{"id":"https://openalex.org/W2124058040","doi":"https://doi.org/10.1145/1953163.1953175","title":"Training students to steal","display_name":"Training students to steal","publication_year":2011,"publication_date":"2011-03-09","ids":{"openalex":"https://openalex.org/W2124058040","doi":"https://doi.org/10.1145/1953163.1953175","mag":"2124058040"},"language":"en","primary_location":{"id":"doi:10.1145/1953163.1953175","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1953163.1953175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 42nd ACM technical symposium on Computer science education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029090450","display_name":"Trajce Dimkov","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Trajce Dimkov","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083595076","display_name":"Wolter Pieters","orcid":"https://orcid.org/0000-0003-3985-4452"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Wolter Pieters","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016345474","display_name":"Pieter Hartel","orcid":"https://orcid.org/0000-0002-0411-0421"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Pieter Hartel","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029090450"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":3.2203,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.93377349,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"21","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.7697397470474243},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6648397445678711},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5611020922660828},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5007216930389404},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.4373672306537628},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.4173658788204193},{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.4157427251338959},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38415515422821045},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.24716490507125854},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.22208696603775024},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.08639127016067505}],"concepts":[{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.7697397470474243},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6648397445678711},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5611020922660828},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5007216930389404},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.4373672306537628},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.4173658788204193},{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.4157427251338959},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38415515422821045},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.24716490507125854},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.22208696603775024},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.08639127016067505},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1953163.1953175","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1953163.1953175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 42nd ACM technical symposium on Computer science education","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/61b7c419-0e64-4ef1-aaf1-a42e85870e11","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/61b7c419-0e64-4ef1-aaf1-a42e85870e11","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Dimkov, T, Pieters, W & Hartel, P H 2011, Training Students to Steal: A Practical Assignment in Computer Security Education. in Proceedings of the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE 2011). Association for Computing Machinery, New York, pp. 21-26. https://doi.org/10.1145/1953163.1953175","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:publications/61b7c419-0e64-4ef1-aaf1-a42e85870e11","is_oa":false,"landing_page_url":"http://eprints.eemcs.utwente.nl/secure2/18722/02/sigcse_teaching_pentesting-author_version.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W101424076","https://openalex.org/W158844236","https://openalex.org/W1502727264","https://openalex.org/W1511039991","https://openalex.org/W1516532723","https://openalex.org/W1533026080","https://openalex.org/W1966556340","https://openalex.org/W1970799258","https://openalex.org/W1982486301","https://openalex.org/W1983688405","https://openalex.org/W2001580943","https://openalex.org/W2013056189","https://openalex.org/W2080885751","https://openalex.org/W2155740216","https://openalex.org/W2157605623","https://openalex.org/W2170961388","https://openalex.org/W2461194516","https://openalex.org/W2499590469","https://openalex.org/W4232402891","https://openalex.org/W4241491750","https://openalex.org/W4245476264","https://openalex.org/W6606494156"],"related_works":["https://openalex.org/W185442532","https://openalex.org/W2966027630","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W3184585962","https://openalex.org/W2914269635","https://openalex.org/W2524694343","https://openalex.org/W2910687894","https://openalex.org/W3040685705","https://openalex.org/W2526787500"],"abstract_inverted_index":{"Practical":[0],"courses":[1],"in":[2],"information":[3,25],"security":[4,12,26,105,116],"provide":[5],"students":[6,19,32,57,82,99],"with":[7,100],"first-hand":[8],"knowledge":[9],"of":[10,24,31,45,67,78,104,110,115,125],"technical":[11,22],"mechanisms":[13],"and":[14,41,72,106,113,129],"their":[15,108],"weaknesses.":[16],"However,":[17],"teaching":[18],"only":[20],"the":[21,39,42,48,79,81,92,98,111,123,126,130,133],"side":[23],"leads":[27],"to":[28],"a":[29,54,60,65,101],"generation":[30],"that":[33],"emphasize":[34],"digital":[35,73],"solutions,":[36],"but":[37],"ignore":[38],"physical":[40,68],"social":[43,70,86],"aspects":[44],"security.":[46],"In":[47,118],"last":[49],"two":[50],"years":[51],"we":[52,121],"devised":[53],"course":[55],"where":[56],"were":[58],"given":[59],"practical":[61,102,127],"assignment":[62,96,128],"which":[63],"includes":[64],"combination":[66],"security,":[69],"engineering":[71,87],"penetration":[74],"testing.":[75],"As":[76],"part":[77],"course,":[80],"stole":[83],"laptops":[84],"using":[85],"from":[88,132],"unaware":[89],"employees":[90],"throughout":[91],"university":[93],"campus.":[94],"The":[95],"provided":[97],"overview":[103],"increased":[107],"awareness":[109],"strengths":[112],"weaknesses":[114],"mechanisms.":[117],"this":[119],"paper":[120],"present":[122],"design":[124],"observations":[131],"execution.":[134]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
