{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:13Z","timestamp":1750308913293,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T00:00:00Z","timestamp":1691366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,7]]},"DOI":"10.1145\/3568812.3603465","type":"proceedings-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:12:11Z","timestamp":1694621531000},"page":"87-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Creating Defensive Programmers : Evaluating the Impact of Adding Cybesecurity Topics to Core Computer Science Courses"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1668-8850","authenticated-orcid":false,"given":"Cheryl","family":"Resch","sequence":"first","affiliation":[{"name":"University of Florida, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"volume-title":"MITRE 2021 CWE Top 25 Most Dangerous Software Errors. https:\/\/cwe.mitre.org\/top25\/archive\/2021\/2021_cwe_top25","year":"2022","key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. MITRE 2021 CWE Top 25 Most Dangerous Software Errors. https:\/\/cwe.mitre.org\/top25\/archive\/2021\/2021_cwe_top25.html. Accessed: 2022-12-16."},{"key":"e_1_3_2_1_2_1","volume-title":"Curriculum Guidelines for Undergraduate Degree Programs in Computer Science","author":"ACM.","year":"2013","unstructured":"ACM. [n.d.]. Curriculum Guidelines for Undergraduate Degree Programs in Computer Science 2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366798"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.133"},{"key":"e_1_3_2_1_5_1","volume-title":"What approaches work best for teaching secure coding practices?2014 HUIC Education & STEM Conference","author":"Chung Sam","year":"2014","unstructured":"Sam Chung, Leo Hansel, Yan Bai, Elizabeth Moore, Carol Taylor, Martha Crosby, Rachelle Heller, Viatcheslav Popovsky, and Barbara Endicott-Popovsky. 2014. What approaches work best for teaching secure coding practices?2014 HUIC Education & STEM Conference (2014)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1709424.1709457"},{"key":"e_1_3_2_1_8_1","unstructured":"John Dewey. 1933. How we think: A restatement of the relation of reflective thinking to the educative process. DC Health."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 12th Colloquium for Information Systems Security Education","author":"Frazier A","year":"2008","unstructured":"A Frazier and X Yuan. 2008. Course modules for software security. Proceedings of the 12th Colloquium for Information Systems Security Education (2008), 47\u201352."},{"key":"e_1_3_2_1_10_1","volume-title":"The Seventh International Conference on Advances and Trends in Software Engineering (SOFTENG","author":"Gueye A.","year":"2021","unstructured":"A. Gueye and P. Mell. 2021. A Historical and Statistical Study of the Software Vulnerability Landscape. In The Seventh International Conference on Advances and Trends in Software Engineering (SOFTENG 2021)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.735847"},{"key":"e_1_3_2_1_12_1","volume-title":"IMSCI 2013 - 7th International Multi-Conference on Society, Cybernetics and Informatics, Proceedings (2013","author":"Kim Hyunju","year":"2013","unstructured":"Hyunju Kim, Natarajan Meghanathan, and Loretta\u00a0A. Moore. 2013. Enhancement of an undergraduate software engineering course by infusing security lecture modules. IMSCI 2013 - 7th International Multi-Conference on Society, Cybernetics and Informatics, Proceedings (2013), 265\u2013269. ISBN: 9781936338832."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.63"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1229637.1229666"},{"key":"e_1_3_2_1_15_1","volume-title":"PDP Working Paper 4 Reflection in Higher Education Learning Jenny Moon","author":"Moon Jenny","year":"2022","unstructured":"Jenny Moon. 2001. PDP Working Paper 4 Reflection in Higher Education Learning Jenny Moon, University of Exeter. LTSN Generic CentreJuly (2001), 1\u201325. ISBN: 0202200485."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766457"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2"},{"key":"e_1_3_2_1_18_1","first-page":"131","article-title":"Beyond the Security Track: Embed Security Education across Undergraduate Computing Curricula Using M-Thread Approach","volume":"11","author":"Ray L.","year":"2011","unstructured":"L. Ray and J. Yang. 2011. Beyond the Security Track: Embed Security Education across Undergraduate Computing Curricula Using M-Thread Approach. Ijcsns 11, 8 (2011), 131.","journal-title":"Ijcsns"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/13562517.2012.694104"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352246"},{"key":"e_1_3_2_1_21_1","volume-title":"Cross-site Security Integration: Preliminary Experiences across Curricula. 13th Colloquium for Information Systems Security Education (CISSE)","author":"Taylor B","year":"2009","unstructured":"B Taylor, H Hochheiser, S Azadegan, and M. O\u2019Leary. 2009. Cross-site Security Integration: Preliminary Experiences across Curricula. 13th Colloquium for Information Systems Security Education (CISSE) (2009), 158\u2013165."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Blair Taylor and Siddharth Kaza. 2011. Security injections. (2011) 3. https:\/\/doi.org\/10.1145\/1999747.1999752 ISBN: 9781450306973.","DOI":"10.1145\/1999747.1999752"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897441"},{"key":"e_1_3_2_1_24_1","first-page":"80","article-title":"CS1 Programming Assignments That Can Help to Increase Awareness of Cybersecurity Issues","volume":"34","author":"Trono A","year":"2018","unstructured":"John\u00a0A Trono. 2018. CS1 Programming Assignments That Can Help to Increase Awareness of Cybersecurity Issues. J. Comput. Sci. Coll. 34, 2 (2018), 80\u201386.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_25_1","first-page":"54","article-title":"Injecting and Assessing Cybersecurity Topics Within a Computer Science Program","volume":"32","author":"Voorhees David","year":"2017","unstructured":"David Voorhees, Aparna Das, Cynthia Choi, David Vorhees, and Aparna Das. 2017. Injecting and Assessing Cybersecurity Topics Within a Computer Science Program. J. Comput. Sci. Coll. 32, 6 (2017), 54\u201366. http:\/\/dl.acm.org\/citation.cfm?id=3069658.3069670","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_26_1","unstructured":"Major\u00a0Gregory White Captain\u00a0Gregory Nordstrom Fairchild Dr and Hq Usafa. [n.d.]. SECURITY ACROSS THE CURRICULUM: USING COMPUTER SECURITY TO TEACH COMPUTER SCIENCE PRINCIPLES. ([n. d.]) 6."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2018.8658433"},{"key":"e_1_3_2_1_28_1","first-page":"3","article-title":"Secure Software Engineering Education: Knowledge Area, Curriculum and Resources","volume":"2016","author":"Yuan Xiaohong","year":"2016","unstructured":"Xiaohong Yuan, Li Yang, Bilan Jones, Huiming Yu, and Bei-Tseng Chu. 2016. Secure Software Engineering Education: Knowledge Area, Curriculum and Resources. Journal of Cybersecurity Education, Research and Practice 2016, 1 (2016), 3.","journal-title":"Journal of Cybersecurity Education, Research and Practice"}],"event":{"name":"ICER 2023: ACM Conference on International Computing Education Research","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Chicago IL USA","acronym":"ICER 2023"},"container-title":["Proceedings of the 2023 ACM Conference on International Computing Education Research - Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568812.3603465","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568812.3603465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:26:26Z","timestamp":1750281986000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568812.3603465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,7]]},"references-count":27,"alternative-id":["10.1145\/3568812.3603465","10.1145\/3568812"],"URL":"https:\/\/doi.org\/10.1145\/3568812.3603465","relation":{},"subject":[],"published":{"date-parts":[[2023,8,7]]},"assertion":[{"value":"2023-09-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}