D. Jones and Gary Skaggs . 2016 . Measuring Students' Motivation: Validity Evidence for the MUSIC Model of Academic Motivation Inventory . International Journal for the Scholarship of Teaching and Learning 10, 1 (2016), Article 7. https: \/\/doi.org\/10.20429\/ijsotl.2016.100107 10.20429\/ijsotl.2016.100107 Brett D. Jones and Gary Skaggs. 2016. Measuring Students' Motivation: Validity Evidence for the MUSIC Model of Academic Motivation Inventory. International Journal for the Scholarship of Teaching and Learning 10, 1 (2016), Article 7. https: \/\/doi.org\/10.20429\/ijsotl.2016.100107"},{"unstructured":"Kaseya Limited. 2021. Updates Regarding VSA Security Incident. Retrieved 19.01.2022 from https:\/\/www.kaseya.com\/potential-attack-on-kaseya-vsa\/  Kaseya Limited. 2021. Updates Regarding VSA Security Incident. Retrieved 19.01.2022 from https:\/\/www.kaseya.com\/potential-attack-on-kaseya-vsa\/","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1016\/j.infsof.2013.07.010"},{"key":"e_1_3_2_1_13_1","volume-title":"Reeves","author":"McKenney Susan","year":"2019","unstructured":"Susan McKenney and Thomas C . Reeves . 2019 . Conducting Educational Design Research (2 ed.). Routledge , London, UK. 326 pages. https:\/\/doi.org\/10.4324\/ 9781315105642 Susan McKenney and Thomas C. Reeves. 2019. Conducting Educational Design Research (2 ed.). Routledge, London, UK. 326 pages. https:\/\/doi.org\/10.4324\/ 9781315105642"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/REET.2009.12"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ITNG.2012.54"},{"unstructured":"Microsoft 365 Defender Threat Intelligence Team. 2021. Analyzing attacks taking advantage of the Exchange Server vulnerabilities. Retrieved 19.01.2022 from https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/25\/analyzing-attackstaking-advantage-of-the-exchange-server-vulnerabilities\/  Microsoft 365 Defender Threat Intelligence Team. 2021. Analyzing attacks taking advantage of the Exchange Server vulnerabilities. Retrieved 19.01.2022 from https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/25\/analyzing-attackstaking-advantage-of-the-exchange-server-vulnerabilities\/","key":"e_1_3_2_1_16_1"},{"unstructured":"Modeliosoft. 2021. Modelio. https:\/\/www.modelio.org\/  Modeliosoft. 2021. Modelio. https:\/\/www.modelio.org\/","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1002\/j.2168-9830.2006.tb00884.x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/EDUCON45650.2020.9125110"},{"key":"e_1_3_2_1_20_1","volume-title":"Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","author":"Shahriar Hossain","year":"2020","unstructured":"Hossain Shahriar , Kai Qian , Atef Shalan , and Fan Wu. 2020. Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) . IEEE , 1095--1096. https:\/\/doi.org\/10.1109\/COMPSAC48688. 2020 .0--123 10.1109\/COMPSAC48688.2020.0--123 Hossain Shahriar, Kai Qian, Atef Shalan, and Fan Wu. 2020. Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 1095--1096. https:\/\/doi.org\/10.1109\/COMPSAC48688.2020.0--123"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/COMPSAC.2019.10274"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1007\/s00766-004-0194-4"},{"volume-title":"Proceedings of the 3rd Symposium on Requirements Engineering for Information Security (CERIAS'02)","author":"Sindre Guttorm","unstructured":"Guttorm Sindre , Andreas L. Opdahl , and Goran F. Brevik . 2002. Generalization\/specialization as a Structuring Mechanism for Misuse Cases . In Proceedings of the 3rd Symposium on Requirements Engineering for Information Security (CERIAS'02) . CERIAS - Purdue University, Raleigh, North Carolina, 1--16. https:\/\/dl.acm.org\/doi\/10.5555\/2835417.2835420 Guttorm Sindre, Andreas L. Opdahl, and Goran F. Brevik. 2002. Generalization\/specialization as a Structuring Mechanism for Misuse Cases. In Proceedings of the 3rd Symposium on Requirements Engineering for Information Security (CERIAS'02). CERIAS - Purdue University, Raleigh, North Carolina, 1--16. https:\/\/dl.acm.org\/doi\/10.5555\/2835417.2835420","key":"e_1_3_2_1_23_1"},{"unstructured":"SparxSystems Software GmbH. 2021. Enterprise Architect. https:\/\/www. sparxsystems.de\/  SparxSystems Software GmbH. 2021. Enterprise Architect. https:\/\/www. sparxsystems.de\/","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1231047.1231053"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1080\/03043797.2017.1329280"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/2889160.2889186"},{"volume-title":"An Introduction to Educational Design Research","author":"den Akker Jan Van","unstructured":"Jan Van den Akker , Brenda Bannan , Anthony E. Kelly , Nienke Nieveen , and Tjeerd Plomp . 2007. An Introduction to Educational Design Research . Slo , Enschede, Netherlands . Jan Van den Akker, Brenda Bannan, Anthony E. Kelly, Nienke Nieveen, and Tjeerd Plomp. 2007. An Introduction to Educational Design Research. Slo, Enschede, Netherlands.","key":"e_1_3_2_1_28_1"},{"volume-title":"Educational Design Research - Part A: An introduction","author":"den Akker Jan Van","unstructured":"Jan Van den Akker , Brenda Bannan , Anthony E. Kelly , Nienke Nieveen , and Tjeerd Plomp . 2013. Educational Design Research - Part A: An introduction . Slo , Enschede, Netherlands . 206 pages. Jan Van den Akker, Brenda Bannan, Anthony E. Kelly, Nienke Nieveen, and Tjeerd Plomp. 2013. Educational Design Research - Part A: An introduction. Slo, Enschede, Netherlands. 206 pages.","key":"e_1_3_2_1_29_1"}],"event":{"sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"acronym":"ITiCSE 2022","name":"ITiCSE 2022: Innovation and Technology in Computer Science Education","location":"Dublin Ireland"},"container-title":["Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3502718.3524823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:47Z","timestamp":1750183787000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524823"}},"subtitle":["Introducing Misuse Cases in a Software Engineering Course for Undergraduate Engineering Students"],"short-title":[],"issued":{"date-parts":[[2022,7,7]]},"references-count":29,"alternative-id":["10.1145\/3502718.3524823","10.1145\/3502718"],"URL":"https:\/\/doi.org\/10.1145\/3502718.3524823","relation":{},"subject":[],"published":{"date-parts":[[2022,7,7]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}