{"id":"https://openalex.org/W4386718990","doi":"https://doi.org/10.1145/3568812.3603465","title":"Creating Defensive Programmers : Evaluating the Impact of Adding Cybesecurity Topics to Core Computer Science Courses","display_name":"Creating Defensive Programmers : Evaluating the Impact of Adding Cybesecurity Topics to Core Computer Science Courses","publication_year":2023,"publication_date":"2023-08-07","ids":{"openalex":"https://openalex.org/W4386718990","doi":"https://doi.org/10.1145/3568812.3603465"},"language":"en","primary_location":{"id":"doi:10.1145/3568812.3603465","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3568812.3603465","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM Conference on International Computing Education Research - Volume 2","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011126757","display_name":"Cheryl Resch","orcid":"https://orcid.org/0000-0003-1668-8850"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Cheryl Resch","raw_affiliation_strings":["University of Florida, United States of America"],"raw_orcid":"https://orcid.org/0000-0003-1668-8850","affiliations":[{"raw_affiliation_string":"University of Florida, United States of America","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5011126757"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20009012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"87","last_page":"91"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9211999773979187,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9199000000953674,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7188876271247864},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.678587019443512},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.34007886052131653},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07378429174423218}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7188876271247864},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.678587019443512},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.34007886052131653},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07378429174423218}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3568812.3603465","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3568812.3603465","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM Conference on International Computing Education Research - Volume 2","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2001281843","https://openalex.org/W2054810911","https://openalex.org/W2056358304","https://openalex.org/W2101270660","https://openalex.org/W2107426351","https://openalex.org/W2128237363","https://openalex.org/W2131214785","https://openalex.org/W2182240636","https://openalex.org/W2255436219","https://openalex.org/W2415122762","https://openalex.org/W2488392911","https://openalex.org/W2587384567","https://openalex.org/W2748329051","https://openalex.org/W2920815960","https://openalex.org/W3008796909"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"The":[0,52,109,196],"research":[1],"described":[2],"in":[3,111,133,165,193,198],"this":[4],"summary":[5],"explores":[6],"whether":[7,69,125,205,251],"adding":[8,206],"defensive":[9,129,207,227,248,258],"programming":[10,39,130,208,259],"topics":[11,131,209],"to":[12,48,89,163,182,233,256],"the":[13,24,62,73,100,112,126,194,211,215,254],"Computer":[14],"Science":[15],"(CS)":[16],"curriculum":[17,212],"produces":[18],"graduates":[19,220],"who":[20,31,221],"understand":[21],"and":[22,30,41,46,60,76,102,114,149,155,218,236,250],"appreciate":[23,253],"risks":[25],"associated":[26],"with":[27,137,142,222],"software":[28,33,136],"vulnerabilities,":[29],"create":[32],"free":[34,150,237],"of":[35,80,104,116,128,157,226,231],"common":[36,56],"vulnerabilities.":[37,97,139],"Defensive":[38],"lectures":[40],"assignments":[42,53,71],"have":[43],"been":[44],"developed":[45],"added":[47],"core":[49,168],"CS":[50,169],"courses.":[51],"teach":[54],"how":[55,61,184],"vulnerabilities":[57,63,105,117],"are":[58,83,187],"exploited":[59],"can":[64],"be":[65,87,107,161,180],"mitigated.":[66],"To":[67],"explore":[68],"these":[70],"enhance":[72],"students\u2019":[74,245],"knowledge":[75],"practice,":[77],"several":[78],"forms":[79],"data":[81],"collection":[82],"done.":[84],"Students":[85],"will":[86,106,121,159,179,201,241],"required":[88],"static":[90],"test":[91],"code":[92],"for":[93,96],"class":[94],"projects":[95],"Data":[98],"on":[99,146,153],"number":[101,113],"type":[103],"collected.":[108],"trends":[110],"types":[115],"over":[118,171],"three":[119,172],"semesters":[120],"give":[122,202,242],"insight":[123,203,243],"into":[124,204,244],"addition":[127],"results":[132],"students":[134,164],"creating":[135],"fewer":[138],"A":[140,174],"survey":[141,185,239],"multiple":[143,175],"choice":[144],"questions":[145,152],"cybersecurity":[147,158],"topics,":[148],"response":[151,238],"interest":[154],"relevance":[156],"also":[160],"given":[162],"four":[166],"different":[167],"courses":[170],"semesters.":[173],"linear":[176],"regression":[177,199],"analysis":[178,230],"performed":[181],"determine":[183],"scores":[186],"affected":[188],"by":[189],"a":[190,223],"student\u2019s":[191],"progress":[192],"curriculum.":[195],"change":[197],"coefficients":[200],"throughout":[210],"is":[213],"having":[214],"desired":[216],"effect":[217],"producing":[219],"greater":[224],"understanding":[225],"programming.":[228],"NLP":[229],"responses":[232],"reflection":[234],"prompts":[235],"question":[240],"attitude":[246],"toward":[247],"programming,":[249],"they":[252],"need":[255],"incorporate":[257],"habits.":[260]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
