{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:10Z","timestamp":1750308790588,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,23]],"date-time":"2009-11-23T00:00:00Z","timestamp":1258934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,23]]},"DOI":"10.1145\/1738826.1738844","type":"proceedings-article","created":{"date-parts":[[2010,3,16]],"date-time":"2010-03-16T19:27:05Z","timestamp":1268767625000},"page":"105-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Teaching privacy with ubicomp scenarios in HCI classes"],"prefix":"10.1145","author":[{"given":"Saila","family":"Ovaska","sequence":"first","affiliation":[{"name":"University of Tampere, Finland"}]},{"given":"Kari-Jouko","family":"R\u00e4ih\u00e4","sequence":"additional","affiliation":[{"name":"University of Tampere, Finland"}]}],"member":"320","published-online":{"date-parts":[[2009,11,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Brooks\/Cole Publishing","author":"Altman I.","year":"1975","unstructured":"Altman , I. The environment and social behavior . Brooks\/Cole Publishing , Monterey , 1975 . Altman, I. The environment and social behavior. Brooks\/Cole Publishing, Monterey, 1975."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Appel F. Ethics across the computer science curriculum: Privacy modules in an introductory database course. Science and Engineering Ethics (2005) 11 635--644.  Appel F. Ethics across the computer science curriculum: Privacy modules in an introductory database course. Science and Engineering Ethics (2005) 11 635--644.","DOI":"10.1007\/s11948-005-0031-2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1241934.1241940"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Computing curricula 2001. J. Educ. Resour. Comput. 1 3es 1. ACM (2001)  Computing curricula 2001. J. Educ. Resour. Comput. 1 3es 1. ACM (2001)","DOI":"10.1145\/384274.384275"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345443.1345439"},{"key":"e_1_3_2_1_6_1","unstructured":"Cranor L. Hong J. and Reiter M. Teaching Usable Privacy and Security: A guide for instructors (2007) http:\/\/cups.cs.cmu.edu\/course-guide\/  Cranor L. Hong J. and Reiter M. Teaching Usable Privacy and Security: A guide for instructors (2007) http:\/\/cups.cs.cmu.edu\/course-guide\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2005.12.005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/234813.234820"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. Sixth Conf. on Australasian Computing Education","volume":"30","author":"Greening T.","year":"2004","unstructured":"Greening , T. , Kay , J. , and Kummerfeld , B . Integrating ethical content into computing curricula . In Proc. Sixth Conf. on Australasian Computing Education Vol. 30 . ACM Int. Conf. Proc. Series 57 ( 2004 ), 91--99. Greening, T., Kay, J., and Kummerfeld, B. Integrating ethical content into computing curricula. In Proc. Sixth Conf. on Australasian Computing Education Vol. 30. ACM Int. Conf. Proc. Series 57 (2004), 91--99."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234786"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031624"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1304_05"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013129"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054986"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375761.1375763"},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","volume-title":"Privacy by design - principles of privacy-aware ubiquitous systems","author":"Langheinrich M.","year":"2001","unstructured":"Langheinrich , M. Privacy by design - principles of privacy-aware ubiquitous systems . In Proc. Ubiquitous Computing. Abowd, G. D., Brumitt, B., and Shafer, S. A. Eds. Lecture Notes in Computer Science , vol. 2201 . Springer-Verlag ( 2001 ), 273--291. Langheinrich, M. Privacy by design - principles of privacy-aware ubiquitous systems. In Proc. Ubiquitous Computing. Abowd, G. D., Brumitt, B., and Shafer, S. A. Eds. Lecture Notes in Computer Science, vol. 2201. Springer-Verlag (2001), 273--291."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765952"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0304-9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-007-0163-2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365126"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.12.001"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03655-2_76"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125463"}],"event":{"name":"OZCHI '09: Proceedings of the 21st conference of the computer-human interaction special interest group of Australia on Computer-human interaction: design","acronym":"OZCHI '09","location":"Melbourne Australia"},"container-title":["Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24\/7"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1738826.1738844","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1738826.1738844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:54Z","timestamp":1750278174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1738826.1738844"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,23]]},"references-count":25,"alternative-id":["10.1145\/1738826.1738844","10.1145\/1738826"],"URL":"https:\/\/doi.org\/10.1145\/1738826.1738844","relation":{},"subject":[],"published":{"date-parts":[[2009,11,23]]},"assertion":[{"value":"2009-11-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}