{"id":"https://openalex.org/W2286828256","doi":"https://doi.org/10.1145/2839509.2844580","title":"A Survey of Ethical Agreements in Information Security Courses","display_name":"A Survey of Ethical Agreements in Information Security Courses","publication_year":2016,"publication_date":"2016-02-17","ids":{"openalex":"https://openalex.org/W2286828256","doi":"https://doi.org/10.1145/2839509.2844580","mag":"2286828256"},"language":"en","primary_location":{"id":"doi:10.1145/2839509.2844580","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2839509.2844580","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 47th ACM Technical Symposium on Computing Science Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016758135","display_name":"Benedict Chukuka","orcid":null},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Benedict Chukuka","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086616243","display_name":"Michael E. Locasto","orcid":null},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Michael Locasto","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016758135"],"corresponding_institution_ids":["https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":0.3419,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61344863,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"479","last_page":"484"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5380200147628784},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5355494022369385},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43992263078689575},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32055431604385376}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5380200147628784},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5355494022369385},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43992263078689575},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32055431604385376}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2839509.2844580","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2839509.2844580","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 47th ACM Technical Symposium on Computing Science Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W182168334","https://openalex.org/W1603176045","https://openalex.org/W1986809372","https://openalex.org/W2065053560","https://openalex.org/W2126935688","https://openalex.org/W2330322376","https://openalex.org/W6636223483"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W4210648132"],"abstract_inverted_index":{"Existing":[0],"ethical":[1,56,101,108,131,202,222,245,255],"agreements,":[2,109],"as":[3],"applicable":[4,185],"in":[5,72,100,122,133,161,186,217],"the":[6,29,55,67,73,79,87,104,114,123,141,145,152,159,199,230,237,250],"teaching":[7],"of":[8,31,49,66,70,81,93,106,116,120,125,163,175,201,232,239,253],"information":[9,82,96,126,134,146,225],"security":[10,83,127,135,147,226],"courses,":[11],"typically":[12],"spell":[13],"out":[14],"rules":[15],"on":[16,47,155,180,214,224],"what":[17,32,151],"students":[18,33],"should":[19,21,34,36],"and":[20,51,242],"not":[22,37,40,111],"do.":[23],"The":[24],"main":[25],"problem":[26],"is":[27,39],"that":[28,58,204,248],"question":[30],"or":[35,168,209],"do":[38],"a":[41,90,172,177,187],"settled":[42],"issue,":[43],"because":[44],"personal":[45],"stances":[46],"questions":[48],"morality":[50],"ethics":[52,84,94,121,143,156,181],"fundamentally":[53],"influence":[54],"recommendations":[57],"teachers":[59],"present":[60,171],"to":[61,197,211,228],"their":[62],"students.":[63],"In":[64],"light":[65],"growing":[68],"level":[69],"malice":[71],"computing":[74],"domain,":[75],"experts":[76],"have":[77],"highlighted":[78],"importance":[80],"by":[85],"debating":[86],"need":[88],"for":[89,95],"standard":[91,178],"code":[92],"security.":[97],"Arguably,":[98],"differences":[99],"stance,":[102],"with":[103],"effect":[105],"divergent":[107],"will":[110,170,207],"efficiently":[112],"serve":[113],"purpose":[115],"effective":[117],"universal":[118],"application":[119],"field":[124],"education.":[128],"Examining":[129],"current":[130],"policies":[132],"courses":[136,227],"can":[137],"provide":[138],"insight":[139],"about":[140],"prevailing":[142,153],"within":[144,158],"community.":[148],"Moreover,":[149],"understanding":[150],"philosophies":[154],"are":[157],"community,":[160],"terms":[162],"how":[164,176],"they":[165],"actually":[166],"diverge":[167],"converge,":[169],"good":[173],"projection":[174],"policy":[179,246],"may":[182,194],"be":[183,195,212],"feasibly":[184],"future":[188,205],"regulatory":[189],"environment.":[190],"This":[191],"way,":[192],"we":[193,220],"able":[196],"forecast":[198],"nature":[200,231],"norms":[203],"professionals":[206],"accept":[208],"allow":[210],"imposed":[213],"them.":[215],"Therefore,":[216],"our":[218],"survey,":[219],"analyze":[221],"agreements":[223,241],"identify":[229],"existing":[233],"agreements.":[234],"We":[235],"determine":[236],"commonalities":[238],"these":[240],"derive":[243],"an":[244],"prototype":[247],"includes":[249],"common":[251],"elements":[252],"329":[254],"policies.":[256]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
