{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:47:19Z","timestamp":1730314039874,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,3,18]]},"DOI":"10.1145\/1167350.1167358","type":"proceedings-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T20:15:56Z","timestamp":1168978556000},"page":"9-10","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Ethics across the computer science curriculum"],"prefix":"10.1145","author":[{"given":"Cynthia","family":"Cicalese","sequence":"first","affiliation":[{"name":"Marymount University, Arlington, VA"}]},{"given":"Janine","family":"DeWitt","sequence":"additional","affiliation":[{"name":"Marymount University, Arlington, VA"}]},{"given":"C. Dianne","family":"Martin","sequence":"additional","affiliation":[{"name":"The George Washington University, NW, Washington, DC"}]}],"member":"320","published-online":{"date-parts":[[2005,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Corvallis","author":"Cicalese C.","year":"2004","unstructured":"Cicalese , C. , and DeWitt , J. , \" Securing Cyberspace : The Challenge of Infusing Ethics,\" 6th International Conference on Ethics Across the Curriculum , Corvallis , Oregon , 2004 . Cicalese, C., and DeWitt, J., \"Securing Cyberspace: The Challenge of Infusing Ethics,\" 6th International Conference on Ethics Across the Curriculum, Corvallis, Oregon, 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"Fourth World Conference on Information Security Education","author":"Hoffman L. J.","year":"2005","unstructured":"Hoffman , L. J. , Cicalese , C. , DeWitt , J. and Rosenberg , T ., \" An Integrated Approach to Computer Security Instruction Using Case Study Modules and a Portable Network Laboratory \", Fourth World Conference on Information Security Education , Moscow , 2005 . Hoffman, L. J., Cicalese, C., DeWitt, J. and Rosenberg, T., \"An Integrated Approach to Computer Security Instruction Using Case Study Modules and a Portable Network Laboratory\", Fourth World Conference on Information Security Education, Moscow, 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/103701.103710"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219687"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/240483.240499"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/382018.382028"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Computing Curricula 2001","year":"2001","unstructured":"\" Computing Curricula 2001 ,\" J. Educ. Resour. Comput. , 1 , 2001 . \"Computing Curricula 2001,\" J. Educ. Resour. Comput., 1, 2001.","journal-title":"J. Educ. Resour. Comput."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/572241.572251"},{"key":"e_1_3_2_1_9_1","first-page":"90","article-title":"Teaching ethics in undergraduate network security courses: the cautionary tale of Randal Schwartz","volume":"19","author":"Wulf T.","year":"2003","unstructured":"Wulf , T. , \" Teaching ethics in undergraduate network security courses: the cautionary tale of Randal Schwartz ,\" J. Comput. Small Coll. , 19 , 2003 , 90 -- 93 . Wulf, T., \"Teaching ethics in undergraduate network security courses: the cautionary tale of Randal Schwartz,\" J. Comput. Small Coll., 19, 2003, 90--93.","journal-title":"J. Comput. Small Coll."}],"event":{"name":"ACM SE05: ACM Southeast Regional Conference 2005","sponsor":["ACM Association for Computing Machinery"],"location":"Kennesaw Georgia","acronym":"ACM SE05"},"container-title":["Proceedings of the 43rd annual Southeast regional conference - Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1167350.1167358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T17:20:52Z","timestamp":1673284852000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1167350.1167358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,3,18]]},"references-count":9,"alternative-id":["10.1145\/1167350.1167358","10.1145\/1167350"],"URL":"https:\/\/doi.org\/10.1145\/1167350.1167358","relation":{},"subject":[],"published":{"date-parts":[[2005,3,18]]},"assertion":[{"value":"2005-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}