{"id":"https://openalex.org/W2005528611","doi":"https://doi.org/10.1145/2157136.2157432","title":"Hacking and the security curriculum","display_name":"Hacking and the security curriculum","publication_year":2012,"publication_date":"2012-02-29","ids":{"openalex":"https://openalex.org/W2005528611","doi":"https://doi.org/10.1145/2157136.2157432","mag":"2005528611"},"language":"en","primary_location":{"id":"doi:10.1145/2157136.2157432","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2157136.2157432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 43rd ACM technical symposium on Computer Science Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009976946","display_name":"Richard Weiss","orcid":"https://orcid.org/0009-0007-6610-5197"},"institutions":[{"id":"https://openalex.org/I60341648","display_name":"The Evergreen State College","ror":"https://ror.org/043yd1m08","country_code":"US","type":"education","lineage":["https://openalex.org/I60341648"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Richard S. Weiss","raw_affiliation_strings":["The Evergreen State College, Olypia, WA, USA","The Evergreen State College, Olypia, WA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"The Evergreen State College, Olypia, WA, USA","institution_ids":["https://openalex.org/I60341648"]},{"raw_affiliation_string":"The Evergreen State College, Olypia, WA, USA#TAB#","institution_ids":["https://openalex.org/I60341648"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086616243","display_name":"Michael E. Locasto","orcid":null},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Michael E. Locasto","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada","University of Calgary; Calgary; AB; Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"University of Calgary; Calgary; AB; Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036749753","display_name":"Jens Mache","orcid":"https://orcid.org/0000-0003-2927-7436"},"institutions":[{"id":"https://openalex.org/I74201987","display_name":"Lewis & Clark College","ror":"https://ror.org/013pz1582","country_code":"US","type":"education","lineage":["https://openalex.org/I74201987"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jens Mache","raw_affiliation_strings":["Lewis &amp; Clark College, Portland, OR, USA"],"affiliations":[{"raw_affiliation_string":"Lewis &amp; Clark College, Portland, OR, USA","institution_ids":["https://openalex.org/I74201987"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009976946"],"corresponding_institution_ids":["https://openalex.org/I60341648"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14989651,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"680","last_page":"680"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9473000168800354,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9291999936103821,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7157964706420898},{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.6261962652206421},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6122614145278931},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.4622345566749573},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.44665074348449707},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.44573545455932617},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4119342267513275},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2594720125198364},{"id":"https://openalex.org/keywords/pedagogy","display_name":"Pedagogy","score":0.23565849661827087},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.23451343178749084},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17113932967185974}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7157964706420898},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.6261962652206421},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6122614145278931},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.4622345566749573},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.44665074348449707},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.44573545455932617},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4119342267513275},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2594720125198364},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.23565849661827087},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.23451343178749084},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17113932967185974},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2157136.2157432","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2157136.2157432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 43rd ACM technical symposium on Computer Science Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.6100000143051147,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"Incorporating":[0],"information":[1],"security":[2,43],"into":[3,44],"the":[4,26,45,52,107,112,133],"undergraduate":[5],"curriculum":[6],"continues":[7],"to":[8,14,23,51,60,65,74,77,93,127,182,204,209],"be":[9,152,162],"a":[10,138,143,177],"topic":[11],"of":[12,19,29,42,54,70,114,121,179],"interest":[13],"SIGCSE":[15],"attendees.":[16],"The":[17],"purpose":[18],"this":[20],"BOF":[21,197],"is":[22,119,130],"help":[24],"sustain":[25],"existing":[27],"community":[28,178],"educators":[30,180],"and":[31,39,47,72,81,88,99,111,136,146,206],"researchers":[32],"interested":[33],"in":[34,85,158,166,170,193],"bringing":[35],"ethical":[36],"hacking":[37,71],"skills":[38],"an":[40,147,163],"understanding":[41],"classroom":[46],"relating":[48],"these":[49],"topics":[50],"foundations":[53],"Computer":[55],"Science.":[56],"We":[57,90],"would":[58],"like":[59],"bring":[61],"our":[62,79,95,103,196],"colleagues":[63],"together":[64],"share":[66,183],"pedagogical":[67],"practices,":[68],"stories":[69,203],"how":[73],"use":[75],"them":[76],"inspire":[78],"students":[80],"communicate":[82],"complex":[83],"concepts":[84],"computer":[86,159],"science":[87,160],"security.":[89],"also":[91],"plan":[92,208],"discuss":[94],"own":[96],"experiences,":[97,106],"practices":[98],"ongoing":[100],"efforts":[101],"(e.g.,":[102],"infosec":[104,115],"teaching":[105,125],"SISMAT":[108,118],"program,":[109,142],"EDURange":[110],"dissemination":[113],"interactive":[116],"exercises).":[117],"one":[120],"many":[122],"alternatives":[123],"for":[124],"cybersecurity":[126],"undergraduates.":[128],"It":[129],"based":[131],"on":[132,211],"\"Hacker":[134],"Curriculum\"":[135],"includes":[137],"two-week":[139],"summer":[140],"intensive":[141],"research":[144],"component":[145],"internship.":[148],"A":[149],"description":[150],"can":[151,161],"viewed":[153],"at":[154],"http://www.ists.dartmouth.edu/events/sismat/.":[155],"An":[156],"education":[157],"important":[164],"resource":[165],"nurturing":[167],"future":[168],"leaders":[169],"cybersecurity,":[171],"but":[172],"only":[173],"if":[174],"we":[175,207],"enable":[176],"willing":[181],"approaches.":[184],"This":[185],"was":[186],"highlighted":[187],"by":[188],"Sally":[189],"Finch's":[190],"keynote":[191],"speech":[192],"2010.":[194],"At":[195],"last":[198],"year,":[199],"several":[200],"people":[201],"had":[202],"share,":[205],"focus":[210],"that.":[212]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
