{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T02:20:31Z","timestamp":1648693231503},"reference-count":0,"publisher":"Informing Science Institute","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JITE:IIP"],"abstract":"<jats:p>The paper describes the development of four learning modules that focus on technical details of how a person\u2019s privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning modules raised students\u2019 awareness of potential breaches of privacy as a user as well as a developer. The demonstration of a privacy breach in action helped students to design, configure, and implement technical solutions to prevent privacy violations. The assessment results demonstrate the strength of the technical approach. <\/jats:p>","DOI":"10.28945\/2330","type":"journal-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T18:05:45Z","timestamp":1508954745000},"page":"001-017","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Privacy Education with a Technical Emphasis in IT Curriculum"],"prefix":"10.28945","volume":"15","author":[{"given":"Svetlana","family":"Peltsverger","sequence":"first","affiliation":[{"name":"Kennesaw State University"}]},{"given":"Guangzhi","family":"Zheng","sequence":"additional","affiliation":[{"name":"Kennesaw State University"}]}],"member":"11490","published-online":{"date-parts":[[2016]]},"container-title":["Journal of Information Technology Education: Innovations in Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jite.org\/documents\/Vol15\/JITEv15IIPp001-017Peltsverger1873.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.jite.org\/documents\/Vol15\/JITEv15IIPp001-017Peltsverger1873.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/www.jite.org\/documents\/Vol15\/JITEv15IIPp001-017Peltsverger1873.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T19:18:40Z","timestamp":1597173520000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.informingscience.org\/Publications\/2330"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":0,"alternative-id":["2330"],"URL":"https:\/\/doi.org\/10.28945\/2330","relation":{},"ISSN":["2165-3151","2165-316X"],"issn-type":[{"value":"2165-3151","type":"print"},{"value":"2165-316X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}