{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:35Z","timestamp":1750220855609,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T00:00:00Z","timestamp":1574294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,21]]},"DOI":"10.1145\/3364510.3364529","type":"proceedings-article","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T13:35:33Z","timestamp":1575898533000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A method for adding cyberethical behaviour measurements to computer science homework assignments"],"prefix":"10.1145","author":[{"given":"Sten","family":"M\u00e4ses","sequence":"first","affiliation":[{"name":"Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Heleri","family":"Aitsam","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Liina","family":"Randmann","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology, Tallinn, Estonia"}]}],"member":"320","published-online":{"date-parts":[[2019,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Isaac Asimov. 1950. I Robot. Gnome Press.  Isaac Asimov. 1950. I Robot. Gnome Press."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Claudio Barbaranelli Maria L Farnese Carlo Tramontano Roberta Fida Valerio Ghezzi Marinella Paciello and Philip Long. 2018. Machiavellian ways to academic cheating: A mediational and interactional model. Frontiers in psychology 9 (2018).  Claudio Barbaranelli Maria L Farnese Carlo Tramontano Roberta Fida Valerio Ghezzi Marinella Paciello and Philip Long. 2018. Machiavellian ways to academic cheating: A mediational and interactional model. Frontiers in psychology 9 (2018).","DOI":"10.3389\/fpsyg.2018.00695"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Rachel Barkan Shahar Ayal and Dan Ariely. 2015. Ethical dissonance justifications and moral behavior. Current Opinion in Psychology 6 DEC (2015) 157--161.  Rachel Barkan Shahar Ayal and Dan Ariely. 2015. Ethical dissonance justifications and moral behavior. Current Opinion in Psychology 6 DEC (2015) 157--161.","DOI":"10.1016\/j.copsyc.2015.08.001"},{"volume-title":"2018 USENIX Workshop on Advances in Security Education (ASE 18)","year":"2018","author":"Blanken-Webb Jane","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Jean-Fran\u00e7ois Bonnefon Azim Shariff and Iyad Rahwan. 2016. The social dilemma of autonomous vehicles. Science 352 6293 (2016) 1573--1576.  Jean-Fran\u00e7ois Bonnefon Azim Shariff and Iyad Rahwan. 2016. The social dilemma of autonomous vehicles. Science 352 6293 (2016) 1573--1576.","DOI":"10.1126\/science.aaf2654"},{"key":"e_1_3_2_1_6_1","article-title":"What issues affect Likert-scale questionnaire formats. Shiken","volume":"4","author":"Brown James Dean","year":"2000","journal-title":"JALT Testing & Evaluation SIG Newsletter"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1525\/jer.2011.6.2.71"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Louis Cohen Lawrence Manion and Keith Morrison. 2002. Research methods in education. routledge.  Louis Cohen Lawrence Manion and Keith Morrison. 2002. Research methods in education. routledge.","DOI":"10.4324\/9780203224342"},{"key":"e_1_3_2_1_9_1","unstructured":"David J Howard. 2018. Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents. (2018). Master thesis in University of South Florida.  David J Howard. 2018. Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents. (2018). Master thesis in University of South Florida."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2014.2360502"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Guy Kahane Jim AC Everett Brian D Earp Lucius Caviola Nadira S Faber Molly J Crockett and Julian Savulescu. 2017. Beyond sacrificial harm: A two-dimensional model of utilitarian psychology. (2017).  Guy Kahane Jim AC Everett Brian D Earp Lucius Caviola Nadira S Faber Molly J Crockett and Julian Savulescu. 2017. Beyond sacrificial harm: A two-dimensional model of utilitarian psychology. (2017).","DOI":"10.1037\/rev0000093"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9233-7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141880.3141902"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Alasdair MacIntyre. 1998. A short history of ethics: a history of moral philosophy from the Homeric Age to the twentieth century. University of Notre Dame Press Notre Dame Ind.  Alasdair MacIntyre. 1998. A short history of ethics: a history of moral philosophy from the Homeric Age to the twentieth century. University of Notre Dame Press Notre Dame Ind.","DOI":"10.2307\/j.ctvpg85gr"},{"volume-title":"18th European Conference on Research Methodology for Business and Management Studies. 218.","author":"M\u00e4ses Sten","key":"e_1_3_2_1_15_1"},{"volume-title":"Cybersecurity Behaviour: A Conceptual Taxonomy. In IFIP International Conference on Information Security Theory and Practice. Springer, 147--156","year":"2018","author":"Mashiane Thulani","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2013.08.015"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563380"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279720.3279740"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.2005.00714.x"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1052562905280844"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/17437199.2013.869710"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/503345.503346"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0036950"},{"key":"e_1_3_2_1_28_1","unstructured":"Norbert Wiener. 1948. Cybernetics or Control and Communication in the Animal and the Machine. The Technology Press.  Norbert Wiener. 1948. Cybernetics or Control and Communication in the Animal and the Machine. The Technology Press."},{"key":"e_1_3_2_1_29_1","unstructured":"Peter Wohlleben. 2017. The inner life of animals: love grief and compassion: surprising observations of a hidden world. Greystone Books David Suzuki Institute Vancouver Berkeley.  Peter Wohlleben. 2017. The inner life of animals: love grief and compassion: surprising observations of a hidden world. Greystone Books David Suzuki Institute Vancouver Berkeley."}],"event":{"name":"Koli Calling '19: 19th Koli Calling International Conference on Computing Education Research","sponsor":["University of Helsinki","Univ. Eastern Finland University of Eastern Finland","The University of Adelaide, Australia","SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Koli Finland","acronym":"Koli Calling '19"},"container-title":["Proceedings of the 19th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364510.3364529","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364510.3364529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:23Z","timestamp":1750202603000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364510.3364529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,21]]},"references-count":29,"alternative-id":["10.1145\/3364510.3364529","10.1145\/3364510"],"URL":"https:\/\/doi.org\/10.1145\/3364510.3364529","relation":{},"subject":[],"published":{"date-parts":[[2019,11,21]]},"assertion":[{"value":"2019-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}