{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:43Z","timestamp":1750221103078,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T00:00:00Z","timestamp":1546992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,9]]},"DOI":"10.1145\/3294016.3294017","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T18:42:31Z","timestamp":1547059351000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Teaching Data Ethics"],"prefix":"10.1145","author":[{"given":"Tristan","family":"Henderson","sequence":"first","affiliation":[{"name":"School of Computer Science, University of St Andrews"}]}],"member":"320","published-online":{"date-parts":[[2019,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67256-4_32"},{"key":"e_1_3_2_1_2_1","volume-title":"The great British Brexit robbery: how our democracy was hijacked. The Observer (7","author":"Cadwalladr Carole","year":"2017","unstructured":"Carole Cadwalladr . 2017. The great British Brexit robbery: how our democracy was hijacked. The Observer (7 May 2017 ), 12. https:\/\/www.theguardian.com\/technology\/2017\/may\/07\/the-great-british-brexit-robbery-hijacked-democracy Carole Cadwalladr. 2017. The great British Brexit robbery: how our democracy was hijacked. The Observer (7 May 2017), 12. https:\/\/www.theguardian.com\/technology\/2017\/may\/07\/the-great-british-brexit-robbery-hijacked-democracy"},{"key":"e_1_3_2_1_3_1","volume-title":"To Appear: Workshop in ACM SIGCSE","author":"Davis Janet","year":"2019","unstructured":"Janet Davis , Iris Howley , Darakhshan Mir , Evan M. Peck , and Deborah Tatar . 2019 . Make and Take an Ethics Module: Ethics Across the CS Curriculum . In To Appear: Workshop in ACM SIGCSE 2019. Janet Davis, Iris Howley, Darakhshan Mir, Evan M. Peck, and Deborah Tatar. 2019. Make and Take an Ethics Module: Ethics Across the CS Curriculum. In To Appear: Workshop in ACM SIGCSE 2019."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1404520.1404526"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2014.976411"},{"key":"e_1_3_2_1_6_1","volume-title":"You in Aisle 5. The New York Times (19","author":"Duhigg Charles","year":"2012","unstructured":"Charles Duhigg . 2012. Psst , You in Aisle 5. The New York Times (19 Feb. 2012 ), MM 30. http:\/\/www.nytimes.com\/2012\/02\/19\/magazine\/shopping-habits.html Charles Duhigg. 2012. Psst, You in Aisle 5. The New York Times (19 Feb. 2012), MM30. http:\/\/www.nytimes.com\/2012\/02\/19\/magazine\/shopping-habits.html"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3234382"},{"key":"e_1_3_2_1_8_1","volume-title":"Slave to the Algorithm? Why a 'Right to Explanation' is Probably Not the Remedy You are Looking for. Duke Law & Technology Review 16 (Dec","author":"Edwards Lilian","year":"2017","unstructured":"Lilian Edwards and Michael Veale . 2017. Slave to the Algorithm? Why a 'Right to Explanation' is Probably Not the Remedy You are Looking for. Duke Law & Technology Review 16 (Dec . 2017 ), 18--84. https:\/\/scholarship.law.duke.edu\/dltr\/vol16\/iss1\/2 Lilian Edwards and Michael Veale. 2017. Slave to the Algorithm? Why a 'Right to Explanation' is Probably Not the Remedy You are Looking for. Duke Law & Technology Review 16 (Dec. 2017), 18--84. https:\/\/scholarship.law.duke.edu\/dltr\/vol16\/iss1\/2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-018-9482-5"},{"key":"e_1_3_2_1_10_1","volume-title":"Shaffer","author":"Goff Jay W.","year":"2014","unstructured":"Jay W. Goff and Christopher M . Shaffer . 2014 . Big Data's Impact on College Admission Practices and Recruitment Strategies. In Building a Smarter University : Big Data, Innovation, and Analytics, Jason E. Lane (Ed.). SUNY Press , Albany, Chapter 4, 93--120. Jay W. Goff and Christopher M. Shaffer. 2014. Big Data's Impact on College Admission Practices and Recruitment Strategies. In Building a Smarter University: Big Data, Innovation, and Analytics, Jason E. Lane (Ed.). SUNY Press, Albany, Chapter 4, 93--120."},{"key":"e_1_3_2_1_11_1","unstructured":"Wendy Hall and J\u00e9r\u00f4me Pesenti. 2017. Growing the artificial intelligence industry in the UK. Technical Report. Department for Digital Culture Media & Sport and Department for Business Energy & Industrial Strategy. https:\/\/www.gov.uk\/government\/publications\/growing-the-artificial-intelligence-industry-in-the-uk  Wendy Hall and J\u00e9r\u00f4me Pesenti. 2017. Growing the artificial intelligence industry in the UK. Technical Report. Department for Digital Culture Media & Sport and Department for Business Energy & Industrial Strategy. https:\/\/www.gov.uk\/government\/publications\/growing-the-artificial-intelligence-industry-in-the-uk"},{"key":"e_1_3_2_1_12_1","unstructured":"Gry Hasselbalch and Pernille Tranberg. 2016. Data ethics: the new competitive advantage. Publishare Frederiksberg. http:\/\/dataethics.eu\/en\/book\/  Gry Hasselbalch and Pernille Tranberg. 2016. Data ethics: the new competitive advantage. Publishare Frederiksberg. http:\/\/dataethics.eu\/en\/book\/"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM). AAAI, Palo Alto, 178--187","author":"Hutton Luke","year":"2015","unstructured":"Luke Hutton and Tristan Henderson . 2015 . \" I Didn't Sign Up for This!\": Informed Consent in Social Network Research . In Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM). AAAI, Palo Alto, 178--187 . http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM15\/paper\/view\/10493 Luke Hutton and Tristan Henderson. 2015. \"I Didn't Sign Up for This!\": Informed Consent in Social Network Research. In Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM). AAAI, Palo Alto, 178--187. http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM15\/paper\/view\/10493"},{"key":"e_1_3_2_1_14_1","first-page":"3","article-title":"Accountable Algorithms","volume":"165","author":"Kroll Joshua A.","year":"2017","unstructured":"Joshua A. Kroll , Joanna Huey , Solon Barocas , Edward W. Felten , Joel R. Reidenberg , David G. Robinson , and Harlan Yu . 2017 . Accountable Algorithms . University of Pennsylvania Law Review 165 , 3 (Feb. 2017), 633--705. https:\/\/www.pennlawreview.com\/print\/?id=553 Joshua A. Kroll, Joanna Huey, Solon Barocas, Edward W. Felten, Joel R. Reidenberg, David G. Robinson, and Harlan Yu. 2017. Accountable Algorithms. University of Pennsylvania Law Review 165, 3 (Feb. 2017), 633--705. https:\/\/www.pennlawreview.com\/print\/?id=553","journal-title":"University of Pennsylvania Law Review"},{"key":"e_1_3_2_1_15_1","volume-title":"Code: And Other Laws of Cyberspace, Version 2.0","author":"Lessig Lawrence","year":"2006","unstructured":"Lawrence Lessig . 2006 . Code: And Other Laws of Cyberspace, Version 2.0 . Basic Books . http:\/\/www.codev2.cc\/ Lawrence Lessig. 2006. Code: And Other Laws of Cyberspace, Version 2.0. Basic Books. http:\/\/www.codev2.cc\/"},{"volume-title":"Ethical data and information management: concepts, tools and methods. Kogan Page","author":"O'Keefe Katherine","key":"e_1_3_2_1_16_1","unstructured":"Katherine O'Keefe and Daragh O Brien . 2018. Ethical data and information management: concepts, tools and methods. Kogan Page , London . Katherine O'Keefe and Daragh O Brien. 2018. Ethical data and information management: concepts, tools and methods. Kogan Page, London."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.05.008"},{"key":"e_1_3_2_1_18_1","unstructured":"Evan Peck. 2018. Ethical Reflection Modules for CS 1. Retrieved 2018-10-13 from https:\/\/ethicalcs.github.io\/  Evan Peck. 2018. Ethical Reflection Modules for CS 1. Retrieved 2018-10-13 from https:\/\/ethicalcs.github.io\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11292-016-9272-0"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_1_21_1","volume-title":"University lecturers to strike as students sit summer exams. The Times (9","author":"Woolcock Nicola","year":"2018","unstructured":"Nicola Woolcock . 2018. University lecturers to strike as students sit summer exams. The Times (9 March 2018 ). https:\/\/www.thetimes.co.uk\/article\/university-lecturers-to-strike-as-students-sit-summer-exams-2jmmxlsbx Nicola Woolcock. 2018. University lecturers to strike as students sit summer exams. The Times (9 March 2018). https:\/\/www.thetimes.co.uk\/article\/university-lecturers-to-strike-as-students-sit-summer-exams-2jmmxlsbx"}],"event":{"name":"CEP '19: Computing Education Practice","sponsor":["University of Durham, UK University of Durham, UK"],"location":"Durham United Kingdom","acronym":"CEP '19"},"container-title":["Proceedings of the 3rd Conference on Computing Education Practice"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3294016.3294017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3294016.3294017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:47Z","timestamp":1750208507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3294016.3294017"}},"subtitle":["We're going to ethics the heck out of this"],"short-title":[],"issued":{"date-parts":[[2019,1,9]]},"references-count":21,"alternative-id":["10.1145\/3294016.3294017","10.1145\/3294016"],"URL":"https:\/\/doi.org\/10.1145\/3294016.3294017","relation":{},"subject":[],"published":{"date-parts":[[2019,1,9]]},"assertion":[{"value":"2019-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}