{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T08:32:49Z","timestamp":1769157169666,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,2]]},"DOI":"10.1145\/3545945.3569758","type":"proceedings-article","created":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T23:40:27Z","timestamp":1677886827000},"page":"193-199","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Cyber Security in English Secondary Education Curricula"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6948-8559","authenticated-orcid":false,"given":"Ollie","family":"Stepney","sequence":"first","affiliation":[{"name":"University of Gloucestershire, Cheltenham, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8513-4646","authenticated-orcid":false,"given":"Jordan","family":"Allison","sequence":"additional","affiliation":[{"name":"University of Gloucestershire, Cheltenham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,3,3]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2018.07.021"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/0309877X.2022.2088269"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.124"},{"key":"e_1_3_2_2_5_1","volume-title":"Case study research in educational settings","author":"Bassey M","unstructured":"M Bassey. 1999. Case study research in educational settings. Open University Press, Maidenhead."},{"key":"e_1_3_2_2_6_1","volume-title":"Transcribing as research: \"Manual transcription\" and Conversation Analysis. Research on Language and Social Interaction. Research on Language and Social Interaction 48 (07","author":"Bolden Galina","year":"2015","unstructured":"Galina Bolden. 2015. Transcribing as research: \"Manual transcription\" and Conversation Analysis. Research on Language and Social Interaction. Research on Language and Social Interaction 48 (07 2015), 276--280. https:\/\/doi.org\/10.1080\/ 08351813.2015.1058603"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.79"},{"key":"e_1_3_2_2_8_1","volume-title":"Successful qualitative research: a practical guide for beginners","author":"Braun Virginia","unstructured":"Virginia Braun and Victoria Clarke. 2013. Successful qualitative research: a practical guide for beginners. SAGE Publications, London."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/0969594X.2022.2053946"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70062-9"},{"key":"e_1_3_2_2_12_1","volume-title":"A cross-cultural investigation of situational information security awareness programs. Information Management Computer Security 16 (10","author":"Chen Charlie","year":"2008","unstructured":"Charlie Chen, B. Medlin, and Ruey-Shiang Shaw. 2008. A cross-cultural investigation of situational information security awareness programs. Information Management Computer Security 16 (10 2008), 360--376. https:\/\/doi.org\/10.1108\/ 09685220810908787"},{"key":"e_1_3_2_2_13_1","volume-title":"Research methods in education (8 ed.)","author":"Cohen L","unstructured":"L Cohen, L Manion, and K Morrison. 2018. Research methods in education (8 ed.). Routledge, Abingdon."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE43999.2019.9028407"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3364510.3364517"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502718.3524807"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3469183"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2528908.2528925"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.769"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2884671"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184594"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.1519"},{"key":"e_1_3_2_2_26_1","unstructured":"National Institute of Standards and Technology. 2018. Framework for Improving Critical Infrastructure Cybersecurity. https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/ NIST.CSWP.04162018.pdf"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-016-9475-z"},{"key":"e_1_3_2_2_29_1","first-page":"1","article-title":"Use of Semi-Structured Interviews to Investigate Teacher Perceptions of Student Collaboration","volume":"8","author":"Pathak Anil","year":"2012","unstructured":"Anil Pathak and Charatdao Intratat. 2012. Use of Semi-Structured Interviews to Investigate Teacher Perceptions of Student Collaboration. Malaysian Journal of ELT Research 8 (2012), 1--10.","journal-title":"Malaysian Journal of ELT Research"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2969409"},{"key":"e_1_3_2_2_31_1","volume-title":"KSU Proceedings on Cybersecurity Education, Research and Practice","author":"Pollock Tommy","year":"2017","unstructured":"Tommy Pollock. 2017. Reducing human error in cyber security using the Human Factors Analysis Classification System (HFACS). In KSU Proceedings on Cybersecurity Education, Research and Practice. Kennesaw, GA, USA."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2701150"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Rayne Reid and Johan van Niekerk. 2014. From Information Security to Cyber Security Cultures Organizations to Societies. In Information Security South Africa (ISSA). Johannesburg South Africa.","DOI":"10.1109\/ISSA.2014.6950492"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3469184"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3421590.3421623"},{"key":"e_1_3_2_2_36_1","volume-title":"Cases in Online Interview Research","author":"Salmons Janet","unstructured":"Janet Salmons. 2012. Cases in Online Interview Research. SAGE Publications, Inc., Glasgow, UK."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1515\/itit-2017-0014"},{"key":"e_1_3_2_2_38_1","unstructured":"Government Digital Service. 2014. The national curriculum. https:\/\/www.gov. uk\/national-curriculum\/key-stage-3-and-4"},{"key":"e_1_3_2_2_39_1","unstructured":"IBM Global Technology Services. 2014. IBM Security Services 2014 Cyber Security Intelligence. https:\/\/i.crn.com\/sites\/default\/files\/ckfinderimages\/userfiles\/images\/crn\/custom\/IBMSecurityServices2014.PDF"},{"key":"e_1_3_2_2_40_1","volume-title":"Shadbolt Review of Computer Sciences Degree Accreditation and Graduate Employability. Department for Business, Innovation and Skills","author":"Shadbolt Nigel","unstructured":"Nigel Shadbolt. 2016. Shadbolt Review of Computer Sciences Degree Accreditation and Graduate Employability. Department for Business, Innovation and Skills, London."},{"key":"e_1_3_2_2_41_1","unstructured":"Suzanne Straw and David Sims. 2019. T Levels Research: How Are Providers Preparing For Delivery? Follow-Up Report. NFER Slough."},{"key":"e_1_3_2_2_42_1","unstructured":"Peter Trim and D. Upton. 2013. Cyber security culture: counteracting cyber threats through organizational learning and training. Routledge Abingdon UK."},{"key":"e_1_3_2_2_43_1","unstructured":"European Union. 2022. The European Qualifications Framework. https:\/\/europa. eu\/europass\/en\/european-qualifications-framework-eqf"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","unstructured":"Isabella Venter Renette Blignaut Karen Renaud and M. Venter. 2019. Cyber security education is as essential as ?the three R's\". Heliyon Computer Science 5 12 (12 2019). https:\/\/doi.org\/10.1016\/j.heliyon.2019.e02855","DOI":"10.1016\/j.heliyon.2019.e02855"},{"key":"e_1_3_2_2_45_1","volume-title":"Researching With NVivo. Forum Qualitative Sozialforschung\/ Forum: Qualitative Social Research 12 (01","author":"Wiltshier Fiona","year":"2011","unstructured":"Fiona Wiltshier. 2011. Researching With NVivo. Forum Qualitative Sozialforschung\/ Forum: Qualitative Social Research 12 (01 2011)."},{"key":"e_1_3_2_2_46_1","volume-title":"Review of Vocational Education-The Wolf Report. Department for Education","author":"Wolf Alison","unstructured":"Alison Wolf. 2011. Review of Vocational Education-The Wolf Report. Department for Education, London."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.15439\/2016F159"}],"event":{"name":"SIGCSE 2023: The 54th ACM Technical Symposium on Computer Science Education","location":"Toronto ON Canada","acronym":"SIGCSE 2023","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545945.3569758","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545945.3569758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:59Z","timestamp":1750183799000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545945.3569758"}},"subtitle":["A Preliminary Study"],"short-title":[],"issued":{"date-parts":[[2023,3,2]]},"references-count":41,"alternative-id":["10.1145\/3545945.3569758","10.1145\/3545945"],"URL":"https:\/\/doi.org\/10.1145\/3545945.3569758","relation":{},"subject":[],"published":{"date-parts":[[2023,3,2]]},"assertion":[{"value":"2023-03-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}