{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T13:30:16Z","timestamp":1774531816760,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T00:00:00Z","timestamp":1723420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2221870, 1821782, 1821822"],"award-info":[{"award-number":["2221870, 1821782, 1821822"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,12]]},"DOI":"10.1145\/3632620.3671093","type":"proceedings-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T12:47:29Z","timestamp":1722948449000},"page":"406-418","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Layering Sociotechnical Cybersecurity Concepts Within Project-Based Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2715-6346","authenticated-orcid":false,"given":"Brandt","family":"Redd","sequence":"first","affiliation":[{"name":"University of Utah, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4757-1604","authenticated-orcid":false,"given":"Ying","family":"Tang","sequence":"additional","affiliation":[{"name":"Southwest University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2391-4196","authenticated-orcid":false,"given":"Hadar","family":"Ziv","sequence":"additional","affiliation":[{"name":"University of California, Irvine, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8214-0765","authenticated-orcid":false,"given":"Sameer","family":"Patil","sequence":"additional","affiliation":[{"name":"University of Utah, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"41","article-title":"Applying an agile approach in an information systems capstone course","volume":"17","author":"Adkins K.","year":"2019","unstructured":"Joni\u00a0K. Adkins and Cindy Tu. 2019. Applying an agile approach in an information systems capstone course. Information Systems Education Journal 17, 3 (2019), 41\u201349. https:\/\/isedj.org\/2019-17\/n3\/ISEDJv17n3p41.html","journal-title":"Information Systems Education Journal"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.1960"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5251-4_103"},{"key":"e_1_3_2_1_4_1","volume-title":"Every Computer Science Degree Should Require a Course in Cybersecurity. Harvard Business Review (Aug","author":"Cable Jack","year":"2019","unstructured":"Jack Cable. 2019. Every Computer Science Degree Should Require a Course in Cybersecurity. Harvard Business Review (Aug 2019), 5\u00a0pages. https:\/\/hbr.org\/2019\/08\/every-computer-science-degree-should-require-a-course-in-cybersecurity Accessed: 2023-08-18."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.62915\/2472-2707.1041"},{"key":"e_1_3_2_1_6_1","unstructured":"CloudPassage. 2016. CloudPassage Study Finds U.S. Universities Failing in Cybersecurity Education. https:\/\/web.archive.org\/web\/20160522051120\/https:\/\/www.cloudpassage.com\/company\/press-releases\/cloudpassage-study-finds-u-s-universities-failing-cybersecurity-education\/ Accessed: 2024-06-13."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9274033"},{"key":"e_1_3_2_1_8_1","volume-title":"The Cybersecurity Workforce Gap","author":"Crumpler William","year":"2019","unstructured":"William Crumpler and James\u00a0A. Lewis. 2019. The Cybersecurity Workforce Gap. Center for Strategic & International Studies (2019), 10\u00a0pages. https:\/\/www.csis.org\/analysis\/cybersecurity-workforce-gap Accessed: 2024-06-13."},{"key":"e_1_3_2_1_9_1","unstructured":"CyberEdge Group LLC. 2022. 2022 Cyberthreat Defense Report. https:\/\/cyber-edge.com\/cyberthreat-defense-report-2022\/ Accessed: 2024-06-13."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_1_11_1","first-page":"24","article-title":"Reliability of assessments in engineering education using Cronbach\u2019s alpha, KR and split-half methods","volume":"21","author":"Ekolu O.","year":"2019","unstructured":"Stephen\u00a0O. Ekolu and Harry Quainoo. 2019. Reliability of assessments in engineering education using Cronbach\u2019s alpha, KR and split-half methods. Global Journal of Engineering Education 21, 1 (2019), 24\u201329. http:\/\/www.wiete.com.au\/journals\/GJEE\/Publish\/vol21no1\/03-Ekolu-S.pdf","journal-title":"Global Journal of Engineering Education"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-0378-8_9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203793206"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093952"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499417"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203887332-8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787726"},{"key":"e_1_3_2_1_18_1","volume-title":"Cybersecurity curricular guidelines: CSEC","author":"Joint Task Force on Cybersecurity Education. 2017.","year":"2017","unstructured":"Joint Task Force on Cybersecurity Education. 2017. Cybersecurity curricular guidelines: CSEC 2017. https:\/\/cybered.hosting.acm.org\/wp\/ Accessed: 2024\u201106\u201113."},{"key":"e_1_3_2_1_19_1","first-page":"65","article-title":"Breadth vs. Depth: Best Practices Teaching Cybersecurity in a Small Public University Sharing Models","volume":"3","author":"Katz H.","year":"2018","unstructured":"Frank\u00a0H. Katz. 2018. Breadth vs. Depth: Best Practices Teaching Cybersecurity in a Small Public University Sharing Models. The Cyber Defense Review 3, 2 (2018), 65\u201372. https:\/\/cyberdefensereview.army.mil\/CDR-Content\/Articles\/Article-View\/Article\/1620289","journal-title":"The Cyber Defense Review"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2221311120"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125686"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2012.54"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293881.3295778"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2006.00030.x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458038"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5116\/ijme.4dfb.8dfd"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897441"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107191"},{"key":"e_1_3_2_1_29_1","unstructured":"Robert Thomas. 2016. Behind the Numbers on Why Universities Lag Behind in Cybersecurity Education. https:\/\/web.archive.org\/web\/20190516182303\/https:\/\/blog.cloudpassage.com\/2016\/04\/13\/behind-numbers-universities-lag-behind-cybersecurity-education\/ Accessed: 2024-06-13."},{"key":"e_1_3_2_1_30_1","unstructured":"U.S. National Security Agency \/ Central Security Service. 2023. National Centers of Academic Excellence in Cybersecurity. https:\/\/www.nsa.gov\/Academics\/Centers-of-Academic-Excellence\/ Accessed: 2024-06-13."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372782.3406277"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EduRex.2012.6225702"},{"key":"e_1_3_2_1_33_1","volume-title":"Teaching Computer Science With Cybersecurity Education Built-in. In 2016 USENIX Workshop on Advances in Security Education (ASE \u201816)","author":"Yue Chuan","year":"2016","unstructured":"Chuan Yue. 2016. Teaching Computer Science With Cybersecurity Education Built-in. In 2016 USENIX Workshop on Advances in Security Education (ASE \u201816). USENIX Association, Austin, TX, 8\u00a0pages. https:\/\/www.usenix.org\/conference\/ase16\/workshop-program\/presentation\/yue"}],"event":{"name":"ICER 2024: ACM Conference on International Computing Education Research","location":"Melbourne VIC Australia","acronym":"ICER 2024","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2024 ACM Conference on International Computing Education Research - Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632620.3671093","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632620.3671093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:34:43Z","timestamp":1755909283000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632620.3671093"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,12]]},"references-count":33,"alternative-id":["10.1145\/3632620.3671093","10.1145\/3632620"],"URL":"https:\/\/doi.org\/10.1145\/3632620.3671093","relation":{},"subject":[],"published":{"date-parts":[[2024,8,12]]},"assertion":[{"value":"2024-08-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}