{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:09:07Z","timestamp":1756310947214,"version":"3.41.0"},"reference-count":3,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2023,5]]},"abstract":"<jats:p>Exploring the intersection of legal compliance and ethical judgment.<\/jats:p>","DOI":"10.1145\/3587825","type":"journal-article","created":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T14:34:35Z","timestamp":1682087675000},"page":"18-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Do the Right Thing"],"prefix":"10.1145","volume":"66","author":[{"given":"Kendra","family":"Albert","sequence":"first","affiliation":[{"name":"Harvard Law School, Cambridge, MA, USA"}]},{"given":"James","family":"Grimmelmann","sequence":"additional","affiliation":[{"name":"Cornell University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Galanter M. Why the haves come out ahead: Speculations on the limits of legal change 10.2307\/3053023","DOI":"10.2307\/3053023"},{"key":"e_1_2_1_2_1","first-page":"26","volume":"101","author":"Hollinger R.C.","year":"1988","unstructured":"Hollinger, R.C. and Lanza-Kaduce, L. The process of criminalization: The case of computer crime laws. Criminology 101, 26 (1988).","journal-title":"Criminology"},{"key":"e_1_2_1_3_1","first-page":"372","author":"Sellars A.","year":"2018","unstructured":"Sellars, A. Twenty years of Web scraping and the Computer Fraud and Abuse Act. B.U. J. Sci. and Tech. L. 372 (2018).","journal-title":"Computer Fraud and Abuse Act. B.U. J. Sci. and Tech. L."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587825","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:27Z","timestamp":1750183707000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587825"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,21]]},"references-count":3,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10.1145\/3587825"],"URL":"https:\/\/doi.org\/10.1145\/3587825","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2023,4,21]]},"assertion":[{"value":"2023-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}