{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:30:24Z","timestamp":1766493024544,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3727967.3756832","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T11:53:17Z","timestamp":1766490797000},"page":"213-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Replication: A Pedagogical Tool for Teaching Ethical Practices to Future Software Engineers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7519-3503","authenticated-orcid":false,"given":"Gouri","family":"Ginde","sequence":"first","affiliation":[{"name":"UCalgary, Calgary, Canada"}]}],"member":"320","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"[n. d.]. IEEE Computer Society. 2023. IEEE-CS\/ACM Joint Task Force on Software Engineering Ethics and Professional Practices. https:\/\/www.computer.org\/. Accessed: 2024-10-8."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884629"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Diana Bairaktarova and Anna Woodcock. 2015. Engineering ethics education: Aligning practice and outcomes. IEEE Communications Magazine 53 11 (2015) 18\u201322.","DOI":"10.1109\/MCOM.2015.7321965"},{"key":"e_1_3_3_2_5_2","unstructured":"Brian Berenbach and Manfred Broy. 2009. Professional and Ethical Dilemmas in Software Engineering. IEEE Computer Society (2009) 25\u201330."},{"key":"e_1_3_3_2_6_2","volume-title":"2023 IEEE 31st International Requirements Engineering Conference Workshops (REW)","author":"Bhatt Meet","year":"2025","unstructured":"Meet Bhatt, Nic Boilard, Muhammad\u00a0Rehan Chaudhary, Cole Thompson, Jacob Idoko, Aakash Sorathiya, and Gouri Ginde. 2025. Automatic Classification of User Requirements from Online Feedback\u2013A Replication Study. In 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW). IEEE."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134288"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Noelle Brown Benjamin Xie Ella Sarder Casey Fiesler and Eliane\u00a0S Wiese. 2024. Teaching ethics in computing: a systematic literature review of ACM computer science education publications. ACM Transactions on Computing Education 24 1 (2024) 1\u201336.","DOI":"10.1145\/3634685"},{"key":"e_1_3_3_2_9_2","unstructured":"Engineers Canada. 2024. The Washington Accord. https:\/\/engineerscanada.ca\/accreditation\/the-washington-accord. [Accessed 09-10-2024]."},{"key":"e_1_3_3_2_10_2","first-page":"1","volume-title":"1st inter. workshop on replication in empirical software engineering","author":"Carver Jeffrey\u00a0C","year":"2010","unstructured":"Jeffrey\u00a0C Carver. 2010. Towards reporting guidelines for experimental replications: A proposal. In 1st inter. workshop on replication in empirical software engineering , Vol.\u00a01. 1\u20134."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639201"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Yogesh\u00a0K Dwivedi et\u00a0al. 2023. \u201cSo what if ChatGPT wrote it?\u201d Multidisciplinary perspectives on opportunities challenges and implications of generative conversational AI for research practice and policy. International Journal of Information Management 71 (2023) 102642.","DOI":"10.1016\/j.ijinfomgt.2023.102642"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Gouri Ginde. 2025. So what if I used GenAI? - Legal Implications of Using GenAI in Software Engineering Research. Proceedings of the 2025 IEEE\/ACM First International Conference on AI Foundation Models and Software Engineering.","DOI":"10.1109\/Forge66646.2025.00034"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Gouri Ginde and Emily Marasco. 2025. Can We Leverage Replication Studies to Instil Ethical Practices in Future Software Engineers? (April 2025). \"https:\/\/conf.researchr.org\/details\/icse-2025\/cseet-2025-papers\/50\/Can-We-Leverage-Replication-Studies-to-Instil-Ethical-Practices-in-Future-Software-En\"Poster presented at IEEE Conference on Software Engineering Education and Training (CSEE&T)) - ICSE 2025.","DOI":"10.1145\/3727967.3756832"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Chetna Gupta and Varun Gupta. 2024. C4 Skills in the Engineering Graduate: A Study to Align Software Engineering Education With Market-Driven Software Industry Needs. IEEE Transactions on Education 67 1 (2024) 31\u201343. 10.1109\/TE.2023.3301625","DOI":"10.1109\/TE.2023.3301625"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Ronald\u00a0S King and James\u00a0H Nolen. 1985. A computer ethics course. ACM SIGCSE Bulletin 17 1 (1985) 99\u2013104.","DOI":"10.1145\/323275.323297"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/349316.349558"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Yotam Lurie and Shlomo Mark. 2016. Professional ethics of software engineers: An ethical framework. Science and engineering ethics 22 (2016) 417\u2013434.","DOI":"10.1007\/s11948-015-9665-x"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Rafael Mi\u00f1ano \u00c1ngel Uruburu Ana Moreno-Romero and Diego P\u00e9rez-L\u00f3pez. 2017. Strategies for teaching professional ethics to IT engineering degree students and evaluating the result. Science and engineering ethics 23 (2017) 263\u2013286.","DOI":"10.1007\/s11948-015-9746-x"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3639474.3640082"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/RESER.2013.17"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSEET49119.2020.9206235"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/REW57809.2023.00022"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Stefan Schmidt. 2009. Shall we really do it again? The powerful concept of replication is neglected in the social sciences. Review of general psychology 13 2 (2009) 90\u2013100.","DOI":"10.1037\/a0015108"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Andreas Schwab et\u00a0al. 2023. How replication studies can improve doctoral student education. Journal of Management Scientific Reports 1 1 (2023) 18\u201341.","DOI":"10.1177\/27550311231156880"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2002.1166920"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Forrest\u00a0J Shull et\u00a0al. 2008. The role of replications in empirical software engineering. Empirical SE 13 (2008) 211\u2013218.","DOI":"10.1007\/s10664-008-9060-1"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Manuel Sojer et\u00a0al. 2014. Understanding the drivers of unethical programming behavior: The inappropriate reuse of internet-accessible code. Journal of Management Information Systems 31 3 (2014) 287\u2013325.","DOI":"10.1080\/07421222.2014.995563"},{"key":"e_1_3_3_2_29_2","unstructured":"Patrick Wessa. 2009. How Reproducible Research Leads to Non-Rote Learning within Socially Constructivist Statistics Education. Electronic Journal of e-Learning 7 2 (2009) 173\u2013182."},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11932-4_55"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15712-8_28"}],"event":{"name":"EASE Companion '25: Evaluation and Assessment in Software Engineering","acronym":"EASE Companion '25","location":"Istanbul Turkiye"},"container-title":["Proceedings of the 2025 29th International Conference on Evaluation and Assessment in Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727967.3756832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:07:06Z","timestamp":1766491626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727967.3756832"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":30,"alternative-id":["10.1145\/3727967.3756832","10.1145\/3727967"],"URL":"https:\/\/doi.org\/10.1145\/3727967.3756832","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}