{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:54:36Z","timestamp":1776106476794,"version":"3.50.1"},"reference-count":94,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T00:00:00Z","timestamp":1705104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM J. Comput. Sustain. Soc."],"published-print":{"date-parts":[[2024,3,31]]},"abstract":"<jats:p>Despite the increase in university courses and curricula on the ethics of computing there are few studies about how computer science (CS) programs should account for the diverse ways ethical dilemmas and approaches to ethics are situated in cultural, philosophical, and governance systems, religions, and languages. We draw on the experiences and insights of 46 university educators and practitioners in Latin America, South-Asia, Africa, the Middle East, and Australian First Nations who participated in surveys and interviews. Our modest study seeks to prompt conversation about ethics and computing in the Global Souths and inform revisions to the Association of Computer Machinery's curricular guidelines for the Society, Ethics and Professionalism knowledge area in undergraduate CS programs. Participants describe frictions between static and anticipatory approaches to ethics in globalised regulations and formal codes of ethics and professional conduct and local practices, values, and impacts of technologies in the Global Souths. Codes and regulations are instruments for international control and their gap with local realities can cause harm, despite local efforts to compensate. However, our insights also illustrate opportunities for university teaching to link more closely to priorities, actions, and experiences in the Global Souths and enrich students\u2019 education in the Global North.<\/jats:p>","DOI":"10.1145\/3608113","type":"journal-article","created":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T11:26:49Z","timestamp":1692962809000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Making Ethics at Home in Global CS Education: Provoking Stories from the Souths"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8071-6716","authenticated-orcid":false,"given":"Marisol","family":"Wong-Villacres","sequence":"first","affiliation":[{"name":"Escuela Superior Politecnica del Litoral, Guayaquil, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6682-979X","authenticated-orcid":false,"given":"Cat","family":"Kutay","sequence":"additional","affiliation":[{"name":"Charles Darwin University, Northern Territory, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1691-8807","authenticated-orcid":false,"given":"Shaimaa","family":"Lazem","sequence":"additional","affiliation":[{"name":"City of Scientific Research and Technological applications, Alexandria, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7715-1742","authenticated-orcid":false,"given":"Nova","family":"Ahmed","sequence":"additional","affiliation":[{"name":"North South University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9263-673X","authenticated-orcid":false,"given":"Cristina","family":"Abad","sequence":"additional","affiliation":[{"name":"Escuela Superior Politecnica del Litoral, Guayaquil, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7099-8131","authenticated-orcid":false,"given":"Cesar","family":"Collazos","sequence":"additional","affiliation":[{"name":"Universidad del Cauca, Popayan, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3491-6311","authenticated-orcid":false,"given":"Shady","family":"Elbassuoni","sequence":"additional","affiliation":[{"name":"American University of Beirut, Beirut, Lebanon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0286-8076","authenticated-orcid":false,"given":"Farzana","family":"Islam","sequence":"additional","affiliation":[{"name":"North South University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6269-3664","authenticated-orcid":false,"given":"Deepa","family":"Singh","sequence":"additional","affiliation":[{"name":"University of Delhi, New Delhi, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4994-9458","authenticated-orcid":false,"given":"Tasmiah Tahsin","family":"Mayeesha","sequence":"additional","affiliation":[{"name":"North South University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3987-8975","authenticated-orcid":false,"given":"Martin Mabeifam","family":"Ujakpa","sequence":"additional","affiliation":[{"name":"Ghana Communication Technology University, Accra, Ghana"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6957-3710","authenticated-orcid":false,"given":"Tariq","family":"Zaman","sequence":"additional","affiliation":[{"name":"University of Technology, Sibu, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-2180","authenticated-orcid":false,"given":"Nicola J.","family":"Bidwell","sequence":"additional","affiliation":[{"name":"University of Melbourne and Charles Darwin University, Australia and International University of Management, Namibia"}]}],"member":"320","published-online":{"date-parts":[[2024,1,13]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445897"},{"key":"e_1_3_1_3_2","unstructured":"ABET Accreditation Board for Engineering and Technology Inc. Retrieved from www.abet.org\/accreditation\/accreditation-criteria\/criteria-for-accrediting-computing-programs-2021-2022\/"},{"key":"e_1_3_1_4_2","unstructured":"Association for Computer Machinery. 2021. ACM and IEEE-CS Release Computing Curricula 2020. Global Guidelines for Baccalaureate Degrees in Computing International Effort Is First Update in 15 Years . New York NY. https:\/\/www.acm.org\/media-center\/2021\/march\/computing-curricula-2020"},{"key":"e_1_3_1_5_2","unstructured":"ACM Curricula Recommendations. Retrieved February 2023 from https:\/\/www.acm.org\/education\/curricula-recommendations"},{"key":"e_1_3_1_6_2","unstructured":"ACM Updates Code of Ethics. Retrieved February 2023 from https:\/\/www.acm.org\/articles\/bulletins\/2018\/july\/new-Code-of-ethics-released"},{"key":"e_1_3_1_7_2","unstructured":"ACM. Retrieved from https:\/\/csed.acm.org\/wp-content\/uploads\/2022\/06\/SEP_Version_Alpha-1.pdf"},{"key":"e_1_3_1_8_2","unstructured":"ACM 2020 Curricula Recommendations. Retrieved from https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/cc2020.pdf"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3571811"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3310418"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3538550"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/3378393.3402244","volume-title":"Proceedings of the 3rd Conference on Computing and Sustainable Societies (SIGCAS\u201920)","author":"Al-Ameen Mahdi Nasrullah","year":"2020","unstructured":"Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, M. A. Manazir Ahsan, Priyank Chandra, and Syed Ishtiaque Ahmed 2020. We don't give a second thought before providing our information: Understanding users' perceptions of information collection by apps in Urban Bangladesh. In Proceedings of the 3rd Conference on Computing and Sustainable Societies (SIGCAS\u201920). ACM, 32\u201343."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283460"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594024"},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1145\/2998581.2998622","volume-title":"Proceedings of the First African Conference on Human Computer Interaction","author":"Kagonya Awori","year":"2016","unstructured":"Awori Kagonya, Nicola J. Bidwell, Tigist Sherwaga Hussan, Satinder Gill, and Silvia Lindtner. 2016. Decolonising technology design. In Proceedings of the First African Conference on Human Computer Interaction. ACM, 226\u2013228."},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1007\/s11948-018-0051-3","article-title":"Engineering ethics education: A comparative study of Japan and Malaysia","volume":"25","author":"Balakrishnan Balamuralithara","year":"2019","unstructured":"Balamuralithara Balakrishnan, Fumihiko Tochinai, and Hidekazu Kanemitsu. 2019. Engineering ethics education: A comparative study of Japan and Malaysia. Sci. Eng. Ethics 25 (2019), 1069\u20131083.","journal-title":"Sci. Eng. Ethics"},{"key":"e_1_3_1_18_2","volume-title":"Economic Gender Gap in the Global South: How Institutional Quality Matters","author":"B\u00e1rcena-Mart\u00edn Elena","year":"2020","unstructured":"Elena B\u00e1rcena-Mart\u00edn, Samuel Medina-Claros, and Salvador P\u00e9rez-Moreno. 2020. Economic Gender Gap in the Global South: How Institutional Quality Matters. United Nations University. UNU-MERIT Working Paper Series No. 2020-025. ISSN 1871-9872."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3545947.3573362"},{"issue":"2","key":"e_1_3_1_20_2","first-page":"187","article-title":"Toward an of AI and human rights in Morocco","volume":"1","author":"Bensalah Mounir","year":"2021","unstructured":"Mounir Bensalah. 2021. Toward an of AI and human rights in Morocco. Int. J. Hum. Rights 1, 2 (2021), 187\u2013203.","journal-title":"Int. J. Hum. Rights"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01079-z"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-030-54169-9_6","article-title":"Decolonising in the gaps: Community networks and the identity of African innovation","author":"Bidwell Nicola J.","year":"2021","unstructured":"Nicola J. Bidwell. 2021. Decolonising in the gaps: Community networks and the identity of African innovation. In Re-imagining Communication in Africa and the Caribbean: Global Souths Issues in Media, Culture and Technology. 97\u2013115.","journal-title":"Re-imagining Communication in Africa and the Caribbean: Global Souths Issues in Media, Culture and Technology"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/2930884"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2021.100205"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858313"},{"issue":"6","key":"e_1_3_1_26_2","article-title":"Artificial intelligence: From ethics to law","volume":"44","author":"Carrillo Margarita Robles","year":"2020","unstructured":"Margarita Robles Carrillo. 2020. Artificial intelligence: From ethics to law. Telecommun. Policy 44, 6 (2020), 101937.","journal-title":"Telecommun. Policy"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1177\/0011392116680020"},{"key":"e_1_3_1_28_2","first-page":"1","volume-title":"Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD\u201913)","author":"Dearden Andy","year":"2013","unstructured":"Andy Dearden. 2013. See no evil? Ethics in an interventionist ICTD. In Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD\u201913). 1\u201317."},{"key":"e_1_3_1_29_2","volume-title":"Proceedings of the Tenth International Conference on Information and Communication Technologies and Development","author":"Dearden Andy","year":"2019","unstructured":"Andy Dearden and Dorothea Kleine. 2019. Ethical standards for the ICTD\/ICT4D community: A participatory process and a co-created document. In Proceedings of the Tenth International Conference on Information and Communication Technologies and Development."},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3530190.3534792"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1177\/1350507620974857"},{"key":"e_1_3_1_32_2","unstructured":"Stanford Embedded Ethics Conference. Retrieved from https:\/\/hai.stanford.edu\/events\/embedded-ethics-conference-strategies-teaching-responsible-computing-within-computer-science"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-9113-3"},{"key":"e_1_3_1_34_2","unstructured":"European Parliament and the Commission. Retrieved from http:\/\/ec.europa.eu\/research\/participants\/data\/ref\/h2020\/legal_basis\/fp\/h2020-eu-establact_en.pdf"},{"key":"e_1_3_1_35_2","unstructured":"European Parliament and the Commission. 2020. Digital Services Act\u2013Deepening the Internal Market and Clarifying Responsibilities for Digital Services. Retrieved from https:\/\/ec.europa.eu\/info\/law\/better-regulation\/have-your-say\/initiatives\/12417-Digital-Services-Act-deepening-the-internal-market-and-clarifying-responsibilities-for-digital-services\/F2164158_en"},{"issue":"1","key":"e_1_3_1_36_2","first-page":"79","article-title":"University rankings: A review of methodological flaws","volume":"30","author":"Ashraf Fauzi Muhammad","year":"2020","unstructured":"Muhammad Ashraf Fauzi, Christine Nya-Ling Tan, Mahyuddin Daud, and Muhammad Mukhtar Noor Awalludi. 2020. University rankings: A review of methodological flaws. Iss. Educ. Res. 30, 1 (2020), 79\u201396.","journal-title":"Iss. Educ. Res."},{"key":"e_1_3_1_37_2","volume-title":"Proceedings of the Symposium on Computer Science Education (SIGCSE\u201920)","author":"Fiesler Casey","year":"2020","unstructured":"Casey Fiesler, Natalie Garrett, and Nathan Beard. 2020. What do we teach when we teach tech ethics? A syllabi analysis. In Proceedings of the Symposium on Computer Science Education (SIGCSE\u201920)."},{"key":"e_1_3_1_38_2","article-title":"Reflecting on \u2018Reflective Practice.\u2019","author":"Finlay Linda","year":"2008","unstructured":"Linda Finlay. 2008. Reflecting on \u2018Reflective Practice.\u2019 The Open University. Retrieved from http:\/\/oro.open.ac.uk\/68945\/1\/Finlay-(2008)-Reflecting-on-reflective-practice-PBPL-paper-52.pdf","journal-title":"The Open University"},{"issue":"1","key":"e_1_3_1_39_2","article-title":"Regulating Contested Reality: The Failure of US Encryption Regulations","volume":"7","author":"Foley Jillian","year":"2019","unstructured":"Jillian Foley. 2019. Regulating Contested Reality: The Failure of US Encryption Regulations. Technology's Stories 7, 1 (2019). Retrieved from www.technologystories.org\/regulating-contested-reality\/","journal-title":"Technology's Stories"},{"issue":"2","key":"e_1_3_1_40_2","first-page":"220","article-title":"In-action ethics","volume":"29","year":"2017","unstructured":"Christopher Frauenberger, Marjo Rauhala, and Geraldine Fitzpatrick. 2017. In-action ethics. Interact. Comput. 29, 2 (2017), 220\u2013236.","journal-title":"Interact. Comput."},{"key":"e_1_3_1_41_2","volume-title":"Proceedings of CHI Conference on Human Factors in Computing Systems (CHI\u201919)","author":"Frauenberger Christopher","year":"2019","unstructured":"Christopher Frauenberger and Peter Purgathofer. 2019. Responsible thinking educating future technologists. In Proceedings of CHI Conference on Human Factors in Computing Systems (CHI\u201919)."},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7585.001.0001"},{"key":"e_1_3_1_43_2","unstructured":"European Union. 2022. General Data Protection Regulation (GDPR). Retrieved from https:\/\/gdpr.eu\/"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451526"},{"issue":"3","key":"e_1_3_1_45_2","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1080\/08989621.2014.955607","article-title":"Researcher perceptions of ethical guidelines and codes of conduct","volume":"22","author":"Giorgini Vincent","year":"2015","unstructured":"Vincent Giorgini, Jensen T. Mecca, Carter Gibson, Kelsey Medeiros, Michael D. Mumford, Shane Connelly, and Lynn D. Devenport. 2015. Researcher perceptions of ethical guidelines and codes of conduct. Account. Res. 22, 3 (2015), 123\u2013138.","journal-title":"Account. Res."},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3330794"},{"issue":"4","key":"e_1_3_1_47_2","article-title":"The role of the African value of Ubuntu in global AI inclusion discourse: A normative ethics perspective","volume":"3","author":"Gwagwa Arthur","year":"2022","unstructured":"Arthur Gwagwa, Emre Kazim, and Airlie Hilliard. 2022. The role of the African value of Ubuntu in global AI inclusion discourse: A normative ethics perspective. Patterns 3, 4 (Apr. 2022), 100462.","journal-title":"Patterns"},{"key":"e_1_3_1_48_2","article-title":"Combating misinformation in Bangladesh: Roles and responsibilities as perceived by journalists, fact-checkers, and users","volume":"4","author":"Haque Md Mahfuzul","year":"2020","unstructured":"Md Mahfuzul Haque, Mohammad Yousuf, Ahmed Shatil Alam, Pratyasha Saha, Syed Ishtiaque Ahmed, and Naeemul Hassan. 2020. Combating misinformation in Bangladesh: Roles and responsibilities as perceived by journalists, fact-checkers, and users. Proc. ACM Hum.-Comput. Interact. 4, CSCW2.","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"e_1_3_1_49_2","first-page":"1","article-title":"Governing algorithms from the South: A case study of AI development in Africa","author":"Hassan Yousif","year":"2022","unstructured":"Yousif Hassan. 2022. Governing algorithms from the South: A case study of AI development in Africa. AI Soc. (2022), 1\u201314.","journal-title":"AI Soc"},{"key":"e_1_3_1_50_2","volume-title":"Proceedings of the Conference on Innovation and Technology in Computer Science Education","author":"Hughes Janet","year":"2020","unstructured":"Janet Hughes, Ethan Plaut, Feng Wang, Elizabeth von Briesen, Cheryl Brown, Gerry Cross, Viraj Kumar, and Paul Myers. 2020. Global and local agendas of computing ethics education. In Proceedings of the Conference on Innovation and Technology in Computer Science Education."},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1177\/02610183211009899"},{"key":"e_1_3_1_52_2","first-page":"89","article-title":"Ethical imperialism? Exporting research ethics to the global south","author":"Israel Mark","year":"2017","unstructured":"Mark Israel. 2017. Ethical imperialism? Exporting research ethics to the global south. In The Sage Handbook of Qualitative Research Ethics. 89\u2013102.","journal-title":"The Sage Handbook of Qualitative Research Ethics"},{"key":"e_1_3_1_53_2","first-page":"588","volume-title":"Proceedings of the 17th Conference on Computer Supported Cooperative Work & Social Computing.","author":"Jackson Steven J.","year":"2014","unstructured":"Steven J. Jackson, Tarleton Gillespie, and Sandy Payette. 2014. The policy knot: Re-integrating policy, practice and design in CSCW studies of social computing. In Proceedings of the 17th Conference on Computer Supported Cooperative Work & Social Computing. 588\u2013602."},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12564-021-09688-8"},{"key":"e_1_3_1_55_2","article-title":"Towards an ethics of AI in Africa: Rule of education","author":"Kiemde Sountongnoma Martial Anicet","year":"2022","unstructured":"Sountongnoma Martial Anicet Kiemde, and Ahmed Dooguy Kora. 2022. Towards an ethics of AI in Africa: Rule of education. AI Ethics (2022).","journal-title":"AI Ethics"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3572921.3572954"},{"issue":"12","key":"e_1_3_1_57_2","article-title":"\u201cMust you make an app?\u201d A qualitative exploration of socio-technical challenges and opportunities for designing digital maternal and child health solutions in Soweto, South Africa","volume":"2","author":"Klingberg Sonja","year":"2022","unstructured":"Sonja Klingberg, Molebogeng Motlhatlhedi, Gugulethu Mabena, Tebogo Mooki, Nervo Verdezoto, Melissa Densmore, Shane A. Norris, and CoMaCH network. 2022. \u201cMust you make an app?\u201d A qualitative exploration of socio-technical challenges and opportunities for designing digital maternal and child health solutions in Soweto, South Africa. PLOS Glob. Publ. Health 2, 12 (2022), e0001280.","journal-title":"PLOS Glob. Publ. Health"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1177\/0306396818823172"},{"key":"e_1_3_1_59_2","first-page":"1","article-title":"Challenges and paradoxes in decolonising HCI: A critical discussion","author":"Lazem Shaimaa","year":"2021","unstructured":"Shaimaa Lazem, Danilo Giglitto, Makuochi Samuel Nkwo, Hafeni Mthoko, Jessica Upani, and Anicia Peters. 2021. Challenges and paradoxes in decolonising HCI: A critical discussion. In Computer Supported Cooperative Work. 1\u201338.","journal-title":"Computer Supported Cooperative Work"},{"key":"e_1_3_1_60_2","first-page":"343","article-title":"Giving by taking away: Big tech, data colonialism and the reconfiguration of social good","volume":"15","author":"Magalh\u00e3es Jo\u00e3o Viera","year":"2021","unstructured":"Jo\u00e3o Viera Magalh\u00e3es and Nick Couldry. 2021. Giving by taking away: Big tech, data colonialism and the reconfiguration of social good. Int. J. Commun. 15 (2021), 343\u2013362.","journal-title":"Int. J. Commun."},{"key":"e_1_3_1_61_2","article-title":"A person is a person through other persons. A critical analysis of privacy and culture in Africa","volume":"7","author":"Makulilo Alex B.","year":"2016","unstructured":"Alex B. Makulilo. 2016. A person is a person through other persons. A critical analysis of privacy and culture in Africa. Beijing Law Rev. 7.","journal-title":"Beijing Law Rev."},{"key":"e_1_3_1_62_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-23514-1_1297-1","article-title":"AI and corporate responsibility","author":"Martin Kirsten","year":"2022","unstructured":"Kirsten Martin and Carolina Villegas-Galaviz. 2022. AI and corporate responsibility. In Encyclopedia of Business and Professional Ethics, D. Poff and C. M. Michalos, editors.","journal-title":"Encyclopedia of Business and Professional Ethics"},{"key":"e_1_3_1_63_2","unstructured":"Tahsin Mayeesha Zareen Tasneem Jasmine Jones and Nova Ahmed. 2018. Applying text mining to protest stories as voice against media censorship. arXiv:1812.11430. Retrieved from https:\/\/arxiv.org\/abs\/1812.11430"},{"key":"e_1_3_1_64_2","unstructured":"Sabelo Mhlambi. 2020. From Rationality to Relationality: Ubuntu as an Ethical & Human Rights Framework for Artificial Intelligence Governance. Retrieved January16 2023 from https:\/\/carrcenter.hks.harvard.edu\/files\/cchr\/files\/ccdp_2020-009_sabelo_b.pdf"},{"key":"e_1_3_1_65_2","article-title":"COVID-19 from the margins: Pandemic invisibilities, policies and resistance in the datafied society","author":"Milan Stefania","year":"2021","unstructured":"Stefania Milan, Emiliano Trer\u00e9, and Silvia Masiero. 2021. COVID-19 from the margins: Pandemic invisibilities, policies and resistance in the datafied society. Theory Demand 40.","journal-title":"Theory Demand"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-023-00437-1"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/277351.277355"},{"key":"e_1_3_1_68_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/2702123.2702481","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","author":"Munteanu Cosmin","year":"2015","unstructured":"Cosmin Munteanu, Heather Molyneaux, Wendy Moncur, Mario Romero, Susan O'Donnell, and John Vine. 2015. Situational ethics: Re-thinking approaches to formal ethics requirements for human\u2013computer interaction. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM Press, New York, NY, 105\u2013114."},{"issue":"2","key":"e_1_3_1_69_2","article-title":"Conceptual tools to inform course design and teaching for ethical engineering engagement for diverse student populations","volume":"28","author":"Ngoepe Malebogo N.","year":"2022","unstructured":"Malebogo N. Ngoepe, Kate le Roux, Corrinne B. Shaw, and Brandon Collier-Reed. 2022. Conceptual tools to inform course design and teaching for ethical engineering engagement for diverse student populations. Sci. Eng. Ethics 28, 2 (2022), 20.","journal-title":"Sci. Eng. Ethics"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589256"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1111\/dech.12505"},{"issue":"3","key":"e_1_3_1_72_2","article-title":"Professional conduct in information processing","volume":"11","author":"Parker D.","year":"1968","unstructured":"D. Parker 1968. Professional conduct in information processing. Commun. ACM 11, 3 (1968).","journal-title":"Commun. ACM"},{"key":"e_1_3_1_73_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Pendse Sachin R.","year":"2022","unstructured":"Sachin R. Pendse, Daniel Nkemelu, Nicola J. Bidwell, Sushrut Jadhav, Soumitra Pathare, Munmun De Choudhury, and Neha Kumar. 2022. From treatment to healing: Envisioning a decolonial digital mental health. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201323."},{"key":"e_1_3_1_74_2","volume-title":"Proceedings of the 25th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW'22)","author":"Petelka Justin","year":"2022","unstructured":"Justin Petelka, Elisa Oreglia, Megan Finn, and Janaki Srinivasan. 2022. Generating practices: Investigations into the double embedding of GDPR and data access policies. In Proceedings of the 25th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW'22)."},{"key":"e_1_3_1_75_2","first-page":"1434","volume-title":"Proceedings ACM Conference on Fairness, Accountability, and Transparency","author":"Png Marie-Therese","year":"2022","unstructured":"Marie-Therese Png. 2022. At the tensions of Souths and North: Critical roles of global Souths takeholders in AI Governance. In Proceedings ACM Conference on Fairness, Accountability, and Transparency. 1434\u20131445."},{"key":"e_1_3_1_76_2","first-page":"157","volume-title":"IEEE Global Engineering Education Conference (EDUCON\u201922)","author":"Carolina Rodr\u00edguez-Galv\u00e1n Lilia","year":"2022","unstructured":"Lilia Carolina Rodr\u00edguez-Galv\u00e1n, Eduardo Daniel Ju\u00e1rez, and Jos\u00e9 Manuel Vel\u00e1zquez. 2022. The ethical competency development framework. In IEEE Global Engineering Education Conference (EDUCON\u201922). IEEE, 157\u2013163."},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462113"},{"key":"e_1_3_1_78_2","volume-title":"Proceedings of 20th European Conference on Computer-Supported Cooperative Work","author":"Saha Manika","year":"2022","unstructured":"Manika Saha, Tom Bartindale, Sharifa Sultana, Gillian Oliver, Shakuntala Haraksingh Thilsted, Syed Ishtiaque Ahmed, Delvin Varghese, and Patrick Olivier. 2022. Pictorial consent: Fieldwork reflections. In Proceedings of 20th European Conference on Computer-Supported Cooperative Work. European Society for Socially Embedded Technologies."},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159483"},{"key":"e_1_3_1_80_2","first-page":"127","volume-title":"Proceedings of the 14th USENIX Conference on Usable Privacy and Security (SOUPS'18). USENIX Association.","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchil. 2018. Privacy is not for me, it's for those rich women: Performative privacy practices on mobile phones by women in Souths Asia. In Proceedings of the 14th USENIX Conference on Usable Privacy and Security (SOUPS'18). USENIX Association. 127\u2013142."},{"key":"e_1_3_1_81_2","unstructured":"Rankings and Accountability in Higher Education: Uses and Misuses"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/1094562.1094569"},{"key":"e_1_3_1_83_2","volume-title":"Imperialism in the Twenty-First Century: Globalization, Super-Exploitation, and Capitalism's Final Crisis","author":"Smith John","year":"2016","unstructured":"John Smith. 2016. Imperialism in the Twenty-First Century: Globalization, Super-Exploitation, and Capitalism's Final Crisis."},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460112.3471956"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/2369220.2369264"},{"key":"e_1_3_1_86_2","article-title":"An exposition of the Islamic perspective of reflection: Meaning, entailment and significance","volume":"3","author":"Sulaiman Kabuye Uthman","year":"2021","unstructured":"Kabuye Uthman Sulaiman. 2021. An exposition of the Islamic perspective of reflection: Meaning, entailment and significance. Int. J. Manage. Stud. Soc. Sci. Res. 3 (2021), I4.","journal-title":"Int. J. Manage. Stud. Soc. Sci. Res."},{"key":"e_1_3_1_87_2","volume-title":"Geek Heresy: Rescuing Social Change from the Cult of Technology","author":"Toyama Kentaro","year":"2015","unstructured":"Kentaro Toyama. 2015. Geek Heresy: Rescuing Social Change from the Cult of Technology. PublicAffairs, New York."},{"key":"e_1_3_1_88_2","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-1-4471-6618-4_10","article-title":"Beyond traditional ethics when developing assistive technology for and with Deaf people in developing regions","author":"Tucker William D.","year":"2015","unstructured":"William D. Tucker. 2015. Beyond traditional ethics when developing assistive technology for and with Deaf people in developing regions. In Ethical Engineering for International Development and Environmental Sustainability. 293\u2013323.","journal-title":"Ethical Engineering for International Development and Environmental Sustainability"},{"issue":"1","key":"e_1_3_1_89_2","article-title":"Decolonization is not a metaphor","volume":"1","author":"Tuck Eve","year":"2012","unstructured":"Eve Tuck and K. Wayne Yang. 2012. Decolonization is not a metaphor. Decolon.: Indigen. Educ. Soc. 1, 1 (2012).","journal-title":"Decolon.: Indigen. Educ. Soc."},{"key":"e_1_3_1_90_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-57959-7","volume-title":"The EU General Data Protection Regulation (GDPR): A Practical Guide","author":"Voigt Paul","year":"2017","unstructured":"Paul Voigt and Axel Von dem Bussch. 2017. The EU General Data Protection Regulation (GDPR): A Practical Guide (1st Ed.). Springer International Publishing, Cham.","edition":"1"},{"key":"e_1_3_1_91_2","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1145\/3287324.3287519","volume-title":"Proceedings of the ACM SIGCSE Technical Symposium on Computer Science Education","author":"Wolf Marty J.","year":"2019","unstructured":"Marty J. Wolf, Don Gotterbarn, and Michael S. Kirkpatrick. 2019. ACM code of ethics: Looking back and forging ahead. In Proceedings of the ACM SIGCSE Technical Symposium on Computer Science Education. 801\u2013802."},{"key":"e_1_3_1_92_2","first-page":"519","volume-title":"Conference Companion Publication of the 2020 Computer Supported Cooperative Work and Social Computing","author":"Wong-Villacres Marisol","year":"2020","unstructured":"Marisol Wong-Villacres, Adriana Alvarado Garcia, Juan F. Maestre, Pedro Reynolds-Cu\u00e9llar, Heloisa Candello, Marilyn Iriarte, and Carl DiSalvo. 2020. Decolonizing learning spaces for sociotechnical research and design. In Conference Companion Publication of the 2020 Computer Supported Cooperative Work and Social Computing. 519\u2013526."},{"key":"e_1_3_1_93_2","unstructured":"World Inequality Database. 2020. Global Inequality Data. Retrieved from https:\/\/wid.world\/news-article\/2020-regional-updates\/"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-013-9495-7"},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209877"}],"container-title":["ACM Journal on Computing and Sustainable Societies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3608113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3608113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:32Z","timestamp":1750178792000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3608113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,13]]},"references-count":94,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3,31]]}},"alternative-id":["10.1145\/3608113"],"URL":"https:\/\/doi.org\/10.1145\/3608113","relation":{},"ISSN":["2834-5533"],"issn-type":[{"value":"2834-5533","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,13]]},"assertion":[{"value":"2023-02-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}