{"id":"https://openalex.org/W4415966017","doi":"https://doi.org/10.1145/3769994.3770028","title":"A Survey of Security Concepts in Introductory Programming Courses in Finland","display_name":"A Survey of Security Concepts in Introductory Programming Courses in Finland","publication_year":2025,"publication_date":"2025-11-06","ids":{"openalex":"https://openalex.org/W4415966017","doi":"https://doi.org/10.1145/3769994.3770028"},"language":"en","primary_location":{"id":"doi:10.1145/3769994.3770028","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769994.3770028","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th Koli Calling International Conference on Computing Education Research","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3769994.3770028","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104431180","display_name":"Alina Torbunova","orcid":"https://orcid.org/0009-0004-2404-1429"},"institutions":[{"id":"https://openalex.org/I130217899","display_name":"\u00c5bo Akademi University","ror":"https://ror.org/029pk6x14","country_code":"FI","type":"education","lineage":["https://openalex.org/I130217899"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Alina Torbunova","raw_affiliation_strings":["\u00c5bo Akademi University, Turku, Finland"],"raw_orcid":"https://orcid.org/0009-0004-2404-1429","affiliations":[{"raw_affiliation_string":"\u00c5bo Akademi University, Turku, Finland","institution_ids":["https://openalex.org/I130217899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043249778","display_name":"Iv\u00e1n Porres","orcid":"https://orcid.org/0000-0002-6791-2018"},"institutions":[{"id":"https://openalex.org/I130217899","display_name":"\u00c5bo Akademi University","ror":"https://ror.org/029pk6x14","country_code":"FI","type":"education","lineage":["https://openalex.org/I130217899"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Ivan Porres","raw_affiliation_strings":["\u00c5bo Akademi University, Turku, Finland"],"raw_orcid":"https://orcid.org/0000-0002-6791-2018","affiliations":[{"raw_affiliation_string":"\u00c5bo Akademi University, Turku, Finland","institution_ids":["https://openalex.org/I130217899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5104431180"],"corresponding_institution_ids":["https://openalex.org/I130217899"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45237151,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.4805999994277954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.4805999994277954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.35749998688697815,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.023399999365210533,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.6626999974250793},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5778999924659729},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4758000075817108},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4440000057220459},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4117000102996826},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.3650999963283539}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6883999705314636},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.6626999974250793},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5778999924659729},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4758000075817108},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4440000057220459},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4117000102996826},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3650999963283539},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3352999985218048},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.33169999718666077},{"id":"https://openalex.org/C145420912","wikidata":"https://www.wikidata.org/wiki/Q853077","display_name":"Mathematics education","level":1,"score":0.3287000060081482},{"id":"https://openalex.org/C33857546","wikidata":"https://www.wikidata.org/wiki/Q80006","display_name":"Computer programming","level":2,"score":0.3046000003814697},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2816999852657318},{"id":"https://openalex.org/C56995899","wikidata":"https://www.wikidata.org/wiki/Q1126687","display_name":"Focus group","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C120912362","wikidata":"https://www.wikidata.org/wiki/Q136822","display_name":"Higher education","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C34165917","wikidata":"https://www.wikidata.org/wiki/Q188267","display_name":"Programming paradigm","level":2,"score":0.2563000023365021}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3769994.3770028","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769994.3770028","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th Koli Calling International Conference on Computing Education Research","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire/4a5090da-56d3-4b1c-aca2-84d3366edc18","is_oa":true,"landing_page_url":"https://research.abo.fi/en/publications/4a5090da-56d3-4b1c-aca2-84d3366edc18","pdf_url":null,"source":{"id":"https://openalex.org/S4406923060","display_name":"\u00c5bo Akademi University Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Torbunova, A & Porres, I 2025, A Survey of Security Concepts in Introductory Programming Courses in Finland. in J Leinonen & R Duran (eds), Proceedings of 25th International Conference on Computing Education Research, Koli Calling 2025., 4, Proceedings of 25th International Conference on Computing Education Research, Koli Calling 2025, ACM, pp. 1-11, 25th Koli Calling International Conference on Computing Education Research, Lieksa, Finland, 13/11/25. https://doi.org/10.1145/3769994.3770028","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3769994.3770028","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769994.3770028","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th Koli Calling International Conference on Computing Education Research","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2044953699","https://openalex.org/W2076184887","https://openalex.org/W2329930013","https://openalex.org/W2415122762","https://openalex.org/W2582927993","https://openalex.org/W2601753676","https://openalex.org/W2914024328","https://openalex.org/W2962752966","https://openalex.org/W3006568433","https://openalex.org/W3011626112","https://openalex.org/W4280601467","https://openalex.org/W4377090863","https://openalex.org/W4391584397","https://openalex.org/W4392564421","https://openalex.org/W4395070422","https://openalex.org/W4399164841","https://openalex.org/W4400267750","https://openalex.org/W4403123493","https://openalex.org/W4405846098","https://openalex.org/W4408274126","https://openalex.org/W4411554679"],"related_works":[],"abstract_inverted_index":{"Background:":[0],"To":[1],"effectively":[2],"counter":[3],"cyber":[4],"threats,":[5],"developers":[6],"must":[7],"be":[8,20],"trained":[9],"to":[10,73,93,204],"write":[11],"secure":[12],"code.":[13],"In":[14],"a":[15,49,94],"university":[16],"setting,":[17],"this":[18],"can":[19],"achieved":[21],"by":[22,133,142],"integrating":[23],"security":[24,38,65,129,171],"concepts":[25,39,112,130,153],"into":[26,43],"programming":[27,46,77,127,135,162],"curricula":[28],"from":[29],"the":[30,57,134,143,165,191,197],"earliest":[31],"courses.":[32,158],"Objective:":[33],"This":[34],"study":[35],"examines":[36],"how":[37],"are":[40,118,154],"currently":[41],"integrated":[42],"university-level":[44],"introductory":[45,76],"courses,":[47,90],"with":[48,103],"focus":[50],"on":[51,149],"course":[52,95],"structure,":[53],"current":[54],"coverage,":[55],"and":[56,60,107,116,128,141,183,201],"perceived":[58],"value":[59],"feasibility":[61],"of":[62,75,98,126,186,193,199],"adding":[63],"more":[64],"content.":[66],"Method:":[67],"A":[68],"self-administered":[69],"questionnaire":[70],"was":[71],"distributed":[72],"lecturers":[74,189],"courses":[78],"at":[79,122],"Finnish":[80],"universities.":[81],"Results:":[82],"We":[83],"received":[84],"12":[85],"responses,":[86],"covering":[87],"11":[88],"unique":[89],"which":[91,137,146],"corresponds":[92],"coverage":[96],"rate":[97],"65%.":[99],"Courses":[100],"typically":[101],"begin":[102],"basics":[104],"like":[105],"variables":[106],"data":[108],"types,":[109],"while":[110],"advanced":[111],"such":[113,176],"as":[114,177],"encryption":[115],"logging":[117],"introduced":[119],"later,":[120],"if":[121],"all.":[123],"The":[124],"selection":[125],"is":[131,138],"shaped":[132],"paradigm,":[136],"primarily":[139],"imperative,":[140],"application":[144],"domain,":[145],"often":[147,155],"focuses":[148],"desktop":[150],"applications.":[151],"Security-related":[152],"underrepresented":[156],"in":[157],"Lecturers":[159],"noted":[160],"that":[161],"projects":[163],"provide":[164],"most":[166],"effective":[167],"context":[168],"for":[169],"introducing":[170],"concepts.":[172],"Despite":[173],"common":[174],"challenges":[175],"limited":[178],"instructional":[179],"time,":[180],"curriculum":[181],"constraints,":[182],"varying":[184],"levels":[185],"student":[187],"preparedness,":[188],"suggested":[190],"use":[192],"supplementary":[194],"materials,":[195],"emphasizing":[196],"importance":[198],"security,":[200],"incorporating":[202],"visualizations":[203],"support":[205],"understanding.":[206]},"counts_by_year":[],"updated_date":"2025-11-07T23:20:04.922697","created_date":"2025-11-06T00:00:00"}
