{"id":"https://openalex.org/W2030492719","doi":"https://doi.org/10.1109/iri.2012.6303071","title":"First use: Introducing information security in high school oracle academy courses","display_name":"First use: Introducing information security in high school oracle academy courses","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W2030492719","doi":"https://doi.org/10.1109/iri.2012.6303071","mag":"2030492719"},"language":"en","primary_location":{"id":"doi:10.1109/iri.2012.6303071","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iri.2012.6303071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 13th International Conference on Information Reuse &amp; Integration (IRI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035542329","display_name":"RoxAnn Stalvey","orcid":null},"institutions":[{"id":"https://openalex.org/I204593131","display_name":"College of Charleston","ror":"https://ror.org/00390t168","country_code":"US","type":"education","lineage":["https://openalex.org/I204593131"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"RoxAnn H. Stalvey","raw_affiliation_strings":["College of Charleston, USA","College of Charleston , USA"],"affiliations":[{"raw_affiliation_string":"College of Charleston, USA","institution_ids":["https://openalex.org/I204593131"]},{"raw_affiliation_string":"College of Charleston , USA","institution_ids":["https://openalex.org/I204593131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059899524","display_name":"Csilla Farkas","orcid":"https://orcid.org/0000-0002-6848-1790"},"institutions":[{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Csilla Farkas","raw_affiliation_strings":["University of South Carolina, USA","University of South Carolina., USA"],"affiliations":[{"raw_affiliation_string":"University of South Carolina, USA","institution_ids":["https://openalex.org/I155781252"]},{"raw_affiliation_string":"University of South Carolina., USA","institution_ids":["https://openalex.org/I155781252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111763649","display_name":"Caroline M. Eastman","orcid":null},"institutions":[{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Caroline Eastman","raw_affiliation_strings":["University of South Carolina, USA","University of South Carolina., USA"],"affiliations":[{"raw_affiliation_string":"University of South Carolina, USA","institution_ids":["https://openalex.org/I155781252"]},{"raw_affiliation_string":"University of South Carolina., USA","institution_ids":["https://openalex.org/I155781252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035542329"],"corresponding_institution_ids":["https://openalex.org/I204593131"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.15855262,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"25","issue":null,"first_page":"653","last_page":"658"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7465522289276123},{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.7273160219192505},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.6975835561752319},{"id":"https://openalex.org/keywords/database-security","display_name":"Database security","score":0.6798102855682373},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.48392826318740845},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.4672163724899292},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.40152281522750854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3901694715023041},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.34842967987060547},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.279934823513031},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.20289936661720276},{"id":"https://openalex.org/keywords/pedagogy","display_name":"Pedagogy","score":0.08397316932678223}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7465522289276123},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.7273160219192505},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.6975835561752319},{"id":"https://openalex.org/C2778553114","wikidata":"https://www.wikidata.org/wiki/Q1035293","display_name":"Database security","level":2,"score":0.6798102855682373},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.48392826318740845},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.4672163724899292},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.40152281522750854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3901694715023041},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.34842967987060547},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.279934823513031},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.20289936661720276},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.08397316932678223},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iri.2012.6303071","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iri.2012.6303071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 13th International Conference on Information Reuse &amp; Integration (IRI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W49916206","https://openalex.org/W206424361","https://openalex.org/W632265550","https://openalex.org/W1568871075","https://openalex.org/W1969021887","https://openalex.org/W1985655515","https://openalex.org/W2008799189","https://openalex.org/W2023796679","https://openalex.org/W2091986016","https://openalex.org/W2103023172","https://openalex.org/W2104157873","https://openalex.org/W2112538635","https://openalex.org/W2203335496","https://openalex.org/W2283630310","https://openalex.org/W4254438575","https://openalex.org/W4293157137","https://openalex.org/W6602046691","https://openalex.org/W6608365490","https://openalex.org/W6677073937"],"related_works":["https://openalex.org/W2187336458","https://openalex.org/W4230385779","https://openalex.org/W1811024770","https://openalex.org/W2375023814","https://openalex.org/W4312715343","https://openalex.org/W3003273405","https://openalex.org/W3119960109","https://openalex.org/W2135155958","https://openalex.org/W2150071393","https://openalex.org/W3012546410"],"abstract_inverted_index":{"Security":[0],"education":[1],"is":[2,164],"vital":[3],"to":[4,66,86,93,127,152,166,175],"successfully":[5],"counter":[6],"cyber-attacks.":[7],"While":[8],"stand-alone":[9],"computer":[10,20,116,147],"security":[11,14,44,77,95,122,155,173,181],"and":[12,32,141,149],"database":[13,98,103,114,172],"courses":[15,25],"are":[16,33],"offered":[17],"in":[18,97,110],"college-level":[19],"science":[21,117],"degree":[22],"programs,":[23],"these":[24],"do":[26],"not":[27],"reach":[28],"all":[29],"computing":[30,50,58],"majors":[31],"often":[34],"available":[35],"only":[36],"for":[37],"senior":[38],"level":[39],"students.":[40],"We":[41,100,119,138,159],"believe":[42],"that":[43,106,121,162],"should":[45],"be":[46,108,125],"incorporated":[47],"into":[48],"the":[49,68,87,94,128,154,180],"curriculum":[51,81,89],"at":[52,131],"every":[53],"level,":[54],"including":[55],"high":[56,71,112,168],"school":[57,113,169],"courses.":[59],"In":[60],"this":[61,132],"paper":[62],"we":[63],"show":[64,120],"how":[65],"extend":[67],"widely":[69],"popular":[70],"school-level":[72],"Oracle":[73],"Academy":[74],"program":[75],"with":[76],"concepts.":[78],"The":[79],"proposed":[80],"extensions":[82],"require":[83],"minimal":[84],"changes":[85],"current":[88],"while":[90],"introducing":[91],"students":[92,129],"threats":[96],"systems.":[99],"provide":[101],"example":[102],"laboratory":[104],"materials":[105],"can":[107,124],"included":[109],"a":[111],"or":[115],"course.":[118],"concepts":[123],"presented":[126],"even":[130],"early":[133],"stage":[134],"of":[135,179],"their":[136],"education.":[137],"propose":[139],"age":[140],"education-level":[142],"appropriate":[143],"methods,":[144],"such":[145],"as":[146],"gaming":[148],"social":[150],"interaction,":[151],"deliver":[153],"relevant":[156],"course":[157],"modules.":[158],"also":[160],"argue":[161],"it":[163],"imperative":[165],"educate":[167],"teachers":[170],"on":[171],"topics":[174],"ensure":[176],"satisfactory":[177],"delivery":[178],"components.":[182]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
