{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:16Z","timestamp":1750220056091,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,27]]},"DOI":"10.1145\/3555776.3577805","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T17:16:29Z","timestamp":1686158189000},"page":"1603-1606","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1666-631X","authenticated-orcid":false,"given":"Jamie","family":"Knott","sequence":"first","affiliation":[{"name":"School of Computing, University of Kent, Institute of Cyber Security for Society, Canterbury, Kent, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6084-6719","authenticated-orcid":false,"given":"Haiyue","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Computing, University of Kent, Institute of Cyber Security for Society, Canterbury, Kent, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9377-6240","authenticated-orcid":false,"given":"Matthew","family":"Boakes","sequence":"additional","affiliation":[{"name":"School of Computing, University of Kent, Institute of Cyber Security for Society, Canterbury, Kent, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5628-7328","authenticated-orcid":false,"given":"Shujun","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing, University of Kent, Institute of Cyber Security for Society, Canterbury, Kent, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. LSM","author":"Agarwal Apoorv","year":"2011","unstructured":"Apoorv Agarwal , Boyi Xie , Ilia Vovsha , Owen Rambow , and Rebecca J. Passonneau . 2011. Sentiment Analysis of Twitter Data . In Proc. LSM 2011 . ACL, 30--38. https:\/\/aclanthology.org\/W11-0705.pdf Apoorv Agarwal, Boyi Xie, Ilia Vovsha, Owen Rambow, and Rebecca J. Passonneau. 2011. Sentiment Analysis of Twitter Data. In Proc. LSM 2011. ACL, 30--38. https:\/\/aclanthology.org\/W11-0705.pdf"},{"volume-title":"Natural language processing with Python: analyzing text with the natural language toolkit","author":"Bird Steven","key":"e_1_3_2_1_2_1","unstructured":"Steven Bird , Ewan Klein , and Edward Loper . 2009. Natural language processing with Python: analyzing text with the natural language toolkit . O'Reilly Media, Inc. Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural language processing with Python: analyzing text with the natural language toolkit. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_3_1","unstructured":"DCMS. 2022. Mapping informal cyber security initiatives for young people aged 5-19 --- gov.uk. Technical Report. https:\/\/www.gov.uk\/government\/publications\/mapping-informal-cyber-security-initiatives-for-young-people-aged-5-19\/mapping-informal-cyber-security-initiatives-for-young-people-aged-5-19 [Accessed 16-Aug-2022].  DCMS. 2022. Mapping informal cyber security initiatives for young people aged 5-19 --- gov.uk. Technical Report. https:\/\/www.gov.uk\/government\/publications\/mapping-informal-cyber-security-initiatives-for-young-people-aged-5-19\/mapping-informal-cyber-security-initiatives-for-young-people-aged-5-19 [Accessed 16-Aug-2022]."},{"key":"e_1_3_2_1_4_1","unstructured":"JustAnotherArchivist. 2022. A social networking service scraper in Python. https:\/\/github.com\/JustAnotherArchivist\/snscrape [Accessed 10-Aug-2022].  JustAnotherArchivist. 2022. A social networking service scraper in Python. https:\/\/github.com\/JustAnotherArchivist\/snscrape [Accessed 10-Aug-2022]."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i1.14185"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2019.1697716"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECOS47637.2019.8984523"},{"key":"e_1_3_2_1_8_1","volume-title":"Children's online behaviour in England and Wales: year ending","author":"Office for National Statistics, UK. 2021.","year":"2020","unstructured":"Office for National Statistics, UK. 2021. Children's online behaviour in England and Wales: year ending March 2020 . Technical report. https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/bulletins\/childrensonlinebehaviourinenglandandwales\/yearendingmarch2020 Office for National Statistics, UK. 2021. Children's online behaviour in England and Wales: year ending March 2020. Technical report. https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/bulletins\/childrensonlinebehaviourinenglandandwales\/yearendingmarch2020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSC.2015.7050858"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.18178\/ijiet.2020.10.5.1393"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. LREC 2010","author":"\u0158eh\u016f\u0159ek Radim","year":"2010","unstructured":"Radim \u0158eh\u016f\u0159ek and Petr Sojka . 2010 . Software Framework for Topic Modelling with Large Corpora . In Proc. LREC 2010 . ELRA, 46--50. https:\/\/radimrehurek.com\/lrec2010_final.pdf Radim \u0158eh\u016f\u0159ek and Petr Sojka. 2010. Software Framework for Topic Modelling with Large Corpora. In Proc. LREC 2010. ELRA, 46--50. https:\/\/radimrehurek.com\/lrec2010_final.pdf"},{"key":"e_1_3_2_1_12_1","volume-title":"Kjartan \u00d3lafsson","author":"Stalker Peter","year":"2019","unstructured":"Peter Stalker , Sonia Livingstone , Maria Eugenia Sozio , Kjartan \u00d3lafsson , Petar Kanchev, and Marium Saeed. 2019 . Growing Up in a Connected World : Understanding Children's Risks and Opportunities in a Digital Age. Technical report. UNICEF Office of Research . https:\/\/www.unicef-irc.org\/growing-up-connected Peter Stalker, Sonia Livingstone, Maria Eugenia Sozio, Kjartan \u00d3lafsson, Petar Kanchev, and Marium Saeed. 2019. Growing Up in a Connected World: Understanding Children's Risks and Opportunities in a Digital Age. Technical report. UNICEF Office of Research. https:\/\/www.unicef-irc.org\/growing-up-connected"},{"key":"e_1_3_2_1_13_1","volume-title":"Franqueira","author":"Waldock Krysia Emily","year":"2022","unstructured":"Krysia Emily Waldock , Vince Miller , Shujun Li , and Virginia N. L . Franqueira . 2022 . Pre-University Cyber Security Education : A report on developing cyber skills amongst children and young people. Technical report. GFCE. https:\/\/cybilportal.org\/wp-content\/uploads\/2022\/08\/GFCE-report-20220731.pdf Krysia Emily Waldock, Vince Miller, Shujun Li, and Virginia N. L. Franqueira. 2022. Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people. Technical report. GFCE. https:\/\/cybilportal.org\/wp-content\/uploads\/2022\/08\/GFCE-report-20220731.pdf"},{"key":"e_1_3_2_1_14_1","first-page":"19","article-title":"Discovery of Insights on Cybersecurity Education from Twitter Using Analytics","volume":"5","author":"Zenebe Azene","year":"2018","unstructured":"Azene Zenebe and Tony Yorkman . 2018 . Discovery of Insights on Cybersecurity Education from Twitter Using Analytics . Journal of The Colloquium for Information Systems Security Education 5 , 2 (2018), 19 . https:\/\/cisse.info\/journal\/index.php\/cisse\/article\/view\/81 Azene Zenebe and Tony Yorkman. 2018. Discovery of Insights on Cybersecurity Education from Twitter Using Analytics. Journal of The Colloquium for Information Systems Security Education 5, 2 (2018), 19. https:\/\/cisse.info\/journal\/index.php\/cisse\/article\/view\/81","journal-title":"Journal of The Colloquium for Information Systems Security Education"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427920"}],"event":{"name":"SAC '23: 38th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Tallinn Estonia","acronym":"SAC '23"},"container-title":["Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3577805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555776.3577805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:30Z","timestamp":1750183710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3577805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":15,"alternative-id":["10.1145\/3555776.3577805","10.1145\/3555776"],"URL":"https:\/\/doi.org\/10.1145\/3555776.3577805","relation":{},"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"2023-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}