{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T08:46:25Z","timestamp":1769589985497,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:00:00Z","timestamp":1569456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,26]]},"DOI":"10.1145\/3349266.3351399","type":"proceedings-article","created":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T12:17:48Z","timestamp":1569500268000},"page":"118-123","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["The Adventures of ScriptKitty"],"prefix":"10.1145","author":[{"given":"Ovidiu-Gabriel","family":"Baciu-Ureche","sequence":"first","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Carlie","family":"Sleeman","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"William C.","family":"Moody","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Suzanne J.","family":"Matthews","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Social Media & Technology","author":"Anderson Monica","year":"2018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/et.2013.0302"},{"key":"e_1_3_2_1_3_1","volume-title":"The Adventures of ScriptKitty: Raspberry Pi 3 Image. Internet Website, last accessed","author":"Baciu-Ureche Ovidiu-Gabriel","year":"2019"},{"key":"e_1_3_2_1_4_1","volume-title":"Matthews","author":"Baciu-Ureche Ovidiu-Gabriel","year":"2019"},{"key":"e_1_3_2_1_5_1","volume-title":"Matthews","author":"Baciu-Ureche Ovidiu-Gabriel","year":"2018"},{"key":"e_1_3_2_1_6_1","volume-title":"PicoCTF: A Game- Based Computer Security Competition for High School Students. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Chapman Peter"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159553"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISECon.2012.6204166"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017783"},{"key":"e_1_3_2_1_11_1","volume-title":"Gen Cyber: Inspiring the next generation of cyber stars. https: \/\/www.gen-cyber.com\/","year":"2014"},{"key":"e_1_3_2_1_12_1","volume-title":"GitBook: Documentation Made Easy. Internet Website, last accessed","author":"GitBook Inc. 2014.","year":"2018"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.05.119"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISECon.2015.7119938"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1325555.1325569"},{"key":"e_1_3_2_1_17_1","volume-title":"CySCom: Cybersecurity COMics. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). 282--284","author":"Ledbetter B.","year":"2016"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174097"},{"key":"e_1_3_2_1_19_1","volume-title":"Internet safety education for youth: stakeholder perspectives. BMC public health 13, 1","author":"Moreno Megan A","year":"2013"},{"key":"e_1_3_2_1_20_1","volume-title":"Children's Access to and Use of the Internet. The Condition of Education","author":"National Center for Education Statistics. 2019.","year":"2019"},{"key":"e_1_3_2_1_21_1","volume-title":"d.]. John the Ripper password cracker. Internet Website, last accessed","year":"2019"},{"key":"e_1_3_2_1_22_1","unstructured":"Angela Orebaugh Gilbert Ramirez and Jay Beale. 2006. Wireshark & Ethereal network protocol analyzer toolkit. Elsevier.  Angela Orebaugh Gilbert Ramirez and Jay Beale. 2006. Wireshark & Ethereal network protocol analyzer toolkit. Elsevier."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15)","author":"Pater Jessica A."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953378"},{"key":"e_1_3_2_1_25_1","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2013"},{"key":"e_1_3_2_1_26_1","volume-title":"Comic-BEE: Comic-Based Education & Evaluation for Cyber Security. Internet Website, last accessed","author":"Decisions Secure","year":"2018"},{"key":"e_1_3_2_1_27_1","volume-title":"Chris Stephenson, and Anita Verno.","author":"Seehorn Deborah","year":"2011"},{"key":"e_1_3_2_1_28_1","volume-title":"The Raspberry Pi: Not a Poor Man's Computer, but an Interesting Possibility. Educational Technology","author":"Strycker Jesse","year":"2015"},{"key":"e_1_3_2_1_29_1","unstructured":"Devin L Suits. 2019. New graphic novellas to educate Soldiers families on future cyber threats. https:\/\/www.army.mil\/article\/215922\/new_graphic_novellas_to_ educate_soldiers_families_on_future_cyber_threats  Devin L Suits. 2019. New graphic novellas to educate Soldiers families on future cyber threats. https:\/\/www.army.mil\/article\/215922\/new_graphic_novellas_to_ educate_soldiers_families_on_future_cyber_threats"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2017.8053432"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2027999.2028009"},{"key":"e_1_3_2_1_32_1","volume-title":"A Model Curriculum for K--12 Computer Science: Final Report of the ACM K--12 Task Force Curriculum Committee","author":"Tucker Allen"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.166"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17)","author":"Wisniewski Pamela"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC.2017.8239274"}],"event":{"name":"SIGITE '19: The 20th Annual Conference on Information Technology Education","location":"Tacoma WA USA","acronym":"SIGITE '19","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"]},"container-title":["Proceedings of the 20th Annual SIG Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3349266.3351399","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3349266.3351399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:36Z","timestamp":1750202016000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3349266.3351399"}},"subtitle":["Using the Raspberry Pi to Teach Adolescents about Internet Safety"],"short-title":[],"issued":{"date-parts":[[2019,9,26]]},"references-count":34,"alternative-id":["10.1145\/3349266.3351399","10.1145\/3349266"],"URL":"https:\/\/doi.org\/10.1145\/3349266.3351399","relation":{},"subject":[],"published":{"date-parts":[[2019,9,26]]},"assertion":[{"value":"2019-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}