{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:23:59Z","timestamp":1773548639612,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1145\/3593663.3593665","type":"proceedings-article","created":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T22:18:56Z","timestamp":1686003536000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Reflections on Training Next-Gen Industry Workforce on Secure Software Development"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1462-6701","authenticated-orcid":false,"given":"Tiago","family":"Espinha Gasiba","sequence":"first","affiliation":[{"name":"Siemens AG, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1867-1542","authenticated-orcid":false,"given":"Andrei-Cristian","family":"Iosif","sequence":"additional","affiliation":[{"name":"Siemens AG, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1549-9131","authenticated-orcid":false,"given":"Santiago","family":"Suppan","sequence":"additional","affiliation":[{"name":"Siemens AG, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4286-3184","authenticated-orcid":false,"given":"Ulrike","family":"Lechner","sequence":"additional","affiliation":[{"name":"Universit\u00e4t der Bundeswehr M\u00fcnchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2725-7629","authenticated-orcid":false,"given":"Maria","family":"Pinto-Albuquerque","sequence":"additional","affiliation":[{"name":"ISCTE-IUL - Instituto Universit\u00e1rio de Lisboa, Portugal, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209087.3209101"},{"key":"e_1_3_2_1_2_1","volume-title":"When Interactive Graphic Storytelling Fails. 27th International Requirements Engineering Conference Workshops (REW) 1 (8 2019","author":"Barela James","year":"2019","unstructured":"James Barela , Tiago Gasiba , Santiago Suppan , Marc Berges , and Kristian Beckers . 2019 . When Interactive Graphic Storytelling Fails. 27th International Requirements Engineering Conference Workshops (REW) 1 (8 2019 ), 164\u2013169. https:\/\/doi.org\/10.1109\/REW.2019.00034 IEEE. 10.1109\/REW.2019.00034 James Barela, Tiago Gasiba, Santiago Suppan, Marc Berges, and Kristian Beckers. 2019. When Interactive Graphic Storytelling Fails. 27th International Requirements Engineering Conference Workshops (REW) 1 (8 2019), 164\u2013169. https:\/\/doi.org\/10.1109\/REW.2019.00034 IEEE."},{"key":"e_1_3_2_1_3_1","volume-title":"Technical Report. BSI, Reguvis Fachmedien GmbH","author":"\u00fcr Bundesamt","year":"2016","unstructured":"Bundesamt f \u00fcr Sicherheit in der Informationstechnik . 2016. BSI IT- Grundschutz-Katalog . Technical Report. BSI, Reguvis Fachmedien GmbH , K\u00f6ln, Germany . 1\u20135082 pages. https:\/\/download.gsb.bund.de\/BSI\/ITGSK\/IT-Grundschutz-Kataloge_ 2016 _EL15_DE.pdf15. ed, BSI. Bundesamt f\u00fcr Sicherheit in der Informationstechnik. 2016. BSI IT-Grundschutz-Katalog. Technical Report. BSI, Reguvis Fachmedien GmbH, K\u00f6ln, Germany. 1\u20135082 pages. https:\/\/download.gsb.bund.de\/BSI\/ITGSK\/IT-Grundschutz-Kataloge_2016_EL15_DE.pdf15. ed, BSI."},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Department of Homeland Security, US-CERT. 2020. Software Assurance.","year":"2020","unstructured":"Department of Homeland Security, US-CERT. 2020. Software Assurance. Retrieved September 27 2020 from https:\/\/tinyurl.com\/y6pr9v42 Department of Homeland Security, US-CERT. 2020. Software Assurance. Retrieved September 27 2020 from https:\/\/tinyurl.com\/y6pr9v42"},{"key":"e_1_3_2_1_5_1","volume-title":"Third International Computer Programming Education Conference (ICPEC 2022)","author":"Dewes Tilman","year":"2022","unstructured":"Tilman Dewes , Tiago Gasiba , and Thomas Schreck . 2022 . Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles . In Third International Computer Programming Education Conference (ICPEC 2022) (Open Access Series in Informatics (OASIcs), Vol.\u00a0102), Alberto Sim\u00f5es and Jo\u00e3o\u00a0Carlos Silva (Eds.). Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany, 3:1\u20133:12. https:\/\/doi.org\/10.4230\/OASIcs.ICPEC. 2022.3 10.4230\/OASIcs.ICPEC.2022.3 Tilman Dewes, Tiago Gasiba, and Thomas Schreck. 2022. Understanding the Usage of IT-Security Games in the Industry and Its Mapping to Job Profiles. In Third International Computer Programming Education Conference (ICPEC 2022)(Open Access Series in Informatics (OASIcs), Vol.\u00a0102), Alberto Sim\u00f5es and Jo\u00e3o\u00a0Carlos Silva (Eds.). Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany, 3:1\u20133:12. https:\/\/doi.org\/10.4230\/OASIcs.ICPEC.2022.3"},{"key":"e_1_3_2_1_6_1","volume-title":"Entertainment Computing and Serious Games: International GI-Dagstuhl Seminar (1 ed.)","author":"D\u00f6rner Ralf","unstructured":"Ralf D\u00f6rner , Stefan G\u00f6bel , Michael Kickmeier-Rust , Maic Masuch , and Katharina Zweig . 2016. Entertainment Computing and Serious Games: International GI-Dagstuhl Seminar (1 ed.) . Springer , Dagstuhl Castle , Germany. 1\u2013549 pages. Ralf D\u00f6rner, Stefan G\u00f6bel, Michael Kickmeier-Rust, Maic Masuch, and Katharina Zweig. 2016. Entertainment Computing and Serious Games: International GI-Dagstuhl Seminar (1 ed.). Springer, Dagstuhl Castle, Germany. 1\u2013549 pages."},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"\u00fcr Bundesamt","year":"2023","unstructured":"Bundesamt f \u00fcr Sicherheit in \u00a0der Informationstechnik . 2023 . Warnstufe Rot: Schwachstelle Log4Shell f\u00fchrt zu extrem kritischer Bedrohungslage . Retrieved February 27, 2023 from https:\/\/www.bsi.bund.de\/DE\/Service-Navi\/Presse\/Pressemitteilungen\/Presse2021\/211211_log4Shell_WarnstufeRot.html Bundesamt f\u00fcr Sicherheit in\u00a0der Informationstechnik. 2023. Warnstufe Rot: Schwachstelle Log4Shell f\u00fchrt zu extrem kritischer Bedrohungslage. Retrieved February 27, 2023 from https:\/\/www.bsi.bund.de\/DE\/Service-Navi\/Presse\/Pressemitteilungen\/Presse2021\/211211_log4Shell_WarnstufeRot.html"},{"key":"e_1_3_2_1_8_1","unstructured":"Tiago Gasiba. 2021. Raising Awareness on Secure Coding in the Industry through CyberSecurity Challenges. Ph.\u00a0D. Dissertation. Universit\u00e4t der Bundeswehr M\u00fcnchen.  Tiago Gasiba. 2021. Raising Awareness on Secure Coding in the Industry through CyberSecurity Challenges. Ph.\u00a0D. Dissertation. Universit\u00e4t der Bundeswehr M\u00fcnchen."},{"key":"e_1_3_2_1_9_1","volume-title":"Sifu - A CyberSecurity Awareness Platform with Challenge Assessment and Intelligent Coach. Special Issue of Cyber-Physical System Security of the Cybersecurity Journal 1 (10","author":"Gasiba Tiago","year":"2020","unstructured":"Tiago Gasiba , Ulrike Lechner , and Maria Pinto-Albuquerque . 2020. Sifu - A CyberSecurity Awareness Platform with Challenge Assessment and Intelligent Coach. Special Issue of Cyber-Physical System Security of the Cybersecurity Journal 1 (10 2020 ), 1\u201323. https:\/\/doi.org\/10.1186\/s42400-020-00064-4 SpringerOpen , Online . 10.1186\/s42400-020-00064-4 Tiago Gasiba, Ulrike Lechner, and Maria Pinto-Albuquerque. 2020. Sifu - A CyberSecurity Awareness Platform with Challenge Assessment and Intelligent Coach. Special Issue of Cyber-Physical System Security of the Cybersecurity Journal 1 (10 2020), 1\u201323. https:\/\/doi.org\/10.1186\/s42400-020-00064-4 SpringerOpen, Online."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3396802.3396808"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224377100800414"},{"key":"e_1_3_2_1_13_1","first-page":"22","article-title":"Skills, Certifications, or Degrees: What Companies Demand for Entry-Level Cybersecurity Jobs.","volume":"18","author":"Marquardson Jim","year":"2020","unstructured":"Jim Marquardson and Ahmed Elnoshokaty . 2020 . Skills, Certifications, or Degrees: What Companies Demand for Entry-Level Cybersecurity Jobs. Information Systems Education Journal 18 , 1 (2020), 22 \u2013 28 . Jim Marquardson and Ahmed Elnoshokaty. 2020. Skills, Certifications, or Degrees: What Companies Demand for Entry-Level Cybersecurity Jobs.Information Systems Education Journal 18, 1 (2020), 22\u201328.","journal-title":"Information Systems Education Journal"},{"key":"e_1_3_2_1_14_1","volume-title":"Mentimeter: Interactive presentation software. Retrieved","author":"Mentimeter","year":"2020","unstructured":"Mentimeter AB. 2020 . Mentimeter: Interactive presentation software. Retrieved September 27 2020 from https:\/\/www.mentimeter.com\/ Mentimeter AB. 2020. Mentimeter: Interactive presentation software. Retrieved September 27 2020 from https:\/\/www.mentimeter.com\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Class Capture-the-Flag Exercises. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) 1 (7","author":"Mirkovic Jelena","year":"2014","unstructured":"Jelena Mirkovic and Peter Peterson . 2014. Class Capture-the-Flag Exercises. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) 1 (7 2014 ), 1\u20138. https:\/\/www.usenix.org\/conference\/3gse14\/summit-program\/presentation\/mirkovic USENIX Association , San Diego, CA, USA . Jelena Mirkovic and Peter Peterson. 2014. Class Capture-the-Flag Exercises. 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) 1 (7 2014), 1\u20138. https:\/\/www.usenix.org\/conference\/3gse14\/summit-program\/presentation\/mirkovic USENIX Association, San Diego, CA, USA."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2013.2297318"},{"key":"e_1_3_2_1_17_1","volume-title":"Open Web Application Security Project JuiceShop. Retrieved (23","author":"Foundation OWASP","year":"2023","unstructured":"OWASP Foundation . 2023. Open Web Application Security Project JuiceShop. Retrieved (23 February 2023 ) from https:\/\/www.owasp.org\/index.php\/OWASP_Juice_Shop_Project OWASP Foundation. 2023. Open Web Application Security Project JuiceShop. Retrieved (23 February 2023) from https:\/\/www.owasp.org\/index.php\/OWASP_Juice_Shop_Project"},{"key":"e_1_3_2_1_18_1","volume-title":"2019 Global Developer Report: DevSecOps finds security roadblocks divide teams. Retrieved","author":"Patel Suri","year":"2020","unstructured":"Suri Patel . 2020. 2019 Global Developer Report: DevSecOps finds security roadblocks divide teams. Retrieved July 18 2020 from https:\/\/about.gitlab.com\/blog\/2019\/07\/15\/global-developer-report\/ Suri Patel. 2020. 2019 Global Developer Report: DevSecOps finds security roadblocks divide teams. Retrieved July 18 2020 from https:\/\/about.gitlab.com\/blog\/2019\/07\/15\/global-developer-report\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Learning Computer Programming: A Gamified Approach. In Third International Computer Programming Education Conference (ICPEC 2022)","author":"Pinto M\u00e1rio","year":"2022","unstructured":"M\u00e1rio Pinto and Teresa Terroso . 2022 . Learning Computer Programming: A Gamified Approach. In Third International Computer Programming Education Conference (ICPEC 2022) (Open Access Series in Informatics (OASIcs), Vol.\u00a0102), Alberto Sim\u00f5es and Jo\u00e3o\u00a0Carlos Silva (Eds.). Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany, 11:1\u201311:8. https:\/\/doi.org\/10.4230\/OASIcs.ICPEC. 2022.11 10.4230\/OASIcs.ICPEC.2022.11 M\u00e1rio Pinto and Teresa Terroso. 2022. Learning Computer Programming: A Gamified Approach. In Third International Computer Programming Education Conference (ICPEC 2022)(Open Access Series in Informatics (OASIcs), Vol.\u00a0102), Alberto Sim\u00f5es and Jo\u00e3o\u00a0Carlos Silva (Eds.). Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany, 11:1\u201311:8. https:\/\/doi.org\/10.4230\/OASIcs.ICPEC.2022.11"},{"key":"e_1_3_2_1_20_1","volume-title":"Introductory Programming in Higher Education: A Systematic Literature Review. In Third International Computer Programming Education Conference (ICPEC 2022)","author":"Rodrigues Gabryella","year":"2022","unstructured":"Gabryella Rodrigues , Ana\u00a0Francisca Monteiro , and Ant\u00f3nio Os\u00f3rio . 2022 . Introductory Programming in Higher Education: A Systematic Literature Review. In Third International Computer Programming Education Conference (ICPEC 2022) (Open Access Series in Informatics (OASIcs), Vol.\u00a0102), Alberto Sim\u00f5es and Jo\u00e3o\u00a0Carlos Silva (Eds.). Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany, 4:1\u20134:17. https:\/\/doi.org\/10.4230\/OASIcs.ICPEC. 2022.4 10.4230\/OASIcs.ICPEC.2022.4 Gabryella Rodrigues, Ana\u00a0Francisca Monteiro, and Ant\u00f3nio Os\u00f3rio. 2022. Introductory Programming in Higher Education: A Systematic Literature Review. In Third International Computer Programming Education Conference (ICPEC 2022)(Open Access Series in Informatics (OASIcs), Vol.\u00a0102), Alberto Sim\u00f5es and Jo\u00e3o\u00a0Carlos Silva (Eds.). Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany, 4:1\u20134:17. https:\/\/doi.org\/10.4230\/OASIcs.ICPEC.2022.4"},{"key":"e_1_3_2_1_21_1","volume-title":"Semi-Automated Categorization of Open-Ended Questions. Survey Research Methods 10, 2 (8","author":"Schonlau Matthias","year":"2016","unstructured":"Matthias Schonlau and Mick Couper . 2016. Semi-Automated Categorization of Open-Ended Questions. Survey Research Methods 10, 2 (8 2016 ), 143\u2013152. https:\/\/doi.org\/10.18148\/srm\/2016.v10i2.6213. 10.18148\/srm Matthias Schonlau and Mick Couper. 2016. Semi-Automated Categorization of Open-Ended Questions. Survey Research Methods 10, 2 (8 2016), 143\u2013152. https:\/\/doi.org\/10.18148\/srm\/2016.v10i2.6213."},{"key":"e_1_3_2_1_22_1","volume-title":"Action Design Research. MIS Quarterly 35, 1 (3","author":"Sein Maung","year":"2011","unstructured":"Maung Sein , Ola Henfridsson , Sandeep Purao , Matti Rossi , and Rikard Lindgren . 2011. Action Design Research. MIS Quarterly 35, 1 (3 2011 ), 37\u201356. https:\/\/doi.org\/10.2307\/23043488 10.2307\/23043488 Maung Sein, Ola Henfridsson, Sandeep Purao, Matti Rossi, and Rikard Lindgren. 2011. Action Design Research. MIS Quarterly 35, 1 (3 2011), 37\u201356. https:\/\/doi.org\/10.2307\/23043488"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2020.100326"}],"event":{"name":"ECSEE 2023: European Conference on Software Engineering Education","location":"Seeon\/Bavaria Germany","acronym":"ECSEE 2023"},"container-title":["Proceedings of the 5th European Conference on Software Engineering Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593663.3593665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3593663.3593665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:47Z","timestamp":1750178867000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593663.3593665"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":22,"alternative-id":["10.1145\/3593663.3593665","10.1145\/3593663"],"URL":"https:\/\/doi.org\/10.1145\/3593663.3593665","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]},"assertion":[{"value":"2023-06-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}