{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T17:05:53Z","timestamp":1762448753488,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","funder":[{"name":"Finnish Ministry of Education and Culture","award":["OKM\/60\/522\/2022"],"award-info":[{"award-number":["OKM\/60\/522\/2022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,11]]},"DOI":"10.1145\/3769994.3770028","type":"proceedings-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T16:35:41Z","timestamp":1762446941000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Survey of Security Concepts in Introductory Programming Courses in Finland"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2404-1429","authenticated-orcid":false,"given":"Alina","family":"Torbunova","sequence":"first","affiliation":[{"name":"\u00c5bo Akademi University, Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6791-2018","authenticated-orcid":false,"given":"Ivan","family":"Porres","sequence":"additional","affiliation":[{"name":"\u00c5bo Akademi University, Turku, Finland"}]}],"member":"320","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Abimbola\u00a0T. Alabi and Musibau\u00a0O. Jelili. 2023. Clarifying likert scale misconceptions for improved application in urban studies. Quality & Quantity 57 2 (01 Apr 2023) 1337\u20131350. 10.1007\/s11135-022-01415-8","DOI":"10.1007\/s11135-022-01415-8"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Sebastian Baltes and Paul Ralph. 2022. Sampling in software engineering research: a critical review and guidelines. Empirical Software Engineering 27 4 (28 Apr 2022) 94. 10.1007\/s10664-021-10072-8","DOI":"10.1007\/s10664-021-10072-8"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3304221.3319752"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39377-826"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"Ezgi Ero\u011flu\u00a0\u00c7akmako\u011flu and Ay\u015fe G\u00fcnay. 2025. Dental students\u2019 opinions on use of artificial intelligence: A survey study. Med. Sci. Monit. 31 (apr 2025) e947658. 10.12659\/MSM.947658","DOI":"10.12659\/MSM.947658"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Jacob Jacoby and Michael\u00a0S. Matell. 1971. Three-Point Likert Scales Are Good Enough. Journal of Marketing Research 8 4 (1971) 495\u2013500. 10.2307\/3150242","DOI":"10.2307\/3150242"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3631802.3631814"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Barbara Kitchenham David Budgen Pearl Brereton and Philip Woodall. 2005. An investigation of software engineering curricula. Journal of Systems and Software 74 3 (2005) 325\u2013335. 10.1016\/j.jss.2004.03.016","DOI":"10.1016\/j.jss.2004.03.016"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-044-53"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3664191"},{"key":"e_1_3_3_2_12_2","volume-title":"Tietoturva ohjelmoinnin ja ohjelmistotuotannon kursseilla Suomen yliopistoissa \u2013 nykytila ja opettajien n\u00e4kemykset","author":"Majanoja Anne-Maarit","year":"2024","unstructured":"Anne-Maarit Majanoja, Antti Hakkala, Ville Lepp\u00e4nen, and Seppo Virtanen. 2024. Tietoturva ohjelmoinnin ja ohjelmistotuotannon kursseilla Suomen yliopistoissa \u2013 nykytila ja opettajien n\u00e4kemykset. Reports from the Faculty of Technology\u00a03. University of Turku, Finland."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3013499.3013512"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630761"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Jorge Melegati Kieran Conboy and Daniel Graziotin. 2024. Qualitative Surveys in Software Engineering Research: Definition Critical Review and Guidelines. IEEE Transactions on Software Engineering 50 12 (2024) 3172\u20133187. 10.1109\/TSE.2024.3474173","DOI":"10.1109\/TSE.2024.3474173"},{"key":"e_1_3_3_2_16_2","unstructured":"MITRE. 2025. Common Weakness Enumeration. Retrieved January 15 2025 from https:\/\/cwe.mitre.org\/"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Jefferson\u00a0Seide Moll\u00e9ri Kai Petersen and Emilia Mendes. 2020. An empirically evaluated checklist for surveys in software engineering. Information and Software Technology 119 (2020) 106240. 10.1016\/j.infsof.2019.106240","DOI":"10.1016\/j.infsof.2019.106240"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Ellen Murphy Tom Crick and James\u00a0H. Davenport. 2017. An analysis of introductory programming courses at UK Universities. The Art Science and Engineering of Programming 1 2 (Apr 2017). 10.22152\/programming-journal.org\/2017\/1\/18","DOI":"10.22152\/programming-journal.org\/2017\/1\/18"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICE\/ITMC39735.2016.9025919"},{"key":"e_1_3_3_2_20_2","unstructured":"OWASP. 2025. Cryptographic Storage Cheat Sheet. Retrieved January 15 2025 from https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Cryptographic_Storage_Cheat_Sheet.html"},{"key":"e_1_3_3_2_21_2","unstructured":"OWASP. 2025. Improper Error Handling. Retrieved January 15 2025 from https:\/\/owasp.org\/www-community\/Improper_Error_Handling"},{"key":"e_1_3_3_2_22_2","unstructured":"OWASP. 2025. Input Validation Cheat Sheet. Retrieved January 15 2025 from https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Input_Validation_Cheat_Sheet.html"},{"key":"e_1_3_3_2_23_2","unstructured":"OWASP. 2025. Logging Cheat Sheet. Retrieved January 15 2025 from https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Logging_Cheat_Sheet.html"},{"key":"e_1_3_3_2_24_2","unstructured":"OWASP. 2025. OWASP Secure Coding Practices-Quick Reference Guide. Retrieved January 15 2025 from https:\/\/owasp.org\/www-project-secure-coding-practices-quick-reference-guide\/"},{"key":"e_1_3_3_2_25_2","unstructured":"OWASP. 2025. OWASP Web Security Testing Guide. Retrieved January 15 2025 from https:\/\/owasp.org\/www-project-web-security-testing-guide\/"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/EDUNINE60625.2024.10500581"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3649217.3653578"},{"key":"e_1_3_3_2_28_2","unstructured":"Paul Ralph Nauman bin Ali Sebastian Baltes Domenico Bianculli Jessica Diaz Yvonne Dittrich Neil Ernst Michael Felderer Robert Feldt Antonio Filieri Breno Bernard\u00a0Nicolau de Fran\u00e7a Carlo\u00a0Alberto Furia Greg Gay Nicolas Gold Daniel Graziotin Pinjia He Rashina Hoda Natalia Juristo Barbara Kitchenham Valentina Lenarduzzi Jorge Mart\u00ednez Jorge Melegati Daniel Mendez Tim Menzies Jefferson Molleri Dietmar Pfahl Romain Robbes Daniel Russo Nyyti Saarim\u00e4ki Federica Sarro Davide Taibi Janet Siegmund Diomidis Spinellis Miroslaw Staron Klaas Stol Margaret-Anne Storey Davide Taibi Damian Tamburri Marco Torchiano Christoph Treude Burak Turhan Xiaofeng Wang and Sira Vegas. 2020. Empirical Standards for Software Engineering Research. arxiv:https:\/\/arXiv.org\/abs\/2010.03525\u00a0[cs.SE] https:\/\/arxiv.org\/abs\/2010.03525"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"Jelena Roganovi\u0107 Miroslav Radenkovi\u0107 and Biljana Mili\u010di\u0107. 2023. Responsible Use of Artificial Intelligence in Dentistry: Survey on Dentists\u2019 and Final-Year Undergraduates\u2019 Perspectives. Healthcare 11 10 (2023). 10.3390\/healthcare11101480","DOI":"10.3390\/healthcare11101480"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Susan Sarhan Amira Badran Dalia Ghalwash Hadeel Gamal\u00a0Almalahy and Asmaa Abou-Bakr. 2025. Perception usage and concerns of artificial intelligence applications among postgraduate dental students: cross-sectional study. BMC Medical Education 25 1 (23 Jun 2025) 856. 10.1186\/s12909-025-07544-6","DOI":"10.1186\/s12909-025-07544-6"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2674683.2674690"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"Blair Taylor and Siddharth Kaza. 2016. Security Injections@Towson: Integrating Secure Coding into Introductory Computer Science Courses. ACM Trans. Comput. Educ. 16 4 Article 16 (2016) 20\u00a0pages. 10.1145\/2897441","DOI":"10.1145\/2897441"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA64295.2024.00052"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-94924-115"}],"event":{"name":"Koli Calling '25: 25th Koli Calling International Conference on Computing Education Research","acronym":"Koli Calling '25","location":"Koli Finland"},"container-title":["Proceedings of the 25th Koli Calling International Conference on Computing Education Research"],"original-title":[],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T17:02:30Z","timestamp":1762448550000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769994.3770028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":33,"alternative-id":["10.1145\/3769994.3770028","10.1145\/3769994"],"URL":"https:\/\/doi.org\/10.1145\/3769994.3770028","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"2025-11-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}