{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:48Z","timestamp":1750220508845,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:00:00Z","timestamp":1605744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,19]]},"DOI":"10.1145\/3428029.3428052","type":"proceedings-article","created":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T20:32:05Z","timestamp":1606077125000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Combining Ideas and Artifacts: an Interaction-Focused View on Computing Education Using a Cybersecurity Example"],"prefix":"10.1145","author":[{"given":"Lutz","family":"Terfloth","sequence":"first","affiliation":[{"name":"Paderborn University, Germany"}]},{"given":"Lea","family":"Budde","sequence":"additional","affiliation":[{"name":"Paderborn University, Germany"}]},{"given":"Carsten","family":"Schulte","sequence":"additional","affiliation":[{"name":"Paderborn University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","unstructured":"National Cyber\u00a0Security Centre. 2019. Most hacked passwords revealed as UK cyber survey exposes gaps in online security. https:\/\/www.ncsc.gov.uk\/news\/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security National Cyber\u00a0Security Centre. 2019. Most hacked passwords revealed as UK cyber survey exposes gaps in online security. https:\/\/www.ncsc.gov.uk\/news\/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security"},{"volume-title":"Now the C Is Going. In Informatics Education \u2013 The Bridge between Using and Understanding Computers, Roland\u00a0T","author":"Clark C.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v7i12.1010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"ACM Computing Curricula\u00a0Task Force (Ed.). 2013. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. ACM Inc. https:\/\/doi.org\/10.1145\/2534860 ACM Computing Curricula\u00a0Task Force (Ed.). 2013. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. ACM Inc. https:\/\/doi.org\/10.1145\/2534860","DOI":"10.1145\/2534860"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(09)70139-3"},{"key":"e_1_3_2_1_7_1","unstructured":"Avi Hofstein Ingo Eilks and Roger Bybee. 2010. Societal Issues and Their Importance for Contemporary Science Education. 5\u201322. Avi Hofstein Ingo Eilks and Roger Bybee. 2010. Societal Issues and Their Importance for Contemporary Science Education. 5\u201322."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.179"},{"volume-title":"Barbara Schenk (Ed.). VS Verl. f\u00fcr Sozialwissenschaften","author":"Koller Hans-Christoph","key":"e_1_3_2_1_9_1"},{"edition":"4","volume-title":"Qualitative Forschung. Ein Handbuch","author":"Marotzki Winfried","key":"e_1_3_2_1_10_1"},{"volume-title":"Machine behaviour. Nature 568, 7753 (April","year":"2019","author":"Rahwan Iyad","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","first-page":"11","article-title":"Teaching human-centered security using nontraditional techniques","volume":"13","author":"Renaud Karen","year":"2013","journal-title":"ACM Transactions on Computing Education (TOCE)"},{"volume-title":"International Conference on Informatics in Secondary Schools-Evolution and Perspectives. Springer, 110\u2013121","year":"2008","author":"Schulte Carsten","key":"e_1_3_2_1_13_1"},{"volume-title":"18th Koli Calling International Conference on Computing Education Research (Koli Calling \u201818)","year":"2018","author":"Schulte Carsten","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"274","article-title":"Fundamental ideas of computer science","volume":"53","author":"Schwill Andreas","year":"1994","journal-title":"Bulletin-European Association for Theoretical Computer Science"},{"volume-title":"Computer Science Education: Perspectives on Teaching and learning in school","author":"Sentance Sue","key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","DOI":"10.5040\/9781350057142"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2016.84"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366816"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1118178.1118215"},{"volume-title":"User-centered Security. In Proceedings of the 1996 Workshop on New Security Paradigms","year":"1996","author":"Zurko Mary\u00a0Ellen","key":"e_1_3_2_1_20_1"}],"event":{"name":"Koli Calling '20: 20th Koli Calling International Conference on Computing Education Research","acronym":"Koli Calling '20","location":"Koli Finland"},"container-title":["Koli Calling '20: Proceedings of the 20th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428029.3428052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428029.3428052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:23Z","timestamp":1750195463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428029.3428052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,19]]},"references-count":20,"alternative-id":["10.1145\/3428029.3428052","10.1145\/3428029"],"URL":"https:\/\/doi.org\/10.1145\/3428029.3428052","relation":{},"subject":[],"published":{"date-parts":[[2020,11,19]]}}}