{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:28:40Z","timestamp":1729650520671,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/tale.2016.7851811","type":"proceedings-article","created":{"date-parts":[[2017,2,13]],"date-time":"2017-02-13T21:38:52Z","timestamp":1487021932000},"page":"303-307","source":"Crossref","is-referenced-by-count":3,"title":["Facebook and information security education: What can we know from social network analyses on Hong Kong engineering students?"],"prefix":"10.1109","author":[{"given":"Rosanna Yuen-Yan","family":"Chan","sequence":"first","affiliation":[]},{"given":"Ka Man","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Yifei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xinwei","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Xiaoyu","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219052"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF02296434"},{"journal-title":"How we Think A Restatement of the Relation of Reflective Thinking to the Educative Process","year":"1933","author":"dewey","key":"ref12"},{"journal-title":"Toward a Theory of Instruction","year":"1966","author":"bruner","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.4159\/9780674029019","author":"bruner","year":"1986","journal-title":"Actual Minds Possible Worlds"},{"journal-title":"Mind in Society","year":"1978","author":"vygotsky","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/52.605928"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219049"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.157"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.22"},{"key":"ref4","first-page":"97","article-title":"Knowledge building: theory, pedagogy, and technology","author":"scardamalia","year":"2006","journal-title":"The Cambridge Handbook of the Learning Sciences"},{"key":"ref27","first-page":"29","article-title":"From practice fields to communities of practice","author":"barab","year":"2012","journal-title":"Theoretical Foundations of Learning Environments"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1207\/s15327809jls1303_6"},{"journal-title":"Secrets & Lies Digital Security in a Networked World","year":"2000","author":"schneier","key":"ref6"},{"journal-title":"Enigma How the German Machine Cipher Was Broken and How It Was Read by the Allies in World War Two","year":"1984","author":"kozaczuk","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/2.735847"},{"key":"ref7","article-title":"An Information Security Education Initiative for Engineering and Computer Science","author":"chin","year":"1997","journal-title":"Technical Report NPSCS-97-003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3102\/00346543074004557"},{"key":"ref9","first-page":"30","article-title":"Computer security education: Training, Scholarship, and Research","volume":"35","author":"matt","year":"2002","journal-title":"Computer"},{"key":"ref1","first-page":"170","article-title":"Constructivism: Implications for the design and delivery of instruction","author":"duffy","year":"1996","journal-title":"Handbook of Research for Educational Communications and Technology"},{"journal-title":"The Engineer of 2020 Visions of Engineering in the New Century","year":"2004","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2016.7757612"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"journal-title":"A First Course in Network Theory","year":"2015","author":"estrada","key":"ref23"},{"year":"2016","key":"ref26","article-title":"The Open Graph Viz Platform"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780356"}],"event":{"name":"2016 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)","start":{"date-parts":[[2016,12,7]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2016,12,9]]}},"container-title":["2016 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7819650\/7851751\/07851811.pdf?arnumber=7851811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,24]],"date-time":"2022-07-24T02:43:58Z","timestamp":1658630638000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7851811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/tale.2016.7851811","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}