{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:44:55Z","timestamp":1770223495156,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T00:00:00Z","timestamp":1576627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FCT \u00f0 Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","award":["Project Scope: UID\/CEC\/00319\/2019"],"award-info":[{"award-number":["Project Scope: UID\/CEC\/00319\/2019"]}]},{"name":"US National Science Foundation","award":["DGE-1433736 and 1922169"],"award-info":[{"award-number":["DGE-1433736 and 1922169"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,18]]},"DOI":"10.1145\/3344429.3372503","type":"proceedings-article","created":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T14:31:43Z","timestamp":1580826703000},"page":"73-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["An Empirical Approach to Understanding Data Science and Engineering Education"],"prefix":"10.1145","author":[{"given":"Rajendra K.","family":"Raj","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Allen","family":"Parrish","sequence":"additional","affiliation":[{"name":"Mississippi State University, Mississippi State, MS, USA"}]},{"given":"John","family":"Impagliazzo","sequence":"additional","affiliation":[{"name":"Hofstra University, Hempstead, NY, USA"}]},{"given":"Carol J.","family":"Romanowski","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Sherif G.","family":"Aly","sequence":"additional","affiliation":[{"name":"The American University in Cairo, Cairo, Egypt"}]},{"given":"Casey C.","family":"Bennett","sequence":"additional","affiliation":[{"name":"DePaul University, Chicago, IL, USA"}]},{"given":"Karen C.","family":"Davis","sequence":"additional","affiliation":[{"name":"Miami University, Oxford, OH, USA"}]},{"given":"Andrew","family":"McGettrick","sequence":"additional","affiliation":[{"name":"Strathclyde University, Strathclyde, United Kingdom"}]},{"given":"Teresa Susana Mendes","family":"Pereira","sequence":"additional","affiliation":[{"name":"Inst. Polit\u00e9cnico de Viana do Castelo, Viana do Castelo, Portugal"}]},{"given":"Lovisa","family":"Sundin","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,12,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ABET Inc. 2017. Criteria for Accrediting Computing Programs. Effective for Review During the 2017--18 Accreditation Cycle. http:\/\/www.abet.org\/wp-content\/uploads\/2016\/12\/C001--17--18-CAC-Criteria-10--29--16--1.pdf  ABET Inc. 2017. Criteria for Accrediting Computing Programs. Effective for Review During the 2017--18 Accreditation Cycle. http:\/\/www.abet.org\/wp-content\/uploads\/2016\/12\/C001--17--18-CAC-Criteria-10--29--16--1.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"Accenture Labs. 2016. Building Digital Trust: The Role of Data Ethics in the Digital Age. https:\/\/www.accenture.com\/us-en\/insight-data-ethics . Accessed: 2019-06--29.  Accenture Labs. 2016. Building Digital Trust: The Role of Data Ethics in the Digital Age. https:\/\/www.accenture.com\/us-en\/insight-data-ethics . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_3_1","unstructured":"Saeed Aghabozorgi. 2016. Data Scientist vs Data Engineer What's the Difference? https:\/\/cognitiveclass.ai\/blog\/data-scientist-vs-data-engineer\/. Accessed: 2019-06--15.  Saeed Aghabozorgi. 2016. Data Scientist vs Data Engineer What's the Difference? https:\/\/cognitiveclass.ai\/blog\/data-scientist-vs-data-engineer\/. Accessed: 2019-06--15."},{"key":"e_1_3_2_1_4_1","volume-title":"Introduction to Machine Learning","author":"Alpaydin Ethem","unstructured":"Ethem Alpaydin . 2014. Introduction to Machine Learning , Third Edition .The MIT Press , Cambridge, MA . Ethem Alpaydin. 2014. Introduction to Machine Learning, Third Edition .The MIT Press, Cambridge, MA."},{"key":"e_1_3_2_1_5_1","unstructured":"American Statistical Association. 2018. Ethical Guidelines for Statistical Practice. https:\/\/www.amstat.org\/ASA\/Your-Career\/Ethical-Guidelines-for-Statistical-Practice.aspx . Accessed: 2019-06--29.  American Statistical Association. 2018. Ethical Guidelines for Statistical Practice. https:\/\/www.amstat.org\/ASA\/Your-Career\/Ethical-Guidelines-for-Statistical-Practice.aspx . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_6_1","unstructured":"Data Science Association. 2013. Data Science Code of Professional Conduct. https:\/\/www.datascienceassn.org\/code-of-conduct.html . Accessed: 2019-06--29.  Data Science Association. 2013. Data Science Code of Professional Conduct. https:\/\/www.datascienceassn.org\/code-of-conduct.html . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_7_1","unstructured":"Association for Computing Machinery. 2018. ACM Code of Ethics and Professional Conduct . https:\/\/www.acm.org\/code-of-ethics . Accessed: 2019-06--29.  Association for Computing Machinery. 2018. ACM Code of Ethics and Professional Conduct . https:\/\/www.acm.org\/code-of-ethics . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_8_1","volume-title":"Network and Distributed Systems Security Symposium","volume":"9","author":"Bayer Ulrich","year":"2009","unstructured":"Ulrich Bayer , Paolo Milani Comparetti , Clemens Hlauschek , Christopher Kruegel , and Engin Kirda . 2009 . Scalable, behavior-based malware clustering . In Network and Distributed Systems Security Symposium , Vol. 9 . Citeseer, Internet Society, San Diego, 8--11. Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, and Engin Kirda. 2009. Scalable, behavior-based malware clustering. In Network and Distributed Systems Security Symposium, Vol. 9. Citeseer, Internet Society, San Diego, 8--11."},{"key":"e_1_3_2_1_9_1","volume-title":"Data Mining and Electronic Health Records: Selecting Optimal Clinical Treatments in Practice. In IEEE International Conference on Data Mining (ICDM). IEEE","author":"Bennett Casey","year":"2011","unstructured":"Casey Bennett and Thomas Doub . 2011 . Data Mining and Electronic Health Records: Selecting Optimal Clinical Treatments in Practice. In IEEE International Conference on Data Mining (ICDM). IEEE , Vancouver, Canada, 313--318. Casey Bennett and Thomas Doub. 2011. Data Mining and Electronic Health Records: Selecting Optimal Clinical Treatments in Practice. In IEEE International Conference on Data Mining (ICDM). IEEE, Vancouver, Canada, 313--318."},{"key":"e_1_3_2_1_10_1","unstructured":"Francine Berman Rob Rutenbar Henrik Christensen Susan Davidson Deborah Estrin Michael Franklin Brent Hailpern Margaret Martonosi Padma Raghavan Victoria Stodden and Alex Szalay. 2016. Realizing the Potential of Data Science: Final Report from the National Science Foundation Computer and Information Science and Engineering Advisory Committee Data Science Working Group. https:\/\/www.nsf.gov\/cise\/ac-data-science-report\/CISEACDataScienceReport1.19.17.pdf .  Francine Berman Rob Rutenbar Henrik Christensen Susan Davidson Deborah Estrin Michael Franklin Brent Hailpern Margaret Martonosi Padma Raghavan Victoria Stodden and Alex Szalay. 2016. Realizing the Potential of Data Science: Final Report from the National Science Foundation Computer and Information Science and Engineering Advisory Committee Data Science Working Group. https:\/\/www.nsf.gov\/cise\/ac-data-science-report\/CISEACDataScienceReport1.19.17.pdf ."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.05.042"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.513"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154485"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.138"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jacr.2018.01.029"},{"key":"e_1_3_2_1_16_1","volume-title":"The Constructivist Paradigm and Some Implications for Science Content and Pedagogy","author":"Carr Malcolm","unstructured":"Malcolm Carr , Miles Barker , Beverley Bell , Fred Biddulph , Alister Jones , Valda Kirkwood , John Pearson , and David Symington . 2013. The Constructivist Paradigm and Some Implications for Science Content and Pedagogy . Taylor and Francis Group , London, Chapter The Content of Science: A Constructivist Approach to its Teaching and Learning, 159--172. Malcolm Carr, Miles Barker, Beverley Bell, Fred Biddulph, Alister Jones, Valda Kirkwood, John Pearson, and David Symington. 2013. The Constructivist Paradigm and Some Implications for Science Content and Pedagogy. Taylor and Francis Group, London, Chapter The Content of Science: A Constructivist Approach to its Teaching and Learning, 159--172."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_18_1","unstructured":"Cleverism. 2019. Objectives and Responsibilities of the Data Engineer. https:\/\/www.cleverism.com\/job-profiles\/data-engineer\/. Accessed: 2019-09-05.  Cleverism. 2019. Objectives and Responsibilities of the Data Engineer. https:\/\/www.cleverism.com\/job-profiles\/data-engineer\/. Accessed: 2019-09-05."},{"key":"e_1_3_2_1_19_1","unstructured":"Data Science Community. 2017. College and University Data Science Degrees. http:\/\/datascience.community\/colleges . Accessed: 2019-07--16.  Data Science Community. 2017. College and University Data Science Degrees. http:\/\/datascience.community\/colleges . Accessed: 2019-07--16."},{"key":"e_1_3_2_1_20_1","unstructured":"Coursera. 2019. Data Science Specialization. https:\/\/www.coursera.org\/specializations\/jhu-data-science? . Accessed: 2019-07--14.  Coursera. 2019. Data Science Specialization. https:\/\/www.coursera.org\/specializations\/jhu-data-science? . Accessed: 2019-07--14."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287522"},{"key":"e_1_3_2_1_22_1","unstructured":"Data4Democracy. 2019. Ethics Resources. https:\/\/github.com\/Data4Democracy\/ethics-resources . Accessed: 2019-06--29.  Data4Democracy. 2019. Ethics Resources. https:\/\/github.com\/Data4Democracy\/ethics-resources . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_23_1","unstructured":"DataEthics. 2017. Data Ethics Principles. https:\/\/dataethics.eu\/data-ethics-principles\/ . Accessed: 2019-06--29.  DataEthics. 2017. Data Ethics Principles. https:\/\/dataethics.eu\/data-ethics-principles\/ . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_24_1","first-page":"70","article-title":"Data Scientist: The Sexiest Job of the 21st Century","volume":"90","author":"Davenport Thomas H","year":"2012","unstructured":"Thomas H Davenport and D J Patil . 2012 . Data Scientist: The Sexiest Job of the 21st Century . Harvard Business Review , Vol. 90 , 5 (2012), 70 -- 76 . Thomas H Davenport and D J Patil. 2012. Data Scientist: The Sexiest Job of the 21st Century. Harvard Business Review , Vol. 90, 5 (2012), 70--76.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-060116-053930"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2016.0107"},{"key":"e_1_3_2_1_27_1","unstructured":"K. Eric Drexler. 2013. The difference between science and engineering. https:\/\/fs.blog\/2013\/07\/the-difference-between-science-and-engineering\/ . Accessed: 2019-09-09.  K. Eric Drexler. 2013. The difference between science and engineering. https:\/\/fs.blog\/2013\/07\/the-difference-between-science-and-engineering\/ . Accessed: 2019-09-09."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1093\/jnci\/djk018"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637751.2017.1375130"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002510"},{"key":"e_1_3_2_1_31_1","unstructured":"Casey Fiesler. 2018. Tech Ethics Curricula: A Collection of Syllabi . https:\/\/medium.com\/@cfiesler\/tech-ethics-curricula-a-collection-of-syllabi-3eedfb76be18.  Casey Fiesler. 2018. Tech Ethics Curricula: A Collection of Syllabi . https:\/\/medium.com\/@cfiesler\/tech-ethics-curricula-a-collection-of-syllabi-3eedfb76be18."},{"key":"e_1_3_2_1_32_1","unstructured":"Principles for Digital Development. 2017. Principles. https:\/\/digitalprinciples.org\/principles\/ . Accessed: 2019-06--29.  Principles for Digital Development. 2017. Principles. https:\/\/digitalprinciples.org\/principles\/ . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_33_1","unstructured":"Alan Fritzler. 2018. An Ethical Checklist for Data Science. https:\/\/dssg.uchicago.edu\/2015\/09\/18\/an-ethical-checklist-for-data-science\/. Accessed: 2019-06--29.  Alan Fritzler. 2018. An Ethical Checklist for Data Science. https:\/\/dssg.uchicago.edu\/2015\/09\/18\/an-ethical-checklist-for-data-science\/. Accessed: 2019-06--29."},{"key":"e_1_3_2_1_34_1","unstructured":"Vincent Granville. 2017. Difference between Machine Learning Data Science AI Deep Learning and Statistics. https:\/\/www.datasciencecentral.com\/profiles\/blogs\/difference-between-machine-learning-data-science-ai-deep-learning . Accessed: 2019-06--18.  Vincent Granville. 2017. Difference between Machine Learning Data Science AI Deep Learning and Statistics. https:\/\/www.datasciencecentral.com\/profiles\/blogs\/difference-between-machine-learning-data-science-ai-deep-learning . Accessed: 2019-06--18."},{"key":"e_1_3_2_1_35_1","unstructured":"Hillary Green-Lerman. 2018. What is Data Engineering? https:\/\/www.datacamp.com\/community\/blog\/data-engineering . Accessed: 2019-09-05.  Hillary Green-Lerman. 2018. What is Data Engineering? https:\/\/www.datacamp.com\/community\/blog\/data-engineering . Accessed: 2019-09-05."},{"key":"e_1_3_2_1_36_1","unstructured":"Peter Grindrod and Juan Bernabe Moreno. 2018. Code of Conduct for Professional Data Scientists. http:\/\/www.code-of-ethics.org\/ . Accessed: 2019-06--29.  Peter Grindrod and Juan Bernabe Moreno. 2018. Code of Conduct for Professional Data Scientists. http:\/\/www.code-of-ethics.org\/ . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_37_1","volume-title":"Data Science from Scratch: First Principles with Python .O'Relly Media","author":"Grus Joel","unstructured":"Joel Grus . 2015. Data Science from Scratch: First Principles with Python .O'Relly Media , Sebastopol, CA . http:\/\/my.safaribooksonline.com\/97814919-01427 Joel Grus. 2015. Data Science from Scratch: First Principles with Python .O'Relly Media, Sebastopol, CA. http:\/\/my.safaribooksonline.com\/97814919-01427"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2015.1077729"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2017.1356747"},{"key":"e_1_3_2_1_40_1","first-page":"413","article-title":"Deconstructing Thinking Like a Lawyer: Analyzing the Cognitive Components of the Analytical Mind","volume":"29","author":"Natt Larry O.","year":"2007","unstructured":"Larry O. Natt Gantt II. 2007 . Deconstructing Thinking Like a Lawyer: Analyzing the Cognitive Components of the Analytical Mind . Campbell Law Review , Vol. 29 (2007), 413 . Larry O. Natt Gantt II. 2007. Deconstructing Thinking Like a Lawyer: Analyzing the Cognitive Components of the Analytical Mind . Campbell Law Review , Vol. 29 (2007), 413.","journal-title":"Campbell Law Review"},{"key":"e_1_3_2_1_41_1","unstructured":"International Data Science in Schools Project. 2019. IDSSP: the International Data Science in Schools Project: Abbreviated Topics List. http:\/\/www.idssp.org\/files\/IDSSP_DraftFramework_AbbreviatedLists.pdf . Draft Curriculum Framework.  International Data Science in Schools Project. 2019. IDSSP: the International Data Science in Schools Project: Abbreviated Topics List. http:\/\/www.idssp.org\/files\/IDSSP_DraftFramework_AbbreviatedLists.pdf . Draft Curriculum Framework."},{"key":"e_1_3_2_1_42_1","unstructured":"Indeed. 2019. https:\/\/www.indeed.co.uk) .  Indeed. 2019. https:\/\/www.indeed.co.uk) ."},{"key":"e_1_3_2_1_43_1","unstructured":"JetBrains. 2018. Data Science Survey . https:\/\/www.jetbrains.com\/research\/data-science-2018\/. Accessed: 2019-07--14.  JetBrains. 2018. Data Science Survey . https:\/\/www.jetbrains.com\/research\/data-science-2018\/. Accessed: 2019-07--14."},{"key":"e_1_3_2_1_44_1","volume-title":"Kaggle Machine Learning & Data Science Survey","year":"2017","unstructured":"Kaggle. 2017. Kaggle Machine Learning & Data Science Survey 2017 . https:\/\/www.kaggle.com\/kaggle\/kaggle-survey-2017 . Accessed : 2019-07--14. Kaggle. 2017. Kaggle Machine Learning & Data Science Survey 2017. https:\/\/www.kaggle.com\/kaggle\/kaggle-survey-2017 . Accessed: 2019-07--14."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2017.1398107"},{"key":"e_1_3_2_1_46_1","unstructured":"Vlado Kevs elj Evangelos Milios Andrew Tuttle Singer Wang and Roger Zhang. 2006. DalTREC 2005 Spam Track: Spam Filtering using N-gram-based Techniques.  Vlado Kevs elj Evangelos Milios Andrew Tuttle Singer Wang and Roger Zhang. 2006. DalTREC 2005 Spam Track: Spam Filtering using N-gram-based Techniques."},{"key":"e_1_3_2_1_47_1","unstructured":"Oleksii Kharkovyna. 2019. Who Is a Data Engineer & How to Become a Data Engineer? https:\/\/towardsdatascience.com\/who-is-a-data-engineer-how-to-become-a-data-engineer-1167ddc12811 . Accessed: 2019-09-09.  Oleksii Kharkovyna. 2019. Who Is a Data Engineer & How to Become a Data Engineer? https:\/\/towardsdatascience.com\/who-is-a-data-engineer-how-to-become-a-data-engineer-1167ddc12811 . Accessed: 2019-09-09."},{"key":"e_1_3_2_1_48_1","first-page":"2721","article-title":"Learning to detect and classify malicious executables in the wild","volume":"7","author":"Zico Kolter J","year":"2006","unstructured":"J Zico Kolter and Marcus A Maloof . 2006 . Learning to detect and classify malicious executables in the wild . Journal of Machine Learning Research , Vol. 7 , Dec (2006), 2721 -- 2744 . J Zico Kolter and Marcus A Maloof. 2006. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research , Vol. 7, Dec (2006), 2721--2744.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_49_1","unstructured":"Cassie Korzyrkov. 2018. Top 10 roles in AI and data science. https:\/\/www.kdnuggets.com\/2018\/08\/top-10-roles-ai-data-science.html . Accessed: 2019-06--18.  Cassie Korzyrkov. 2018. Top 10 roles in AI and data science. https:\/\/www.kdnuggets.com\/2018\/08\/top-10-roles-ai-data-science.html . Accessed: 2019-06--18."},{"key":"e_1_3_2_1_50_1","first-page":"381","article-title":"Beyond thinking like a lawyer and the traditional legal paradigm: Toward a comprehensive view of legal education","volume":"86","author":"Krannich Jess M","year":"2008","unstructured":"Jess M Krannich , James R Holbrook , and Julie J McAdams . 2008 . Beyond thinking like a lawyer and the traditional legal paradigm: Toward a comprehensive view of legal education . Denv. UL Rev. , Vol. 86 (2008), 381 . Jess M Krannich, James R Holbrook, and Julie J McAdams. 2008. Beyond thinking like a lawyer and the traditional legal paradigm: Toward a comprehensive view of legal education. Denv. UL Rev. , Vol. 86 (2008), 381.","journal-title":"Denv. UL Rev."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03521-0_2"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 7th Conference on USENIX Security Symposium -","volume":"7","author":"Lee Wenke","unstructured":"Wenke Lee and Salvatore J. Stolfo . 1998. Data Mining Approaches for Intrusion Detection . In Proceedings of the 7th Conference on USENIX Security Symposium - Volume 7 (SSYM'98). USENIX Association, Berkeley, CA, USA, 6--6. http:\/\/dl.acm.org\/citation.cfm?id=1267549.1267555 Wenke Lee and Salvatore J. Stolfo. 1998. Data Mining Approaches for Intrusion Detection. In Proceedings of the 7th Conference on USENIX Security Symposium - Volume 7 (SSYM'98). USENIX Association, Berkeley, CA, USA, 6--6. http:\/\/dl.acm.org\/citation.cfm?id=1267549.1267555"},{"key":"e_1_3_2_1_53_1","unstructured":"Yaniv Leven. 2017. Data Engineer Vs Data Scientist. https:\/\/blog.panoply.io\/what-is-the-difference-between-a-data-engineer-and-a-data-scientist . Accessed: 2010-06--15.  Yaniv Leven. 2017. Data Engineer Vs Data Scientist. https:\/\/blog.panoply.io\/what-is-the-difference-between-a-data-engineer-and-a-data-scientist . Accessed: 2010-06--15."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/10691898.2018.1564638"},{"key":"e_1_3_2_1_55_1","volume-title":"WordNet: An electronic lexical database","author":"Miller George A","unstructured":"George A Miller . 1998. WordNet: An electronic lexical database . MIT Press, Cambridge , MA. George A Miller. 1998. WordNet: An electronic lexical database .MIT Press, Cambridge, MA."},{"key":"e_1_3_2_1_56_1","volume-title":"The Popularity of Data Science Software","author":"Muenchen Robert","unstructured":"Robert Muenchen . 2019. The Popularity of Data Science Software . http:\/\/r4stats.com\/articles\/popularity\/. Accessed: 2019-04-04. Robert Muenchen. 2019. The Popularity of Data Science Software. http:\/\/r4stats.com\/articles\/popularity\/. Accessed: 2019-04-04."},{"key":"e_1_3_2_1_57_1","volume-title":"Data Science for Undergraduates: Opportunities and Options","author":"Engineering National Academies of Sciences and Medicine. 2018.","unstructured":"Engineering National Academies of Sciences and Medicine. 2018. Data Science for Undergraduates: Opportunities and Options . The National Academies Press , Washington, DC . https:\/\/doi.org\/10.17226\/25104 10.17226\/25104 Engineering National Academies of Sciences and Medicine. 2018. Data Science for Undergraduates: Opportunities and Options .The National Academies Press, Washington, DC. https:\/\/doi.org\/10.17226\/25104"},{"key":"e_1_3_2_1_58_1","unstructured":"Institute of Electrical and Electronics Engineers. 2014. IEEE Code of Ethics. https:\/\/www.ieee.org\/about\/corporate\/governance\/p7--8.html . Accessed: 2019-06--29.  Institute of Electrical and Electronics Engineers. 2014. IEEE Code of Ethics. https:\/\/www.ieee.org\/about\/corporate\/governance\/p7--8.html . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_59_1","volume-title":"The Construction of Reality in the Child","author":"Piaget Jean","unstructured":"Jean Piaget . 1954. The Construction of Reality in the Child . Basic Books , New York . Jean Piaget. 1954. The Construction of Reality in the Child. Basic Books, New York."},{"key":"e_1_3_2_1_60_1","unstructured":"The Linux Foundation Projects. 2019. Data Values and Principles. https:\/\/datapractices.org\/manifesto\/ . Accessed: 2019-06--29.  The Linux Foundation Projects. 2019. Data Values and Principles. https:\/\/datapractices.org\/manifesto\/ . Accessed: 2019-06--29."},{"key":"e_1_3_2_1_61_1","volume-title":"Teresa Susana Mendes Pereira, and Lovisa Sundin","author":"Raj Rajendra K.","year":"2019","unstructured":"Rajendra K. Raj , Allen Parrish , John Impagliazzo , Carol J. Romanowski , Sherif G. Aly , Casey C. Bennett , Karen C. Davis , Andrew McGettrick , Teresa Susana Mendes Pereira, and Lovisa Sundin . 2019 . A Listing of Data Science and Engineering (DSE) Textbooks, circa July 2019 . Technical Report. The American University in Cairo. https:\/\/bit.ly\/2lUhQJh. Rajendra K. Raj, Allen Parrish, John Impagliazzo, Carol J. Romanowski, Sherif G. Aly, Casey C. Bennett, Karen C. Davis, Andrew McGettrick, Teresa Susana Mendes Pereira, and Lovisa Sundin. 2019. A Listing of Data Science and Engineering (DSE) Textbooks, circa July 2019 . Technical Report. The American University in Cairo. https:\/\/bit.ly\/2lUhQJh."},{"key":"e_1_3_2_1_62_1","unstructured":"David Reinsel John Gantz and John Rydning. 2018. The Digitization of the World from Edge to Core. https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf . Accessed: 2019--11--11.  David Reinsel John Gantz and John Rydning. 2018. The Digitization of the World from Edge to Core. https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf . Accessed: 2019--11--11."},{"key":"e_1_3_2_1_63_1","unstructured":"Karl Rexer. 2017. A Decade of Surveying Analytic Professionals: 2017 Survey Highlights . http:\/\/www2.cs.uh.edu\/ ceick\/UDM\/RexerDSSOV17.pdf . Accessed: 2019-07--14.  Karl Rexer. 2017. A Decade of Surveying Analytic Professionals: 2017 Survey Highlights . http:\/\/www2.cs.uh.edu\/ ceick\/UDM\/RexerDSSOV17.pdf . Accessed: 2019-07--14."},{"key":"e_1_3_2_1_64_1","volume-title":"Constructivist pedagogy. Teachers college record","author":"Richardson Virginia","year":"2003","unstructured":"Virginia Richardson . 2003. Constructivist pedagogy. Teachers college record , Vol. 105 , 9 ( 2003 ), 1623--1640. Virginia Richardson. 2003. Constructivist pedagogy. Teachers college record , Vol. 105, 9 (2003), 1623--1640."},{"key":"e_1_3_2_1_65_1","unstructured":"Margaret Rouse. 2016. Definition: data engineer. https:\/\/searchdatamanagement.techtarget.com\/definition\/data-engineer . Accessed: 2019-09-05.  Margaret Rouse. 2016. Definition: data engineer. https:\/\/searchdatamanagement.techtarget.com\/definition\/data-engineer . Accessed: 2019-09-05."},{"key":"e_1_3_2_1_66_1","unstructured":"Margaret Rouse. 2019. Data Analytics: definition. https:\/\/searchdatamanagement.techtarget.com\/definition\/data-analytics . Accessed: 2019-09-09.  Margaret Rouse. 2019. Data Analytics: definition. https:\/\/searchdatamanagement.techtarget.com\/definition\/data-analytics . Accessed: 2019-09-09."},{"key":"e_1_3_2_1_67_1","unstructured":"Aravind Sekar. 2018. What Is The Difference Between Data Science And Machine Learning? https:\/\/analyticstraining.com\/what-is-the-difference-between-data-science-and-machine-learning . Accessed: 2019-05--25.  Aravind Sekar. 2018. What Is The Difference Between Data Science And Machine Learning? https:\/\/analyticstraining.com\/what-is-the-difference-between-data-science-and-machine-learning . Accessed: 2019-05--25."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124706.1121482"},{"key":"e_1_3_2_1_69_1","volume-title":"Reconstructing mathematics pedagogy from a constructivist perspective","author":"Simon Martin A","unstructured":"Martin A Simon . 1993. Reconstructing mathematics pedagogy from a constructivist perspective . ERIC , New York . Martin A Simon. 1993. Reconstructing mathematics pedagogy from a constructivist perspective. ERIC, New York."},{"key":"e_1_3_2_1_70_1","unstructured":"Stack Exchange. 2019. Cross Validated . https:\/\/stats.stackexchange.com\/.  Stack Exchange. 2019. Cross Validated . https:\/\/stats.stackexchange.com\/."},{"key":"e_1_3_2_1_71_1","unstructured":"Studyportals B.V. 2019. Studyportals . https:\/\/www.studyportals.com\/.  Studyportals B.V. 2019. Studyportals . https:\/\/www.studyportals.com\/."},{"key":"e_1_3_2_1_72_1","unstructured":"Brian Suda. 2018. 2017 Data Science Salary Survey. https:\/\/learning.oreilly.com\/library\/view\/2017-data-science\/9781491997079\/ch04.html . Accessed: 2019-07--14.  Brian Suda. 2018. 2017 Data Science Salary Survey. https:\/\/learning.oreilly.com\/library\/view\/2017-data-science\/9781491997079\/ch04.html . Accessed: 2019-07--14."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"e_1_3_2_1_74_1","unstructured":"techopedia. 2019 a. Definition - What does Data Engineer mean? https:\/\/www.techopedia.com\/definition\/33707\/data-engineer . Accessed: 2019-09-09.  techopedia. 2019 a. Definition - What does Data Engineer mean? https:\/\/www.techopedia.com\/definition\/33707\/data-engineer . Accessed: 2019-09-09."},{"key":"e_1_3_2_1_75_1","unstructured":"techopedia. 2019 b. Definition - What is Data Science? https:\/\/www.techopedia.com\/definition\/30202\/data-science . Accessed: 2019-09-09.  techopedia. 2019 b. Definition - What is Data Science? https:\/\/www.techopedia.com\/definition\/30202\/data-science . Accessed: 2019-09-09."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.3390\/educsci7010002"},{"key":"e_1_3_2_1_77_1","volume-title":"Ethical Reasoning in Big Data: An Exploratory Analysis","author":"Tractenberg Rochelle E.","unstructured":"Rochelle E. Tractenberg . 2016. Institutionalizing Ethical Reasoning: Integrating the ASA's Ethical Guidelines for Professional Practice into Course, Program, and Curriculum . In Ethical Reasoning in Big Data: An Exploratory Analysis , Jeff Collmann and Sorin Adam Matei (Eds.). Springer , Berlin . Rochelle E. Tractenberg. 2016. Institutionalizing Ethical Reasoning: Integrating the ASA's Ethical Guidelines for Professional Practice into Course, Program, and Curriculum. In Ethical Reasoning in Big Data: An Exploratory Analysis, Jeff Collmann and Sorin Adam Matei (Eds.). Springer, Berlin."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/02602938.2011.596923"},{"key":"e_1_3_2_1_79_1","article-title":"The Future of Data Analysis","volume":"33","author":"Tukey John W.","year":"1962","unstructured":"John W. Tukey . 1962 . The Future of Data Analysis . The Annals of Mathematical Statistics , Vol. 33 , 1 (03 1962), 1--67. https:\/\/doi.org\/10.1214\/aoms\/1177704711 10.1214\/aoms John W. Tukey. 1962. The Future of Data Analysis. The Annals of Mathematical Statistics , Vol. 33, 1 (03 1962), 1--67. https:\/\/doi.org\/10.1214\/aoms\/1177704711","journal-title":"The Annals of Mathematical Statistics"},{"key":"e_1_3_2_1_80_1","unstructured":"Nanyang Technological University. 2018. Bachelor of Science in Data Science and Artificial Intelligence . Brochure. http:\/\/scse.ntu.edu.sg\/Programmes\/CurrentStudents\/Undergraduate\/Documents\/2018\/DSAIbrochure.pdf  Nanyang Technological University. 2018. Bachelor of Science in Data Science and Artificial Intelligence . Brochure. http:\/\/scse.ntu.edu.sg\/Programmes\/CurrentStudents\/Undergraduate\/Documents\/2018\/DSAIbrochure.pdf"},{"key":"e_1_3_2_1_81_1","unstructured":"Iliya Valchanov. 2018. Data Science versus Machine Learning versus Data Analytics versus Business Analytics. https:\/\/www.kdnuggets.com\/2018\/05\/data-science-machine-learning-business-analytics.html . Accessed: 2019-06-01.  Iliya Valchanov. 2018. Data Science versus Machine Learning versus Data Analytics versus Business Analytics. https:\/\/www.kdnuggets.com\/2018\/05\/data-science-machine-learning-business-analytics.html . Accessed: 2019-06-01."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.121"},{"key":"e_1_3_2_1_83_1","volume-title":"Computer Security -- ESORICS 2012 ,","author":"Verma Rakesh","unstructured":"Rakesh Verma , Narasimha Shashidhar , and Nabil Hossain . 2012. Phishing email detection the natural language way . In Computer Security -- ESORICS 2012 , , Sara Foresti, Moti Yung, and Fabio Martinelli (Eds.). Springer , Berlin, Heidelberg , 824--841. Rakesh Verma, Narasimha Shashidhar, and Nabil Hossain. 2012. Phishing email detection the natural language way. In Computer Security -- ESORICS 2012 , , Sara Foresti, Moti Yung, and Fabio Martinelli (Eds.). Springer, Berlin, Heidelberg, 824--841."},{"key":"e_1_3_2_1_84_1","volume-title":"Mind in society: The development of higher psychological processes","author":"Vygotsky Lev Semenovich","unstructured":"Lev Semenovich Vygotsky . 1980. Mind in society: The development of higher psychological processes . Harvard University Press , Cambridge, MA . Lev Semenovich Vygotsky. 1980. Mind in society: The development of higher psychological processes .Harvard University Press, Cambridge, MA."},{"key":"e_1_3_2_1_85_1","unstructured":"Jeannette M Wing Vandana P Janeja Tyler Kloefkorn and Lucy C Erickson. 2018. Data Science Leadership Summit: Summary Report.  Jeannette M Wing Vandana P Janeja Tyler Kloefkorn and Lucy C Erickson. 2018. Data Science Leadership Summit: Summary Report."},{"key":"e_1_3_2_1_86_1","volume-title":"The Core Courses of Data Science and Big Data Technology: The Computing in Data Science. In ACM TURC 2019 (SIGCSE China). ACM","author":"Yu Ge","year":"2019","unstructured":"Ge Yu . 2019 . The Core Courses of Data Science and Big Data Technology: The Computing in Data Science. In ACM TURC 2019 (SIGCSE China). ACM , Chengdu, China, 1. Ge Yu. 2019. The Core Courses of Data Science and Big Data Technology: The Computing in Data Science. In ACM TURC 2019 (SIGCSE China). ACM, Chengdu, China, 1."}],"event":{"name":"ITiCSE '19: Innovation and Technology in Computer Science Education","location":"Aberdeen Scotland Uk","acronym":"ITiCSE '19","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344429.3372503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3344429.3372503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:25Z","timestamp":1750203865000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344429.3372503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,18]]},"references-count":86,"alternative-id":["10.1145\/3344429.3372503","10.1145\/3344429"],"URL":"https:\/\/doi.org\/10.1145\/3344429.3372503","relation":{},"subject":[],"published":{"date-parts":[[2019,12,18]]},"assertion":[{"value":"2019-12-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}