{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T04:55:02Z","timestamp":1744520102006},"reference-count":39,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1992,1,1]],"date-time":"1992-01-01T00:00:00Z","timestamp":694224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[1992,1]]},"DOI":"10.1016\/0164-1212(92)90084-w","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T03:44:36Z","timestamp":1060314276000},"page":"81-89","source":"Crossref","is-referenced-by-count":1,"title":["EDICT for computer ethics education"],"prefix":"10.1016","volume":"17","author":[{"given":"Riva Wenig","family":"Bickel","sequence":"first","affiliation":[]},{"given":"Maria M.","family":"Larrondo-Petrie","sequence":"additional","affiliation":[]},{"given":"David F.","family":"Bush","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0164-1212(92)90084-W_BIB1","first-page":"6","article-title":"It's back: \u2018No Nukes Worm\u2019 haunts internet","volume":"45","author":"Alexander","year":"1989","journal-title":"Computerworld XXIII"},{"key":"10.1016\/0164-1212(92)90084-W_BIB2_1","first-page":"1","article-title":"Hacker raids stir up battle over Constitutional rights","volume":"26","author":"Alexander","year":"1990","journal-title":"Computerworld XXXIV"},{"key":"10.1016\/0164-1212(92)90084-W_BIB2_2","first-page":"6","article-title":"Hacker raids stir up battle over Constitutional rights","volume":"26","author":"Alexander","year":"1990","journal-title":"Computerworld XXXIV"},{"key":"10.1016\/0164-1212(92)90084-W_BIB3_1","first-page":"1","article-title":"Kapor's hacker aid plan ripped","volume":"23","author":"Bozman","year":"1990","journal-title":"Computerworld XXXIV"},{"key":"10.1016\/0164-1212(92)90084-W_BIB3_2","first-page":"123","article-title":"Kapor's hacker aid plan ripped","volume":"23","author":"Bozman","year":"1990","journal-title":"Computerworld XXXIV"},{"key":"10.1016\/0164-1212(92)90084-W_BIB4","first-page":"100","article-title":"Strong scruples can curb computer crime,","volume":"13","author":"Alexander","year":"1989","journal-title":"Computerworld XXIII"},{"key":"10.1016\/0164-1212(92)90084-W_BIB5","article-title":"Computer ethics for cynics","author":"Bloombecker","year":"1989","journal-title":"Computerworld"},{"key":"10.1016\/0164-1212(92)90084-W_BIB6","volume":"2","year":"1975","journal-title":"IEEE Spectrum"},{"key":"10.1016\/0164-1212(92)90084-W_BIB7","first-page":"183","volume":"25","year":"1982","journal-title":"Commun. ACM"},{"key":"10.1016\/0164-1212(92)90084-W_BIB8","series-title":"DPMA code of ethics, standards of conduct and enforcement procedures","first-page":"22","year":"1985"},{"key":"10.1016\/0164-1212(92)90084-W_BIB9","series-title":"Codes of Ethics, Conduct and Good Practice for Certified Computer Professionals","first-page":"2","year":"1977"},{"key":"10.1016\/0164-1212(92)90084-W_BIB10","first-page":"51","volume":"14","year":"1987","journal-title":"Computing Teacher"},{"key":"10.1016\/0164-1212(92)90084-W_BIB11","first-page":"8","article-title":"Computer piracy and the myth of computer innocence","volume":"43","author":"Weintraub","year":"1986","journal-title":"School Aministrator"},{"key":"10.1016\/0164-1212(92)90084-W_BIB12","series-title":"AAAS Professional Ethics Project: Professional Ethics Activities in the Scientific and Engineering Societies","first-page":"154","article-title":"The quest for a code of professional ethics: an intellectual and moral confusion","author":"Ladd","year":"1980"},{"key":"10.1016\/0164-1212(92)90084-W_BIB13","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1061\/(ASCE)1052-3928(1984)110:2(88)","article-title":"What should professional societies do about ethics?","volume":"110","author":"Sawyer","year":"1984","journal-title":"J. Professional Issues Engineering"},{"key":"10.1016\/0164-1212(92)90084-W_BIB14","series-title":"Ethical Issues in the Use of Computers","author":"Johnson","year":"1985"},{"key":"10.1016\/0164-1212(92)90084-W_BIB15","first-page":"13","article-title":"EDICT: A tool to assist computer ethics education","volume":"4","author":"Bickel","year":"1991"},{"key":"10.1016\/0164-1212(92)90084-W_BIB16","unstructured":"R. W. Bickel, M. M. Larrondo-Petrie and D. Bush, Computer-related ethical issues affecting employees\u2014a student perspective, unpublished paper."},{"key":"10.1016\/0164-1212(92)90084-W_BIB17","series-title":"Ethical Conflicts in Information and Computer Science, Technology and Business","author":"Parker","year":"1990"},{"key":"10.1016\/0164-1212(92)90084-W_BIB18","series-title":"Self-assessment procedure IX: a self-assessment procedure dealing with ethics in computing","first-page":"181","volume":"25","author":"Parker","year":"1982"},{"key":"10.1016\/0164-1212(92)90084-W_BIB19","first-page":"33","article-title":"Teaching ethics in the computer classroom","volume":"4","author":"Hannah","year":"1984","journal-title":"Class. Comp. Learn."},{"key":"10.1016\/0164-1212(92)90084-W_BIB20","series-title":"Computer ethics: cautionary tales and ethical dilemmas in computing","author":"Forester","year":"1990"},{"key":"10.1016\/0164-1212(92)90084-W_BIB21","series-title":"CMU Software Ethics Workshop","first-page":"9","volume":"1","author":"Gotterbarn","year":"1990"},{"key":"10.1016\/0164-1212(92)90084-W_BIB22","doi-asserted-by":"crossref","first-page":"598","DOI":"10.5951\/MT.77.8.0598","article-title":"Ethics and Computer Use","volume":"77","author":"Gilliland","year":"1984","journal-title":"Math. Teach."},{"key":"10.1016\/0164-1212(92)90084-W_BIB23","series-title":"Proceedings of the 17th North American Conference of the International Business Schools Computer Users Group","first-page":"281","article-title":"Teaching computer ethics\u2014using computer law as a vehicle","author":"Bickel","year":"1989"},{"key":"10.1016\/0164-1212(92)90084-W_BIB24","unstructured":"R. Bickel, Computer law\u2014computer ethics: a common curriculum, unpublished paper."},{"key":"10.1016\/0164-1212(92)90084-W_BIB25","series-title":"Proceedings of American Education Research Association Annual Conference","article-title":"Measuring ethical sensitivity in computer use","author":"Leibowitz","year":"1996"},{"key":"10.1016\/0164-1212(92)90084-W_BIB26","series-title":"Nicomachean Ethics","author":"Aristotle","year":"1985"},{"key":"10.1016\/0164-1212(92)90084-W_BIB27","series-title":"Utilitarianism","author":"Mill","year":"1987"},{"key":"10.1016\/0164-1212(92)90084-W_BIB28","series-title":"Foundations of the Metaphysics of Morals","author":"Kant","year":"1976"},{"key":"10.1016\/0164-1212(92)90084-W_BIB29","series-title":"The Moral Judgment of the Child","author":"Piaget","year":"1948"},{"key":"10.1016\/0164-1212(92)90084-W_BIB30","first-page":"11","article-title":"The development of children's orientations toward a moral order. 1. Sequence in the development of moral thought","volume":"6","author":"Kohlberg","year":"1963","journal-title":"Vita Humana"},{"key":"10.1016\/0164-1212(92)90084-W_BIB31","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1037\/h0036598","article-title":"Judging the important issues in moral dilemmas\u2014an objective measure of development","volume":"10","author":"Rest","year":"1974","journal-title":"Dev. Psyschol."},{"key":"10.1016\/0164-1212(92)90084-W_BIB32","series-title":"Test Supplement","first-page":"57","year":"1984"},{"key":"10.1016\/0164-1212(92)90084-W_BIB33","doi-asserted-by":"crossref","first-page":"319","DOI":"10.3102\/00346543055003319","article-title":"Does moral education improve moral judgment? A meta-analysis of intervention studies using the defining issues test","volume":"55","author":"Schaefli","year":"1985","journal-title":"Rev. Educ. Res."},{"key":"10.1016\/0164-1212(92)90084-W_BIB34","series-title":"presented at Florida International University Conference","article-title":"Relationship of moral judgment and moral action","author":"Kohlberg","year":"1981"},{"key":"10.1016\/0164-1212(92)90084-W_BIB35","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/0305724750040207","article-title":"The effect of classroom moral discussion upon children in level of moral judgment","volume":"4","author":"Blatt","year":"1975","journal-title":"J. Moral Education"},{"key":"10.1016\/0164-1212(92)90084-W_BIB36","series-title":"Life-Span Developmental Pyschology: Personality and Socialization","first-page":"180","article-title":"Continuity in childhood and adult moral development revisited","author":"Kohlberg","year":"1973"},{"key":"10.1016\/0164-1212(92)90084-W_BIB37","first-page":"14","article-title":"Factors contributing to moral stage change in adolescence and adulthood","volume":"1","author":"Bush","year":"1977"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016412129290084W?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016412129290084W?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T01:35:12Z","timestamp":1623288912000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016412129290084W"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1992,1]]}},"alternative-id":["016412129290084W"],"URL":"https:\/\/doi.org\/10.1016\/0164-1212(92)90084-w","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[1992,1]]}}}