{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T01:37:32Z","timestamp":1772761052256,"version":"3.50.1"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2011,2,25]],"date-time":"2011-02-25T00:00:00Z","timestamp":1298592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2011,2,25]]},"abstract":"<jats:p>The acceptance and integration of social issues into computing curricula is still a work in progress twenty years after it was first incorporated into the ACM Computing Curricula. Through an international survey of computing instructors, this paper corroborates prior work showing that most institutions include the societal impact of ICT in their programs. However, topics often concentrate on computer history, codes of ethics and intellectual property, while neglecting broader issues of societal impact. This paper explores how these neglected topics can be better developed through a subtle change of focus to the significant role that ICT plays in addressing the needs of the community. Drawing on the survey and a set of implementation cases, the paper provides guidance by means of examples and resources to empower teaching teams to engage students in the application of ICT to bring about positive social outcomes -- computing for the social good.<\/jats:p>","DOI":"10.1145\/1929887.1929907","type":"journal-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T19:22:23Z","timestamp":1350328943000},"page":"64-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Enhancing the social issues components in our computing curriculum"],"prefix":"10.1145","volume":"2","author":[{"given":"Mikey","family":"Goldweber","sequence":"first","affiliation":[{"name":"Xavier University, Cincinnati, Ohio USA"}]},{"given":"Renzo","family":"Davoli","sequence":"additional","affiliation":[{"name":"University of Bologna, Bologna, Italy"}]},{"given":"Joyce Currie","family":"Little","sequence":"additional","affiliation":[{"name":"Towson University, Baltimore, Maryland USA"}]},{"given":"Charles","family":"Riedesel","sequence":"additional","affiliation":[{"name":"University of Nebraska, Lincoln, Lincoln, Nebraska USA"}]},{"given":"Henry","family":"Walker","sequence":"additional","affiliation":[{"name":"Grinnell College, Grinnell, Iowa USA"}]},{"given":"Gerry","family":"Cross","sequence":"additional","affiliation":[{"name":"Mount Royal University, Calgary, Alberta Canada"}]},{"given":"Brian R.","family":"Von Konsky","sequence":"additional","affiliation":[{"name":"Curtin University, Perth Australia"}]}],"member":"320","published-online":{"date-parts":[[2011,2,25]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/349316.349558"},{"key":"e_1_2_1_2_1","first-page":"15","volume-title":"Proceedings of the 21st Annual Conference of the Naitonal Advisory Committee on Computing Qualifi cations. 2008: Auckland New Zealand.","author":"von Konsky B.R.","unstructured":"von Konsky , B.R. , Defining the ICT Profession : A partnership of stakeholders, keynote address , in Proceedings of the 21st Annual Conference of the Naitonal Advisory Committee on Computing Qualifi cations. 2008: Auckland New Zealand. p. 15 -- 22 . von Konsky, B.R., Defining the ICT Profession: A partnership of stakeholders, keynote address, in Proceedings of the 21st Annual Conference of the Naitonal Advisory Committee on Computing Qualifi cations. 2008: Auckland New Zealand. p. 15--22."},{"key":"e_1_2_1_3_1","volume-title":"Computing curricula 1991: Report of the ACM\/IEEE-CS Joint Curriculum Task Force","author":"Tucker A.B.","year":"1991","unstructured":"Tucker , A.B. , et al. , Computing curricula 1991: Report of the ACM\/IEEE-CS Joint Curriculum Task Force . 1991 . Tucker, A.B., et al., Computing curricula 1991: Report of the ACM\/IEEE-CS Joint Curriculum Task Force. 1991."},{"key":"e_1_2_1_4_1","volume-title":"The social impact of computers","author":"Rosenberg R.S.","year":"2004","unstructured":"Rosenberg , R.S. , The social impact of computers . 3 rd ed. 2004 : Elsevier Academic Press . Rosenberg, R.S., The social impact of computers. 3rd ed. 2004: Elsevier Academic Press.","edition":"3"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/585597.585602"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666452"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 2002 annual national conference on Digital government research.","author":"Dawes S.S.","year":"2002","unstructured":"Dawes , S.S. , et al. , Some assembly required: building a digital government for the 21st century , in Proceedings of the 2002 annual national conference on Digital government research. 2002 , Digital Government Society of North America : Los Angeles, California. p. 1--39. Dawes, S.S., et al., Some assembly required: building a digital government for the 21st century, in Proceedings of the 2002 annual national conference on Digital government research. 2002, Digital Government Society of North America: Los Angeles, California. p. 1--39."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1189191"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315290"},{"key":"e_1_2_1_10_1","unstructured":"Mustafaraj E. and P. Metaxas From Obscurity to Prominence in Minutes: Political Speech and Real-Time Search in WebSci 10: Extending the Frontiers of Society On-Line. 2010: Raleigh NC USA.  Mustafaraj E. and P. Metaxas From Obscurity to Prominence in Minutes: Political Speech and Real-Time Search in WebSci 10: Extending the Frontiers of Society On-Line. 2010: Raleigh NC USA."},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Boldrin M. and D.K. Levine Against intellectual monopoly. 2008: Cambridge University Press.  Boldrin M. and D.K. Levine Against intellectual monopoly. 2008: Cambridge University Press.","DOI":"10.1017\/CBO9780511510854"},{"key":"e_1_2_1_12_1","volume-title":"Free as in Freedom: Richard Stallman's crusade for free software","author":"Williams S.","year":"2002","unstructured":"Williams , S. , Free as in Freedom: Richard Stallman's crusade for free software . 2002 , Sebastopol, CA : O'Reilly & Associates . Williams, S., Free as in Freedom: Richard Stallman's crusade for free software. 2002, Sebastopol, CA: O'Reilly & Associates."},{"key":"e_1_2_1_13_1","first-page":"900","volume-title":"Nature","author":"Giles J.","year":"2005","unstructured":"Giles , J. , Internet encyclopedias go head to head . Nature , 2005 . 438(7070): p. 900 -- 901 . Giles, J., Internet encyclopedias go head to head. Nature, 2005. 438(7070): p. 900--901."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993400903255184"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352255"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219687"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/240483.240499"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/266057.266075"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/266057.266119"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/571922.571967"},{"key":"e_1_2_1_21_1","volume-title":"International Professional Practice Partnership. 2010 {cited 2010","year":"2010","unstructured":"IP3. International Professional Practice Partnership. 2010 {cited 2010 26 June 2010 }; Available from: http:\/\/www.ipthree.org\/. IP3. International Professional Practice Partnership. 2010 {cited 2010 26 June 2010}; Available from: http:\/\/www.ipthree.org\/."},{"key":"e_1_2_1_22_1","volume-title":"Strategic outcomes and directions. 2010 {cited 2010","year":"2010","unstructured":"IP3. Strategic outcomes and directions. 2010 {cited 2010 26 June 2010 }; Available from: http:\/\/www.ipthree.org\/about-ip3\/strategicobjectives. IP3. Strategic outcomes and directions. 2010 {cited 2010 26 June 2010}; Available from: http:\/\/www.ipthree.org\/about-ip3\/strategicobjectives."},{"key":"e_1_2_1_23_1","unstructured":"Seoul Accord. Seoul Accord. 2010 June 4 2010}; Available from: http:\/\/www.abeek.or.kr\/accord\/contents.jsp?menu_l=85.  Seoul Accord. Seoul Accord. 2010 June 4 2010}; Available from: http:\/\/www.abeek.or.kr\/accord\/contents.jsp?menu_l=85."},{"key":"e_1_2_1_24_1","volume-title":"Seoul Accord Foundation Documents: Section D (Graduate Attributes). 2010","author":"Seoul Accord","year":"2010","unstructured":"Seoul Accord . Seoul Accord Foundation Documents: Section D (Graduate Attributes). 2010 June 4 2010 }; Available from: http:\/\/www.abeek.or.kr\/accord\/contents.jsp?menu_l=144&menu_m=199. Seoul Accord. Seoul Accord Foundation Documents: Section D (Graduate Attributes). 2010 June 4 2010}; Available from: http:\/\/www.abeek.or.kr\/accord\/contents.jsp?menu_l=144&menu_m=199."},{"key":"e_1_2_1_25_1","volume-title":"Seoul Accord Signatories. 2010","author":"Seoul Accord","year":"2010","unstructured":"Seoul Accord . Seoul Accord Signatories. 2010 June 4 2010 }; Available from: http:\/\/www.abeek.or.kr\/accord\/contents.jsp?menu_l=154&menu_m=185. Seoul Accord. Seoul Accord Signatories. 2010 June 4 2010}; Available from: http:\/\/www.abeek.or.kr\/accord\/contents.jsp?menu_l=154&menu_m=185."},{"key":"e_1_2_1_26_1","volume-title":"The ICT profession and the ICT Body of Knowledge (Vers. 5.0)","author":"Gregor S.","year":"2008","unstructured":"Gregor , S. , et al. , The ICT profession and the ICT Body of Knowledge (Vers. 5.0) , Australian Computer Society . 2008 : Sydney, Australia. Gregor, S., et al., The ICT profession and the ICT Body of Knowledge (Vers. 5.0), Australian Computer Society. 2008: Sydney, Australia."},{"key":"e_1_2_1_27_1","volume-title":"Computer Science, Information Systems, Information Technology, Software Engineering.","author":"ACM\/IEEE Joint Task Force","year":"2005","unstructured":"ACM\/IEEE Joint Task Force , Computing Curricula 2005: The overview report covering undergraduate degree programs in Comptuer Engineering , Computer Science, Information Systems, Information Technology, Software Engineering. 2005 . ACM\/IEEE Joint Task Force, Computing Curricula 2005: The overview report covering undergraduate degree programs in Comptuer Engineering, Computer Science, Information Systems, Information Technology, Software Engineering. 2005."},{"key":"e_1_2_1_28_1","volume-title":"Computing Curricula 2001: Computer Science","author":"ACM\/IEEE Joint Task Force","year":"2001","unstructured":"ACM\/IEEE Joint Task Force , Computing Curricula 2001: Computer Science . 2001 . ACM\/IEEE Joint Task Force, Computing Curricula 2001: Computer Science. 2001."},{"key":"e_1_2_1_29_1","volume-title":"Computer science curriculum 2008: An interim revision of CS","author":"Cassel L.","year":"2001","unstructured":"Cassel , L. , et al. , Computer science curriculum 2008: An interim revision of CS 2001 . Report from the interim review task force. 2008. Cassel, L., et al., Computer science curriculum 2008: An interim revision of CS 2001. Report from the interim review task force. 2008."},{"key":"e_1_2_1_30_1","volume-title":"Information Technology 2008: Curriculum guidelines for undergraduate degree programs in informaiton technology","author":"Lunt B.M.","year":"2008","unstructured":"Lunt , B.M. , et al. , Information Technology 2008: Curriculum guidelines for undergraduate degree programs in informaiton technology . 2008 , Association for Computing Machinery and IEEE Computer Society . Lunt, B.M., et al., Information Technology 2008: Curriculum guidelines for undergraduate degree programs in informaiton technology. 2008, Association for Computing Machinery and IEEE Computer Society."},{"key":"e_1_2_1_31_1","volume-title":"Curriculum guidelines for undergraduate degree programs in informaiton systems","author":"Topi H.","year":"2010","unstructured":"Topi , H. , et al. , Curriculum guidelines for undergraduate degree programs in informaiton systems . 2010 . Topi, H., et al., Curriculum guidelines for undergraduate degree programs in informaiton systems. 2010."},{"key":"e_1_2_1_32_1","volume-title":"Software Engineering 2004: Curriculum guidelines for undergraduae degree programs in software engineering","author":"Le Blanc R.","year":"2004","unstructured":"Le Blanc , R. , et al. , Software Engineering 2004: Curriculum guidelines for undergraduae degree programs in software engineering , J.L. Diaz-Herrera and T.B. Hilburn, Editors. 2004 . Le Blanc, R., et al., Software Engineering 2004: Curriculum guidelines for undergraduae degree programs in software engineering, J.L. Diaz-Herrera and T.B. Hilburn, Editors. 2004."},{"key":"e_1_2_1_33_1","volume-title":"Computer Engineering 2004: Curriculum guidelines for undergraduate degree programs in computer engineering","author":"ACM\/IEEE Joint Task Force","year":"2004","unstructured":"ACM\/IEEE Joint Task Force , Computer Engineering 2004: Curriculum guidelines for undergraduate degree programs in computer engineering . 2004 . ACM\/IEEE Joint Task Force, Computer Engineering 2004: Curriculum guidelines for undergraduate degree programs in computer engineering. 2004."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631728.1631764"},{"key":"e_1_2_1_35_1","author":"Barroso P.","year":"2004","unstructured":"Barroso , P. and G. Melara , Teaching of computer ethics at the State of California's Universities and other countries. The Ethicomp E-Journal , 2004 . Barroso, P. and G. Melara, Teaching of computer ethics at the State of California's Universities and other countries. The Ethicomp E-Journal, 2004.","journal-title":"The Ethicomp E-Journal"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/266057.266131"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352188"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/63526.63530"},{"key":"e_1_2_1_39_1","volume-title":"the free encyclopedia. {cited","author":"Morris","year":"2010","unstructured":"Morris worm - Widipedia , the free encyclopedia. {cited 2010 , 2 August}; Available from: http:\/\/en.wikipedia.org\/wiki\/Morris_worm. Morris worm - Widipedia, the free encyclopedia. {cited 2010, 2 August}; Available from: http:\/\/en.wikipedia.org\/wiki\/Morris_worm."},{"key":"e_1_2_1_40_1","volume-title":"The Humanitarian FOSS Project - Home. 2010 {cited 2010","author":"FOSS.","year":"2010","unstructured":"H- FOSS. The Humanitarian FOSS Project - Home. 2010 {cited 2010 30 June 2010 }; Available from: http:\/\/www.hfoss.org\/. H-FOSS. The Humanitarian FOSS Project - Home. 2010 {cited 2010 30 June 2010}; Available from: http:\/\/www.hfoss.org\/."},{"key":"e_1_2_1_41_1","first-page":"83","volume-title":"Proceedings of the sixth conference on Australasian computing education -","volume":"30","author":"Gotterbarn D.","year":"2004","unstructured":"Gotterbarn , D. and T. Clear , Using SoDIS&trade; as a risk analysis process: a teaching perspective , in Proceedings of the sixth conference on Australasian computing education - Volume 30 . 2004 , Australian Computer Society, Inc.: Dunedin, New Zealand. p. 83 -- 90 . Gotterbarn, D. and T. Clear, Using SoDIS&trade; as a risk analysis process: a teaching perspective, in Proceedings of the sixth conference on Australasian computing education - Volume 30. 2004, Australian Computer Society, Inc.: Dunedin, New Zealand. p. 83--90."},{"key":"e_1_2_1_42_1","author":"Vascellaro J.E.","year":"2010","unstructured":"Vascellaro , J.E. Google to build great wall in wake of cyber attack. The Wall Street Journal 13 January 2010 {cited 2010 1 August}; Available from: http:\/\/www.theaustralian.com.au\/business\/news\/google-to-build-great-wall-in-wake-of-cyber-attack\/storye6frg90x-1225818914737. Vascellaro, J.E. Google to build great wall in wake of cyber attack. The Wall Street Journal 13 January 2010 {cited 2010 1 August}; Available from: http:\/\/www.theaustralian.com.au\/business\/news\/google-to-build-great-wall-in-wake-of-cyber-attack\/storye6frg90x-1225818914737.","journal-title":"The Wall Street Journal"},{"key":"e_1_2_1_43_1","volume-title":"Military's killer robots must learn warrior code. The Sunday Times","author":"Lewis L.","year":"2009","unstructured":"Lewis , L. Military's killer robots must learn warrior code. The Sunday Times 16 February 2009 {cited 2010; Available from: http:\/\/technology.timesonline.co.uk\/tol\/news\/tech_and_web\/article5741334.ece. Lewis, L. Military's killer robots must learn warrior code. The Sunday Times 16 February 2009 {cited 2010; Available from: http:\/\/technology.timesonline.co.uk\/tol\/news\/tech_and_web\/article5741334.ece."},{"key":"e_1_2_1_44_1","unstructured":"Facebook's security fl aws exposed. The Australian IT {cited 2010 1 August}; Available from: http:\/\/www.theaustralian.com.au\/australian-it\/facebooks-security-fl aws-exposed\/storye6frgakx-1225898699575.  Facebook's security fl aws exposed. The Australian IT {cited 2010 1 August}; Available from: http:\/\/www.theaustralian.com.au\/australian-it\/facebooks-security-fl aws-exposed\/storye6frgakx-1225898699575."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328057.1328090"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073006"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529736"},{"key":"e_1_2_1_48_1","volume-title":"SIGCAS Mission - SIGCAS - Computers & Society. 2010 {cited 2010","author":"SIGCAS.","year":"2010","unstructured":"SIGCAS. SIGCAS Mission - SIGCAS - Computers & Society. 2010 {cited 2010 30 June 2010 }; Available from: http:\/\/www.sigcas.org\/. SIGCAS. SIGCAS Mission - SIGCAS - Computers & Society. 2010 {cited 2010 30 June 2010}; Available from: http:\/\/www.sigcas.org\/."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1227310.1227495"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536616.1536635"},{"key":"e_1_2_1_51_1","unstructured":"SRC. Socially Relevant Computing. 2010 {cited 2010 30 June 2010}; Available from: http:\/\/src.cse.buffalo.edu\/index.html.  SRC. Socially Relevant Computing. 2010 {cited 2010 30 June 2010}; Available from: http:\/\/src.cse.buffalo.edu\/index.html."},{"key":"e_1_2_1_52_1","volume-title":"CPSR - Computer Professionals for Social Responsibility. 2010 {cited","author":"CPSR.","year":"2010","unstructured":"CPSR. CPSR - Computer Professionals for Social Responsibility. 2010 {cited 2010 , 30 June}; Available from: http:\/\/cpsr.org\/. CPSR. CPSR - Computer Professionals for Social Responsibility. 2010 {cited 2010, 30 June}; Available from: http:\/\/cpsr.org\/."},{"key":"e_1_2_1_53_1","volume-title":"CPSR - CPSR History. 2010 {cited","author":"CPSR.","year":"2010","unstructured":"CPSR. CPSR - CPSR History. 2010 {cited 2010 , 2 August}; Available from: http:\/\/cpsr.org\/about\/history\/. CPSR. CPSR - CPSR History. 2010 {cited 2010, 2 August}; Available from: http:\/\/cpsr.org\/about\/history\/."},{"key":"e_1_2_1_54_1","volume-title":"The Risks Digest. {cited","author":"Moderated P.G.","year":"2010","unstructured":"Moderated by Neumann, P.G. The Risks Digest. {cited 2010 , 2 August}; Available from: http:\/\/catless.ncl.ac.uk\/risks. Moderated by Neumann, P.G. The Risks Digest. {cited 2010, 2 August}; Available from: http:\/\/catless.ncl.ac.uk\/risks."},{"key":"e_1_2_1_55_1","first-page":"2010","volume":"2010","author":"IEEE Technology and Society","unstructured":"IEEE Technology and Society Magazine. 2010 {cited 2010 , 2 August}; Available from: http:\/\/ieeessit.org\/technology_and_society\/. IEEE Technology and Society Magazine. 2010 {cited 2010, 2 August}; Available from: http:\/\/ieeessit.org\/technology_and_society\/.","journal-title":"Magazine."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352246"},{"key":"e_1_2_1_57_1","first-page":"19","volume-title":"ASEE\/IEEE Fronters in Education Conference. 2004: Savannah, GA.","author":"Bailey T.","unstructured":"Bailey , T. and J. Forbes , Computers and Society in CS0: An interactive approach , in ASEE\/IEEE Fronters in Education Conference. 2004: Savannah, GA. p. S2F 19 -- 23 . Bailey, T. and J. Forbes, Computers and Society in CS0: An interactive approach, in ASEE\/IEEE Fronters in Education Conference. 2004: Savannah, GA. p. S2F 19--23."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/606032.606034"},{"key":"e_1_2_1_59_1","first-page":"163","volume-title":"Proceedings of the ninth Australasian conference on Computing education -","volume":"66","author":"von Konsky B.R.","year":"2007","unstructured":"von Konsky , B.R. , J. Ivins , and S.J. Gribble , Engaging undergraduates in discussions about ethics in computing , in Proceedings of the ninth Australasian conference on Computing education - Volume 66 . 2007 , Australian Computer Society, Inc.: Ballarat, Victoria, Australia. p. 163 -- 169 . von Konsky, B.R., J. Ivins, and S.J. Gribble, Engaging undergraduates in discussions about ethics in computing, in Proceedings of the ninth Australasian conference on Computing education - Volume 66. 2007, Australian Computer Society, Inc.: Ballarat, Victoria, Australia. p. 163--169."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/572139.572179"}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1929887.1929907","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1929887.1929907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:32Z","timestamp":1750278392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1929887.1929907"}},"subtitle":["computing for the social good"],"short-title":[],"issued":{"date-parts":[[2011,2,25]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2,25]]}},"alternative-id":["10.1145\/1929887.1929907"],"URL":"https:\/\/doi.org\/10.1145\/1929887.1929907","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"value":"2153-2184","type":"print"},{"value":"2153-2192","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,25]]},"assertion":[{"value":"2011-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}