{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:04:49Z","timestamp":1759961089455,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,4,23]],"date-time":"2006-04-23T00:00:00Z","timestamp":1145750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,4,23]]},"DOI":"10.1145\/1141277.1141339","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"261-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Good\/fast\/cheap"],"prefix":"10.1145","author":[{"given":"M. J.","family":"Wolf","sequence":"first","affiliation":[{"name":"Bemidji State University, Bemidji, MN"}]},{"given":"F. S.","family":"Grodzinsky","sequence":"additional","affiliation":[{"name":"Sacred Heart University, Fairfield, CT"}]}],"member":"320","published-online":{"date-parts":[[2006,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Agile Manifesto (http:\/\/agilemanifesto.org\/ accessed August 25 2005).]]  Agile Manifesto (http:\/\/agilemanifesto.org\/ accessed August 25 2005).]]"},{"key":"e_1_3_2_1_2_1","unstructured":"AITP (http:\/\/www.aitp.org\/organization\/about\/ethics\/ethics.jsp accessed August 23 2005).]]  AITP (http:\/\/www.aitp.org\/organization\/about\/ethics\/ethics.jsp accessed August 23 2005).]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5840\/bpej19832220"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/175222.175229"},{"key":"e_1_3_2_1_5_1","unstructured":"Forrester J. E. and Miller B. P. (August 2000) \"An Empirical Study of the Robustness of Windows NT Applications Using Random Testing.\" Proceedings of the 4th USENIX Windows Systems Symposium. Seattle Washington.]]   Forrester J. E. and Miller B. P. (August 2000) \"An Empirical Study of the Robustness of Windows NT Applications Using Random Testing.\" Proceedings of the 4th USENIX Windows Systems Symposium. Seattle Washington.]]"},{"volume-title":"Helsinki University of Technology","year":"2001","author":"Fr\u00e4nde J.","key":"e_1_3_2_1_6_1"},{"volume-title":"Accessed","year":"2005","author":"Free Software Foundation","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Grodzinsky FS Miller K Wolf MJ (2005) Influences on and Incentives for Increasing Software Reliability forthcoming in Journal of Information Communication and Ethics in Society.]]  Grodzinsky FS Miller K Wolf MJ (2005) Influences on and Incentives for Increasing Software Reliability forthcoming in Journal of Information Communication and Ethics in Society.]]","DOI":"10.1108\/14779960680000295"},{"key":"e_1_3_2_1_9_1","unstructured":"Institute of Electrical and Electronics Engineers. (1990) IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries. New York NY: IEEE.]]  Institute of Electrical and Electronics Engineers. (1990) IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries. New York NY: IEEE.]]"},{"key":"e_1_3_2_1_10_1","unstructured":"Johnson D. (2001) Computer Ethics 3rd edition. New Jersey: Prentice Hall.]]  Johnson D. (2001) Computer Ethics 3rd edition. New Jersey: Prentice Hall.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/944868.944910"},{"key":"e_1_3_2_1_12_1","article-title":"Security research suggests Linux has fewer flaws","author":"Lemos Robert","year":"2004","journal-title":"CNET News, http: news.com.com\/Security+research+suggests+Lmux+ha s+fewer+flaws\/2100-1002_3-5489804.html. Accessed"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"key":"e_1_3_2_1_14_1","unstructured":"Lyu Michael R. (1996) Handbook of Software Engineering Reliability. New Jersey: McGraw-Hill.]]   Lyu Michael R. (1996) Handbook of Software Engineering Reliability. New Jersey: McGraw-Hill.]]"},{"volume-title":"Accessed","year":"2005","author":"Microsoft Corporation","key":"e_1_3_2_1_15_1"},{"volume":"4","volume-title":"Science and Engineering Ethics","author":"Miller K.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010078828842"},{"volume-title":"Accessed","year":"2005","author":"Open Source Initiative","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"PCGuide.com (http:\/\/www.pcguide.com\/ref\/hdd\/perf\/raid\/whyTradeoffsc.html accessed August 23 2005)]]  PCGuide.com (http:\/\/www.pcguide.com\/ref\/hdd\/perf\/raid\/whyTradeoffsc.html accessed August 23 2005)]]"},{"key":"e_1_3_2_1_20_1","unstructured":"Rawls John A Theory of Justice The Belknap Press of Harvard University Press 1971.]]  Rawls John A Theory of Justice The Belknap Press of Harvard University Press 1971.]]"},{"key":"e_1_3_2_1_21_1","unstructured":"Raymond E. S. (2001) \"The Cathedral and the Bazaar \" in Readings in Cyberethics eds. Spinello and Tavani. Sudbury MA: Jones and Bartlett.]]   Raymond E. S. (2001) \"The Cathedral and the Bazaar \" in Readings in Cyberethics eds. Spinello and Tavani. Sudbury MA: Jones and Bartlett.]]"},{"volume-title":"Accessed","year":"2004","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"U.S. Dept. of Energy. Engineering Tradeoff Studies. Good Practice Guide: GPG-FM-003 (March 1996) http:\/\/www.sc.doe.gov\/sc-80\/pdf_file\/gpg03.pdf accessed August 23 2005.]]  U.S. Dept. of Energy. Engineering Tradeoff Studies. Good Practice Guide: GPG-FM-003 (March 1996) http:\/\/www.sc.doe.gov\/sc-80\/pdf_file\/gpg03.pdf accessed August 23 2005.]]"}],"event":{"name":"SAC06: The 2006 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Dijon France","acronym":"SAC06"},"container-title":["Proceedings of the 2006 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1141277.1141339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:37Z","timestamp":1750278157000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141339"}},"subtitle":["contexts, relationships and professional responsibility during software development"],"short-title":[],"issued":{"date-parts":[[2006,4,23]]},"references-count":23,"alternative-id":["10.1145\/1141277.1141339","10.1145\/1141277"],"URL":"https:\/\/doi.org\/10.1145\/1141277.1141339","relation":{},"subject":[],"published":{"date-parts":[[2006,4,23]]},"assertion":[{"value":"2006-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}