{"id":"https://openalex.org/W2013056189","doi":"https://doi.org/10.1145/1734263.1734302","title":"Educating the next generation of spammers","display_name":"Educating the next generation of spammers","publication_year":2010,"publication_date":"2010-03-10","ids":{"openalex":"https://openalex.org/W2013056189","doi":"https://doi.org/10.1145/1734263.1734302","mag":"2013056189"},"language":"en","primary_location":{"id":"doi:10.1145/1734263.1734302","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1734263.1734302","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 41st ACM technical symposium on Computer science education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077852213","display_name":"Joel Sommers","orcid":"https://orcid.org/0000-0003-4872-6532"},"institutions":[{"id":"https://openalex.org/I39660569","display_name":"Colgate University","ror":"https://ror.org/05d23ve83","country_code":"US","type":"education","lineage":["https://openalex.org/I39660569"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Joel Sommers","raw_affiliation_strings":["Colgate University, Hamilton, NY, USA","*Colgate University, Hamilton, NY, USA"],"affiliations":[{"raw_affiliation_string":"Colgate University, Hamilton, NY, USA","institution_ids":["https://openalex.org/I39660569"]},{"raw_affiliation_string":"*Colgate University, Hamilton, NY, USA","institution_ids":["https://openalex.org/I39660569"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5077852213"],"corresponding_institution_ids":["https://openalex.org/I39660569"],"apc_list":null,"apc_paid":null,"fwci":1.0115,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74771445,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"117","last_page":"121"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.629806399345398},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5826628804206848},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49810075759887695},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.41440558433532715},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.31540602445602417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15157407522201538}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.629806399345398},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5826628804206848},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49810075759887695},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.41440558433532715},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.31540602445602417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15157407522201538}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1734263.1734302","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1734263.1734302","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 41st ACM technical symposium on Computer science education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1528040107","https://openalex.org/W1529934475","https://openalex.org/W1553359200","https://openalex.org/W1929075730","https://openalex.org/W1966585167","https://openalex.org/W1980031281","https://openalex.org/W1990159359","https://openalex.org/W2009148626","https://openalex.org/W2044546611","https://openalex.org/W2107754621","https://openalex.org/W2146938540","https://openalex.org/W2155740216","https://openalex.org/W2163231024","https://openalex.org/W2170096197","https://openalex.org/W2339183141","https://openalex.org/W3005807387","https://openalex.org/W3162439866","https://openalex.org/W4253732778","https://openalex.org/W6633295692","https://openalex.org/W6640306368"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Compelling":[0],"experiences":[1],"in":[2,9,15,52,62,67],"introductory":[3],"courses":[4],"make":[5],"a":[6],"key":[7],"difference":[8],"whether":[10],"non-majors":[11],"develop":[12],"an":[13],"interest":[14],"computer":[16],"science,":[17],"possibly":[18],"even":[19],"converting":[20],"them":[21],"into":[22],"undergraduate":[23],"majors":[24],"or":[25],"minors.":[26],"In":[27,42],"this":[28],"paper":[29],"we":[30,46],"advocate":[31],"integrated":[32],"hands-on":[33],"laboratory":[34],"style":[35],"activities":[36,45],"to":[37,57],"provide":[38],"such":[39],"pivotal":[40],"experiences.":[41],"the":[43,79,80,107,112],"lab":[44,113],"describe,":[47],"students":[48],"do":[49],"not":[50],"engage":[51],"programming,":[53],"yet":[54],"they":[55],"learn":[56],"think":[58],"computationally":[59],"by":[60,94],"engaging":[61],"computational":[63],"activities.":[64],"The":[65],"course":[66],"which":[68],"these":[69],"labs":[70],"are":[71],"implemented":[72],"is":[73],"oriented":[74],"around":[75],"three":[76],"aspects":[77],"of":[78,111],"internet's":[81],"underside:":[82],"its":[83,95,103],"techno-scientific":[84],"underpinnings,":[85],"environmental":[86],"and":[87,90,98,109,129],"energy":[88],"problems":[89],"promise":[91],"brought":[92],"on":[93],"rapid":[96],"growth,":[97],"security":[99],"threats":[100],"associated":[101],"with":[102],"use.":[104],"We":[105,124],"describe":[106],"goals":[108],"content":[110],"activities,":[114],"as":[115,117],"well":[116],"various":[118],"challenges":[119],"encountered":[120],"through":[121],"their":[122],"implementation.":[123],"also":[125],"discuss":[126],"student":[127],"responses":[128],"future":[130],"directions.":[131]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
