{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:13Z","timestamp":1750308613609,"version":"3.41.0"},"reference-count":17,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,2,17]],"date-time":"2017-02-17T00:00:00Z","timestamp":1487289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2017,2,17]]},"DOI":"10.1145\/3043949","type":"journal-article","created":{"date-parts":[[2017,2,27]],"date-time":"2017-02-27T13:06:52Z","timestamp":1488200812000},"page":"38-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Action ethics for a software development class"],"prefix":"10.1145","volume":"8","author":[{"given":"David K.","family":"Larson","sequence":"first","affiliation":[{"name":"University of Illinois at Springfield"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Keith W.","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Missouri-St. Louis"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,2,17]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"The ethical challenges of ubiquitous healthcare International Review of Information Ethics, 8,12","author":"Brown I.","year":"2007","unstructured":"Brown , I. , & Adams , A. A. The ethical challenges of ubiquitous healthcare International Review of Information Ethics, 8,12 ( 2007 ), 53--60. Brown, I., & Adams, A. A. The ethical challenges of ubiquitous healthcare International Review of Information Ethics, 8,12 (2007), 53--60."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(92)90077-W"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/175222.175229"},{"key":"e_1_2_1_4_1","volume-title":"Do good and avoid evil\u2026 and why that is complicated in computing. ACM webcast","author":"Gotterbarn D.","year":"2014","unstructured":"Gotterbarn , D. and Miller , K . ( 2014 ). Do good and avoid evil\u2026 and why that is complicated in computing. ACM webcast ; https:\/\/www.youtube.com\/watch?v=b8TJvEr6eSQ. Accessed 2016 October 14. Gotterbarn, D. and Miller, K. (2014). Do good and avoid evil\u2026 and why that is complicated in computing. ACM webcast; https:\/\/www.youtube.com\/watch?v=b8TJvEr6eSQ. Accessed 2016 October 14."},{"key":"e_1_2_1_5_1","volume-title":"Case of the killer robot","author":"Epstein R.G.","year":"2017","unstructured":"Epstein , R.G. Case of the killer robot ; http:\/\/www.onlineethics.org\/Resources\/killerrobot\/robot.aspx. Accessed 2017 January 5. Epstein, R.G. Case of the killer robot; http:\/\/www.onlineethics.org\/Resources\/killerrobot\/robot.aspx. Accessed 2017 January 5."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4037\/ajcc2010651"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/03043790050200340"},{"key":"e_1_2_1_8_1","volume-title":"Software Engineering Code of Ethics and Professional Practice (5.2)","author":"IEEE-CS \/ ACM Join Task Force on Software Engineering Ethics and Professional Practices.","year":"2016","unstructured":"IEEE-CS \/ ACM Join Task Force on Software Engineering Ethics and Professional Practices. Software Engineering Code of Ethics and Professional Practice (5.2) ; http:\/\/seeri.etsu.edu\/Codes\/TheSECode.htm. Accessed 2016 October 14. IEEE-CS \/ ACM Join Task Force on Software Engineering Ethics and Professional Practices. Software Engineering Code of Ethics and Professional Practice (5.2); http:\/\/seeri.etsu.edu\/Codes\/TheSECode.htm. Accessed 2016 October 14."},{"key":"e_1_2_1_9_1","volume-title":"Business Ethics: Case Studies and Selected Readings","author":"Jennings M. M.","year":"2014","unstructured":"Jennings , M. M. Business Ethics: Case Studies and Selected Readings . 8 th ed. (Stamford, CT : Cengage Learning , 2014 ). Jennings, M. M. Business Ethics: Case Studies and Selected Readings. 8th ed. (Stamford, CT: Cengage Learning, 2014).","edition":"8"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/0899340880010104"},{"key":"e_1_2_1_11_1","volume-title":"Version 1","author":"Miller K.","year":"2016","unstructured":"Miller , K. ( 2016 ). Simulated patient monitoring system , Version 1 ; https:\/\/edocs.uis.edu\/kmill2\/www\/PatientMonitoringV1.html. Accessed 2016 October 15. Miller, K. (2016). Simulated patient monitoring system, Version 1; https:\/\/edocs.uis.edu\/kmill2\/www\/PatientMonitoringV1.html. Accessed 2016 October 15."},{"key":"e_1_2_1_12_1","volume-title":"Version 2","author":"Miller K.","year":"2016","unstructured":"Miller , K. ( 2016 ). Simulated patient monitoring system , Version 2 ; https:\/\/edocs.uis.edu\/kmill2\/www\/PatientMonitoringV2.html. Accessed 2016 October 15. Miller, K. (2016). Simulated patient monitoring system, Version 2; https:\/\/edocs.uis.edu\/kmill2\/www\/PatientMonitoringV2.html. Accessed 2016 October 15."},{"key":"e_1_2_1_13_1","volume-title":"Version 3","author":"Miller K.","year":"2016","unstructured":"Miller , K. ( 2016 ). Simulated patient monitoring system , Version 3 ; https:\/\/edocs.uis.edu\/kmill2\/www\/PatientMonitoringV3.html. Accessed 2016 October 15. Miller, K. (2016). Simulated patient monitoring system, Version 3; https:\/\/edocs.uis.edu\/kmill2\/www\/PatientMonitoringV3.html. Accessed 2016 October 15."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-006-0032-9"},{"key":"e_1_2_1_15_1","first-page":"2","article-title":"Debriefing experiential learning exercises in ethics education","volume":"6","author":"Sims R. R","year":"2002","unstructured":"Sims , R. R . Debriefing experiential learning exercises in ethics education . Teaching Business Ethics , 6 , 2 ( 2002 ), 179--197. Sims, R. R. Debriefing experiential learning exercises in ethics education. Teaching Business Ethics, 6,2 (2002), 179--197.","journal-title":"Teaching Business Ethics"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2607(00)00142-5"},{"key":"e_1_2_1_17_1","volume-title":"Ethics of Withdrawal of Life-Support Systems: Case Studies on Decision Making in Intensive Care","author":"Walton D. N.","year":"1987","unstructured":"Walton , D. N. Ethics of Withdrawal of Life-Support Systems: Case Studies on Decision Making in Intensive Care . ( Praeger , 1987 ). Walton, D. N. Ethics of Withdrawal of Life-Support Systems: Case Studies on Decision Making in Intensive Care. (Praeger, 1987)."}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3043949","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3043949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:27Z","timestamp":1750273647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3043949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,17]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2,17]]}},"alternative-id":["10.1145\/3043949"],"URL":"https:\/\/doi.org\/10.1145\/3043949","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"type":"print","value":"2153-2184"},{"type":"electronic","value":"2153-2192"}],"subject":[],"published":{"date-parts":[[2017,2,17]]},"assertion":[{"value":"2017-02-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}