{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T12:17:44Z","timestamp":1770466664075,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,3]]},"DOI":"10.1145\/3649217.3653578","type":"proceedings-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T18:30:20Z","timestamp":1720031420000},"page":"346-352","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Embedding Technical, Personal and Professional Competencies in Computing Degree Programmes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9671-2250","authenticated-orcid":false,"given":"Tom","family":"Prickett","sequence":"first","affiliation":[{"name":"Northumbria University, Newcastle Upon Tyne, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5196-9389","authenticated-orcid":false,"given":"Tom","family":"Crick","sequence":"additional","affiliation":[{"name":"Swansea University, Swansea, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3982-7545","authenticated-orcid":false,"given":"James H.","family":"Davenport","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3106-4923","authenticated-orcid":false,"given":"David S.","family":"Bowers","sequence":"additional","affiliation":[{"name":"The Open University, Milton Keynes, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2192-9113","authenticated-orcid":false,"given":"Alan","family":"Hayes","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5174-6596","authenticated-orcid":false,"given":"Alastair","family":"Irons","sequence":"additional","affiliation":[{"name":"Abertay University, Dundee, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567837"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630944"},{"key":"e_1_3_2_1_3_1","volume-title":"The Chartered Institute for IT","author":"BCS","year":"2022","unstructured":"BCS, The Chartered Institute for IT. 2022. Guidelines on course accreditation (January 2020). https:\/\/www.bcs.org\/media\/1209\/accreditation-guidelines.pdf."},{"key":"e_1_3_2_1_4_1","volume-title":"The Chartered Institute for IT","author":"BCS","year":"2024","unstructured":"BCS, The Chartered Institute for IT. 2024. RITTech - the registration for IT technicians. https:\/\/www.bcs.org\/membership-and-registrations\/get-registered\/rittech-the-registration-for-it-technicians\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3573205"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352274"},{"key":"e_1_3_2_1_7_1","volume-title":"Teaching for Quality Learning at University -- What the Student Does","author":"Biggs John","unstructured":"John Biggs. 1999. Teaching for Quality Learning at University -- What the Student Does. SRHE\/Open University Press."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610969.3611121"},{"key":"e_1_3_2_1_9_1","volume-title":"Bowers and Marian Petre","author":"David","year":"2023","unstructured":"David S. Bowers and Marian Petre. 2023. Developing a Competence Assessment which References a Student Portfolio to a Professional Skills Framework. Interaction Design & Architecture(s) , Vol. 57, 57 (2023), 97--114."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-023--11933-z"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585059.3611426"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON52537.2022.9766565"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734303"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/07377363.2016.1177704"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"CC2020 Task Force. 2020. Computing Curricula 2020: Paradigms for Future Computing Curricula. Technical Report. ACM\/IEEE\/IEEE Computer Society. https:\/\/doi.org\/10.1145\/3467967.","DOI":"10.1145\/3467967"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/03075079.2017.1294152"},{"key":"e_1_3_2_1_17_1","unstructured":"Engineering Council. 2020. The Accreditation of Higher Education Programmes (AHEP). https:\/\/www.engc.org.uk\/media\/3464\/ahep-fourth-edition.pdf."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/itnow\/bwab005"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9274033"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Tom Crick James H. Davenport and Alan Hayes. 2015. Innovative Pedagogical Practices in the Craft of Computing. Advance HE.","DOI":"10.1109\/LaTiCE.2016.38"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE43999.2019.9028407"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON46332.2021.9453846"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498343.3498346"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610969.3611142"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON45650.2020.9125272"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/LaTiCE.2016.38"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/016146810400500601"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555009.3555018"},{"key":"e_1_3_2_1_29_1","unstructured":"EQANIE. 2017. Euro-Inf Programme Outcomes for business informatics and related programmes."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571785.3574126"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502870.3506565"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437800.3439208"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3623762.3633499"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502870.3506570"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571785.3574121"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.08.002"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2023.102642"},{"key":"e_1_3_2_1_38_1","unstructured":"European Skills Competences Qualifications and Occupations. 2024. European e-Competence Framework (e-CF). https:\/\/esco.ec.europa.eu\/en\/about-esco\/escopedia\/escopedia\/european-e-competence-framework-e-cf."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.seps.2023.101584"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.261"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293881.3295782"},{"key":"e_1_3_2_1_42_1","unstructured":"Joseph Fuller and Manjari Raman. 2022. The Partnership Imperative: Community Colleges Employers and America's Chronic Skills Gap. Harvard Business School. https:\/\/www.hbs.edu\/managing-the-future-of-work\/Documents\/research\/The%20Partnership%20Imperative%2012.12.2022.pdf."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.268"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/cbe2.1011"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON45650.2020.9125105"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372356.3372363"},{"key":"e_1_3_2_1_47_1","unstructured":"HESA. 2023. Who's studying in HE? https:\/\/www.hesa.ac.uk\/data-and-analysis\/students\/whos-in-he."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Monzur Hossain. 2022. Human Capital Labor Market Outcomes and Skills Gap in the ICT Sector. In Digital Transformation and Economic Development in Bangladesh: Rethinking Digitalization Strategies for Leapfrogging. 171--194.","DOI":"10.1007\/978-981-19-2753-9_9"},{"key":"e_1_3_2_1_49_1","unstructured":"Information-technology Promotion Agency. 2023. i Competency Dictionary. https:\/\/www.ipa.go.jp\/en\/it-talents\/skill-standard\/icd.html."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3439678"},{"key":"e_1_3_2_1_51_1","volume-title":"24773: Software and systems engineering - Certification of software and systems engineering professionals - Part 1: General requirements. Standard","author":"ISO.","unstructured":"ISO. 2019. 24773: Software and systems engineering - Certification of software and systems engineering professionals - Part 1: General requirements. Standard. International Organization for Standardization."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2019.2930024"},{"key":"e_1_3_2_1_53_1","volume-title":"Experiential learning: Experience as the source of learning and development","author":"Kolb David A.","unstructured":"David A. Kolb. 2014. Experiential learning: Experience as the source of learning and development. FT Press."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605215"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499358"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2004.11645818"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1002\/cae.21968"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630761"},{"key":"e_1_3_2_1_59_1","unstructured":"National Cyber Security Centre. 2022. NCSC Certified Degrees. https:\/\/www.ncsc.gov.uk\/information\/ncsc-certified-degrees."},{"key":"e_1_3_2_1_60_1","volume-title":"Teaching at its best: A research-based resource for college instructors","author":"Nilson Linda B.","unstructured":"Linda B. Nilson. 2016. Teaching at its best: A research-based resource for college instructors. John Wiley & Sons."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499404"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610602.3610606"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293881.3295778"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1002\/cbe2.1263"},{"key":"e_1_3_2_1_65_1","unstructured":"QAA. 2022. Subject Benchmark Statement: Computing. https:\/\/www.qaa.ac.uk\/docs\/qaa\/sbs\/sbs-computing-22.pdf."},{"key":"e_1_3_2_1_66_1","unstructured":"Awais Rashid Andrew Martin Steve Schneider Yulia Cherdantseva Rod Chapman and Dr Marina Krotofil. 2022. CyBOK. https:\/\/www.cybok.org."},{"key":"e_1_3_2_1_67_1","unstructured":"Mihaela Sabin Hala Alrumaih John Impagliazzo Barry Lunt Ming Zhang Brenda Byers William Newhouse Bill Paterson Svetlana Peltsverger Cara Tang Gerrit van der Veer and Barbara Viola. 2017. Information Technology Curricula 2017 (IT2017). Technical Report. ACM\/IEEE Computer Society."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287395"},{"key":"e_1_3_2_1_69_1","unstructured":"Nigel Shadbolt. 2016. Computer science degree accreditation: Shadbolt review. UK Government. https:\/\/www.gov.uk\/government\/publications\/computer-science-degree-accreditation-and-graduate-employability-shadbolt-review."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/01425692.2018.1489219"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMU49871.2020.9243448"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/03075079.2019.1585420"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9273987"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287429"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3304221.3319744"},{"key":"e_1_3_2_1_76_1","unstructured":"The Joint Task Force on Computing Curricula. 2023. Computer Science Curricula 2023 Version Gamma. https:\/\/csed.acm.org\/wp-content\/uploads\/2023\/09\/Version-Gamma.pdf."},{"key":"e_1_3_2_1_77_1","unstructured":"The SFIA Foundation. 2021a. Glossary of Behavioural Factors within the 7 Levels of Responsibility. https:\/\/sfia-online.org\/en\/assets\/sfia-behavioural-factors\/sfia-v8-levels-of-responsibility-behavioural-factors-glossary_original-final_24-sept-2021.pdf."},{"key":"e_1_3_2_1_78_1","unstructured":"The SFIA Foundation. 2021b. Programming\/software development PROG. https:\/\/sfia-online.org\/en\/sfia-8\/skills\/programming-software-development."},{"key":"e_1_3_2_1_79_1","unstructured":"The SFIA Foundation. 2021c. SFIA -- Skills Framework for the Information Age. https:\/\/sfia-online.org\/en\/."},{"key":"e_1_3_2_1_80_1","unstructured":"The SFIA Foundation. 2021d. Skills. https:\/\/sfia-online.org\/en\/sfia-8\/skills."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","unstructured":"Tom Prickett et al. 2023. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes. In Cybersecurity Teaching in Higher Education. Springer 1--35. https:\/\/doi.org\/10.1007\/978--3-031--24216--8_1","DOI":"10.1007\/978--3-031--24216--8_1"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1108\/ET-05-2016-0090"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/00220272.2012.668938"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5334\/jime.807"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON46332.2021.9453883"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10734-020-00561-y"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1080\/01425692.2021.1937058"},{"key":"e_1_3_2_1_88_1","first-page":"140","article-title":"Top 10 hands-on cybersecurity exercises","volume":"29","author":"Weiss Richard","year":"2013","unstructured":"Richard Weiss, Jens Mache, and Erik Nilsen. 2013. Top 10 hands-on cybersecurity exercises. J. of Comput. Sci. in Colleges , Vol. 29, 1 (2013), 140--147.","journal-title":"J. of Comput. Sci. in Colleges"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.25304\/rlt.v26.2035"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502718.3534205"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3330"}],"event":{"name":"ITiCSE 2024: Innovation and Technology in Computer Science Education","location":"Milan Italy","acronym":"ITiCSE 2024","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649217.3653578","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649217.3653578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:49:27Z","timestamp":1755787767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649217.3653578"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,3]]},"references-count":91,"alternative-id":["10.1145\/3649217.3653578","10.1145\/3649217"],"URL":"https:\/\/doi.org\/10.1145\/3649217.3653578","relation":{},"subject":[],"published":{"date-parts":[[2024,7,3]]},"assertion":[{"value":"2024-07-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}