{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:38:17Z","timestamp":1755999497458,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:00:00Z","timestamp":1657152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,7]]},"DOI":"10.1145\/3502718.3524800","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T10:28:30Z","timestamp":1657189710000},"page":"283-289","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privately Executable Examples"],"prefix":"10.1145","author":[{"given":"Viraj","family":"Kumar","sequence":"first","affiliation":[{"name":"Indian Institute of Science, Bengaluru, India"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/T4E.2015.11"},{"key":"e_1_3_2_1_2_1","volume-title":"The privacy paradox--Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review. Telematics and informatics 34, 7","author":"Barth Susanne","year":"2017","unstructured":"Susanne Barth and Menno DT De Jong . 2017. The privacy paradox--Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review. Telematics and informatics 34, 7 ( 2017 ), 1038--1058. Susanne Barth and Menno DT De Jong. 2017. The privacy paradox--Investigating discrepancies between expressed privacy concerns and actual online behavior--A systematic literature review. Telematics and informatics 34, 7 (2017), 1038--1058."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/10508406.2014.954750"},{"key":"e_1_3_2_1_5_1","volume-title":"Chi-squared and Fisher--Irwin tests of two-by-two tables with small sample recommendations. Statistics in medicine 26, 19","author":"Campbell Ian","year":"2007","unstructured":"Ian Campbell . 2007. Chi-squared and Fisher--Irwin tests of two-by-two tables with small sample recommendations. Statistics in medicine 26, 19 ( 2007 ), 3661--3675. Ian Campbell. 2007. Chi-squared and Fisher--Irwin tests of two-by-two tables with small sample recommendations. Statistics in medicine 26, 19 (2007), 3661--3675."},{"key":"e_1_3_2_1_6_1","volume-title":"Prutor: A system for tutoring CS1 and collecting student programs for analysis. arXiv preprint arXiv:1608.03828","author":"Das Rajdeep","year":"2016","unstructured":"Rajdeep Das , Umair Z Ahmed , Amey Karkare , and Sumit Gulwani . 2016 . Prutor: A system for tutoring CS1 and collecting student programs for analysis. arXiv preprint arXiv:1608.03828 (2016). Rajdeep Das, Umair Z Ahmed, Amey Karkare, and Sumit Gulwani. 2016. Prutor: A system for tutoring CS1 and collecting student programs for analysis. arXiv preprint arXiv:1608.03828 (2016)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2883851.2883893"},{"key":"e_1_3_2_1_8_1","volume-title":"Matthew Flatt, and Shriram Krishnamurthi.","author":"Felleisen Matthias","year":"2018","unstructured":"Matthias Felleisen , Robert Bruce Findler , Matthew Flatt, and Shriram Krishnamurthi. 2018 . How to design programs: an introduction to programming and computing. MIT Press . Matthias Felleisen, Robert Bruce Findler, Matthew Flatt, and Shriram Krishnamurthi. 2018. How to design programs: an introduction to programming and computing. MIT Press."},{"key":"e_1_3_2_1_9_1","volume-title":"International workshop on privacy enhancing technologies. Springer, 243--258","author":"Kumaraguru Ponnurangam","year":"2005","unstructured":"Ponnurangam Kumaraguru and Lorrie Cranor . 2005 . Privacy in India: Attitudes and awareness . In International workshop on privacy enhancing technologies. Springer, 243--258 . Ponnurangam Kumaraguru and Lorrie Cranor. 2005. Privacy in India: Attitudes and awareness. In International workshop on privacy enhancing technologies. Springer, 243--258."},{"key":"e_1_3_2_1_10_1","volume-title":"Privacy in India: Attitudes and awareness v 2.0. Available at SSRN 2188749","author":"Kumaraguru Ponnurangam","year":"2012","unstructured":"Ponnurangam Kumaraguru and Niharika Sachdeva . 2012. Privacy in India: Attitudes and awareness v 2.0. Available at SSRN 2188749 ( 2012 ). Ponnurangam Kumaraguru and Niharika Sachdeva. 2012. Privacy in India: Attitudes and awareness v 2.0. Available at SSRN 2188749 (2012)."},{"key":"e_1_3_2_1_11_1","volume-title":"Matthieu De Mari, and Christopher M Poskitt.","author":"Kurniawan Oka","year":"2021","unstructured":"Oka Kurniawan , Cyrille J\u00e9gourel , Norman Tiong Seng Lee , Matthieu De Mari, and Christopher M Poskitt. 2021 . Steps Before Syntax: Helping Novice Programmers Solve Problems using the PCDIT Framework . arXiv preprint arXiv:2109.08896 (2021). Oka Kurniawan, Cyrille J\u00e9gourel, Norman Tiong Seng Lee, Matthieu De Mari, and Christopher M Poskitt. 2021. Steps Before Syntax: Helping Novice Programmers Solve Problems using the PCDIT Framework. arXiv preprint arXiv:2109.08896 (2021)."},{"volume-title":"Proceedings of the 2016 ACM Conference on International Computing Education Research","author":"Loksa Dastyni","key":"e_1_3_2_1_12_1","unstructured":"Dastyni Loksa and Amy J. Ko . 2016. The Role of Self-Regulation in Programming Problem Solving Process and Success . In Proceedings of the 2016 ACM Conference on International Computing Education Research ( Melbourne, VIC, Australia) (ICER '16). Association for Computing Machinery, New York, NY, USA, 83--91. https: \/\/doi.org\/10.1145\/2960310.2960334 10.1145\/2960310.2960334 Dastyni Loksa and Amy J. Ko. 2016. The Role of Self-Regulation in Programming Problem Solving Process and Success. In Proceedings of the 2016 ACM Conference on International Computing Education Research (Melbourne, VIC, Australia) (ICER '16). Association for Computing Machinery, New York, NY, USA, 83--91. https: \/\/doi.org\/10.1145\/2960310.2960334"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12152"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157182"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230977.3230981"},{"key":"e_1_3_2_1_16_1","volume-title":"The analysis of 2\u00d7 2 contingency tables--yet again. Statistics in medicine 30, 8","author":"Richardson JT","year":"2011","unstructured":"JT Richardson . 2011. The analysis of 2\u00d7 2 contingency tables--yet again. Statistics in medicine 30, 8 ( 2011 ), 890--author. JT Richardson. 2011. The analysis of 2\u00d7 2 contingency tables--yet again. Statistics in medicine 30, 8 (2011), 890--author."},{"key":"e_1_3_2_1_17_1","volume-title":"Penetrating the fog: Analytics in learning and education. EDUCAUSE review 46, 5","author":"Siemens George","year":"2011","unstructured":"George Siemens and Phil Long . 2011. Penetrating the fog: Analytics in learning and education. EDUCAUSE review 46, 5 ( 2011 ), 30. George Siemens and Phil Long. 2011. Penetrating the fog: Analytics in learning and education. EDUCAUSE review 46, 5 (2011), 30."},{"key":"e_1_3_2_1_18_1","unstructured":"Daniel J Solove. 2008. Understanding privacy. (2008).  Daniel J Solove. 2008. Understanding privacy. (2008)."},{"key":"e_1_3_2_1_19_1","volume-title":"ASE","author":"Taylor Clark","year":"2016","unstructured":"Clark Taylor and Christian Collberg . 2016. A tool for teaching reverse engineering. USENIX Workshop on Advances in Security Education , ASE 2016 , co-located with the 25th USENIX Security Symposium. All rights reserved.; 2016 USENIX Workshop on Advances in Security Education, ASE 2016, co-located with the 25th USENIX Security Symposium . Clark Taylor and Christian Collberg. 2016. A tool for teaching reverse engineering. USENIX Workshop on Advances in Security Education, ASE 2016, co-located with the 25th USENIX Security Symposium. All rights reserved.; 2016 USENIX Workshop on Advances in Security Education, ASE 2016, co-located with the 25th USENIX Security Symposium."},{"volume-title":"The Privacy Paradox and Its Implications for Learning Analytics","author":"Tsai Yi-Shan","key":"e_1_3_2_1_20_1","unstructured":"Yi-Shan Tsai , Alexander Whitelock-Wainwright , and Dragan Ga?evi?. 2020. The Privacy Paradox and Its Implications for Learning Analytics . Association for Computing Machinery , New York, NY, USA , 230--239. https:\/\/doi.org\/10.1145\/ 3375462.3375536 Yi-Shan Tsai, Alexander Whitelock-Wainwright, and Dragan Ga?evi?. 2020. The Privacy Paradox and Its Implications for Learning Analytics. Association for Computing Machinery, New York, NY, USA, 230--239. https:\/\/doi.org\/10.1145\/ 3375462.3375536"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41039-020-00130-y"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591762"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291279.3339416"}],"event":{"name":"ITiCSE 2022: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Dublin Ireland","acronym":"ITiCSE 2022"},"container-title":["Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3502718.3524800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:47Z","timestamp":1750183787000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,7]]},"references-count":23,"alternative-id":["10.1145\/3502718.3524800","10.1145\/3502718"],"URL":"https:\/\/doi.org\/10.1145\/3502718.3524800","relation":{},"subject":[],"published":{"date-parts":[[2022,7,7]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}