{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T11:46:27Z","timestamp":1769514387405,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,6]]},"DOI":"10.1145\/3769694.3771158","type":"proceedings-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T10:03:58Z","timestamp":1766829838000},"page":"307-309","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Cognitive-Aware Plugin for Vulnerability Feedback"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7158-0097","authenticated-orcid":false,"given":"Andrew Logan","family":"Sanders","sequence":"first","affiliation":[{"name":"Computer and Cyber Sciences, Augusta University, Augusta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4029-6227","authenticated-orcid":false,"given":"Gursimran","family":"Walia","sequence":"additional","affiliation":[{"name":"Computer and Cyber Sciences, Augusta University, Augusta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9757-1755","authenticated-orcid":false,"given":"Lucas P.","family":"Cordova","sequence":"additional","affiliation":[{"name":"Computer Science, Willamette University, Salem, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2528908.2528911"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569823"},{"key":"e_1_3_3_1_4_2","unstructured":"Department of Homeland Security US-CERT. [n. d.]. Software Assurance. https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/infosheet _SoftwareAssurance.pdf"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Dieter Pawelczak. 2020. Teaching Security in Introductory C-Programming Courses. 6th International Conference on Higher Education Advances (HEAd\u201920) (June 2020). 10.4995\/HEAd20.2020.11114","DOI":"10.4995\/HEAd20.2020.11114"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Mohamed Elbawab and Roberto Henriques. 2023. Machine Learning applied to student attentiveness detection: Using emotional and non-emotional measures. Education and Information Technologies (2023) 1 \u2013 21. 10.1007\/s10639-023-11814-5","DOI":"10.1007\/s10639-023-11814-5"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"T. Gasiba U. Lechner Jorge Cu\u00e9llar and A. Zouitni. 2020. Ranking Secure Coding Guidelines for Software Developer Awareness Training in the Industry. 10.4230\/OASIcs.ICPEC.2020.11","DOI":"10.4230\/OASIcs.ICPEC.2020.11"},{"key":"e_1_3_3_1_8_2","unstructured":"John Zorabedian. [n. d.]. Veracode Survey Research Identifies Cybersecurity Skills Gap Causes and Cures. https:\/\/www.veracode.com\/blog\/security-news\/veracode-survey-research-identifies-cybersecurity-skills-gap-causes-and-cures"},{"key":"e_1_3_3_1_9_2","volume-title":"Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science","author":"Society Joint Task Force on Computing Curricula, Association for Computing Machinery (ACM) and IEEE Computer","year":"2013","unstructured":"Joint Task Force on Computing Curricula, Association for Computing Machinery (ACM) and IEEE Computer Society. 2013. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. Association for Computing Machinery, New York, NY, USA."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445396"},{"key":"e_1_3_3_1_11_2","unstructured":"Kenneth A. Williams Xiaohong Yuan Huiming Yu and Kelvin Bryant. 2014. Teaching Secure Coding for Beginning Programmers. Journal of Computing Sciences in Colleges 29 5 (May 2014) 91\u201399."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499391"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630789"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569785"},{"key":"e_1_3_3_1_15_2","first-page":"10","volume-title":"Proceedings of the 2023 ACM Conference on Innovation and Technology in Computer Science Education","author":"Prather James","year":"2023","unstructured":"James Prather, Brent\u00a0N Reeves, Paul Denny, Brett\u00a0A Becker, Juho Leinonen, Andrew Luxton-Reilly, Garrett Powell, James Finnie-Ansley, and Eddie\u00a0Antonio Santos. 2023. The robots are coming: Exploring the implications of openai codex on introductory programming. In Proceedings of the 2023 ACM Conference on Innovation and Technology in Computer Science Education. ACM, 10\u201316."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIE49875.2021.9637411"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIE61694.2024.10893015"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"John Sweller Jeroen\u00a0JG van Merri\u00ebnboer and Fred Paas. 2019. Cognitive architecture and instructional design: 20 years later. Educational Psychology Review 31 2 (2019) 261\u2013292.","DOI":"10.1007\/s10648-019-09465-5"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Karl Tamberg and Hayretdin Bahsi. 2024. Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study. ArXiv (2024). 10.48550\/ARXIV.2405.15614","DOI":"10.48550\/ARXIV.2405.15614"},{"key":"e_1_3_3_1_20_2","unstructured":"Verizon. [n. d.]. Verizon 2023 Data Breach Investigations Report. https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/"},{"key":"e_1_3_3_1_21_2","volume-title":"Mind in Society: Development of Higher Psychological Processes","author":"Vygotsky L.","year":"1978","unstructured":"L. Vygotsky. 1978. Mind in Society: Development of Higher Psychological Processes. Harvard University Press, Cambridge."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"Nan Xie Zhaojie Liu Zhengxu Li Wei Pang and Beier Lu. 2023. Student engagement detection in online environment using computer vision and multi-dimensional feature fusion. Multimedia Systems 29 (2023) 3559\u20133577. 10.1007\/s00530-023-01153-3","DOI":"10.1007\/s00530-023-01153-3"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Tolga Yilmaz and \u00d6zg\u00fcr Ulusoy. 2022. Understanding Security Vulnerabilities in Student Code: A Case Study in a Non-Security Course. Journal of Systems and Software 185 (March 2022) 111150. 10.1016\/j.jss.2021.111150","DOI":"10.1016\/j.jss.2021.111150"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","unstructured":"Bo Zhu Kien\u00a0Tsong Chau and Nur Azlina\u00a0Mohamed Mokmin. 2024. Optimizing cognitive load and learning adaptability with adaptive microlearning for in-service personnel. Scientific Reports 14 (2024). 10.1038\/s41598-024-77122-1","DOI":"10.1038\/s41598-024-77122-1"}],"event":{"name":"ACM SIGCITE 2025: 26th Annual ACM Conference on Cybersecurity and Information Technology Education","location":"Sacramento , California , USA","acronym":"ACM SIGCITE 2025","sponsor":["SIGCITE ACM Special Interest Group on Cybersecurity & Information Technology Education"]},"container-title":["Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769694.3771158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:13Z","timestamp":1769472013000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769694.3771158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"references-count":23,"alternative-id":["10.1145\/3769694.3771158","10.1145\/3769694"],"URL":"https:\/\/doi.org\/10.1145\/3769694.3771158","relation":{},"subject":[],"published":{"date-parts":[[2025,11,6]]},"assertion":[{"value":"2025-12-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}