{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:22Z","timestamp":1750306762501,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,12]],"date-time":"2013-10-12T00:00:00Z","timestamp":1381536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,12]]},"DOI":"10.1145\/2528908.2528918","type":"proceedings-article","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T13:42:56Z","timestamp":1382449376000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Incorporating Privacy into the Undergraduate Curriculum"],"prefix":"10.1145","author":[{"given":"Jaideep","family":"Vaidya","sequence":"first","affiliation":[{"name":"Rutgers University, 1 Washington Park, Newark, NJ 07102, 1-973-353-1441"}]},{"given":"Basit","family":"Shafiq","sequence":"additional","affiliation":[{"name":"LUMS, D.H.A., Lahore Cantt., Lahore, Pakistan 54792, 92-42-3560-8366"}]},{"given":"David","family":"Lorenzi","sequence":"additional","affiliation":[{"name":"Rutgers University, 1 Washington Park, Newark, NJ 07102, 1-973-353-5371"}]},{"given":"Nazia","family":"Badar","sequence":"additional","affiliation":[{"name":"Rutgers University, 1 Washington Park, Newark, NJ 07102, 1-973-353-5205"}]}],"member":"320","published-online":{"date-parts":[[2013,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195407"},{"key":"e_1_3_2_1_5_1","volume-title":"Internet Engineering Task Force","author":"Callas J.","year":"2007","unstructured":"J. Callas , L. Donnerhacke , H. Finney , D. Shaw , and F. Thayer . Rfc 4880 - openpgp message format. Technical report , Internet Engineering Task Force , November 2007 . J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and F. Thayer. Rfc 4880 - openpgp message format. Technical report, Internet Engineering Task Force, November 2007."},{"key":"e_1_3_2_1_6_1","volume-title":"Curriculum guidelines for undergraduate degree programs in computer science","author":"Cassel L.","year":"2008","unstructured":"L. Cassel , A. Clements , G. Davies , M. Guzdial , R. McCauley , A. McGettrick , B. Sloan , L. Snyder , P. Tymann , and B. W. Weide . Curriculum guidelines for undergraduate degree programs in computer science , 2008 . L. Cassel, A. Clements, G. Davies, M. Guzdial, R. McCauley, A. McGettrick, B. Sloan, L. Snyder, P. Tymann, and B. W. Weide. Curriculum guidelines for undergraduate degree programs in computer science, 2008."},{"key":"e_1_3_2_1_7_1","volume-title":"Apr. 16","author":"Cranor L.","year":"2002","unstructured":"L. Cranor , M. Langheinrich , M. Marchiori , M. Presler-Marshall , and J. Reagle . The platform for privacy preferences 1.0 (P3P1.0) specification , Apr. 16 , 2002 . L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle. The platform for privacy preferences 1.0 (P3P1.0) specification, Apr. 16, 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2008.04.003"},{"key":"e_1_3_2_1_9_1","unstructured":"Cross industry standard process for data mining Dec. 1999.  Cross industry standard process for data mining Dec. 1999."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884235"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1017\/CBO9780511721656.004","volume-title":"The Foundations of Cryptography","author":"Goldreich O.","year":"2004","unstructured":"O. Goldreich . The Foundations of Cryptography , volume 2 , chapter General Cryptographic Protocols, pages 599 -- 764 . Cambridge University Press , Cambridge, UK, 2004 . O. Goldreich. The Foundations of Cryptography, volume 2, chapter General Cryptographic Protocols, pages 599--764. Cambridge University Press, Cambridge, UK, 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_3_2_1_14_1","volume-title":"Learning and Understanding: Improving Advanced Study of Mathematics and Science in U.S. High Schools","author":"Gollub J. P.","year":"2002","unstructured":"J. P. Gollub , M. W. Bertenthal , J. B. Labov , and P. C. Curtis , editors . Learning and Understanding: Improving Advanced Study of Mathematics and Science in U.S. High Schools . 2002 . J. P. Gollub, M. W. Bertenthal, J. B. Labov, and P. C. Curtis, editors. Learning and Understanding: Improving Advanced Study of Mathematics and Science in U.S. High Schools. 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_16_1","first-page":"36","volume-title":"Advances in Cryptology -- CRYPTO","author":"Lindell Y.","year":"2000","unstructured":"Y. Lindell and B. Pinkas . Privacy preserving data mining . In Advances in Cryptology -- CRYPTO 2000 , pages 36 -- 54 , New York, NY , Aug. 20-24 2000. Springer-Verlag . Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology -- CRYPTO 2000, pages 36--54, New York, NY, Aug. 20-24 2000. Springer-Verlag."},{"key":"e_1_3_2_1_17_1","volume-title":"Curriculum guidelines for undergraduate degree programs in information technology","author":"Lunt B. M.","year":"2008","unstructured":"B. M. Lunt , J. J. Ekstrom , S. Gorka , G. Hislop , R. Kamali , E. Lawson , R. LeBlanc , J. Miller , and H. Reichgelt . Curriculum guidelines for undergraduate degree programs in information technology , 2008 . B. M. Lunt, J. J. Ekstrom, S. Gorka, G. Hislop, R. Kamali, E. Lawson, R. LeBlanc, J. Miller, and H. Reichgelt. Curriculum guidelines for undergraduate degree programs in information technology, 2008."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_19_1","volume-title":"The National Academies Board on Science Education","author":"Mestre J.","year":"2010","unstructured":"J. Mestre . Learning goals in undergraduate stem education and evidence for achieving them. Technical report , The National Academies Board on Science Education , 2010 . J. Mestre. Learning goals in undergraduate stem education and evidence for achieving them. Technical report, The National Academies Board on Science Education, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.147"},{"key":"e_1_3_2_1_22_1","volume-title":"Computer science curricula","author":"Sahami M.","year":"2013","unstructured":"M. Sahami and Computer science curricula 2013 , 2013. http:\/\/ai.stanford.edu\/users\/sahami\/CS2013\/ M. Sahami and et al. Computer science curricula 2013, 2013. http:\/\/ai.stanford.edu\/users\/sahami\/CS2013\/"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"Samarati P.","year":"1998","unstructured":"P. Samarati and L. Sweeney . Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression . In Proceedings of the IEEE Symposium on Research in Security and Privacy , Oakland, CA , May 1998 . P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1998."},{"key":"e_1_3_2_1_24_1","volume-title":"Utd anonymization toolbox","author":"Dallas Security UT","year":"2010","unstructured":"UT Dallas Security and Privacy Lab . Utd anonymization toolbox , 2010 . http:\/\/cs.utdallas.edu\/dspl\/cgibin\/toolbox\/index.php UT Dallas Security and Privacy Lab. Utd anonymization toolbox, 2010. http:\/\/cs.utdallas.edu\/dspl\/cgibin\/toolbox\/index.php"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings, Journal of the American Medical Informatics Association. Hanley & Belfus, Inc.","author":"Sweeney L.","year":"1997","unstructured":"L. Sweeney . Guaranteeing anonymity when sharing medical data, the datafly system . In Proceedings, Journal of the American Medical Informatics Association. Hanley & Belfus, Inc. , 1997 . L. Sweeney. Guaranteeing anonymity when sharing medical data, the datafly system. In Proceedings, Journal of the American Medical Informatics Association. Hanley & Belfus, Inc., 1997."},{"key":"e_1_3_2_1_26_1","volume-title":"Curriculum guidelines for undergraduate degree programs in information systems","author":"Topi H.","year":"2010","unstructured":"H. Topi , J. S. Valacich , R. T. Wright , K. M. Kaiser , J. J.F. Nunamaker , J. C. Sipior , and G. de Vreede . Curriculum guidelines for undergraduate degree programs in information systems , 2010 . http:\/\/www.acm.org\/education\/curricula\/IS2010 ACM final.pdf H. Topi, J. S. Valacich, R. T. Wright, K. M. Kaiser, J. J.F. Nunamaker, J. C. Sipior, and G. de Vreede. Curriculum guidelines for undergraduate degree programs in information systems, 2010. http:\/\/www.acm.org\/education\/curricula\/IS2010 ACM final.pdf"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_3_2_1_28_1","series-title":"Advances in Information Security","volume-title":"Privacy-Preserving Data Mining","author":"Vaidya J.","year":"2005","unstructured":"J. Vaidya , C. Clifton , and M. Zhu . Privacy-Preserving Data Mining , volume 19 of Advances in Information Security . Springer-Verlag , 1 st edition, 2005 . J. Vaidya, C. Clifton, and M. Zhu. Privacy-Preserving Data Mining, volume 19 of Advances in Information Security. Springer-Verlag, 1st edition, 2005.","edition":"1"},{"key":"e_1_3_2_1_29_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"1999","unstructured":"I. H. Witten and E. Frank . Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations . Morgan Kaufmann , San Francisco , Oct. 1999 . I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann, San Francisco, Oct. 1999."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.25"}],"event":{"name":"InfoSecCD '13: 2013 Information Security Curriculum Development Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw GA USA","acronym":"InfoSecCD '13"},"container-title":["Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2528908.2528918","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2528908.2528918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:45Z","timestamp":1750231725000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2528908.2528918"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,12]]},"references-count":30,"alternative-id":["10.1145\/2528908.2528918","10.1145\/2528908"],"URL":"https:\/\/doi.org\/10.1145\/2528908.2528918","relation":{},"subject":[],"published":{"date-parts":[[2013,10,12]]},"assertion":[{"value":"2013-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}