{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:07:58Z","timestamp":1770998878461,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","funder":[{"name":"Australian Research Council","award":["DP250100229"],"award-info":[{"award-number":["DP250100229"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,2,18]]},"DOI":"10.1145\/3770762.3772575","type":"proceedings-article","created":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:15:58Z","timestamp":1770995758000},"page":"971-977","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Scaffolding genAI for Critical Reflection: A Transformative Approach to Diverging Assessments in IT Forensics"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4569-3384","authenticated-orcid":false,"given":"Amin","family":"Sakzad","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Monash University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4179-8149","authenticated-orcid":false,"given":"Judithe","family":"Sheard","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6911-608X","authenticated-orcid":false,"given":"Tahmine","family":"Ghorbaniandehkordi","sequence":"additional","affiliation":[{"name":"School of Mathematics, Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0910-9822","authenticated-orcid":false,"given":"Mikaela E.","family":"Milesi","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8143-289X","authenticated-orcid":false,"given":"Monica T.","family":"Whitty","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2026,2,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Game-based learning: A review of tabletop exercises for cybersecurity incident response training. Security and privacy","author":"Angafor Giddeon N","year":"2020","unstructured":"Giddeon N Angafor, Iryna Yevseyeva, and Ying He. 2020. Game-based learning: A review of tabletop exercises for cybersecurity incident response training. Security and privacy, Vol. 3, 6 (2020), e126."},{"key":"e_1_3_2_1_2_1","volume-title":"Whisper Diarization: Speaker Diarization Using OpenAI Whisper.","author":"Ashraf Mahmoud","year":"2024","unstructured":"Mahmoud Ashraf. 2024. Whisper Diarization: Speaker Diarization Using OpenAI Whisper. (2024)."},{"key":"e_1_3_2_1_3_1","unstructured":"Anon authors. 2025. Interview Questions. https:\/\/anonymous.4open.science\/r\/DivergingAssessment-GenAI-53E5\/Diverging%20Assessment%20and%20GenAI%20for%20Cybersecurity%20Education%20-%20Interview%20Questions.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3670243.3670781"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3724363.3729052"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dte.2024.100019"},{"key":"e_1_3_2_1_8_1","unstructured":"Exterro. 2025. FTK Forensic Toolkit. https:\/\/www.exterro.com\/digital-forensics-software\/forensic-toolkit"},{"key":"e_1_3_2_1_9_1","unstructured":"Volatility Foundation. 2025a. volatility3. https:\/\/github.com\/volatilityfoundation\/volatility3"},{"key":"e_1_3_2_1_10_1","unstructured":"Wireshark Foundation. 2025b. Wireshark. https:\/\/www.wireshark.org\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17727-4_70-1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541344608322678"},{"key":"e_1_3_2_1_13_1","volume-title":"Experiential learning: Experience as the source of learning and development","author":"Kolb David A","unstructured":"David A Kolb. 2014. Experiential learning: Experience as the source of learning and development. FT press."},{"key":"e_1_3_2_1_14_1","unstructured":"Sleuth Kit Labs. 2025. Autopsy Digital Forensics. https:\/\/www.autopsy.com\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-022-10142-8"},{"key":"e_1_3_2_1_16_1","volume-title":"Transformative learning: Theory to practice. New directions for adult and continuing education","author":"Mezirow Jack","year":"1997","unstructured":"Jack Mezirow. 1997. Transformative learning: Theory to practice. New directions for adult and continuing education, Vol. 1997, 74 (1997), 5-12."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3587102.3588788"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630774"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3641554.3701905"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3641554.3701922"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630832"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630880"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487056"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3660650.3660672"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003052081"}],"event":{"name":"SIGCSE TS 2026:The 57th ACM Technical Symposium on Computer Science Education","location":"St. Louis MO USA","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.1"],"original-title":[],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:18:44Z","timestamp":1770995924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3770762.3772575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,17]]},"references-count":25,"alternative-id":["10.1145\/3770762.3772575","10.1145\/3770762"],"URL":"https:\/\/doi.org\/10.1145\/3770762.3772575","relation":{},"subject":[],"published":{"date-parts":[[2026,2,17]]},"assertion":[{"value":"2026-02-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}