{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:06:44Z","timestamp":1776107204502,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T00:00:00Z","timestamp":1629072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1657310; 1909714"],"award-info":[{"award-number":["1657310; 1909714"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,16]]},"DOI":"10.1145\/3446871.3469754","type":"proceedings-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T13:50:22Z","timestamp":1629208222000},"page":"225-238","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Understanding \u201cDark\u201d Design Roles in Computing Education"],"prefix":"10.1145","author":[{"given":"Colin M.","family":"Gray","sequence":"first","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Shruthi Sai","family":"Chivukula","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Kassandra","family":"Melkey","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Rhea","family":"Manocha","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. ABET Accreditation. https:\/\/www.abet.org\/. Accessed: 2021-2-16.  [n.d.]. ABET Accreditation. https:\/\/www.abet.org\/. Accessed: 2021-2-16."},{"key":"e_1_3_2_2_2_1","volume-title":"Dark patterns: User interfaces designed to trick people","unstructured":"2014. Dark patterns: User interfaces designed to trick people . http:\/\/talks.ui-patterns.com\/videos\/dark-patterns-user-interfaces-designed-to-trick-people. http:\/\/talks.ui-patterns.com\/videos\/dark-patterns-user-interfaces-designed-to-trick-people Accessed: 2021-3-26. 2014. Dark patterns: User interfaces designed to trick people. http:\/\/talks.ui-patterns.com\/videos\/dark-patterns-user-interfaces-designed-to-trick-people. http:\/\/talks.ui-patterns.com\/videos\/dark-patterns-user-interfaces-designed-to-trick-people Accessed: 2021-3-26."},{"key":"e_1_3_2_2_3_1","unstructured":"2017. GenderMag Teach. https:\/\/sites.google.com\/site\/gendermagteach\/. Accessed: 2020-12-30.  2017. GenderMag Teach. https:\/\/sites.google.com\/site\/gendermagteach\/. Accessed: 2020-12-30."},{"key":"e_1_3_2_2_4_1","volume-title":"Dark patterns","year":"2021","unstructured":"2020. \u201c Dark patterns \u201d make their appearance in California\u2019s new privacy law. https:\/\/www.jdsupra.com\/legalnews\/dark-patterns-make-their-appearance-in-30570\/. https:\/\/www.jdsupra.com\/legalnews\/dark-patterns-make-their-appearance-in-30570\/ Accessed : 2021 -1-4. 2020. \u201cDark patterns\u201d make their appearance in California\u2019s new privacy law. https:\/\/www.jdsupra.com\/legalnews\/dark-patterns-make-their-appearance-in-30570\/. https:\/\/www.jdsupra.com\/legalnews\/dark-patterns-make-their-appearance-in-30570\/ Accessed: 2021-1-4."},{"key":"e_1_3_2_2_5_1","unstructured":"2020. Dark Patterns: Regulating Digital Design. https:\/\/www.stiftung-nv.de\/en\/publication\/dark-patterns-regulating-digital-design. https:\/\/www.stiftung-nv.de\/en\/publication\/dark-patterns-regulating-digital-design Accessed: 2020-8-2.  2020. Dark Patterns: Regulating Digital Design. https:\/\/www.stiftung-nv.de\/en\/publication\/dark-patterns-regulating-digital-design. https:\/\/www.stiftung-nv.de\/en\/publication\/dark-patterns-regulating-digital-design Accessed: 2020-8-2."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026576421399"},{"key":"e_1_3_2_2_7_1","volume-title":"Critical and cultural approaches to HCI. The SAGE handbook of digital technology research","author":"Bardzell Jeffrey","year":"2014","unstructured":"Jeffrey Bardzell . 2014. Critical and cultural approaches to HCI. The SAGE handbook of digital technology research ( 2014 ), 130\u2013143. Jeffrey Bardzell. 2014. Critical and cultural approaches to HCI. The SAGE handbook of digital technology research (2014), 130\u2013143."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466451"},{"key":"e_1_3_2_2_9_1","unstructured":"Jane Blanken-Webb Imani Palmer Nicholas\u00a0C Burbules Roy\u00a0H Campbell and Masooda Bashir. 2018. A Case Study-based Cybersecurity Ethics Curriculum. In 2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18). usenix.org.  Jane Blanken-Webb Imani Palmer Nicholas\u00a0C Burbules Roy\u00a0H Campbell and Masooda Bashir. 2018. A Case Study-based Cybersecurity Ethics Curriculum. In 2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18). usenix.org."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/2159676X.2019.1628806"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017803"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.18260\/p.24024"},{"key":"e_1_3_2_2_14_1","volume-title":"Design ethics: Reflecting on the ethical dimensions of technology, sustainability, and responsibility in the Anthropocene. Design Studies 54 (Jan","author":"Chan Jeffrey K\u00a0H","year":"2018","unstructured":"Jeffrey K\u00a0H Chan . 2018. Design ethics: Reflecting on the ethical dimensions of technology, sustainability, and responsibility in the Anthropocene. Design Studies 54 (Jan . 2018 ), 184\u2013200. https:\/\/doi.org\/10.1016\/j.destud.2017.09.005 Jeffrey K\u00a0H Chan. 2018. Design ethics: Reflecting on the ethical dimensions of technology, sustainability, and responsibility in the Anthropocene. Design Studies 54 (Jan. 2018), 184\u2013200. https:\/\/doi.org\/10.1016\/j.destud.2017.09.005"},{"key":"e_1_3_2_2_15_1","volume-title":"Co-Evolving Towards Evil Design Outcomes: Mapping Problem and Solution Process Moves. In DRS Biennial Conference Series","author":"Chivukula Shruthi\u00a0Sai","year":"2020","unstructured":"Shruthi\u00a0Sai Chivukula and Colin\u00a0 M Gray . 2020 . Co-Evolving Towards Evil Design Outcomes: Mapping Problem and Solution Process Moves. In DRS Biennial Conference Series ( Brisbane, Australia). Design Research Society. https:\/\/doi.org\/10.21606\/drs. 2020.107 Shruthi\u00a0Sai Chivukula and Colin\u00a0M Gray. 2020. Co-Evolving Towards Evil Design Outcomes: Mapping Problem and Solution Process Moves. In DRS Biennial Conference Series (Brisbane, Australia). Design Research Society. https:\/\/doi.org\/10.21606\/drs.2020.107"},{"key":"e_1_3_2_2_16_1","unstructured":"Shruthi\u00a0Sai Chivukula Ziqing Li Anne\u00a0C. Pivonka Jingning Chen and Colin\u00a0M. Gray. 2021. Surveying the Landscape of Ethics-Focused Design Methods. arxiv:2102.08909\u00a0[cs.HC]  Shruthi\u00a0Sai Chivukula Ziqing Li Anne\u00a0C. Pivonka Jingning Chen and Colin\u00a0M. Gray. 2021. Surveying the Landscape of Ethics-Focused Design Methods. arxiv:2102.08909\u00a0[cs.HC]"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Shruthi\u00a0S Chivukula Chris Watkins Lucca McKay and Colin\u00a0M Gray. 2019. \u201cNothing Comes Before Profit\u201d: Asshole Design in the Wild. In CHI EA \u201919: CHI\u201919 Extended Abstracts on Human Factors in Computing Systems. LBW1314. https:\/\/doi.org\/10.1145\/3290607.3312863  Shruthi\u00a0S Chivukula Chris Watkins Lucca McKay and Colin\u00a0M Gray. 2019. \u201cNothing Comes Before Profit\u201d: Asshole Design in the Wild. In CHI EA \u201919: CHI\u201919 Extended Abstracts on Human Factors in Computing Systems. LBW1314. https:\/\/doi.org\/10.1145\/3290607.3312863","DOI":"10.1145\/3290607.3312863"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12255.001.0001"},{"key":"e_1_3_2_2_19_1","volume-title":"Integrating ethics in design through the value-sensitive design approach. Science and engineering ethics 12, 4 (Oct","author":"Cummings L","year":"2006","unstructured":"Mary\u00a0 L Cummings . 2006. Integrating ethics in design through the value-sensitive design approach. Science and engineering ethics 12, 4 (Oct . 2006 ), 701\u2013715. https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/17199145 Mary\u00a0L Cummings. 2006. Integrating ethics in design through the value-sensitive design approach. Science and engineering ethics 12, 4 (Oct. 2006), 701\u2013715. https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/17199145"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901861"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366994"},{"key":"e_1_3_2_2_22_1","unstructured":"Trine Falbe Kim Andersen and Martin\u00a0Michael Frederiksen. 2017. White Hat UX. Smashing Media AG. https:\/\/play.google.com\/store\/books\/details?id=b0EiygEACAAJ  Trine Falbe Kim Andersen and Martin\u00a0Michael Frederiksen. 2017. White Hat UX. Smashing Media AG. https:\/\/play.google.com\/store\/books\/details?id=b0EiygEACAAJ"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432510"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366825"},{"key":"e_1_3_2_2_25_1","volume-title":"Values at Play in Digital Games","author":"Flanagan Mary","unstructured":"Mary Flanagan and Helen Nissenbaum . 2014. Values at Play in Digital Games . MIT Press . https:\/\/doi.org\/10.1177\/1461444816631742 Mary Flanagan and Helen Nissenbaum. 2014. Values at Play in Digital Games. MIT Press. https:\/\/doi.org\/10.1177\/1461444816631742"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541948.1542005"},{"key":"e_1_3_2_2_27_1","volume-title":"Value Sensitive Design: Shaping Technology with Moral Imagination","author":"Friedman Batya","unstructured":"Batya Friedman and David\u00a0 G Hendry . 2019. Value Sensitive Design: Shaping Technology with Moral Imagination . MIT Press . Batya Friedman and David\u00a0G Hendry. 2019. Value Sensitive Design: Shaping Technology with Moral Imagination. MIT Press."},{"key":"e_1_3_2_2_28_1","volume-title":"Value sensitive design: Theory and methods","author":"Friedman Batya","unstructured":"Batya Friedman , Peter Kahn , and Alan Borning . 2002. Value sensitive design: Theory and methods . University of Washington technical report02\u201312 (2002) . Batya Friedman, Peter Kahn, and Alan Borning. 2002. Value sensitive design: Theory and methods. University of Washington technical report02\u201312 (2002)."},{"key":"e_1_3_2_2_29_1","volume-title":"Early engagement and new technologies: Opening up the laboratory, Neelke Doorn, Daan Schuurbiers, Ibo van\u00a0de Poel, and Michael\u00a0E Gorman (Eds.)","author":"Friedman Batya","unstructured":"Batya Friedman , Peter\u00a0 H Kahn , Alan Borning , and Alina Huldtgren . 2013. Value Sensitive Design and Information Systems . In Early engagement and new technologies: Opening up the laboratory, Neelke Doorn, Daan Schuurbiers, Ibo van\u00a0de Poel, and Michael\u00a0E Gorman (Eds.) . Springer Netherlands , Dordrecht , 55\u201395. https:\/\/doi.org\/10.1007\/978-94-007-7844-3_4 Batya Friedman, Peter\u00a0H Kahn, Alan Borning, and Alina Huldtgren. 2013. Value Sensitive Design and Information Systems. In Early engagement and new technologies: Opening up the laboratory, Neelke Doorn, Daan Schuurbiers, Ibo van\u00a0de Poel, and Michael\u00a0E Gorman (Eds.). Springer Netherlands, Dordrecht, 55\u201395. https:\/\/doi.org\/10.1007\/978-94-007-7844-3_4"},{"key":"e_1_3_2_2_30_1","volume-title":"Co-designing Resources for Ethics Education in HCI. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery","author":"Pillai Ajit","year":"2021","unstructured":"Ajit G.\u00a0 Pillai , A Baki\u00a0Kocaballi , Tuck Wah\u00a0Leong , Rafael A.\u00a0 Calvo , Nassim Parvin , Katie Shilton , Jenny Waycott , Casey Fiesler , John C.\u00a0 Havens , and Naseem Ahmadpour . 2021 . Co-designing Resources for Ethics Education in HCI. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery , New York, NY, USA, 1\u20135. https:\/\/doi.org\/10.1145\/3411763.3441349 Ajit G.\u00a0Pillai, A Baki\u00a0Kocaballi, Tuck Wah\u00a0Leong, Rafael A.\u00a0Calvo, Nassim Parvin, Katie Shilton, Jenny Waycott, Casey Fiesler, John C.\u00a0Havens, and Naseem Ahmadpour. 2021. Co-designing Resources for Ethics Education in HCI. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1\u20135. https:\/\/doi.org\/10.1145\/3411763.3441349"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375868"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3372638"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0142-694X(97)00015-X"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Paul Gra\u00dfl Hanna Schraffenberger Frederik\u00a0Zuiderveen Borgesius and Moniek Buijzen. 2021. Dark and Bright Patterns in Cookie Consent Requests. 38\u00a0pages. https:\/\/doi.org\/10.33621\/jdsr.v3i1.54  Paul Gra\u00dfl Hanna Schraffenberger Frederik\u00a0Zuiderveen Borgesius and Moniek Buijzen. 2021. Dark and Bright Patterns in Cookie Consent Requests. 38\u00a0pages. https:\/\/doi.org\/10.33621\/jdsr.v3i1.54","DOI":"10.33621\/jdsr.v3i1.54"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.18260\/p.24208"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300408"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449144"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the Sixth Australasian Conference on Computing Education -","volume":"30","author":"Greening Tony","year":"2004","unstructured":"Tony Greening , Judy Kay , and Bob Kummerfeld . 2004 . Integrating ethical content into computing curricula . In Proceedings of the Sixth Australasian Conference on Computing Education - Volume 30 (Dunedin, New Zealand) (ACE \u201904). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 91\u201399. Tony Greening, Judy Kay, and Bob Kummerfeld. 2004. Integrating ethical content into computing curricula. In Proceedings of the Sixth Australasian Conference on Computing Education - Volume 30 (Dunedin, New Zealand) (ACE \u201904). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 91\u201399."},{"key":"e_1_3_2_2_40_1","volume-title":"Making epistemological trouble: Third-paradigm HCI as successor science. Interacting with computers 23, 5 (Sept","author":"Harrison Steve","year":"2011","unstructured":"Steve Harrison , Phoebe Sengers , and Deborah Tatar . 2011. Making epistemological trouble: Third-paradigm HCI as successor science. Interacting with computers 23, 5 (Sept . 2011 ), 385\u2013392. https:\/\/doi.org\/10.1016\/j.intcom.2011.03.005 Steve Harrison, Phoebe Sengers, and Deborah Tatar. 2011. Making epistemological trouble: Third-paradigm HCI as successor science. Interacting with computers 23, 5 (Sept. 2011), 385\u2013392. https:\/\/doi.org\/10.1016\/j.intcom.2011.03.005"},{"key":"e_1_3_2_2_41_1","volume-title":"A Systematic Literature Review of US Engineering Ethics Interventions. Science and engineering ethics 24, 2 (April","author":"Hess L","year":"2018","unstructured":"Justin\u00a0 L Hess and Grant Fore . 2018. A Systematic Literature Review of US Engineering Ethics Interventions. Science and engineering ethics 24, 2 (April 2018 ), 551\u2013583. https:\/\/doi.org\/10.1007\/s11948-017-9910-6 Justin\u00a0L Hess and Grant Fore. 2018. A Systematic Literature Review of US Engineering Ethics Interventions. Science and engineering ethics 24, 2 (April 2018), 551\u2013583. https:\/\/doi.org\/10.1007\/s11948-017-9910-6"},{"key":"e_1_3_2_2_42_1","volume-title":"CHI \u201914 Extended Abstracts on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI EA \u201914)","author":"Koepfler A","unstructured":"Jes\u00a0 A Koepfler , Luke Stark , Paul Dourish , Phoebe Sengers , and Katie Shilton . 2014. Values & Design in HCI Education . In CHI \u201914 Extended Abstracts on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI EA \u201914) . ACM , New York, NY, USA , 127\u2013130. https:\/\/doi.org\/10.1145\/2559206.2559231 Jes\u00a0A Koepfler, Luke Stark, Paul Dourish, Phoebe Sengers, and Katie Shilton. 2014. Values & Design in HCI Education. In CHI \u201914 Extended Abstracts on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI EA \u201914). ACM, New York, NY, USA, 127\u2013130. https:\/\/doi.org\/10.1145\/2559206.2559231"},{"key":"e_1_3_2_2_43_1","volume-title":"Proc. Rom. Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci.","author":"Lorents A\u00a0C","year":"2006","unstructured":"A\u00a0C Lorents , J\u00a0M Maris , J\u00a0N Morgan , and others. 2006 . Ethics of computer use: A survey of student attitudes . Proc. Rom. Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci. (2006). A\u00a0C Lorents, J\u00a0M Maris, J\u00a0N Morgan, and others. 2006. Ethics of computer use: A survey of student attitudes. Proc. Rom. Acad. Ser. A Math. Phys. Tech. Sci. Inf. Sci. (2006)."},{"key":"e_1_3_2_2_44_1","volume-title":"Normative Considerations, and Measurement Methods. (Jan.","author":"Mathur Arunesh","year":"2021","unstructured":"Arunesh Mathur , Jonathan Mayer , and Mihir Kshirsagar . 2021. What Makes a Dark Pattern... Dark? Design Attributes , Normative Considerations, and Measurement Methods. (Jan. 2021 ). https:\/\/doi.org\/10.1145\/3411764.3445610 arxiv:2101.04843\u00a0[cs.HC] Arunesh Mathur, Jonathan Mayer, and Mihir Kshirsagar. 2021. What Makes a Dark Pattern... Dark? Design Attributes, Normative Considerations, and Measurement Methods. (Jan. 2021). https:\/\/doi.org\/10.1145\/3411764.3445610 arxiv:2101.04843\u00a0[cs.HC]"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264833"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/0899340880010104"},{"key":"e_1_3_2_2_47_1","first-page":"2","article-title":"Dark Patterns: Past, Present, and Future","volume":"18","author":"Narayanan Arvind","year":"2020","unstructured":"Arvind Narayanan , Arunesh Mathur , Marshini Chetty , and Mihir Kshirsagar . 2020 . Dark Patterns: Past, Present, and Future . Queueing Systems. Theory and Applications 18 , 2 (April 2020), 67\u201392. https:\/\/doi.org\/10.1145\/3400899.3400901 Arvind Narayanan, Arunesh Mathur, Marshini Chetty, and Mihir Kshirsagar. 2020. Dark Patterns: Past, Present, and Future. Queueing Systems. Theory and Applications 18, 2 (April 2020), 67\u201392. https:\/\/doi.org\/10.1145\/3400899.3400901","journal-title":"Queueing Systems. Theory and Applications"},{"key":"e_1_3_2_2_48_1","volume-title":"The Design of Everyday Things: Revised and Expanded Edition","author":"Norman Don","unstructured":"Don Norman . 2013. The Design of Everyday Things: Revised and Expanded Edition . Basic Books . Don Norman. 2013. The Design of Everyday Things: Revised and Expanded Edition. Basic Books."},{"key":"e_1_3_2_2_49_1","volume-title":"Qualitative Research & Evaluation Methods: Integrating Theory and Practice","author":"Patton Michael\u00a0Quinn","unstructured":"Michael\u00a0Quinn Patton . 2014. Qualitative Research & Evaluation Methods: Integrating Theory and Practice . SAGE Publications . Michael\u00a0Quinn Patton. 2014. Qualitative Research & Evaluation Methods: Integrating Theory and Practice. SAGE Publications."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341164"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376251"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243912436985"},{"key":"e_1_3_2_2_53_1","volume-title":"Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation. Sci. Eng. Ethics (July","author":"Shilton Katie","year":"2020","unstructured":"Katie Shilton , Donal Heidenblad , Adam Porter , Susan Winter , and Mary Kendig . 2020. Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation. Sci. Eng. Ethics (July 2020 ). https:\/\/doi.org\/10.1007\/s11948-020-00250-0 Katie Shilton, Donal Heidenblad, Adam Porter, Susan Winter, and Mary Kendig. 2020. Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation. Sci. Eng. Ethics (July 2020). https:\/\/doi.org\/10.1007\/s11948-020-00250-0"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159573"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159574"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3439648"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-013-9498-4"},{"key":"e_1_3_2_2_58_1","unstructured":"Bimlesh Wadhwa Eng\u00a0Lieh Ouh and Benjamin Gan. 2020. How to and how much? Teaching ethics in an interaction design course. (2020).  Bimlesh Wadhwa Eng\u00a0Lieh Ouh and Benjamin Gan. 2020. How to and how much? Teaching ethics in an interaction design course. (2020)."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287519"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134746"}],"event":{"name":"ICER 2021: ACM Conference on International Computing Education Research","location":"Virtual Event USA","acronym":"ICER 2021","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 17th ACM Conference on International Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446871.3469754","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3446871.3469754","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3446871.3469754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:32Z","timestamp":1750193252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446871.3469754"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,16]]},"references-count":60,"alternative-id":["10.1145\/3446871.3469754","10.1145\/3446871"],"URL":"https:\/\/doi.org\/10.1145\/3446871.3469754","relation":{},"subject":[],"published":{"date-parts":[[2021,8,16]]},"assertion":[{"value":"2021-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}