{"id":"https://openalex.org/W7128766469","doi":"https://doi.org/10.1145/3770761.3777119","title":"Integrating Real-World Cybersecurity Case Studies into Undergraduate CS Education","display_name":"Integrating Real-World Cybersecurity Case Studies into Undergraduate CS Education","publication_year":2026,"publication_date":"2026-02-13","ids":{"openalex":"https://openalex.org/W7128766469","doi":"https://doi.org/10.1145/3770761.3777119"},"language":null,"primary_location":{"id":"doi:10.1145/3770761.3777119","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3770761.3777119","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3770761.3777119","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125900916","display_name":"Yu Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yu Cai","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5125900916"],"corresponding_institution_ids":["https://openalex.org/I11957088"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7537978,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1710","last_page":"1710"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6991000175476074,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6991000175476074,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.043699998408555984,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13034","display_name":"Information Systems Education and Curriculum Development","score":0.02419999986886978,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6276000142097473},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.38280001282691956},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.35260000824928284},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.34549999237060547},{"id":"https://openalex.org/keywords/undergraduate-education","display_name":"Undergraduate education","score":0.30790001153945923},{"id":"https://openalex.org/keywords/higher-education","display_name":"Higher education","score":0.2978000044822693},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.2847000062465668}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6276000142097473},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5756000280380249},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.4374000132083893},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.42899999022483826},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.42570000886917114},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.38280001282691956},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3801000118255615},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35260000824928284},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.35010001063346863},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C2986314682","wikidata":"https://www.wikidata.org/wiki/Q1430192","display_name":"Undergraduate education","level":2,"score":0.30790001153945923},{"id":"https://openalex.org/C120912362","wikidata":"https://www.wikidata.org/wiki/Q136822","display_name":"Higher education","level":2,"score":0.2978000044822693},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.2847000062465668},{"id":"https://openalex.org/C5041995","wikidata":"https://www.wikidata.org/wiki/Q853745","display_name":"Engineering education","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.2754000127315521},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C533356498","wikidata":"https://www.wikidata.org/wiki/Q843894","display_name":"Critical thinking","level":2,"score":0.26460000872612},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2623000144958496},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.26030001044273376},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C2781162219","wikidata":"https://www.wikidata.org/wiki/Q26250693","display_name":"Replicate","level":2,"score":0.2531000077724457},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3770761.3777119","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3770761.3777119","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3770761.3777119","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3770761.3777119","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0],"demo":[1],"introduces":[2],"the":[3,56,64],"Case":[4],"Analysis":[5],"for":[6],"Security":[7],"Education":[8],"(CASE)":[9],"framework":[10],"(https://cyber-cases.info/),":[11],"an":[12],"NSF":[13],"funded":[14],"initiative":[15],"designed":[16],"to":[17,33,50,63,91],"enhance":[18],"undergraduate":[19],"cybersecurity":[20,29],"education":[21],"through":[22],"realistic,":[23],"scenario-based":[24],"learning.":[25],"CASE":[26],"leverages":[27],"real-world":[28],"breaches":[30],"and":[31,42,58,66,69,84,96],"vulnerabilities":[32],"create":[34],"structured":[35],"case":[36],"modules":[37,47],"paired":[38],"with":[39],"discussion":[40],"questions":[41],"hands-on":[43],"lab":[44],"exercises.":[45],"These":[46],"enable":[48],"students":[49,79],"investigate":[51],"authentic":[52],"cyber":[53],"incidents,":[54],"analyze":[55],"technical":[57],"organizational":[59],"factors":[60],"that":[61],"contributed":[62],"compromise,":[65],"replicate":[67],"attack":[68],"defense":[70],"strategies":[71],"within":[72],"controlled":[73],"virtual":[74],"environments.":[75],"Through":[76],"this":[77],"approach,":[78],"develop":[80],"both":[81],"adversarial":[82],"thinking":[83,86],"systems":[85],"skills,":[87],"strengthening":[88],"their":[89],"ability":[90],"understand":[92],"complex":[93],"threat":[94],"landscapes":[95],"design":[97],"effective":[98],"security":[99],"solutions.":[100]},"counts_by_year":[],"updated_date":"2026-02-15T05:58:04.055770","created_date":"2026-02-14T00:00:00"}
