{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:17:55Z","timestamp":1760426275040,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:00:00Z","timestamp":1739318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Centers of Academic Excellence in Cybersecurity (NCAE-C)","award":["H98230-23-1-0090"],"award-info":[{"award-number":["H98230-23-1-0090"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,12]]},"DOI":"10.1145\/3641554.3701897","type":"proceedings-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:33:41Z","timestamp":1739903621000},"page":"561-567","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Strengthening Workforce Education: Excellence in Programming Securely (SWEEPS)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1308-2052","authenticated-orcid":false,"given":"Deborah","family":"Kariuki","sequence":"first","affiliation":[{"name":"Department of Education, University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7191-2179","authenticated-orcid":false,"given":"Ida","family":"Ngambeki","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6890-6429","authenticated-orcid":false,"given":"Jun","family":"Dai","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7301-7060","authenticated-orcid":false,"given":"Matt","family":"Bishop","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California, Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0321-2338","authenticated-orcid":false,"given":"Xiaoyan","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7901-9374","authenticated-orcid":false,"given":"Melissa","family":"Dark","sequence":"additional","affiliation":[{"name":"Dark Enterprises, Inc., Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3559-2187","authenticated-orcid":false,"given":"Jenny","family":"Daugherty","sequence":"additional","affiliation":[{"name":"Dark Enterprises, Inc., Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7295-2086","authenticated-orcid":false,"given":"Alex","family":"Lowrie","sequence":"additional","affiliation":[{"name":"Continuing and Professional Education, University of California, Davis, Davis, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3346-9174","authenticated-orcid":false,"given":"Markus","family":"Geissler","sequence":"additional","affiliation":[{"name":"Computer Information Science, Cosumnes River College, Sacramento, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7405-2546","authenticated-orcid":false,"given":"Phillip","family":"Nico","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, California Polytechnic State University, San Luis Obispo, San Luis Obispo, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8068-3453","authenticated-orcid":false,"given":"Arshad","family":"Noor","sequence":"additional","affiliation":[{"name":"StrongAuth, Inc., Cupertino, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,2,18]]},"reference":[{"volume-title":"National Vulnerability Database. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-0160. Accessed","year":"2024","key":"e_1_3_2_1_1_1","unstructured":"CVE-2014-0160, National Vulnerability Database. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-0160. Accessed in Nov, 2024."},{"key":"e_1_3_2_1_2_1","unstructured":"\"The Heartbleed Bug\" Synopsys Inc. https:\/\/heartbleed.com\/. Accessed in Nov 2024."},{"key":"e_1_3_2_1_3_1","volume-title":"Computer Security: Art and Science, Section 20.1.2.2.","author":"Bishop Matt","year":"2002","unstructured":"Matt Bishop, 2002. Computer Security: Art and Science, Section 20.1.2.2."},{"volume-title":"Accessed in Nov","year":"2024","key":"e_1_3_2_1_4_1","unstructured":"\"Cyber Attacks on the Power Grid\", IronNet Threat Research. https:\/\/www.ironnet.com\/blog\/cyber-attacks-on-the-power-grid. Accessed in Nov, 2024."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/579090"},{"key":"e_1_3_2_1_7_1","volume-title":"Equity & Inclusion. https:\/\/diversity.ucdavis.edu\/uc-statement-diversity.","author":"T.","year":"2019","unstructured":"O'Donnell, T. UC statement on diversity. Diversity, Equity & Inclusion. https:\/\/diversity.ucdavis.edu\/uc-statement-diversity. August 9, 2019."},{"key":"e_1_3_2_1_8_1","first-page":"6","volume-title":"Haertel","author":"Mislevy Robert J.","year":"2006","unstructured":"Robert J. Mislevy and Geneva D. Haertel. 2006. Implications of evidence?centered design for educational testing. Educational measurement: issues and practice, 25(4), pp.6--20."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569811"},{"key":"e_1_3_2_1_10_1","volume-title":"Practice Secure Programmer,\" Proceedings of the 19th Colloquium on Information Systems Security Education (June","author":"Dark Melissa","year":"2015","unstructured":"Melissa Dark, Steven Belcher, Matt Bishop, and Ida Ngambeki, \"Practice, Practice, Practice Secure Programmer,\" Proceedings of the 19th Colloquium on Information Systems Security Education (June 2015)."},{"key":"e_1_3_2_1_11_1","volume-title":"Train the Mind A Secure Programming Clinic,\" Proceedings of the 19th Colloquium on Information Systems Security Education (June","author":"Dark Melissa","year":"2015","unstructured":"Melissa Dark, Ida Ngambeki, Matt Bishop, and Steven Belcher., \"Teach the Hands, Train the Mind A Secure Programming Clinic,\" Proceedings of the 19th Colloquium on Information Systems Security Education (June 2015)."},{"key":"e_1_3_2_1_12_1","unstructured":"Melissa Dark Lauren Stuart Ida Ngambeki and Matt Bishop \"Effect of the Secure Programming Clinic on Learners' Secure Programming Practices \" Proceedings of the 20th Colloquium on Information Systems Security Education (June 2016)."},{"key":"e_1_3_2_1_13_1","first-page":"51","volume-title":"Proceedings of the 10th World Conference on Information Security Education","author":"Bishop Matt","year":"2017","unstructured":"Matt Bishop, Jun Dai, Melissa Dark, Ida Ngambeki, Phillip Nico, and Ming Zhu, \"Evaluating Secure Programming Knowledge,\" Proceedings of the 10th World Conference on Information Security Education pp. 51--62 (May 2017)."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 14th World Conference on Information Security Education (WISE 14)","author":"Bishop Matt","year":"2021","unstructured":"Matt Bishop, Ida Ngambeki, Shivan Mian, Jun Dai and Phillip Nico, \"Measuring Self-Efficacy in Secure Programming: The Context of a Secure Programming Clinic\". Proceedings of the 14th World Conference on Information Security Education (WISE 14), Oslo, Norway, June 22--24, 2021."},{"volume-title":"48th Annual Frontiers in Education (FIE 2018) Conference","author":"Ngambeki Ida","key":"e_1_3_2_1_15_1","unstructured":"Ida Ngambeki, Phillip Nico, Jun Dai, Matt Bishop, \"Concept Inventories in Cybersecurity Education: An Example from Secure Programming\". 48th Annual Frontiers in Education (FIE 2018) Conference, San Jose, California USA."},{"key":"e_1_3_2_1_16_1","volume-title":"ACM Special Interest Group on Computer Science Education (SIGCSE) Technical Symposium (TS)","author":"Ngambeki Ida","year":"2023","unstructured":"Ida Ngambeki, Matt Bishop, Jun Dai, Phillip Nico, \"Validation of a Secure Programming Concept Inventory\". ACM Special Interest Group on Computer Science Education (SIGCSE) Technical Symposium (TS) 2023."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08172-9_2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1119\/1.1466554"}],"event":{"name":"SIGCSE TS 2025: The 56th ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Pittsburgh PA USA","acronym":"SIGCSE TS 2025"},"container-title":["Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701897","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641554.3701897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T06:30:21Z","timestamp":1755757821000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701897"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,12]]},"references-count":18,"alternative-id":["10.1145\/3641554.3701897","10.1145\/3641554"],"URL":"https:\/\/doi.org\/10.1145\/3641554.3701897","relation":{},"subject":[],"published":{"date-parts":[[2025,2,12]]},"assertion":[{"value":"2025-02-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}