{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:34Z","timestamp":1750306534917,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,11]],"date-time":"2014-10-11T00:00:00Z","timestamp":1412985600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DUE-1141000"],"award-info":[{"award-number":["DUE-1141000"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,11]]},"DOI":"10.1145\/2670739.2670751","type":"proceedings-article","created":{"date-parts":[[2016,3,8]],"date-time":"2016-03-08T14:13:39Z","timestamp":1457446419000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Teaching privacy in an interactive fashion"],"prefix":"10.1145","author":[{"given":"Jaideep","family":"Vaidya","sequence":"first","affiliation":[{"name":"Rutgers University, Newark, NJ"}]},{"given":"David","family":"Lorenzi","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ"}]},{"given":"Basit","family":"Shafiq","sequence":"additional","affiliation":[{"name":"LUMS, DHA, Lahore Cantt."}]},{"given":"Soon","family":"Chun","sequence":"additional","affiliation":[{"name":"City University of New York, Staten Island, NY"}]},{"given":"Nazia","family":"Badar","sequence":"additional","affiliation":[{"name":"Rutgers University, Newark, NJ"}]}],"member":"320","published-online":{"date-parts":[[2014,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Learning by doing: A comprehensive guide to simulations, computer games, and pedagogy in e-learning and other educational experiences","author":"Aldrich C.","year":"2005","unstructured":"C. Aldrich . Learning by doing: A comprehensive guide to simulations, computer games, and pedagogy in e-learning and other educational experiences . Wiley . com, 2005 . C. Aldrich. Learning by doing: A comprehensive guide to simulations, computer games, and pedagogy in e-learning and other educational experiences. Wiley. com, 2005."},{"key":"e_1_3_2_1_2_1","volume-title":"Aug.16","author":"Breyer C. R.","year":"2013","unstructured":"C. R. Breyer . Craigslist inc. v. 3taps inc. et al. Case No. CV 12-03816 CRB IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA , Aug.16 2013 . Court ruling. C. R. Breyer. Craigslist inc. v. 3taps inc. et al. Case No. CV 12-03816 CRB IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA, Aug.16 2013. Court ruling."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445408"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157170"},{"key":"e_1_3_2_1_6_1","volume-title":"Harvard Business School","author":"Ellet W.","year":"2007","unstructured":"W. Ellet . The case study handbook . Harvard Business School , 2007 . W. Ellet. The case study handbook. Harvard Business School, 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.64"},{"key":"e_1_3_2_1_8_1","volume-title":"Digital game-based learning: Towards an experiential gaming model. The Internet and higher education, 8(1):13--24","author":"Kiili K.","year":"2005","unstructured":"K. Kiili . Digital game-based learning: Towards an experiential gaming model. The Internet and higher education, 8(1):13--24 , 2005 . K. Kiili. Digital game-based learning: Towards an experiential gaming model. The Internet and higher education, 8(1):13--24, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593311"},{"key":"e_1_3_2_1_10_1","volume-title":"Commissioned paper presented at NRC workshop on Evidence on Selected Promising Practices in Undergraduate Science, Technology, Engineering, and Mathematics (STEM) Education","author":"Mestre J.","year":"2008","unstructured":"J. Mestre . Learning goals in undergraduate stem education and evidence for achieving them . In Commissioned paper presented at NRC workshop on Evidence on Selected Promising Practices in Undergraduate Science, Technology, Engineering, and Mathematics (STEM) Education , 2008 . J. Mestre. Learning goals in undergraduate stem education and evidence for achieving them. In Commissioned paper presented at NRC workshop on Evidence on Selected Promising Practices in Undergraduate Science, Technology, Engineering, and Mathematics (STEM) Education, 2008."},{"key":"e_1_3_2_1_11_1","volume-title":"Computer science curricula","author":"Sahami M.","year":"2013","unstructured":"M. Sahami and Computer science curricula 2013 , 2013. M. Sahami and et al. Computer science curricula 2013, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593310"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the AMIA Clinical Research Informatics Summit","author":"Vaidya J.","year":"2013","unstructured":"J. Vaidya , B. Shafiq , X. Jiang , and L. Ohno-Machado . Identifying inference attacks against healthcare data repositories. In E. V. Bernstam, editor , Proceedings of the AMIA Clinical Research Informatics Summit , San Francisco, CA, USA , Mar. 2013 . AMIA, AMIA. J. Vaidya, B. Shafiq, X. Jiang, and L. Ohno-Machado. Identifying inference attacks against healthcare data repositories. In E. V. Bernstam, editor, Proceedings of the AMIA Clinical Research Informatics Summit, San Francisco, CA, USA, Mar. 2013. AMIA, AMIA."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124706.1121463"}],"event":{"name":"InfoSecCD '14: Information Security Curriculum Development Conference","sponsor":["KSU Kennesaw State University","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '14"},"container-title":["Proceedings of the 2014 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670739.2670751","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2670739.2670751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:18Z","timestamp":1750227138000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670739.2670751"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,11]]},"references-count":15,"alternative-id":["10.1145\/2670739.2670751","10.1145\/2670739"],"URL":"https:\/\/doi.org\/10.1145\/2670739.2670751","relation":{},"subject":[],"published":{"date-parts":[[2014,10,11]]},"assertion":[{"value":"2014-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}