{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:54:18Z","timestamp":1776120858008,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T00:00:00Z","timestamp":1614729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Responsible Computer Science Challenge"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,3]]},"DOI":"10.1145\/3408877.3432468","type":"proceedings-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T18:45:27Z","timestamp":1614969927000},"page":"1020-1026","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Computing Ethics Narratives"],"prefix":"10.1145","author":[{"given":"Beleicia B.","family":"Bullock","sequence":"first","affiliation":[{"name":"University of Illinois, Urbana-Champaign, IL, USA"}]},{"given":"Fernando L.","family":"Nascimento","sequence":"additional","affiliation":[{"name":"Bowdoin College, Brunswick, ME, USA"}]},{"given":"Stacy A.","family":"Doore","sequence":"additional","affiliation":[{"name":"Colby College, Waterville, ME, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Oneself as Another","author":"Ricoeur P.","year":"1992","unstructured":"Ricoeur , P. ( 1992 ). Oneself as Another . University of Chicago Press , Chicago. Ricoeur, P. (1992). Oneself as Another. University of Chicago Press, Chicago."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"key":"e_1_3_2_1_3_1","volume-title":"Business Legal and Ethical Issues","author":"Gotterbarn D.W.","year":"1993","unstructured":"Gotterbarn . D.W. ( 1993 ). Computer Ethics: Responsibility Regained, first published in the National Forum, rep . in Business Legal and Ethical Issues . Australian Computer Society . Gotterbarn. D.W. (1993). Computer Ethics: Responsibility Regained, first published in the National Forum, rep. in Business Legal and Ethical Issues. Australian Computer Society."},{"key":"e_1_3_2_1_4_1","volume-title":"Computer ethics","author":"Johnson D.","year":"2004","unstructured":"Johnson , D. ( 2004 ). Computer ethics . Blackwell guide to the philosophy of computing and information, 65--75. Johnson, D. (2004). Computer ethics. Blackwell guide to the philosophy of computing and information, 65--75."},{"key":"e_1_3_2_1_5_1","volume-title":"Ethics and technology: Controversies, questions, and strategies for ethical computing","author":"Tavani H. T.","year":"2015","unstructured":"Tavani , H. T. ( 2015 ). Ethics and technology: Controversies, questions, and strategies for ethical computing . John Wiley & Sons . Tavani, H. T. (2015). Ethics and technology: Controversies, questions, and strategies for ethical computing. John Wiley & Sons."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999812"},{"key":"e_1_3_2_1_7_1","volume-title":"Tech Ethics Curricula","author":"Fiesler C.","year":"2018","unstructured":"Fiesler , C. ( 2018 ). Tech Ethics Curricula . Fiesler, C. (2018). Tech Ethics Curricula."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the American Society for Engineering Management 2017 International Annual Conference E.H. Ng, B. Nepal, and E. Schott eds.","author":"Mehdiabadi A.H.","year":"2019","unstructured":"Mehdiabadi , A.H. and J. Li . ( 2019 ). Toward a framework for developing computing professional ethics: A review of the literature . In Proceedings of the American Society for Engineering Management 2017 International Annual Conference E.H. Ng, B. Nepal, and E. Schott eds. Mehdiabadi, A.H. and J. Li. (2019). Toward a framework for developing computing professional ethics: A review of the literature. In Proceedings of the American Society for Engineering Management 2017 International Annual Conference E.H. Ng, B. Nepal, and E. Schott eds."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/572260.572264"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330794"},{"key":"e_1_3_2_1_11_1","volume-title":"Teaching AI Ethics Using Science Fiction. In AAAI Workshop: AI and Ethics.","author":"Burton E.","year":"2015","unstructured":"Burton , E. , Goldsmith , J. , & Mattei , N. ( 2015 ). Teaching AI Ethics Using Science Fiction. In AAAI Workshop: AI and Ethics. Burton, E., Goldsmith, J., & Mattei, N. (2015). Teaching AI Ethics Using Science Fiction. In AAAI Workshop: AI and Ethics."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159573"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174038"},{"issue":"4","key":"e_1_3_2_1_14_1","first-page":"32","article-title":"Integrating Ethics within Machine-learning Courses","volume":"19","author":"Saltz J.","year":"2019","unstructured":"Saltz , J. , Skirpan , M. , Fiesler , C. , Gorelick , M. , Yeh , T. , Heckman , R. , & Beard , N. ( 2019 ). Integrating Ethics within Machine-learning Courses . ACM Transactions on Computing Education (TOCE) , 19 ( 4 ), 32 . Saltz, J., Skirpan, M., Fiesler, C., Gorelick, M., Yeh, T., Heckman, R., & Beard, N. (2019). Integrating Ethics within Machine-learning Courses. ACM Transactions on Computing Education (TOCE), 19(4), 32.","journal-title":"ACM Transactions on Computing Education (TOCE)"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154485"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467605283048"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366994"},{"key":"e_1_3_2_1_18_1","unstructured":"Mozilla Foundation. Responsible Computer Science Challenge https:\/\/foundation.mozilla.org\/en\/initiatives\/responsible-cs\/  Mozilla Foundation. Responsible Computer Science Challenge https:\/\/foundation.mozilla.org\/en\/initiatives\/responsible-cs\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1386\/jicms_00008_7"},{"issue":"304","key":"e_1_3_2_1_20_1","first-page":"112","article-title":"Digital millennium copyright act (DMCA)","volume":"105","author":"Congress U.S.","year":"1998","unstructured":"Congress , U.S. ( 1998 ). Digital millennium copyright act (DMCA) . Public Law , 105 ( 304 ), 112 . Congress, U.S. (1998). Digital millennium copyright act (DMCA). Public Law, 105(304), 112.","journal-title":"Public Law"},{"key":"e_1_3_2_1_21_1","unstructured":"Kehl D. L. & Kessler S. A. Algorithms in the Criminal Justice System: Assessing the Use of Risk Assessments in Sentencing. Algorithms 60(80) 100.  Kehl D. L. & Kessler S. A. Algorithms in the Criminal Justice System: Assessing the Use of Risk Assessments in Sentencing. Algorithms 60(80) 100."},{"key":"e_1_3_2_1_22_1","volume-title":"Predictive policing. Data & Civil Rights: A New Era of Policing And Justice","author":"Brayne S.","year":"2015","unstructured":"Brayne , S. , Rosenblat , A. , & Boyd , D. ( 2015 ). Predictive policing. Data & Civil Rights: A New Era of Policing And Justice . Brayne, S., Rosenblat, A., & Boyd, D. (2015). Predictive policing. Data & Civil Rights: A New Era of Policing And Justice."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Hadden B. R. Tolliver W. Snowden F. & Brown-Manning R. (2016). An authentic discourse: Recentering race and racism as factors that contribute to police violence against unarmed Black or African American men. J. of Human Behavior in the Social Environ 26(3--4) 336--349.  Hadden B. R. Tolliver W. Snowden F. & Brown-Manning R. (2016). An authentic discourse: Recentering race and racism as factors that contribute to police violence against unarmed Black or African American men. J. of Human Behavior in the Social Environ 26(3--4) 336--349.","DOI":"10.1080\/10911359.2015.1129252"},{"key":"e_1_3_2_1_24_1","volume-title":"Dirty Data","author":"Richardson R.","year":"2019","unstructured":"Richardson , R. , Schultz , J. , & Crawford , K. ( 2019 ). Dirty Data , Bad Predictions : How Civil Rights Violations Impact Police Data, Predictive Policing Systems, and Justice. New York University Law Review Online . Richardson, R., Schultz, J., & Crawford, K. (2019). Dirty Data, Bad Predictions: How Civil Rights Violations Impact Police Data, Predictive Policing Systems, and Justice. New York University Law Review Online."},{"key":"e_1_3_2_1_25_1","volume-title":"AI and judicial decision-making. Current Issues in Criminal Justice, 1--18.","author":"McKay C.","year":"2019","unstructured":"McKay , C. ( 2019 ). Predicting risk in criminal procedure: actuarial tools, algorithms , AI and judicial decision-making. Current Issues in Criminal Justice, 1--18. McKay, C. (2019). Predicting risk in criminal procedure: actuarial tools, algorithms, AI and judicial decision-making. Current Issues in Criminal Justice, 1--18."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3294052.3322192"},{"key":"e_1_3_2_1_27_1","volume-title":"Police Are Using Software to Predict Crime: Is It a 'Holy Grail' or Biased against Minorities? The Washington Post, 17","author":"Jouvenal J.","year":"2016","unstructured":"Jouvenal , J. ( 2016 ). Police Are Using Software to Predict Crime: Is It a 'Holy Grail' or Biased against Minorities? The Washington Post, 17 . Jouvenal, J. (2016). Police Are Using Software to Predict Crime: Is It a 'Holy Grail' or Biased against Minorities? The Washington Post, 17."},{"key":"e_1_3_2_1_28_1","volume-title":"Stop-and-Frisk: A Brief History of a Controversial Policing Tool. KQED News","author":"Green M.","year":"2017","unstructured":"Green , M. ( 2017 ). Stop-and-Frisk: A Brief History of a Controversial Policing Tool. KQED News . Green, M. (2017). Stop-and-Frisk: A Brief History of a Controversial Policing Tool. KQED News."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/3002861"},{"key":"e_1_3_2_1_30_1","volume-title":"NYPD Stop and Frisks: 15 Shocking Facts About a Controversial Program? Huffington Post","author":"Matias C.","year":"2012","unstructured":"Matias , C. ( 2012 ). NYPD Stop and Frisks: 15 Shocking Facts About a Controversial Program? Huffington Post . Matias, C. (2012). NYPD Stop and Frisks: 15 Shocking Facts About a Controversial Program? Huffington Post."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/2330443X.2018.1438940"},{"key":"e_1_3_2_1_32_1","volume-title":"The Police Are Using Computer Algorithms to Tell If You're a Threat.? Time Magazine","author":"Ferguson A.","year":"2017","unstructured":"Ferguson , A. ( 2017 ). The Police Are Using Computer Algorithms to Tell If You're a Threat.? Time Magazine . Ferguson, A. (2017). The Police Are Using Computer Algorithms to Tell If You're a Threat.? Time Magazine."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11292-016-9272-0"},{"key":"e_1_3_2_1_34_1","unstructured":"PredPol. Overview. https:\/\/www.predpol.com\/predpol-software-overview\/  PredPol. Overview. https:\/\/www.predpol.com\/predpol-software-overview\/"},{"key":"e_1_3_2_1_35_1","unstructured":"HunchLab. Next Generation Predictive Policing. https:\/\/www.shotspotter.com\/law-enforcement\/patrol-management\/  HunchLab. Next Generation Predictive Policing. https:\/\/www.shotspotter.com\/law-enforcement\/patrol-management\/"},{"key":"e_1_3_2_1_36_1","volume-title":"HunchLab: Under the Hood. https:\/\/cdn.azavea.com\/pdfs\/hunchlab\/HunchLab-Under-the-Hood.pdf","author":"Azavea","year":"2015","unstructured":"Azavea . ( 2015 ). HunchLab: Under the Hood. https:\/\/cdn.azavea.com\/pdfs\/hunchlab\/HunchLab-Under-the-Hood.pdf Azavea. (2015).HunchLab: Under the Hood. https:\/\/cdn.azavea.com\/pdfs\/hunchlab\/HunchLab-Under-the-Hood.pdf"},{"key":"e_1_3_2_1_37_1","volume-title":"PK [2002]. Selected Stories of Philip K. Dick","author":"Dick P.K.","year":"1956","unstructured":"Dick , P.K. ( 1956 ). Minority Report. Fantastic Universe. Collected in Dick , PK [2002]. Selected Stories of Philip K. Dick . Pantheon . New York. Dick, P.K. (1956). Minority Report. Fantastic Universe. Collected in Dick, PK [2002]. Selected Stories of Philip K. Dick. Pantheon. New York."},{"key":"e_1_3_2_1_38_1","volume-title":"Minority Report. Dreamworks. 20th Century Fox","author":"Dick P.K.","year":"2002","unstructured":"Dick , P.K. and Frank , S . ( 2002 ). Minority Report. Dreamworks. 20th Century Fox . Dick, P.K. and Frank, S. (2002). Minority Report. Dreamworks. 20th Century Fox."},{"key":"e_1_3_2_1_39_1","volume-title":"A Ricoeur reader: Reflection and imagination","author":"Ricoeur P.","year":"1991","unstructured":"Ricoeur , P. ( 1991 ). A Ricoeur reader: Reflection and imagination . University of Toronto Press. Ricoeur, P. (1991). A Ricoeur reader: Reflection and imagination. University of Toronto Press."},{"key":"e_1_3_2_1_40_1","unstructured":"International Association of Chiefs of Police (IACP) https:\/\/www.theiacp.org\/  International Association of Chiefs of Police (IACP) https:\/\/www.theiacp.org\/"},{"key":"e_1_3_2_1_41_1","volume-title":"https:\/\/www.theiacp.org\/resources\/law-enforcement-code-of-ethics","author":"Code","year":"1957","unstructured":"IACP Code of Ethics. ( 1957 ). https:\/\/www.theiacp.org\/resources\/law-enforcement-code-of-ethics IACP Code of Ethics. (1957). https:\/\/www.theiacp.org\/resources\/law-enforcement-code-of-ethics"},{"key":"e_1_3_2_1_42_1","volume-title":"Code of Ethics","author":"Association of Computing Machinery (ACM).","year":"2018","unstructured":"Association of Computing Machinery (ACM). Code of Ethics ( 2018 ). https:\/\/www.acm.org\/code-of-ethics Association of Computing Machinery (ACM). Code of Ethics (2018). https:\/\/www.acm.org\/code-of-ethics"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1740-9713.2016.00960.x"},{"key":"e_1_3_2_1_44_1","volume-title":"Pre-Crime Policing: How cops are using algorithms to predict crimes. https:\/\/wired.com\/video\/watch\/pre-crime-policing-how-cops-are-using-algorithms-to-predict-crimes","author":"Wired","year":"2018","unstructured":"Wired . ( 2018 ). Pre-Crime Policing: How cops are using algorithms to predict crimes. https:\/\/wired.com\/video\/watch\/pre-crime-policing-how-cops-are-using-algorithms-to-predict-crimes Wired. (2018). Pre-Crime Policing: How cops are using algorithms to predict crimes. https:\/\/wired.com\/video\/watch\/pre-crime-policing-how-cops-are-using-algorithms-to-predict-crimes"},{"key":"e_1_3_2_1_45_1","volume-title":"How predictive policing software works. https:\/\/youtu.be\/YxvyeaL7NEM","author":"The Verge","year":"2016","unstructured":"The Verge . ( 2016 ). How predictive policing software works. https:\/\/youtu.be\/YxvyeaL7NEM The Verge. (2016). How predictive policing software works. https:\/\/youtu.be\/YxvyeaL7NEM"},{"key":"e_1_3_2_1_46_1","volume-title":"Predictive policing algorithms. https:\/\/nij.ojp.gov\/media\/video\/17641","author":"National Institute of Justice.","year":"2018","unstructured":"National Institute of Justice. ( 2018 ). Predictive policing algorithms. https:\/\/nij.ojp.gov\/media\/video\/17641 National Institute of Justice. (2018). Predictive policing algorithms. https:\/\/nij.ojp.gov\/media\/video\/17641"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.7249\/RR233"},{"key":"e_1_3_2_1_48_1","unstructured":"Upturn. (2014). Chapter 3: Predictive policing: From Neighborhoods to Individuals. Civil Rights Big Data and Our Algorithmic Future. A September 2014 report on social justice and technology. https:\/\/bigdata.fairness.io  Upturn. (2014). Chapter 3: Predictive policing: From Neighborhoods to Individuals. Civil Rights Big Data and Our Algorithmic Future. A September 2014 report on social justice and technology. https:\/\/bigdata.fairness.io"},{"key":"e_1_3_2_1_49_1","volume-title":"Why Oakland Police Turned Down Predictive Policing. Vice. https:\/\/www.vice.com\/en\/article\/ezp8zp\/minority-retort-why-oakland-police-turned-down-predictive-policing","author":"Thomas E.","year":"2016","unstructured":"Thomas , E. ( 2016 ). Why Oakland Police Turned Down Predictive Policing. Vice. https:\/\/www.vice.com\/en\/article\/ezp8zp\/minority-retort-why-oakland-police-turned-down-predictive-policing Thomas, E. (2016). Why Oakland Police Turned Down Predictive Policing. Vice. https:\/\/www.vice.com\/en\/article\/ezp8zp\/minority-retort-why-oakland-police-turned-down-predictive-policing"}],"event":{"name":"SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education","location":"Virtual Event USA","acronym":"SIGCSE '21","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 52nd ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408877.3432468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3408877.3432468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:25Z","timestamp":1750195465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408877.3432468"}},"subtitle":["Teaching Computing Ethics and the Impact of Predictive Algorithms"],"short-title":[],"issued":{"date-parts":[[2021,3,3]]},"references-count":49,"alternative-id":["10.1145\/3408877.3432468","10.1145\/3408877"],"URL":"https:\/\/doi.org\/10.1145\/3408877.3432468","relation":{},"subject":[],"published":{"date-parts":[[2021,3,3]]},"assertion":[{"value":"2021-03-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}