{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T00:03:45Z","timestamp":1723161825666},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2018,4,27]],"date-time":"2018-04-27T00:00:00Z","timestamp":1524787200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2018,4,27]]},"DOI":"10.1145\/3204466","type":"journal-article","created":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T11:58:18Z","timestamp":1525089498000},"page":"10-12","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["THINKING PROFESSIONALLYThe continual evolution of interest in computing ethics"],"prefix":"10.1145","volume":"9","author":[{"given":"Don","family":"Gotterbarn","sequence":"first","affiliation":[{"name":"East Tennessee State University"}]},{"given":"Marty J.","family":"Wolf","sequence":"additional","affiliation":[{"name":"Bemidji State University"}]},{"given":"Catherine","family":"Flick","sequence":"additional","affiliation":[{"name":"DeMontfort University"}]},{"given":"Keith","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Missouri"}]}],"member":"320","published-online":{"date-parts":[[2018,4,27]]},"reference":[{"unstructured":"ACM home page; www.acm.org. Accessed 2018 March 20.","key":"e_1_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1145\/359080.359083"},{"key":"e_1_2_1_3_1","volume-title":"A very short history of computer ethics. APA Newsletters on Philosophy and Computers 99.2","author":"Bynum T.W.","year":"2000","unstructured":"Bynum, T.W. A very short history of computer ethics. APA Newsletters on Philosophy and Computers 99.2 (2000)."},{"unstructured":"Committee on Professional Ethics home page. https:\/\/ethics.acm.org. Accessed 2018 March 20.","key":"e_1_2_1_4_1"},{"unstructured":"Fiedler C. partial list of computer ethics courses. https:\/\/twitter.com\/cfiesler\/status\/931200575873490944. Accessed 2018 March 20.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","volume-title":"CIO","author":"Florentine S.","year":"2018","unstructured":"Florentine, S. Should Software Developers have a Code of Ethics? CIO January 11, 2017; https:\/\/www.cio.com\/article\/3156565\/developer\/should-software-developers-have-a-code-of-ethics.html. Accessed 20 March 2018."},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1145\/3173016"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1145\/222092.222266"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1145\/282991.283127"},{"unstructured":"Self-driving car fatality; https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/uber-driverless-fatality.html. Accessed 2018 March 19.","key":"e_1_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1145\/366696.366703"},{"key":"e_1_2_1_12_1","volume-title":"New York Times","author":"Singer N.","year":"2018","unstructured":"Singer, N. Tech's Ethical `Dark Side': Harvard, Stanford, and Others Want to Address It, New York Times, February 12, 2018; https:\/\/www.nytimes.com\/2018\/02\/12\/business\/computer-science-ethics-courses.html. Accessed 2018 March 20. The article is also summarized and repeated by Sam Hodgson On February 14, 2018 in ACM TechNews; https:\/\/cacm.acm.org\/news\/225294-universities-rush-to-roll-out-computer-science-ethics-courses\/fulltext. Accessed 2018 March 26."},{"unstructured":"Software Engineering Code; https:\/\/ethics.acm.org\/code-of-ethics\/software-engineering-code\/. Accessed 2018 March 20.","key":"e_1_2_1_13_1"},{"unstructured":"Spanish Software Engineering Society; https:\/\/www.sistedes.es\/informes-recursos\/codigo-etico-y-practicas-profesionales. Accessed 2018 March 20.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","volume-title":"Cybernetics: Control and Communication in the Animal and the Machine","author":"Wiener N.","year":"1948","unstructured":"Wiener, N. Cybernetics: Control and Communication in the Animal and the Machine. Technology Press (1948)."}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3204466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T10:23:12Z","timestamp":1723112592000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3204466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,27]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4,27]]}},"alternative-id":["10.1145\/3204466"],"URL":"https:\/\/doi.org\/10.1145\/3204466","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"type":"print","value":"2153-2184"},{"type":"electronic","value":"2153-2192"}],"subject":[],"published":{"date-parts":[[2018,4,27]]},"assertion":[{"value":"2018-04-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}