{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:47:47Z","timestamp":1755838067324,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231054","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"30-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Contextual integration"],"prefix":"10.1145","author":[{"given":"Janine","family":"DeWitt","sequence":"first","affiliation":[{"name":"Marymount University, Arlington, VA"}]},{"given":"Cynthia","family":"Cicalese","sequence":"additional","affiliation":[{"name":"Marymount University, Arlington, VA"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/151220.151231"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121505"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Association for Computing Machinery. Computing Curricula 2001. J. Educ. Resour. Comput. 1 3es (Fall 2001) 1--240.  Association for Computing Machinery. Computing Curricula 2001. J. Educ. Resour. Comput. 1 3es (Fall 2001) 1--240.","DOI":"10.1145\/384274.384275"},{"key":"e_1_3_2_1_4_1","unstructured":"Association for Computing Machinery ACM Code of Ethics and Professional Conduct. http:\/\/www.acm.org.proxymu.wrlc.org\/constitution\/code.html last accessed June 2006.  Association for Computing Machinery ACM Code of Ethics and Professional Conduct . http:\/\/www.acm.org.proxymu.wrlc.org\/constitution\/code.html last accessed June 2006."},{"key":"e_1_3_2_1_5_1","unstructured":"Association of American Colleges and Universities and the Carnegie Foundation for the Advancement of Teaching Statement on Integrative Learning. http:\/\/www.aacu-edu.org\/integrative_learning\/pdfs\/ILP_Statement.pdf last accessed June 2006.  Association of American Colleges and Universities and the Carnegie Foundation for the Advancement of Teaching Statement on Integrative Learning . http:\/\/www.aacu-edu.org\/integrative_learning\/pdfs\/ILP_Statement.pdf last accessed June 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047463"},{"key":"e_1_3_2_1_7_1","unstructured":"Bowyer K. W. Pornography on the Dean's PC: An Ethics and Computing Case Study. Journal of Information Systems Education (JISE) 11 3-4 (Summer-Fall 2000) 121--126.  Bowyer K. W. Pornography on the Dean's PC: An Ethics and Computing Case Study. Journal of Information Systems Education (JISE) 11 3-4 (Summer-Fall 2000) 121--126."},{"volume-title":"Experience and School. National Academy of Science Press","year":"2000","author":"Bransford J. D.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"19","volume-title":"Ed. Educational Technology Publications","author":"Brown J. S.","year":"1996"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047464"},{"volume-title":"6th International Conference on Ethics Across the Curriculum","year":"2004","author":"Cicalese C.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167350.1167358"},{"volume-title":"Jossey-Bass","year":"2003","author":"Colby A.","key":"e_1_3_2_1_13_1"},{"volume-title":"American Educator","year":"1991","author":"Collins A.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"Committee on National Security Systems National Information Assurance Training Standard for Risk Analysts. CNSS Instruction No. 4016 2005. http:\/\/www.cnss.gov\/Assets\/pdf\/CNSSI-4016.PDF last accessed June 2006.  Committee on National Security Systems National Information Assurance Training Standard for Risk Analysts . CNSS Instruction No. 4016 2005. http:\/\/www.cnss.gov\/Assets\/pdf\/CNSSI-4016.PDF last accessed June 2006."},{"volume-title":"Proceedings of the 10th Colloquium for Information Systems Security Education","year":"2006","author":"Dark M. J.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107630"},{"volume-title":"Routledge","year":"1999","author":"Davis M.","key":"e_1_3_2_1_18_1"},{"volume-title":"6th International Conference on Ethics Across the Curriculum","year":"2004","author":"DeWitt J.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121506"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume":"1","author":"Etzioni A.","year":"2002","journal-title":"Seattle Journal of Social Justice"},{"volume-title":"CRPIT '04: Proceedings of the Sixth Conference on Australian Computing Education","year":"2004","author":"Greening T.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.108.1.4"},{"volume-title":"Auerbach Publications","year":"2004","author":"Hansche S.","key":"e_1_3_2_1_24_1"},{"volume-title":"4th World Conference on Information Security Education","year":"2005","author":"Hoffman L.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219687"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-005-0008-1"},{"volume-title":"The University of Chicago Press","year":"1993","author":"Johnson M.","key":"e_1_3_2_1_28_1"},{"volume-title":"Jossey-Bass","year":"1994","author":"King P. M.","key":"e_1_3_2_1_29_1"},{"volume-title":"Prentice Hall","year":"2002","author":"Liska J.","key":"e_1_3_2_1_30_1"},{"volume-title":"Praeger","year":"1996","author":"Lisman C. D.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047405"},{"volume-title":"MIT Press","year":"2002","author":"Margolis J.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/240483.240499"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/382018.382028"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055973.1055981"},{"volume-title":"Foundation for Critical Thinking","year":"2005","author":"Paul R.","key":"e_1_3_2_1_37_1"},{"volume-title":"Prentice Hall","year":"2003","author":"Pfleeger C. P.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","first-page":"3","volume":"20","author":"Poteat V. E.","year":"2005","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121503"},{"key":"e_1_3_2_1_41_1","first-page":"556","volume-title":"Handbook of Child Psychology: Cognitive Development","author":"Rest J.","year":"1983","edition":"4"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047465"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107637"},{"key":"e_1_3_2_1_44_1","unstructured":"Stein D. Situated Learning in Adult Education. ERIC Digest no. 195. ED418250 1998. http:\/\/www.eric.ed.gov\/ERICDocs\/data\/ericdocs2\/content_storag e_01\/0000000b\/80\/2a\/2b\/04.pdf last accessed June 2006.  Stein D. Situated Learning in Adult Education. ERIC Digest no. 195 . ED418250 1998. http:\/\/www.eric.ed.gov\/ERICDocs\/data\/ericdocs2\/content_storag e_01\/0000000b\/80\/2a\/2b\/04.pdf last accessed June 2006."},{"key":"e_1_3_2_1_45_1","first-page":"3","volume":"21","author":"Streff K.","year":"2006","journal-title":"J. Comput. Small Coll."},{"volume-title":"John Wiley and Sons","year":"2004","author":"Tavani H. M.","key":"e_1_3_2_1_46_1"},{"volume-title":"Meaning and Identity","year":"1998","author":"Wenger E.","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","first-page":"1","volume":"20","author":"Werner L.","year":"2004","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.39"},{"key":"e_1_3_2_1_50_1","first-page":"1","volume":"19","author":"Wulf T.","year":"2003","journal-title":"Randal Schwartz. J. Comput. Small Coll."}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231054","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231054"}},"subtitle":["a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum"],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":50,"alternative-id":["10.1145\/1231047.1231054","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231054","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}