{"id":"https://openalex.org/W4400267610","doi":"https://doi.org/10.1145/3649217.3653572","title":"Design and Use of Privacy Capture-the-Flag Challenges in an Introductory Class on Information Privacy and Security","display_name":"Design and Use of Privacy Capture-the-Flag Challenges in an Introductory Class on Information Privacy and Security","publication_year":2024,"publication_date":"2024-07-03","ids":{"openalex":"https://openalex.org/W4400267610","doi":"https://doi.org/10.1145/3649217.3653572"},"language":"en","primary_location":{"id":"doi:10.1145/3649217.3653572","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649217.3653572","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3649217.3653572","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093054856","display_name":"Wolfgang Vigl","orcid":"https://orcid.org/0009-0007-4938-2782"},"institutions":[{"id":"https://openalex.org/I190249584","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659","country_code":"AT","type":"education","lineage":["https://openalex.org/I190249584"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Wolfgang Vigl","raw_affiliation_strings":["Department of Computer Science, University of Innsbruck, Innsbruck, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Innsbruck, Innsbruck, Austria","institution_ids":["https://openalex.org/I190249584"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005580422","display_name":"Svetlana Abramova","orcid":"https://orcid.org/0000-0002-8298-4634"},"institutions":[{"id":"https://openalex.org/I190249584","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659","country_code":"AT","type":"education","lineage":["https://openalex.org/I190249584"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Svetlana Abramova","raw_affiliation_strings":["Department of Computer Science, University of Innsbruck, Innsbruck, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Innsbruck, Innsbruck, Austria","institution_ids":["https://openalex.org/I190249584"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5093054856"],"corresponding_institution_ids":["https://openalex.org/I190249584"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1517019,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"618","last_page":"624"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/flag","display_name":"Flag (linear algebra)","score":0.7211623191833496},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6863712668418884},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.605576753616333},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5827876329421997},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5638773441314697},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5302198529243469},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.44541293382644653},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.421487420797348},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07298043370246887},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.059790998697280884}],"concepts":[{"id":"https://openalex.org/C2776730729","wikidata":"https://www.wikidata.org/wiki/Q1392130","display_name":"Flag (linear algebra)","level":3,"score":0.7211623191833496},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6863712668418884},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.605576753616333},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5827876329421997},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5638773441314697},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5302198529243469},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.44541293382644653},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.421487420797348},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07298043370246887},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.059790998697280884},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3649217.3653572","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649217.3653572","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1","raw_type":"proceedings-article"},{"id":"pmh:oai:ulb-dok.uibk.ac.at/:13264985","is_oa":true,"landing_page_url":"https://ulb-dok.uibk.ac.at/doi/10.1145/3649217.3653572","pdf_url":null,"source":{"id":"https://openalex.org/S4306401999","display_name":"Digital Library of the University of Innsbruck (University of Innsbruck)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I143397708","host_organization_name":"Innsbruck Medical University","host_organization_lineage":["https://openalex.org/I143397708"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"BookPart"}],"best_oa_location":{"id":"doi:10.1145/3649217.3653572","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649217.3653572","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W78997237","https://openalex.org/W573791239","https://openalex.org/W1486470321","https://openalex.org/W1882297107","https://openalex.org/W1974653074","https://openalex.org/W2063929576","https://openalex.org/W2144426826","https://openalex.org/W2159024459","https://openalex.org/W2167163614","https://openalex.org/W2290181636","https://openalex.org/W2416486883","https://openalex.org/W2565345046","https://openalex.org/W2616332126","https://openalex.org/W2757451536","https://openalex.org/W2787932188","https://openalex.org/W2970592824","https://openalex.org/W3011295929","https://openalex.org/W3015392158","https://openalex.org/W3047485792","https://openalex.org/W3166608317","https://openalex.org/W3166717588","https://openalex.org/W3186173847","https://openalex.org/W4237413241","https://openalex.org/W4284878873","https://openalex.org/W4284893893","https://openalex.org/W4299627282"],"related_works":["https://openalex.org/W2101582069","https://openalex.org/W2116878667","https://openalex.org/W2219269088","https://openalex.org/W2127814706","https://openalex.org/W2584827882","https://openalex.org/W2118333568","https://openalex.org/W2994243660","https://openalex.org/W2528109871","https://openalex.org/W1598195095","https://openalex.org/W2549995367"],"abstract_inverted_index":{"With":[0],"the":[1,80,94,111],"advancement":[2],"of":[3,43,83,104,115,136,158],"data-intensive":[4],"technologies":[5],"and":[6,25,29,53,66,76,89,113,120,126,149,155],"online":[7],"tracking":[8],"opportunities,":[9],"education":[10,96],"on":[11],"privacy":[12,28,95,117],"is":[13,69,139],"becoming":[14],"a":[15,101],"bigger":[16],"priority":[17],"in":[18,93,145],"cybersecurity":[19],"curricula.":[20],"Owing":[21],"to":[22,36,46,72,141],"its":[23,30,91],"multidimensional":[24],"context-dependent":[26],"nature,":[27],"protection":[31],"goals":[32],"can":[33],"be":[34],"introduced":[35],"computer":[37],"science":[38],"students":[39],"as":[40,151],"collective":[41],"efforts":[42],"system":[44],"designers":[45],"enable":[47],"data":[48,55],"protection,":[49],"user's":[50],"informational":[51],"control,":[52],"privacy-preserving":[54],"sharing":[56],"with":[57],"third":[58],"parties.":[59],"Since":[60],"engaging":[61,156],"course":[62,132],"participants":[63],"into":[64],"hands-on":[65],"gamified":[67],"exercises":[68,138],"generally":[70],"known":[71],"enhance":[73],"learning":[74,159],"experience":[75],"effect,":[77],"we":[78],"adopted":[79],"teaching":[81],"practice":[82],"using":[84],"Capture-the-Flag":[85],"(CTF)":[86],"security":[87],"challenges":[88],"validated":[90],"applicability":[92],"domain.":[97],"This":[98],"work":[99],"presents":[100],"pioneering":[102],"set":[103],"8":[105],"CTF-style":[106],"tasks":[107],"intentionally":[108],"designed":[109],"for":[110],"study":[112],"demonstration":[114],"handpicked":[116],"concepts,":[118],"techniques,":[119],"attacks.":[121],"Drawing":[122],"upon":[123],"both":[124],"quantitative":[125],"qualitative":[127],"feedback":[128],"collected":[129],"from":[130],"27":[131],"participants,":[133],"this":[134,146],"format":[135],"homework":[137],"found":[140],"increase":[142],"students'":[143],"confidence":[144],"knowledge":[147],"domain":[148],"perceived":[150],"an":[152],"enjoyable,":[153],"motivating,":[154],"way":[157],"about":[160],"information":[161],"privacy.":[162]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
