{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T17:07:11Z","timestamp":1762448831895,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":96,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,11,10]],"date-time":"2026-11-10T00:00:00Z","timestamp":1794268800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1852260"],"award-info":[{"award-number":["1852260"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,11]]},"DOI":"10.1145\/3769994.3770022","type":"proceedings-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T16:35:41Z","timestamp":1762446941000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Observations of Highly Successful, Distributed Teams in a K-12 Online Security Competition"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0756-5704","authenticated-orcid":false,"given":"Emma","family":"Hogan","sequence":"first","affiliation":[{"name":"Bard College, Annandale-on-Hudson, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6507-1334","authenticated-orcid":false,"given":"Alejandro","family":"Cuevas Villalba","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0250-3616","authenticated-orcid":false,"given":"Hanan","family":"Hibshi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA and King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2506-8031","authenticated-orcid":false,"given":"Nicolas","family":"Christin","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2020. Hacker101 CTF. https:\/\/ctf.hacker101.com\/."},{"key":"e_1_3_3_2_3_2","unstructured":"2020. NSA Codebreaker Challenge. https:\/\/codebreaker.ltsnet.net\/resources."},{"volume-title":"8th Annual Hacker-Powered Security Report 2024\/2025","year":"2024","key":"e_1_3_3_2_4_2","unstructured":"2024. 8th Annual Hacker-Powered Security Report 2024\/2025. Technical Report. Hacker One. https:\/\/www.hackerone.com\/resources\/reporting\/8th-hacker-powered-security-report"},{"key":"e_1_3_3_2_5_2","unstructured":"0x00sec The Home of\u00a0the Hacker. 2017. Null Byte Poisoning - The Magic Byte. https:\/\/0x00sec.org\/t\/null-byte-poisoning-the-magic-byte\/3874."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"V\u00ecctor M\u00a0Garro Abarca Pedro\u00a0R Palos-Sanchez and Enrique Rus-Arias. 2020. Working in Virtual Teams: A Systematic Literature Review and a Bibliometric Analysis. IEEE Access 8 (2020) 168923\u2013168940. 10.1109\/ACCESS.2020.3023546","DOI":"10.1109\/ACCESS.2020.3023546"},{"key":"e_1_3_3_2_7_2","unstructured":"Omer Akgul Taha Eghtesad Amit Elazari Omprakash Gnawali Jens Grossklags Daniel Votipka and Aron Laszka. 2020. The Hackers\u2019 Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs. (2020)."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441840"},{"key":"e_1_3_3_2_9_2","unstructured":"Meraj\u00a0Farheen Ansari Bibhu Dash Pawankumar Sharma and Nikhitha Yathiraju. 2022. The impact and limitations of artificial intelligence in cybersecurity: a literature review. International Journal of Advanced Research in Computer and Communication Engineering (2022)."},{"key":"e_1_3_3_2_10_2","unstructured":"Josh Armour. 2017. Announcing Google Capture the Flag 2017. https:\/\/security.googleblog.com\/2017\/06\/announcing-google-capture-flag-2017.html"},{"key":"e_1_3_3_2_11_2","unstructured":"Hart\u00a0Research Associates. 2016. Falling Short? College Learning and Career Success. NACTA Journal 60 1a (May 2016) 1\u20136. https:\/\/www.proquest.com\/docview\/1791668756\/abstract\/DFC6355E9DBA4F5DPQ\/1 Num Pages: 6 Place: Twin Falls United States Publisher: North American Colleges and Teachers of Agriculture."},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Tyler Balon and Ibrahim\u00a0(Abe) Baggili. 2023. Cybercompetitions: A survey of competitions tools and systems to support cybersecurity education. Education and Information Technologies 28 9 (Sept. 2023) 11759\u201311791. 10.1007\/s10639-022-11451-4","DOI":"10.1007\/s10639-022-11451-4"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Bradford\u00a0S Bell and Steve\u00a0WJ Kozlowski. 2002. A Typology of Virtual Teams : Implications for Effective Leadership. Group & Organization Management 27 1 (2002) 14\u201349. 10.1177\/1059601102027001003","DOI":"10.1177\/1059601102027001003"},{"key":"e_1_3_3_2_14_2","volume-title":"Diversity consciousness: Opening our minds to people, cultures, and opportunities (4 ed.)","author":"Bucher Richard\u00a0D","year":"2014","unstructured":"Richard\u00a0D Bucher. 2014. Diversity consciousness: Opening our minds to people, cultures, and opportunities (4 ed.). Pearson."},{"key":"e_1_3_3_2_15_2","unstructured":"Bugcrowd. [n. d.]. LevelUp0x07 - Hack Another Day Bugcrowd. https:\/\/levelup.bugcrowd.com\/."},{"volume-title":"Priority One: The State of Crowdsourced Security in 2019","year":"2019","key":"e_1_3_3_2_16_2","unstructured":"Bugcrowd. 2019. Priority One: The State of Crowdsourced Security in 2019. Technical Report. https:\/\/www.bugcrowd.com\/resources\/reports\/priority-one-report\/."},{"key":"e_1_3_3_2_17_2","volume-title":"Constructing grounded theory (2 ed.)","author":"Charmaz Kathy","year":"2014","unstructured":"Kathy Charmaz. 2014. Constructing grounded theory (2 ed.). SAGE Publications."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Tiffani\u00a0R Chen Daniel\u00a0B Shore Stephen\u00a0J Zaccaro Reeshad\u00a0S Dalal Lois\u00a0E Tetrick and Aiva\u00a0K Gorab. 2014. An organizational psychology perspective to examining computer security incident response teams. IEEE Security & Privacy 12 5 (2014) 61\u201367. 10.1109\/MSP.2014.85","DOI":"10.1109\/MSP.2014.85"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Laku Chidambaram. 1996. Relational development in computer-supported groups. MIS Q. 20 (1996) 143\u2013165. 10.2307\/249476","DOI":"10.2307\/249476"},{"key":"e_1_3_3_2_20_2","volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"Corbin Juliet","year":"2007","unstructured":"Juliet Corbin and Anselm Strauss. 2007. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3641554.3701807"},{"key":"e_1_3_3_2_22_2","unstructured":"Discord Inc.2020. Discord. https:\/\/discord.com"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143468"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3194779.3194782"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"J\u00a0Alberto Espinosa and Erran Carmel. 2003. The impact of time separation on coordination in global software teams: a conceptual foundation. Software Process: Improvement and Practice 8 4 (2003) 249\u2013266. 10.1002\/spip.185","DOI":"10.1002\/spip.185"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.463"},{"key":"e_1_3_3_2_27_2","unstructured":"Facebook. 2016. Facebook CTF is Now Open Source! Facebook. https:\/\/www.facebook.com\/notes\/facebook-ctf\/facebook-ctf-is-now-open-source\/525464774322241\/."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534790"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"Saneesh\u00a0P. Francis Vysakh\u00a0Kani Kolil Vipin Pavithran Indrakshi Ray and Krishnashree Achuthan. 2024. Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective. Computers & Security 144 (Sept. 2024) 103968. 10.1016\/j.cose.2024.103968","DOI":"10.1016\/j.cose.2024.103968"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Lucy\u00a0L Gilson M\u00a0Travis Maynard Nicole\u00a0C Jones\u00a0Young Matti Vartiainen and Marko Hakonen. 2015. Virtual Teams Research: 10 Years 10 Themes and 10 Opportunities. Journal of Management 41 5 (2015) 1313\u20131337. 10.1177\/0149206314559946","DOI":"10.1177\/0149206314559946"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","unstructured":"Kuldeep Gurjar Anshika Jangra Hasnan Baber Maidul Islam and Shabnam\u00a0Abdulkasem Sheikh. 2024. An Analytical Review on the Impact of Artificial Intelligence on the Business Industry: Applications Trends and Challenges. IEEE Engineering Management Review 52 2 (April 2024) 84\u2013102. 10.1109\/EMR.2024.3355973Conference Name: IEEE Engineering Management Review.","DOI":"10.1109\/EMR.2024.3355973"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376654"},{"volume-title":"The Hacker-Powered Security Report 2019","year":"2019","key":"e_1_3_3_2_33_2","unstructured":"HackerOne. 2019. The Hacker-Powered Security Report 2019. Technical Report. https:\/\/www.hackerone.com\/resources\/reporting\/the-hacker-powered-security-report-2019."},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","unstructured":"Alexa\u00a0M Harris Diego G\u00f3mez-Zar\u00e1 Leslie\u00a0A DeChurch and Noshir\u00a0S Contractor. 2019. Joining Together Online: The Trajectory of CSCW Scholarship on Group Formation. Proceedings of the ACM on Human-Computer Interaction 3 Article 148 (2019) 27\u00a0pages. 10.1145\/3359250","DOI":"10.1145\/3359250"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795423"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","unstructured":"James\u00a0D. Herbsleb and Audris Mockus. 2003. An Empirical Study of Speed and Communication in Globally Distributed Software Development. IEEE Transactions on Software Engineering 29 6 (2003) 481\u2013494. 10.1109\/TSE.2003.1205177","DOI":"10.1109\/TSE.2003.1205177"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919083"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.5555\/560765"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Julia\u00a0E Hoch and Steve\u00a0WJ Kozlowski. 2014. Leading virtual teams: Hierarchical leadership structural supports and shared team leadership. Journal of Applied Psychology 99 3 (2014) 390. 10.1037\/a0030264","DOI":"10.1037\/a0030264"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366835"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","unstructured":"Gareth\u00a0R Jones and Jennifer\u00a0M George. 1998. The experience and evolution of trust: Implications for cooperation and teamwork. The Academy of Management Review 23 3 (1998) 531\u2013546. 10.2307\/259293","DOI":"10.2307\/259293"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","unstructured":"Bradley\u00a0L. Kirkman Benson Rosen Paul\u00a0E. Tesluk and Cristina\u00a0B. Gibson. 2004. The Impact of Team Empowerment on Virtual Team Performance: The Moderating Role of Face-to-Face Interaction. Academy of Management Journal 47 2 (2004) 175\u2013192. 10.5465\/20159571","DOI":"10.5465\/20159571"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441923"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354239"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157246"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","unstructured":"Claire La\u00a0Fleur Blaine Hoffman C.\u00a0Benjamin Gibson and Norbou Buchler. 2021. Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role specialization. Computers & Security 104 (May 2021) 102229. 10.1016\/j.cose.2021.102229","DOI":"10.1016\/j.cose.2021.102229"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","unstructured":"Claus\u00a0W Langfred. 2005. Autonomy and performance in teams: The multilevel moderating effect of task interdependence. Journal of Management 31 4 (2005) 513\u2013529. 10.1177\/0149206304272190","DOI":"10.1177\/0149206304272190"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-39"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647349"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053268"},{"key":"e_1_3_3_2_52_2","unstructured":"The GNU\u00a0C Library. [n. d.]. Memory Allocation Tunables (The GNU C Library). https:\/\/www.gnu.org\/software\/libc\/manual\/html_node\/Memory-Allocation-Tunables.html."},{"key":"e_1_3_3_2_53_2","unstructured":"Rachel\u00a0A Lotan. 2003. Group-worthy tasks. Educational Leadership 60 6 (2003) 72\u201375. Publisher: ASCD ASSOCIATION FOR SUPERVISION AND."},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","unstructured":"Jeremy\u00a0S Lurey and Mahesh\u00a0S Raisinghani. 2001. An Emprical Study of Best Practices in Virtual Teams. Information & Management 38 8 (2001) 523\u2013544. 10.1016\/S0378-7206(01)00074-X","DOI":"10.1016\/S0378-7206(01)00074-X"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998322"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58858-831"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","unstructured":"Thomas Maillart Mingyi Zhao Jens Grossklags and John Chuang. 2017. Given enough eyeballs all bugs are shallow? Revisiting Eric Raymond with bug bounty programs. Journal of Cybersecurity 3 2 (2017) 81\u201390. 10.1093\/cybsec\/tyx008","DOI":"10.1093\/cybsec\/tyx008"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.5555\/3153292"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2851054"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","unstructured":"Roger\u00a0C Mayer James\u00a0H Davis and F\u00a0David Schoorman. 1995. An Integrative Model of Organizational Trust. The Academy of Management Review 20 3 (1995) 709\u2013734. 10.5465\/amr.1995.9508080335","DOI":"10.5465\/amr.1995.9508080335"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","unstructured":"Roger\u00a0C Mayer and Mark\u00a0B Gavin. 2005. Trust in management and performance: Who minds the shop while the employees watch the boss? Academy of Management Journal 48 5 (2005) 874\u2013888. 10.5465\/AMJ.2005.18803928","DOI":"10.5465\/AMJ.2005.18803928"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and Inter-Rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proceedings of the ACM on Computer Supported Cooperative Work and Social Computing 3 CSCW Article 72 23\u00a0pages. 10.1145\/3359174","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","unstructured":"Ebony\u00a0O. McGee Derek\u00a0M. Griffith and Stacey\u00a0L. HoustonII. 2019. \u201cI Know I Have to Work Twice as Hard and Hope that Makes Me Good Enough\u201d: Exploring the Stress and Strain of Black Doctoral Students in Engineering and Computing. Teachers College Record 121 4 (April 2019) 1\u201338. 10.1177\/016146811912100407Publisher: SAGE Publications.","DOI":"10.1177\/016146811912100407"},{"key":"e_1_3_3_2_64_2","series-title":"(3GSE \u201914)","volume-title":"USENIX Summit on Gaming, Games, and Gamification in Security Education","author":"Mirkovic Jelena","year":"2014","unstructured":"Jelena Mirkovic and Peter\u00a0AH Peterson. 2014. Class Capture-the-Flag Exercises. In USENIX Summit on Gaming, Games, and Gamification in Security Education(3GSE \u201914). USENIX Association."},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","unstructured":"Wayne\u00a0A. Neu. 2018. Quantitative Evidence of Students\u2019 Use of Social Networks and Social Categorization When Self-Selecting Teams. Journal of Marketing Education 40 3 (Dec. 2018) 161\u2013175. 10.1177\/0273475318757583Publisher: SAGE Publications Inc.","DOI":"10.1177\/0273475318757583"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181"},{"key":"e_1_3_3_2_67_2","unstructured":"Barbara Oakley Rebecca Brent Richard\u00a0M Felder and Imad Elhajj. 2004. Turning Student Groups into Effective Teams. Journal of Student Centered Learning 2 1 (2004)."},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630811"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","unstructured":"Gary\u00a0M Olson and Judith\u00a0S Olson. 2000. Distance Matters. Human-Computer Interaction 15 2 (2000) 139\u2013178. 10.1207\/S15327051HCI15234","DOI":"10.1207\/S15327051HCI15234"},{"key":"e_1_3_3_2_70_2","unstructured":"OWASP. [n. d.]. Doubly freeing memory. https:\/\/owasp.org\/www-community\/vulnerabilities\/Doubly_freeing_memory."},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","unstructured":"Gabriele Piccoli Anne Powell and Blake Ives. 2004. Virtual teams: team control structure work processes and team effectiveness. Information Technology & People 17 (2004). 10.1108\/09593840410570258","DOI":"10.1108\/09593840410570258"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","unstructured":"Anne Powell Gabriele Piccoli and Blake Ives. 2004. Virtual Teams: A Review of Current Literature and Directions for Future Research. SIGMIS Database 35 1 (2004) 6\u201336. 10.1145\/968464.968467","DOI":"10.1145\/968464.968467"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499367"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3501385.3543980"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"publisher","unstructured":"Radostina\u00a0K Purvanova and Joyce\u00a0E Bono. 2009. Transformational leadership in context: Face-to-face and virtual teams. The Leadership Quarterly 20 3 (2009) 343\u2013357. 10.1016\/j.leaqua.2009.03.004","DOI":"10.1016\/j.leaqua.2009.03.004"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","unstructured":"Yolanda\u00a0A. Rankin Jakita\u00a0O. Thomas and Sheena Erete. 2021. Black Women Speak: Examining Power Privilege and Identity in CS Education. ACM Transactions on Computing Education 21 4 (Dec. 2021) 1\u201331. 10.1145\/3451344","DOI":"10.1145\/3451344"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820076"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","unstructured":"Lionel\u00a0P Robert Alan\u00a0R Denis and Yu-Ting\u00a0Caisy Hung. 2009. Individual swift trust and knowledge-based trust in face-to-face and virtual team members. Journal of Management Information Systems 26 2 (2009) 241\u2013279. 10.2753\/MIS0742-1222260210","DOI":"10.2753\/MIS0742-1222260210"},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","unstructured":"William\u00a0H. Robinson Ebony\u00a0O. McGee Lydia\u00a0C. Bentley Stacey\u00a0L. Houston and Portia\u00a0K. Botchway. 2016. Addressing Negative Racial and Gendered Experiences That Discourage Academic Careers in Engineering. Computing in Science & Engineering 18 2 (March 2016) 29\u201339. 10.1109\/MCSE.2016.38Conference Name: Computing in Science & Engineering.","DOI":"10.1109\/MCSE.2016.38"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"publisher","unstructured":"Robin Ruefle Audrey Dorofee David Mundie Allen\u00a0D Householder Michael Murray and Samuel\u00a0J Perl. 2014. Computer security incident response team development and evolution. IEEE Security & Privacy 12 5 (2014) 16\u201326. 10.1109\/MSP.2014.89","DOI":"10.1109\/MSP.2014.89"},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/1833310.1833319"},{"key":"e_1_3_3_2_82_2","doi-asserted-by":"publisher","unstructured":"Wm\u00a0David Salisbury Traci\u00a0A Carte and Laku Chidambaram. 2006. Cohesion in virtual teams: validating the perceived cohesion scale in a distributed setting. SIGMIS Database 37 2-3 (2006) 147\u2013155. 10.1145\/1161345.1161362","DOI":"10.1145\/1161345.1161362"},{"key":"e_1_3_3_2_83_2","doi-asserted-by":"publisher","unstructured":"John Schaubroeck Simon\u00a0SK Lam and Ann\u00a0Chunyan Peng. 2011. Cognition-based and affect-based trust as mediators of leader behavior influences on team performance. Journal of Applied Psychology 96 4 (2011) 863. 10.1037\/a0022625","DOI":"10.1037\/a0022625"},{"key":"e_1_3_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3641554.3701811"},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3568813.3600121"},{"key":"e_1_3_3_2_86_2","unstructured":"Cesare Silvio. 2019. Linux Heap TCache Poisoning. https:\/\/blog.infosectcbr.com.au\/2019\/07\/linux-heap-tcache-poisoning.html"},{"key":"e_1_3_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSEET58097.2023.00036"},{"key":"e_1_3_3_2_88_2","doi-asserted-by":"publisher","unstructured":"Leonard Springer Mary\u00a0Elizabeth Stanne and Samuel\u00a0S. Donovan. 1999. Effects of Small-Group Learning on Undergraduates in Science Mathematics Engineering and Technology: A Meta-Analysis. Review of Educational Research 69 1 (March 1999) 21\u201351. 10.3102\/00346543069001021Publisher: American Educational Research Association.","DOI":"10.3102\/00346543069001021"},{"key":"e_1_3_3_2_89_2","doi-asserted-by":"publisher","unstructured":"Julie Steinke Balca Bolunmez Laura Fletcher Vicki Wang Alan\u00a0J Tomassetti Kristin\u00a0M Repchick Stephen\u00a0J Zaccaro Reeshad\u00a0S Dalal and Lois\u00a0E Tetrick. 2015. Improving cybersecurity incident response team effectiveness using teams-based research. IEEE Security & Privacy 13 4 (2015) 20\u201329. 10.1109\/MSP.2015.71","DOI":"10.1109\/MSP.2015.71"},{"key":"e_1_3_3_2_90_2","doi-asserted-by":"crossref","unstructured":"S.\u00a0D. Teasley L.\u00a0A. Covi M.\u00a0S. Krishnan and J.\u00a0S. Olson. 2002. Rapid software development through team collocation. IEEE Transactions on Software Engineering 28 7 (2002) 671\u2013683.","DOI":"10.1109\/TSE.2002.1019481"},{"key":"e_1_3_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503252.3531298"},{"key":"e_1_3_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--37163"},{"key":"e_1_3_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/IBF50092.2020.9034828"},{"key":"e_1_3_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2835237"},{"key":"e_1_3_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366792"},{"key":"e_1_3_3_2_96_2","volume-title":"The HCOMP Workshop on Mathematical Foundations of Human Computation","author":"Zhao Mingyi","year":"2016","unstructured":"Mingyi Zhao, Aron Laszka, Thomas Maillart, and Jens Grossklags. 2016. Crowdsourced security vulnerability discovery: Modeling and organizing bug-bounty programs. In The HCOMP Workshop on Mathematical Foundations of Human Computation (Austin, TX, USA)."},{"key":"e_1_3_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145269"}],"event":{"name":"Koli Calling '25: 25th Koli Calling International Conference on Computing Education Research","acronym":"Koli Calling '25","location":"Koli Finland"},"container-title":["Proceedings of the 25th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3769994.3770022","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T17:02:56Z","timestamp":1762448576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769994.3770022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":96,"alternative-id":["10.1145\/3769994.3770022","10.1145\/3769994"],"URL":"https:\/\/doi.org\/10.1145\/3769994.3770022","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"2025-11-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}