{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T03:15:03Z","timestamp":1773717303891,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T00:00:00Z","timestamp":1723420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF CAREER","award":["AWD-20-09-0068"],"award-info":[{"award-number":["AWD-20-09-0068"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,12]]},"DOI":"10.1145\/3632620.3671109","type":"proceedings-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T12:47:29Z","timestamp":1722948449000},"page":"517-526","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["\"It's Not Exactly Meant to Be Realistic\": Student Perspectives on the Role of Ethics In Computing Group Projects"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4013-7442","authenticated-orcid":false,"given":"Michelle","family":"Tran","sequence":"first","affiliation":[{"name":"University of Colorado Boulder, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8743-4201","authenticated-orcid":false,"given":"Casey","family":"Fiesler","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432536"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1961574.1961586"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--28516"},{"key":"e_1_3_2_1_4_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501945"},{"key":"e_1_3_2_1_6_1","volume-title":"Looks. Proceedings of the ACM ICER International Computing Education Research Conference","author":"Brown Noelle","year":"2023","unstructured":"Noelle Brown, Korrian South, Suresh Venkatasubramanian, and Eliane\u00a0S. Wiese. 2023. Designing Ethically-Integrated Assignments: It\u2019s Harder Than it Looks. Proceedings of the ACM ICER International Computing Education Research Conference (2023)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501385.3543978"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3634685"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569753"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432456"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157248"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432510"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the ACM SIGCSE Technical Symposium on Computer Science Education. 289\u2013295","author":"Fiesler Casey","year":"2020","unstructured":"Casey Fiesler, Natalie Garrett, and Nathan Beard. 2020. What do we teach when we teach tech ethics? A syllabi analysis. In Proceedings of the ACM SIGCSE Technical Symposium on Computer Science Education. 289\u2013295."},{"key":"e_1_3_2_1_14_1","unstructured":"Markkula\u00a0Center for Applied\u00a0Ethics. [n. d.]. Ethics Cases. https:\/\/www.scu.edu\/ethics\/ethics-resources\/ethics-cases\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Association for Computing\u00a0Machinery. [n. d.]. ACM Code of Ethics - Case Studies. https:\/\/www.acm.org\/code-of-ethics\/case-studies"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458723"},{"key":"e_1_3_2_1_17_1","volume-title":"Introducing the (World\u2019s First) Ethical Operating System. Omidyar Network","author":"Goldman Paula","year":"2018","unstructured":"Paula Goldman and Raina Kumra. 2018. Introducing the (World\u2019s First) Ethical Operating System. Omidyar Network (2018). https:\/\/medium.com\/omidyar-network\/introducing-the-worlds-first-ethical-operating-system-7acc4abc2bfa"},{"key":"e_1_3_2_1_18_1","volume-title":"Experiential Learning: Exploring Nuances When Making Ethical Decisions in a Capstone Design Course. Biomedical Engineering Education","author":"Golecki Holly","year":"2023","unstructured":"Holly Golecki and Joe Bradley. 2023. Experiential Learning: Exploring Nuances When Making Ethical Decisions in a Capstone Design Course. Biomedical Engineering Education (2023), 1\u20138."},{"key":"e_1_3_2_1_19_1","volume-title":"The ethical wisdom of AI developers. AI and Ethics","author":"Griffin A","year":"2024","unstructured":"Tricia\u00a0A Griffin, Brian\u00a0P Green, and Jos\u00a0VM Welie. 2024. The ethical wisdom of AI developers. AI and Ethics (2024), 1\u201311."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330794"},{"key":"e_1_3_2_1_21_1","volume-title":"The Dataset Nutrition Label. Data Protection and Privacy 12, 12","author":"Holland Sarah","year":"2020","unstructured":"Sarah Holland, Ahmed Hosny, Sarah Newman, Joshua Joseph, and Kasia Chmielinski. 2020. The Dataset Nutrition Label. Data Protection and Privacy 12, 12 (2020)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630834"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499407"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569846"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499394"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the ACM SIGCSE Technical Symposium on Computer Science Education-Volume 1. 836\u2013842","author":"Klassen Shamika","year":"2022","unstructured":"Shamika Klassen and Casey Fiesler. 2022. \" Run Wild a Little With Your Imagination\" Ethical Speculation in Computing Education with Black Mirror. In Proceedings of the ACM SIGCSE Technical Symposium on Computer Science Education-Volume 1. 836\u2013842."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3424000"},{"key":"e_1_3_2_1_28_1","volume-title":"We\u2019re missing a moral framework of justice in artificial intelligence. The Oxford handbook of ethics of AI","author":"Le\u00a0Bui Matthew","year":"2020","unstructured":"Matthew Le\u00a0Bui and Safiya\u00a0Umoja Noble. 2020. We\u2019re missing a moral framework of justice in artificial intelligence. The Oxford handbook of ethics of AI (2020), 163\u2013179."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582580.3582643"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499291"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569844"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376445"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469130"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1353\/sor.2019.0022"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157173"},{"key":"e_1_3_2_1_36_1","unstructured":"Mozilla. [n. d.]. https:\/\/foundation.mozilla.org\/en\/what-we-fund\/awards\/teaching-responsible-computing-playbook\/. https:\/\/foundation.mozilla.org\/en\/what-we-fund\/awards\/teaching-responsible-computing-playbook\/"},{"key":"e_1_3_2_1_37_1","unstructured":"MIT Schwarzman\u00a0College of Computing. [n. d.]. Case Studies in Social and Ethical Responsibilities of Computing. https:\/\/www.scu.edu\/ethics\/ethics-resources\/ethics-cases\/"},{"key":"e_1_3_2_1_38_1","volume-title":"A Realist Review of Undergraduate Student Attitudes towards Ethical Interventions in Technical Computing Courses. ACM Transactions on Computing Education","author":"Padiyath Aadarsh","year":"2024","unstructured":"Aadarsh Padiyath. 2024. A Realist Review of Undergraduate Student Attitudes towards Ethical Interventions in Technical Computing Courses. ACM Transactions on Computing Education (2024)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372873"},{"key":"e_1_3_2_1_40_1","volume-title":"Entering the Techlash: Student Perspectives on Ethics in Tech Job Searches. In Companion Publication of the ACM CSCW Conference on Computer Supported Cooperative Work and Social Computing. 85\u201388","author":"Sarder Ella","year":"2022","unstructured":"Ella Sarder and Casey Fiesler. 2022. Entering the Techlash: Student Perspectives on Ethics in Tech Job Searches. In Companion Publication of the ACM CSCW Conference on Computer Supported Cooperative Work and Social Computing. 85\u201388."},{"key":"e_1_3_2_1_41_1","unstructured":"Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences. Teachers college press."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432525"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159573"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533122"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569855"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449253"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372782.3406277"},{"key":"e_1_3_2_1_48_1","volume-title":"It\u2019s about power: What ethical concerns do software engineers have, and what do they (feel they can) do about them?Proceedings of the ACM FAccT Conference on Fairness, Accountability, and Transparency","author":"Widder David\u00a0Gray","year":"2023","unstructured":"David\u00a0Gray Widder, Derrick Zhen, Laura Dabbish, and James Herbsleb. 2023. It\u2019s about power: What ethical concerns do software engineers have, and what do they (feel they can) do about them?Proceedings of the ACM FAccT Conference on Fairness, Accountability, and Transparency (2023), 467\u2013479."}],"event":{"name":"ICER 2024: ACM Conference on International Computing Education Research","location":"Melbourne VIC Australia","acronym":"ICER 2024","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2024 ACM Conference on International Computing Education Research - Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632620.3671109","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632620.3671109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:34:04Z","timestamp":1755909244000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632620.3671109"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,12]]},"references-count":48,"alternative-id":["10.1145\/3632620.3671109","10.1145\/3632620"],"URL":"https:\/\/doi.org\/10.1145\/3632620.3671109","relation":{},"subject":[],"published":{"date-parts":[[2024,8,12]]},"assertion":[{"value":"2024-08-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}