{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:41:30Z","timestamp":1754163690900,"version":"3.41.2"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T00:00:00Z","timestamp":1754092800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2350165"],"award-info":[{"award-number":["2350165"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,3]]},"DOI":"10.1145\/3702652.3744226","type":"proceedings-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T09:39:27Z","timestamp":1753954767000},"page":"16-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Do CS Undergraduates Show Evidence of a Security Mindset without Formal Coursework? An Exploratory Qualitative Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5802-8804","authenticated-orcid":false,"given":"Michelle","family":"Jensen","sequence":"first","affiliation":[{"name":"University of Wisconsin - Madison, Madison, WI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5457-1461","authenticated-orcid":false,"given":"Matthew","family":"Berland","sequence":"additional","affiliation":[{"name":"University of Wisconsin - Madison, Madison, WI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0308-8787","authenticated-orcid":false,"given":"Rahul","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"University of Wisconsin - Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,8,2]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372782.3406266"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432416"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569730"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Matt Bishop. 2011. Teaching Security Stealthily. IEEE Security & Privacy 9 2 (2011) 69\u201371. doi:https:\/\/doi.org\/10.1109\/MSP.2011.43","DOI":"10.1109\/MSP.2011.43"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80865-5_6"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3341525.3387426"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Edward Bonver and Michael Cohen. 2008. Developing and Retaining a Security Testing Mindset. IEEE Security & Privacy 6 5 (Sep. 2008) 82\u201385. doi:https:\/\/doi.org\/10.1109\/MSP.2008.115","DOI":"10.1109\/MSP.2008.115"},{"key":"e_1_3_3_2_10_2","unstructured":"CloudPassage. 2016. CloudPassage study finds U.S. universities failing in cybersecurity education. https:\/\/www.globenewswire.com\/news-release\/2016\/04\/07\/1312702\/0\/en\/CloudPassage-Study-Finds-U-S-Universities-Failing-in-Cybersecurity-Education.html"},{"key":"e_1_3_3_2_11_2","volume-title":"How People Learn: Brain, Mind, Experience, and School: Expanded Edition","author":"Council National\u00a0Research","year":"2000","unstructured":"National\u00a0Research Council. 2000. How People Learn: Brain, Mind, Experience, and School: Expanded Edition. The National Academies Press, Washington, DC. doi:https:\/\/doi.org\/10.17226\/9853"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2016.7535227"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Wenliang Du. 2011. SEED: Hands-On Lab Exercises for Computer Security Education. IEEE Security & Privacy 9 5 (2011) 70\u201373. doi:https:\/\/doi.org\/10.1109\/MSP.2011.139","DOI":"10.1109\/MSP.2011.139"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Deborah\u00a0Ann Fields Yasmin Kafai Tomoko Nakajima Joanna Goode and Jane Margolis. 2018. Putting Making into High School Computer Science Classrooms: Promoting Equity in Teaching and Learning with Electronic Textiles in Exploring Computer Science. Equity & Excellence in Education 51 1 (2018) 21\u201335. doi:https:\/\/doi.org\/10.1080\/10665684.2018.1436998","DOI":"10.1080\/10665684.2018.1436998"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560569"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCQ51190.2021.9392965"},{"key":"e_1_3_3_2_17_2","unstructured":"W Huitt and J Hummel. 2003. Piaget\u2019s theory of cognitive development. Educational Psychology Interactive (2003)."},{"key":"e_1_3_3_2_18_2","volume-title":"Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science","author":"Computing\u00a0Curricula Association for Computing Machinery\u00a0(ACM) Joint Task Force\u00a0on","year":"2013","unstructured":"Association for Computing Machinery\u00a0(ACM) Joint Task Force\u00a0on Computing\u00a0Curricula and IEEE\u00a0Computer Society. 2013. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. Association for Computing Machinery, New York, NY, USA."},{"key":"e_1_3_3_2_19_2","first-page":"71","volume-title":"Learning Design by Making Games: Children\u2019s Development of Design Strategies in the Creation of a Complex Computationtional Artifact","author":"Kafai Yasmin\u00a0B.","year":"1996","unstructured":"Yasmin\u00a0B. Kafai. 1996. Learning Design by Making Games: Children\u2019s Development of Design Strategies in the Creation of a Complex Computationtional Artifact. Routledge, 71\u201396."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0E. Locasto. 2009. Helping Students 0wn Their Own Code. IEEE Security and Privacy 7 3 (2009) 53\u201356. doi:https:\/\/doi.org\/10.1109\/MSP.2009.66","DOI":"10.1109\/MSP.2009.66"},{"key":"e_1_3_3_2_21_2","unstructured":"MIT Media Lab. 2025. Scratch - Imagine Program Share. https:\/\/scratch.mit.edu\/ Accessed: 08 June 2025."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Kara Nance. 2009. Teach Them When They Aren\u2019t Looking: Introducing Security in CS1. IEEE Security & Privacy 7 5 (2009) 53\u201355. doi:https:\/\/doi.org\/10.1109\/MSP.2009.139","DOI":"10.1109\/MSP.2009.139"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2018.8658474"},{"key":"e_1_3_3_2_24_2","unstructured":"U.S.\u00a0Department of Homeland\u00a0Security. 2024. https:\/\/www.dhs.gov\/topics\/cybersecurity"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIE43999.2019.9028652"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569782"},{"key":"e_1_3_3_2_27_2","volume-title":"Mindstorms: children, computers, and powerful ideas","author":"Papert Seymour","year":"1980","unstructured":"Seymour Papert. 1980. Mindstorms: children, computers, and powerful ideas. Basic Books, Inc., USA."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"James Parker Michael Hicks Andrew Ruef Michelle\u00a0L. Mazurek Dave Levin Daniel Votipka Piotr Mardziel and Kelsey\u00a0R. Fulton. 2020. Build It Break It Fix It: Contesting Secure Development. ACM Trans. Priv. Secur. 23 2 (2020). doi:https:\/\/doi.org\/10.1145\/3383773","DOI":"10.1145\/3383773"},{"key":"e_1_3_3_2_29_2","unstructured":"Bryan Parno. 2020. Project 1: Build it; break it; fix it. https:\/\/course.ece.cmu.edu\/\u00a0ece732\/s20\/homework\/bibifi\/SPEC.html Publication Title: 18-335 \/ 18-732: Secure Software Systems."},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Seth Poulsen Geoffrey\u00a0L. Herman Peter A.\u00a0H. Peterson Enis Golaszewski Akshita Gorti Linda Oliva Travis Scheponik and Alan\u00a0T. Sherman. 2021. Psychometric Evaluation of the Cybersecurity Concept Inventory. ACM Trans. Comput. Educ. 22 1 Article 6 (Oct. 2021) 18\u00a0pages. doi:https:\/\/doi.org\/10.1145\/3451346","DOI":"10.1145\/3451346"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TALE52509.2021.9678545"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24615-4"},{"key":"e_1_3_3_2_33_2","unstructured":"Philip\u00a0C. Ritchey. 2020. Build-it break-it fix-it Project. https:\/\/people.engr.tamu.edu\/pcr\/courses\/csce489\/spring20\/project\/bibifi_details.html Publication Title: CSCE 413\/713: Software Security Project."},{"key":"e_1_3_3_2_34_2","volume-title":"8th Workshop on Cyber Security Experimentation and Test (CSET 15)","author":"Ruef Andrew","year":"2015","unstructured":"Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Atif Memon, Jandelyn Plane, and Piotr Mardziel. 2015. Build It Break It: Measuring and Comparing Development Security. In 8th Workshop on Cyber Security Experimentation and Test (CSET 15). USENIX Association, Washington, D.C.https:\/\/www.usenix.org\/conference\/cset15\/workshop-program\/presentation\/ruef"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Koen Schoenmakers Daniel Greene Sarah Stutterheim Herbert Lin and Megan\u00a0J Palmer. 2023. The security mindset: characteristics development and consequences. Journal of Cybersecurity 9 1 (May 2023) tyad010. doi:https:\/\/doi.org\/10.1093\/cybsec\/tyad010","DOI":"10.1093\/cybsec\/tyad010"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Charles Severance. 2016. Bruce Schneier: The Security Mindset. Computer 49 2 (Feb 2016) 7\u20138. doi:https:\/\/doi.org\/10.1109\/MC.2016.38","DOI":"10.1109\/MC.2016.38"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Bruce\u00a0L. Sherin. 2001. How Students Understand Physics Equations. Cognition and Instruction 19 4 (2001) 479\u2013541. doi:https:\/\/doi.org\/10.1207\/S1532690XCI1904_3","DOI":"10.1207\/S1532690XCI1904_3"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3450358"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Ambareen Siraj Blair Taylor Siddarth Kaza and Sheikh Ghafoor. 2015. Integrating Security in the Computer Science Curriculum. ACM Inroads 6 2 (2015) 77\u201381. doi:https:\/\/doi.org\/10.1145\/2766457","DOI":"10.1145\/2766457"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159511"},{"key":"e_1_3_3_2_41_2","unstructured":"Cara Tang Elizabeth\u00a0K. Hawthorne Blair Taylor and Siddharth Kaza. 2013. Introducing Security and Responsible Coding into Introductory Computer Science Courses. J. Comput. Sci. Coll. 29 1 (2013) 148\u2013149."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352246"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Blair Taylor and Siddharth Kaza. 2016. Security Injections@Towson: Integrating Secure Coding into Introductory Computer Science Courses. ACM Trans. Comput. Educ. 16 4 (June 2016). doi:https:\/\/doi.org\/10.1145\/2897441","DOI":"10.1145\/2897441"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287429"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"crossref","unstructured":"Julia\u00a0D Thompson Geoffrey\u00a0L Herman Travis Scheponik Linda Oliva Alan Sherman Ennis Golaszewski Dhananjay Phatak and Kostantinos Patsourakos. 2018. Student misconceptions about cybersecurity concepts: Analysis of think-aloud interviews. Journal of Cybersecurity Education Research and Practice 2018 1 (2018) 5.","DOI":"10.62915\/2472-2707.1030"},{"key":"e_1_3_3_2_46_2","unstructured":"Daniel Votipka Kelsey Fulton Mike Hicks and Michelle Mazurek. 2020. CMSC 388n - build it break it fix it: Competing to secure software. https:\/\/www.cs.umd.edu\/class\/winter2020\/cmsc388N\/ Publication Title: CMSC 388n - build it break it fix it: Competing to secure software."},{"key":"e_1_3_3_2_47_2","unstructured":"Daniel Votipka Kelsey\u00a0R. Fulton James Parker Matthew Hou Michelle\u00a0L. Mazurek and Michael Hicks. 2020. Understanding security mistakes developers make: Qualitative analysis from Build It Break It Fix It. USENIX Association 109\u2013126. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/votipka-understanding"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366816"},{"key":"e_1_3_3_2_49_2","volume-title":"Mind in society: The development of Higher Psychological Processes","author":"Vygotsky L.\u00a0S.","year":"1978","unstructured":"L.\u00a0S. Vygotsky, Michael Cole, Sally Stein, and Allan Sekula. 1978. Mind in society: The development of Higher Psychological Processes. Harvard University Press."},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3446871.3469743"}],"event":{"name":"ICER 2025: ACM Conference on International Computing Education Research","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Charlottesville USA","acronym":"ICER '25"},"container-title":["Proceedings of the 2025 ACM Conference on International Computing Education Research V.1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3702652.3744226","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3702652.3744226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T11:37:46Z","timestamp":1753961866000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702652.3744226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,2]]},"references-count":49,"alternative-id":["10.1145\/3702652.3744226","10.1145\/3702652"],"URL":"https:\/\/doi.org\/10.1145\/3702652.3744226","relation":{},"subject":[],"published":{"date-parts":[[2025,8,2]]},"assertion":[{"value":"2025-08-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}