Integrating Security Concepts Into Introductory Programming Courses

Research output: Chapter in Book/Conference proceedingPublished conference proceedingScientificpeer-review

21 Downloads (Pure)

Abstract

This article proposes a method to help students develop a security mindset by incorporating security concepts into a university-level introductory programming course. The method is based on a mapping of introductory programming topics to relevant security concepts. The mapping is used to modify lecture materials and programming projects to incorporate security-related information and requirements. These modifications are added gradually, with minimal impact on existing learning outcomes and expected student effort. We evaluated our method in a case study on the introduction of security concepts in an introductory programming course in Python. For this, we analyzed student programming projects and conducted a post-course survey. The results show improved security implementation in student projects and increased awareness of the importance of security in programming.
Original languageEnglish
Title of host publicationInformation Security Education. Empowering People Through Information Security Education - 17th IFIP WG 11.8 World Conference, WISE 2025, Proceedings
EditorsLynette Drevin, Wai Sze Leung, Suné von Solms
PublisherSpringer
Pages217-233
Number of pages16
ISBN (Electronic)978-3-031-94924-1
ISBN (Print)978-3-031-94923-4
DOIs
Publication statusPublished - 26 Jul 2025
MoE publication typeA4 Article in a conference publication
EventIFIP World Conference on Information Security Education -
Duration: 21 May 202523 May 2025

Publication series

NameIFIP Advances in Information and Communication Technology
Volume742 IFIPAICT
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

ConferenceIFIP World Conference on Information Security Education
Period21/05/2523/05/25

Funding

This work has received funding from the Finnish Ministry of Education and Culture under grant agreement OKM/60/522/2022. We would like to thank Annamari Soini for providing the opportunity to perform a case study on the method proposed in this paper.

Cite this