{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T15:10:10Z","timestamp":1755789010594,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,3]]},"DOI":"10.1145\/3649217.3653572","type":"proceedings-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T18:30:20Z","timestamp":1720031420000},"page":"618-624","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and Use of Privacy Capture-the-Flag Challenges in an Introductory Class on Information Privacy and Security"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4938-2782","authenticated-orcid":false,"given":"Wolfgang","family":"Vigl","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Innsbruck, Innsbruck, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8298-4634","authenticated-orcid":false,"given":"Svetlana","family":"Abramova","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Innsbruck, Innsbruck, Austria"}]}],"member":"320","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"267","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security 19)","author":"Carlini N.","year":"2019","unstructured":"Carlini, N., Liu, C., Erlingsson, \u00da., Kos, J., and Song, D. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19) (2019), pp. 267--284."},{"key":"e_1_3_2_1_2_1","volume-title":"D.C.","author":"Carlisle M.","year":"2015","unstructured":"Carlisle, M., Chiaramonte, M., and Caswell, D. Using CTFs for an Undergraduate Cyber Education. In 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15) (Washington, D.C., 2015), USENIX Association."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3467967"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Chung K.","year":"2014","unstructured":"Chung, K., and Cohen, J. Learning Obstacles in the Capture The Flag Model . In Proceedings of 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) (San Diego, CA, 2014), USENIX Association."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502718.3524806"},{"key":"e_1_3_2_1_7_1","volume-title":"Computer Science Curricula 2023: Version Beta","author":"CS2023 Task Force","year":"2023","unstructured":"CS2023 Task Force. Computer Science Curricula 2023: Version Beta. Association for Computing Machinery, IEEE-Computer Society, and Association for Advancement of Artificial Intelligence, 2023."},{"key":"e_1_3_2_1_8_1","volume-title":"Cryptography and Data Security","author":"Denning D. E. R.","year":"1982","unstructured":"Denning, D. E. R. Cryptography and Data Security, vol. 112. Addison-Wesley Reading, 1982."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.21"},{"key":"e_1_3_2_1_10_1","first-page":"591","volume-title":"The Teaching Privacy Curriculum. In Proceedings of the 47th ACM Technical Symposium on Computing Science Education","author":"Egelman S.","year":"2016","unstructured":"Egelman, S., Bernd, J., Friedland, G., and Garcia, D. The Teaching Privacy Curriculum. In Proceedings of the 47th ACM Technical Symposium on Computing Science Education (2016), pp. 591--596."},{"key":"e_1_3_2_1_11_1","volume-title":"Teaching Privacy as a Part of the Computer Science Curriculum. The Impact of Information Technology: From practice to curriculum","author":"Fischer-H\u00fcbner S.","year":"1996","unstructured":"Fischer-H\u00fcbner, S. Teaching Privacy as a Part of the Computer Science Curriculum. The Impact of Information Technology: From practice to curriculum (1996), 47--53."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.04.024"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287287"},{"key":"e_1_3_2_1_14_1","volume-title":"Secure Multi-Party Computation. Manuscript. Preliminary version 78, 110","author":"Goldreich O.","year":"1998","unstructured":"Goldreich, O. Secure Multi-Party Computation. Manuscript. Preliminary version 78, 110 (1998), 1--108."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186097"},{"volume-title":"Wiley International Encyclopedia of Marketing (2010).","author":"Grimm P.","key":"e_1_3_2_1_16_1","unstructured":"Grimm, P. Social Desirability Bias. Wiley International Encyclopedia of Marketing (2010)."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Symposium on Privacy Enhancing Technologies","author":"Gross T.","year":"2021","unstructured":"Gross, T. Validity and Reliability of the Scale Internet Users' Information Privacy Concerns (IUIPC). Proceedings of the Symposium on Privacy Enhancing Technologies (2021)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500779"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0069"},{"key":"e_1_3_2_1_20_1","volume-title":"A Survey of Database Inference Attack Prevention Methods. Educational Technology Research","author":"Hylkema M.","year":"2009","unstructured":"Hylkema, M. A Survey of Database Inference Attack Prevention Methods. Educational Technology Research (2009)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502717.3532153"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125686"},{"key":"e_1_3_2_1_24_1","first-page":"517","volume-title":"Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (New York, NY, USA, 2009), KDD '09, Association for Computing Machinery","author":"Li T.","unstructured":"Li, T., and Li, N. On the Tradeoff between Privacy and Utility in Data Publishing. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (New York, NY, USA, 2009), KDD '09, Association for Computing Machinery, p. 517--526."},{"key":"e_1_3_2_1_25_1","volume-title":"??-diversity: Privacy beyond ??-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD) 1, 1","author":"Machanavajjhala A.","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., and Venkitasubramaniam, M. ??-diversity: Privacy beyond ??-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD) 1, 1 (2007), 3--es."},{"key":"e_1_3_2_1_26_1","first-page":"2","article-title":"Theoretical Results on De-anonymization via Linkage Attacks","volume":"5","author":"Merener M. M","year":"2012","unstructured":"Merener, M. M. Theoretical Results on De-anonymization via Linkage Attacks. Transactions on Data Privacy 5, 2 (2012), 377--402.","journal-title":"Transactions on Data Privacy"},{"key":"e_1_3_2_1_27_1","volume-title":"CA","author":"Mirkovic J.","year":"2014","unstructured":"Mirkovic, J., and Peterson, P. A. H. Class Capture-the-Flag Exercises. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE (San Diego, CA, 2014), USENIX Association."},{"key":"e_1_3_2_1_28_1","volume-title":"Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education","author":"Nurse J. R.","year":"2021","unstructured":"Nurse, J. R., Adamos, K., Grammatopoulos, A., and Di Franco, F. Addressing the EU Cybersecurity Skills Shortage and Gap Through Higher Education. European Union Agency for Cybersecurity (ENISA) Report (2021)."},{"key":"e_1_3_2_1_29_1","first-page":"1","volume":"35","author":"Spiekermann S.","year":"2008","unstructured":"Spiekermann, S., and Cranor, L. F. Engineering Privacy. IEEE Transactions on Software Engineering 35, 1 (2008), 67--82.","journal-title":"Engineering Privacy. IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_31_1","volume-title":"The Cyber Security Body of Knowledge v1.1.0","author":"Troncoso C.","year":"2021","unstructured":"Troncoso, C. The Cyber Security Body of Knowledge v1.1.0, 2021. University of Bristol, 2021, ch. Privacy & Online Rights. KA Version 1.0.2."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2528908.2528918"},{"key":"e_1_3_2_1_33_1","unstructured":"Vykopal J. ?v\u00e1bensk"},{"key":"e_1_3_2_1_34_1","first-page":"752","volume-title":"Proceedings of the 51st ACM Technical Symposium on Computer Science Education (New York, NY, USA, 2020), SIGCSE '20, Association for Computing Machinery","author":"Chang E","unstructured":"y, V., and Chang, E.-C. Benefits and Pitfalls of Using Capture the Flag Games in University Courses. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (New York, NY, USA, 2020), SIGCSE '20, Association for Computing Machinery, p. 752--758."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2019.08.025"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"e_1_3_2_1_37_1","first-page":"1","volume":"25","author":"Westin A. F.","year":"1968","unstructured":"Westin, A. F. Privacy and Freedom. Washington and Lee Law Review 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.28945\/4597"},{"key":"e_1_3_2_1_39_1","volume-title":"Computers & Security 102","author":"Cybersecurity Knowledge","year":"2021","unstructured":"S. Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges. Computers & Security 102 (2021), 1--14."}],"event":{"name":"ITiCSE 2024: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Milan Italy","acronym":"ITiCSE 2024"},"container-title":["Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649217.3653572","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649217.3653572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:49:57Z","timestamp":1755787797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649217.3653572"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,3]]},"references-count":39,"alternative-id":["10.1145\/3649217.3653572","10.1145\/3649217"],"URL":"https:\/\/doi.org\/10.1145\/3649217.3653572","relation":{},"subject":[],"published":{"date-parts":[[2024,7,3]]},"assertion":[{"value":"2024-07-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}