{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:32Z","timestamp":1750219952349,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:00:00Z","timestamp":1695772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"North-Rhine Westphalian Experts in Research on Digitalization (NERD II)","award":["05-2201-0014"],"award-info":[{"award-number":["05-2201-0014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,27]]},"DOI":"10.1145\/3605468.3609766","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T22:11:46Z","timestamp":1694556706000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Behind the Screens: The Security &amp; Privacy Advice Landscape of Children in Grades 5 &amp; 6"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2831-885X","authenticated-orcid":false,"given":"Alexander","family":"L\u00f6bel","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5206-1146","authenticated-orcid":false,"given":"Frederic","family":"Salmen","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2569-1042","authenticated-orcid":false,"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5178-8497","authenticated-orcid":false,"given":"Ulrik","family":"Schroeder","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,9,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978249.2978259"},{"volume-title":"Grunds\u00e4tze und Standards f\u00fcr die Informatik in der Schule-Bildungsstandards Informatik f\u00fcr die Sekundarstufe I. (2008)","author":"Brinda Torsten","key":"e_1_3_2_1_2_1","unstructured":"Torsten Brinda, Michael Fothe, Steffen Friedrich, Bernhard Koerber, Hermann Puhlmann, Gerhard R\u00f6hner, and Carsten Schulte. 2008. Grunds\u00e4tze und Standards f\u00fcr die Informatik in der Schule-Bildungsstandards Informatik f\u00fcr die Sekundarstufe I. (2008). Gesellschaft f\u00fcr Informatik eV."},{"key":"e_1_3_2_1_3_1","unstructured":"UK\u00a0Department for Education. 2013. National curriculum in England: computing programmes of study."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361721.3361726"},{"key":"e_1_3_2_1_5_1","volume-title":"Social Media & Technology Overview","author":"Lenhart Amanda","year":"2015","unstructured":"Amanda Lenhart. 2015. Teens, Social Media & Technology Overview 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3421590.3421630"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05563-8_4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2021.100343"},{"key":"e_1_3_2_1_9_1","unstructured":"Elissa\u00a0M Redmiles Yasemin Acar Sascha Fahl and Michelle\u00a0L. Mazurek. 2017. A Summary of Survey Methodology Best Practices for Security and Privacy Researchers. (2017)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489218"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681050"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3421590.3421623"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMAP.2016.7753391"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930716"}],"event":{"name":"WiPSCE '23: The 18th WiPSCE Conference on Primary and Secondary Computing Education Research","acronym":"WiPSCE '23","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the 18th WiPSCE Conference on Primary and Secondary Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605468.3609766","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605468.3609766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:03Z","timestamp":1750182543000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605468.3609766"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,27]]},"references-count":14,"alternative-id":["10.1145\/3605468.3609766","10.1145\/3605468"],"URL":"https:\/\/doi.org\/10.1145\/3605468.3609766","relation":{},"subject":[],"published":{"date-parts":[[2023,9,27]]},"assertion":[{"value":"2023-09-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}