{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:40:06Z","timestamp":1750236006802,"version":"3.41.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"4-1","license":[{"start":{"date-parts":[[1987,10,1]],"date-time":"1987-10-01T00:00:00Z","timestamp":560044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCAS Comput. Soc."],"published-print":{"date-parts":[[1987,10]]},"DOI":"10.1145\/25601.25602","type":"journal-article","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T15:54:55Z","timestamp":1132070095000},"page":"3-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Computer ethics: an antidote to despair"],"prefix":"10.1145","volume":"16-17","author":[{"given":"J J Buck","family":"BloomBecker","sequence":"first","affiliation":[]}],"member":"320","published-online":{"date-parts":[[1987,10]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Batt Robert \"White Collar Crime The Enemy Within \" Computerworld Dec. 26 1983 - Jan. 2 1984 pp. 49-56.  Batt Robert \"White Collar Crime The Enemy Within \" Computerworld Dec. 26 1983 - Jan. 2 1984 pp. 49-56."},{"volume-title":"Computers and Society","year":"1982","author":"BloomBecker Jay","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","unstructured":"BloomBecker Jay Computer Crime Computer Security Computer Ethics National Center for Computer Crime Data Los Angeles 1986.  BloomBecker Jay Computer Crime Computer Security Computer Ethics National Center for Computer Crime Data Los Angeles 1986."},{"key":"e_1_2_1_4_1","unstructured":"BloomBecker Jay Computer Crime Law Reporter National Center for Computer Crime Data Los Angeles 1985 1986 update.  BloomBecker Jay Computer Crime Law Reporter National Center for Computer Crime Data Los Angeles 1985 1986 update."},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"BloomBecker Jay \"Conscience in Computing\" Computers and Society Summer 1983.  BloomBecker Jay \"Conscience in Computing\" Computers and Society Summer 1983.","DOI":"10.1145\/958600.958603"},{"key":"e_1_2_1_6_1","first-page":"3","volume-title":"Information Age","author":"BloomBecker Jay","year":"1978"},{"key":"e_1_2_1_7_1","unstructured":"BloomBecker Jay \"Who are the Computer Criminals?\" New Scientist March 1980.  BloomBecker Jay \"Who are the Computer Criminals?\" New Scientist March 1980."},{"volume-title":"Congress on Computer and Communications Security and Privacy, Committee on Science and Technology, Subcommittee on Transportation, Aviation and Materials, House of Reps., 98 Cong. 2 Sess.","year":"1984","author":"Campbell Robert","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","unstructured":"Coates Joseph \"Computers and Business - A Case of Ethical Overload\" in Hickman (ed.) Philosophy Technology and Human Affairs Ibis Press of College Station Texas 1985.  Coates Joseph \"Computers and Business - A Case of Ethical Overload\" in Hickman (ed.) Philosophy Technology and Human Affairs Ibis Press of College Station Texas 1985."},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","first-page":"598","DOI":"10.5951\/MT.77.8.0598","author":"Gilliland Kay","year":"1984","journal-title":"Mathematics Teacher"},{"key":"e_1_2_1_11_1","unstructured":"Johnson Deborah Computer Ethics Prentice Hall 1985.   Johnson Deborah Computer Ethics Prentice Hall 1985."},{"volume-title":"Wadsworth Publishing Co.","year":"1985","author":"Johnson Deborah","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","unstructured":"Johnson Douglas Computer Ethics The Brethren Press Elgin IL 1984.   Johnson Douglas Computer Ethics The Brethren Press Elgin IL 1984."},{"volume-title":"New Society Publishers","year":"1983","author":"Macy Joanna Rogers","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Mowshowitz Abbe \"On the Social Relations of Computers\" Human Systems Management 1985 99-110. {Has extensive bibliography}.  Mowshowitz Abbe \"On the Social Relations of Computers\" Human Systems Management 1985 99-110. {Has extensive bibliography}.","DOI":"10.3233\/HSM-1985-5203"},{"key":"e_1_2_1_16_1","unstructured":"Parabola Issue on Theft Vol. 9 #2 Summer. Parabola Issue on Theft Vol. 9 #2 Summer."},{"key":"e_1_2_1_17_1","unstructured":"Parker Donn Ethical Conflicts in Computer Science and Technology and Workbook AFIPS Press Arlington VA.   Parker Donn Ethical Conflicts in Computer Science and Technology and Workbook AFIPS Press Arlington VA."},{"key":"e_1_2_1_18_1","unstructured":"Solomonides Tony and Levidow Les Compulsive Technology Free Association Books London 1985.  Solomonides Tony and Levidow Les Compulsive Technology Free Association Books London 1985."},{"key":"e_1_2_1_19_1","unstructured":"Theobold Robert Beyond Despair Seven Locks Press Cabin John MD 1981.  Theobold Robert Beyond Despair Seven Locks Press Cabin John MD 1981."},{"volume-title":"San Francisco","year":"1976","author":"Weizenbaum Joseph","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","unstructured":"Winner Langdon \"Do Artifacts Have Politics?\" 109 Daedelus No. 1 Winter 1980.  Winner Langdon \"Do Artifacts Have Politics?\" 109 Daedelus No. 1 Winter 1980."},{"key":"e_1_2_1_22_1","unstructured":"Winner Langdon \"Mythinformation in the High-Tech Era \" IEEE Spectrum June 1984 p. 91.  Winner Langdon \"Mythinformation in the High-Tech Era \" IEEE Spectrum June 1984 p. 91."}],"container-title":["ACM SIGCAS Computers and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/25601.25602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/25601.25602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:21Z","timestamp":1750234221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/25601.25602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987,10]]},"references-count":22,"journal-issue":{"issue":"4-1","published-print":{"date-parts":[[1987,10]]}},"alternative-id":["10.1145\/25601.25602"],"URL":"https:\/\/doi.org\/10.1145\/25601.25602","relation":{},"ISSN":["0095-2737"],"issn-type":[{"type":"print","value":"0095-2737"}],"subject":[],"published":{"date-parts":[[1987,10]]},"assertion":[{"value":"1987-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}