{"id":"https://openalex.org/W7117364322","doi":"https://doi.org/10.1145/3769694.3771166","title":"The Current State Of AI Education: Security As An Afterthought","display_name":"The Current State Of AI Education: Security As An Afterthought","publication_year":2025,"publication_date":"2025-11-06","ids":{"openalex":"https://openalex.org/W7117364322","doi":"https://doi.org/10.1145/3769694.3771166"},"language":null,"primary_location":{"id":"doi:10.1145/3769694.3771166","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3769694.3771166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113211821","display_name":"PJ Reddy","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Pavan Reddy","raw_affiliation_strings":["George Washington University, Washington, DC, USA"],"raw_orcid":"https://orcid.org/0009-0001-4832-1845","affiliations":[{"raw_affiliation_string":"George Washington University, Washington, DC, USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5113211821"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70340614,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"233","last_page":"239"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.19249999523162842,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.19249999523162842,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.17890000343322754,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.03849999979138374,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.829200029373169},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.6790000200271606},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5379999876022339},{"id":"https://openalex.org/keywords/preparedness","display_name":"Preparedness","score":0.4945000112056732},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.46709999442100525},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4569000005722046},{"id":"https://openalex.org/keywords/applications-of-artificial-intelligence","display_name":"Applications of artificial intelligence","score":0.38580000400543213},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.35409998893737793},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.34290000796318054}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.829200029373169},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7272999882698059},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.6790000200271606},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5379999876022339},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5278000235557556},{"id":"https://openalex.org/C2777042776","wikidata":"https://www.wikidata.org/wiki/Q4583103","display_name":"Preparedness","level":2,"score":0.4945000112056732},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.46709999442100525},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4569000005722046},{"id":"https://openalex.org/C157170001","wikidata":"https://www.wikidata.org/wiki/Q4781507","display_name":"Applications of artificial intelligence","level":2,"score":0.38580000400543213},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.35409998893737793},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.34290000796318054},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.3427000045776367},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.3391999900341034},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.33489999175071716},{"id":"https://openalex.org/C22607594","wikidata":"https://www.wikidata.org/wiki/Q5375150","display_name":"Enabling","level":2,"score":0.32589998841285706},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.29649999737739563},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2851000130176544},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.28040000796318054},{"id":"https://openalex.org/C2778062554","wikidata":"https://www.wikidata.org/wiki/Q3404031","display_name":"Security community","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.2700999975204468},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.26840001344680786},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2651999890804291},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26510000228881836},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.26179999113082886},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.2524999976158142},{"id":"https://openalex.org/C2767350","wikidata":"https://www.wikidata.org/wiki/Q6662173","display_name":"Business intelligence","level":2,"score":0.25110000371932983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3769694.3771166","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3769694.3771166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W4379799312","https://openalex.org/W4402582069","https://openalex.org/W7090791519"],"related_works":[],"abstract_inverted_index":{"Artificial":[0],"Intelligence":[1],"(AI)":[2],"has":[3,19],"become":[4],"embedded":[5,125],"in":[6,70,116],"critical":[7],"sectors":[8],"at":[9],"a":[10,80,113,155,197],"pace":[11],"unmatched":[12],"by":[13],"previous":[14],"technologies;":[15],"however,":[16],"its":[17,193],"security":[18,143,170],"lagged":[20],"significantly.":[21],"This":[22,61,136],"paper":[23,62,102,137],"examines":[24],"the":[25,33,96,127,172,177],"widening":[26],"gap":[27,178],"between":[28,179],"rapid":[29],"AI":[30,105,139,151,169,190],"adoption":[31],"and":[32,38,49,57,79,84,119,129,153,165,181,187],"preparedness":[34],"of":[35,98],"systems,":[36],"institutions,":[37],"practitioners":[39],"to":[40,52,112,132,142,149],"defend":[41],"against":[42],"novel":[43],"attack":[44],"surfaces\u2014ranging":[45],"from":[46,88,126],"prompt":[47],"injection":[48],"data":[50],"poisoning":[51],"model":[53],"theft,":[54],"privacy":[55],"leakage,":[56],"autonomous":[58],"agent":[59],"abuse.":[60],"presents":[63],"empirical":[64],"trends":[65],"showing":[66],"an":[67],"accelerating":[68],"rise":[69],"AI-related":[71],"incidents,":[72],"analyzes":[73],"systemic":[74,198],"causes":[75],"including":[76],"educational":[77],"gaps":[78],"move-fast":[81],"deployment":[82,180],"culture,":[83],"documents":[85],"high-impact":[86],"failures":[87],"2022\u20132025":[89],"that":[90,104,189],"illustrate":[91],"escalating":[92],"real-world":[93],"harm.":[94],"On":[95],"basis":[97],"these":[99],"findings,":[100],"this":[101],"argues":[103],"Security":[106],"Education":[107],"(AISecEd)":[108],"should":[109],"be":[110],"elevated":[111],"first-class":[114],"priority":[115],"both":[117],"AI/ML":[118],"cybersecurity":[120,147],"curricula,":[121],"with":[122],"secure-by-design":[123],"principles":[124],"outset":[128],"dedicated":[130],"courses":[131],"build":[133],"specialized":[134],"expertise.":[135],"maps":[138],"course":[140],"topics":[141],"concepts,":[144],"extends":[145],"core":[146],"modules":[148],"cover":[150],"threats,":[152],"proposes":[154],"minimal":[156],"baseline":[157],"for":[158],"industry":[159],"adoption.":[160],"By":[161],"aligning":[162],"education,":[163],"practice,":[164],"policy":[166],"around":[167],"foundational":[168],"principles,":[171],"development":[173],"community":[174],"can":[175],"close":[176],"assurance\u2014reducing":[182],"catastrophic":[183],"failures,":[184],"strengthening":[185],"trust,":[186],"ensuring":[188],"delivers":[191],"on":[192],"promise":[194],"without":[195],"becoming":[196],"liability.":[199]},"counts_by_year":[],"updated_date":"2025-12-27T23:12:19.206068","created_date":"2025-12-27T00:00:00"}
