{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:56Z","timestamp":1772163956395,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,4]],"date-time":"2009-03-04T00:00:00Z","timestamp":1236124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,4]]},"DOI":"10.1145\/1508865.1508933","type":"proceedings-article","created":{"date-parts":[[2009,3,3]],"date-time":"2009-03-03T11:06:03Z","timestamp":1236078363000},"page":"192-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Pander to ponder"],"prefix":"10.1145","author":[{"given":"Owen","family":"Astrachan","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Accessed","author":"Abelson H.","year":"2008","unstructured":"H. Abelson . Ethics and law on the electronic frontier . Accessed August 29, 2008 , http:\/\/groups.csail.mit.edu\/mac\/classes\/6.805, 2008. H. Abelson. Ethics and law on the electronic frontier. Accessed August 29, 2008, http:\/\/groups.csail.mit.edu\/mac\/classes\/6.805, 2008."},{"key":"e_1_3_2_1_2_1","volume-title":"Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion","author":"Abelson H.","year":"2008","unstructured":"H. Abelson , K. Ledeen , and H. Lewis . Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion . Prentice Hall , 2008 . H. Abelson, K. Ledeen, and H. Lewis. Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion. Prentice Hall, 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352195"},{"key":"e_1_3_2_1_4_1","volume-title":"Accessed","author":"Blog R.","year":"2008","unstructured":"R. Blog . Pakistan hijacks youtube . Accessed August 29, 2008 , http:\/\/tinyurl.com\/yuwd2p, 2008. R. Blog. Pakistan hijacks youtube. Accessed August 29, 2008, http:\/\/tinyurl.com\/yuwd2p, 2008."},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"67","article-title":"Computational thinking is pervasive","volume":"1","author":"Bundy A.","year":"2007","unstructured":"A. Bundy . Computational thinking is pervasive . Journal of Scientific and Practical Programming , 1 ( 2 ): 67 -- 69 , 2007 . A. Bundy. Computational thinking is pervasive. Journal of Scientific and Practical Programming, 1(2):67--69, 2007.","journal-title":"Journal of Scientific and Practical Programming"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.850224"},{"key":"e_1_3_2_1_7_1","volume-title":"Incentives Build Robustness in BitTorrent. Workshop on Economics of Peer-to-Peer Systems, 6","author":"Cohen B.","year":"2003","unstructured":"B. Cohen . Incentives Build Robustness in BitTorrent. Workshop on Economics of Peer-to-Peer Systems, 6 , 2003 . B. Cohen. Incentives Build Robustness in BitTorrent. Workshop on Economics of Peer-to-Peer Systems, 6, 2003."},{"key":"e_1_3_2_1_8_1","volume-title":"Accessed","author":"Colbert S.","year":"2008","unstructured":"S. Colbert . Colbert interviews Jonathan Zittrain . Accessed August 29, 2008 , www.youtube.com\/watch?v=hS8ywG5M_NQ, 2008. S. Colbert. Colbert interviews Jonathan Zittrain. Accessed August 29, 2008, www.youtube.com\/watch?v=hS8ywG5M_NQ, 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/www.cs.cmu.edu\/~tcortina\/15-105fa07\/lectures.html","author":"Cortina T.","year":"2007","unstructured":"T. Cortina . http:\/\/www.cs.cmu.edu\/~tcortina\/15-105fa07\/lectures.html , 2007 . Accessed August 28, 2008. T. Cortina. http:\/\/www.cs.cmu.edu\/~tcortina\/15-105fa07\/lectures.html, 2007. Accessed August 28, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1227504.1227387"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198263"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7617.001.0001","volume-title":"Access Denied: The Practice and Policy of Global Internet Filtering","author":"Deibert R.","year":"2008","unstructured":"R. Deibert , J. Palfrey , R. Rohozinski , and J. Zittrain , editors . Access Denied: The Practice and Policy of Global Internet Filtering . MIT Press , 2008 . also accessible online http:\/\/opennet.net\/accessdenied. R. Deibert, J. Palfrey, R. Rohozinski, and J. Zittrain, editors. Access Denied: The Practice and Policy of Global Internet Filtering. MIT Press, 2008. also accessible online http:\/\/opennet.net\/accessdenied."},{"key":"e_1_3_2_1_13_1","volume-title":"Fostering e-mail security awareness: The west point carronade. EDUCASE Quarterly, 28(1)","author":"Ferguson A. J.","year":"2005","unstructured":"A. J. Ferguson . Fostering e-mail security awareness: The west point carronade. EDUCASE Quarterly, 28(1) , 2005 . A. J. Ferguson. Fostering e-mail security awareness: The west point carronade. EDUCASE Quarterly, 28(1), 2005."},{"key":"e_1_3_2_1_14_1","volume-title":"Making sense of the 'digital explosion'. Chronicle of Higher Education, 54(49)","author":"Foster A.","year":"2008","unstructured":"A. Foster . Making sense of the 'digital explosion'. Chronicle of Higher Education, 54(49) , 2008 . Audio Interview , http:\/\/chronicle.com\/media\/audio\/v54\/i49\/abelson_lewis. A. Foster. Making sense of the 'digital explosion'. Chronicle of Higher Education, 54(49), 2008. Audio Interview, http:\/\/chronicle.com\/media\/audio\/v54\/i49\/abelson_lewis."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378704.1378713"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1227504.1227378"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_18_1","volume-title":"Version 2.0","author":"Lessig L.","year":"2006","unstructured":"L. Lessig . Code And Other Laws of Cyberpace , Version 2.0 . Basic Books , 2006 . Also accessible online via a Creative Commons License, http:\/\/codev2.cc. L. Lessig. Code And Other Laws of Cyberpace, Version 2.0. Basic Books, 2006. Also accessible online via a Creative Commons License, http:\/\/codev2.cc."},{"key":"e_1_3_2_1_19_1","volume-title":"Acessed","author":"Lewis H.","year":"2008","unstructured":"H. Lewis and H. Abelson . Qr48 and csci e-2 . Acessed August 29, 2008 , http:\/\/www.eecs.harvard.edu\/qr48, 2007. H. Lewis and H. Abelson. Qr48 and csci e-2. Acessed August 29, 2008, http:\/\/www.eecs.harvard.edu\/qr48, 2007."},{"key":"e_1_3_2_1_20_1","volume-title":"The Washington Post","author":"Nakashima E.","year":"2008","unstructured":"E. Nakashima . In child porn case, a digital dilemma . The Washington Post , January 16 2008 . accessed via http:\/\/tinyurl.com\/2fnsb4. E. Nakashima. In child porn case, a digital dilemma. The Washington Post, January 16 2008. accessed via http:\/\/tinyurl.com\/2fnsb4."},{"key":"e_1_3_2_1_21_1","unstructured":"J. Niedermeier. In re boucher. http:\/\/www.eff.org\/files\/Boucher.pdf 2008.  J. Niedermeier. In re boucher. http:\/\/www.eff.org\/files\/Boucher.pdf 2008."},{"key":"e_1_3_2_1_22_1","volume-title":"Accessed","author":"Obama B.","year":"2008","unstructured":"B. Obama . Barack Obama discusses bubblesort at Google . Accessed August 29, 2008 , http:\/\/www.youtube.com\/watch?v=k4RRi_ntQc8, 2008. B. Obama. Barack Obama discusses bubblesort at Google. Accessed August 29, 2008, http:\/\/www.youtube.com\/watch?v=k4RRi_ntQc8, 2008."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/960492.960494"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tate.2006.03.002"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1093\/joclec\/nhl016"},{"key":"e_1_3_2_1_29_1","unstructured":"J. Stewart. John hodgman on net neutrality. Accessed on August 29 2008 http:\/\/www.comedycentral.com\/videos\/index.jhtml?videoId=114648 July 19 2006.  J. Stewart. John hodgman on net neutrality. Accessed on August 29 2008 http:\/\/www.comedycentral.com\/videos\/index.jhtml?videoId=114648 July 19 2006."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1145287.1145312"},{"key":"e_1_3_2_1_31_1","volume-title":"Merriam-webster online dictionary. website","author":"Webster M.","year":"2008","unstructured":"M. Webster . Merriam-webster online dictionary. website , 2008 . referenced on August 29, 2008. M. Webster. Merriam-webster online dictionary. website, 2008. referenced on August 29, 2008."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1118178.1118215"},{"key":"e_1_3_2_1_33_1","first-page":"2","article-title":"Network neutrality, broadband discrimination","author":"Wu T.","year":"2003","unstructured":"T. Wu . Network neutrality, broadband discrimination . Journal of Telecommunications and High Technology Law , 2 , 2003 . T. Wu. Network neutrality, broadband discrimination. Journal of Telecommunications and High Technology Law, 2, 2003.","journal-title":"Journal of Telecommunications and High Technology Law"},{"key":"e_1_3_2_1_34_1","volume-title":"The Future of the Internet And How To Stop It","author":"Zittrain J.","year":"2008","unstructured":"J. Zittrain . The Future of the Internet And How To Stop It . Yale University Press , 2008 . Also accessible via a Creative Commons License at http:\/\/futureoftheinternet.org. J. Zittrain. The Future of the Internet And How To Stop It. Yale University Press, 2008. Also accessible via a Creative Commons License at http:\/\/futureoftheinternet.org."}],"event":{"name":"SIGCSE09: The 40th ACM Technical Symposium on Computer Science Education","location":"Chattanooga TN USA","acronym":"SIGCSE09","sponsor":["ACM Association for Computing Machinery","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 40th ACM technical symposium on Computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1508865.1508933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1508865.1508933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:29:43Z","timestamp":1750238983000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1508865.1508933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,4]]},"references-count":33,"alternative-id":["10.1145\/1508865.1508933","10.1145\/1508865"],"URL":"https:\/\/doi.org\/10.1145\/1508865.1508933","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1539024.1508933","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2009,3,4]]},"assertion":[{"value":"2009-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}