{"id":"https://openalex.org/W6963329673","doi":"https://doi.org/10.18420/delfi2022-021","title":"Lernende an die Kryptologie heranf\u00fchren: digital und haptisch zugleich \u2013 Praxisbericht \u00fcber den Online-Adventskalender \u201eKrypto im Advent\u201c","display_name":"Lernende an die Kryptologie heranf\u00fchren: digital und haptisch zugleich \u2013 Praxisbericht \u00fcber den Online-Adventskalender \u201eKrypto im Advent\u201c","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W6963329673","doi":"https://doi.org/10.18420/delfi2022-021"},"language":"de","primary_location":{"id":"doi:10.18420/delfi2022-021","is_oa":true,"landing_page_url":"https://doi.org/10.18420/delfi2022-021","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/delfi2022-021","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Borys, Thomas","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Borys, Thomas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Fox, Dirk","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fox, Dirk","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.58681394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.044199999421834946,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.044199999421834946,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.033399999141693115,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.03009999915957451,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.27970001101493835},{"id":"https://openalex.org/keywords/subject","display_name":"Subject (documents)","score":0.24560000002384186},{"id":"https://openalex.org/keywords/german","display_name":"German","score":0.2363000065088272},{"id":"https://openalex.org/keywords/writing-style","display_name":"Writing style","score":0.20440000295639038}],"concepts":[{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4659000039100647},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.41690000891685486},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.34459999203681946},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.24819999933242798},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.24560000002384186},{"id":"https://openalex.org/C154775046","wikidata":"https://www.wikidata.org/wiki/Q188","display_name":"German","level":2,"score":0.2363000065088272},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.22339999675750732},{"id":"https://openalex.org/C13622073","wikidata":"https://www.wikidata.org/wiki/Q2243831","display_name":"Writing style","level":2,"score":0.20440000295639038},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.2012999951839447}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/delfi2022-021","is_oa":true,"landing_page_url":"https://doi.org/10.18420/delfi2022-021","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/delfi2022-021","is_oa":true,"landing_page_url":"https://doi.org/10.18420/delfi2022-021","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.6965790390968323}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Die":[0],"Kryptologie":[1,24,81,122],"ist":[2,45],"eine":[3,116],"sehr":[4],"alte":[5],"Wissenschaft":[6,118],"und":[7,16,38,53,74,101,133],"war":[8],"bis":[9],"vor":[10,57],"wenigen":[11],"Jahrzehnten":[12],"nur":[13],"f\u00fcr":[14,34],"Regierungen":[15],"Geheimdienste":[17],"von":[18],"Interesse.":[19],"Heute":[20],"findet":[21],"sich":[22,41],"die":[23,49,77,121,129,131],"fast":[25,42],"\u00fcberall":[26],"in":[27],"unserem":[28],"Leben.":[29],"Trotz":[30],"ihrer":[31],"immensen":[32],"Bedeutung":[33],"unsere":[35],"moderne":[36],"Kommunikations-":[37],"Informationstechnologie,":[39],"derer":[40],"jeder":[43],"bedient,":[44],"das":[46],"Verst\u00e4ndnis":[47],"\u00fcber":[48],"Funktionsweise,":[50],"ihre":[51],"M\u00f6glichkeiten":[52],"Grenzen":[54],"nach":[55],"wie":[56,65],"wenig":[58],"verbreitet.":[59],"In":[60,125],"diesem":[61,126],"Praxisbericht":[62],"wird":[63],"gezeigt,":[64],"man":[66],"auf":[67],"spielerische":[68],"Weise":[69],"Lernenden":[70],"insbesondere":[71],"der":[72,80,86],"Primar-":[73],"Sekundarstufe":[75],"I":[76],"fundamentalen":[78],"Methoden":[79],"nahebringen":[82],"kann.":[83],"Dazu":[84],"wurde":[85],"Online-Adventskalender":[87],"\u201eKrypto":[88],"im":[89],"Advent\u201c":[90],"(https://krypto-im-advent.de)":[91],"entwickelt.":[92],"Der":[93],"besondere":[94],"Ansatz":[95],"dieser":[96],"Webseite":[97],"besteht":[98],"darin,":[99],"digital":[100],"haptisch":[102,114],"zugleich":[103],"vorzugehen,":[104],"d.":[105],"h.":[106],"es":[107],"werden":[108,128],"digitale":[109],"Vermittlungsformate":[110],"dazu":[111],"verwendet,":[112],"Lernende":[113],"an":[115],"kognitive":[117],"-":[119,123],"hier":[120],"heranzuf\u00fchren.":[124],"Beitrag":[127],"Ziele,":[130],"Kernelemente":[132],"ein":[134],"\u00dcberblick":[135],"zu":[136],"den":[137],"Teilnehmenden,":[138],"sowie":[139],"deren":[140],"L\u00f6sungserfolge":[141],"vorgestellt.":[142]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
