Ethics and Information Technology
container_ah37m2ztbvcbnnkuypnp5ln4kq
Springer-Verlag
Showing first 25 out of 765 results
eFRIEND: an ethical framework for intelligent environments development
Simon Jones, Sukhvinder Hara, Juan Carlos Augusto
2014
|
Ethics and Information Technology
doi:10.1007/s10676-014-9358-1
The potential impact of quantum computers on society
Ronald de Wolf
2017
|
Ethics and Information Technology
doi:10.1007/s10676-017-9439-z
You've got a friend in me: sociable robots for older adults in an age of global pandemics
Nancy S. Jecker
2020
|
Ethics and Information Technology
doi:10.1007/s10676-020-09546-y pmcid:PMC7365025
Why virtual friendship is no genuine friendship
Barbro Fröding, Martin Peterson
2012
|
Ethics and Information Technology
doi:10.1007/s10676-011-9284-4
Lockbox: mobility, privacy and values in cloud storage
Luke Stark, Matt Tierney
2013
|
Ethics and Information Technology
doi:10.1007/s10676-013-9328-z
Autonomous weapons systems, killer robots and human dignity
Amanda Sharkey
2018
|
Ethics and Information Technology
doi:10.1007/s10676-018-9494-0
Ethics in the COVID-19 pandemic: myths, false dilemmas, and moral overload
Georgy Ishmaev, Matthew Dennis, M. Jeroen van den Hoven
2021
|
Ethics and Information Technology
doi:10.1007/s10676-020-09568-6 pmcid:PMC7952813
On crimes and punishments in virtual worlds: bots, the failure of punishment and players as moral entrepreneurs
Stefano De Paoli, Aphra Kerr
2011
|
Ethics and Information Technology
doi:10.1007/s10676-011-9281-7
Twenty years of value sensitive design: a review of methodological practices in VSD projects
Till Winkler, Sarah Spiekermann
2018
|
Ethics and Information Technology
doi:10.1007/s10676-018-9476-2
The immorality of computer games: Defending the endorsement view against Young's objections
Sebastian Ostritsch, Samuel Ulbricht
2020
|
Ethics and Information Technology
doi:10.1007/s10676-020-09549-9
From open-source software to Wikipedia: 'Backgrounding' trust by collective monitoring and reputation tracking
Paul B. de Laat
2014
|
Ethics and Information Technology
doi:10.1007/s10676-014-9342-9
The normative significance of identifiability
Tomasz Żuradzki
2018
|
Ethics and Information Technology
doi:10.1007/s10676-018-9487-z
Identity and distinctness in online interaction: encountering a problem for narrative accounts of self
Alexander D. Carruth, David W. Hill
2015
|
Ethics and Information Technology
doi:10.1007/s10676-015-9364-y
How shall i compare thee? Comparing the prudential value of actual virtual friendship
Johnny Hartz Søraker
2012
|
Ethics and Information Technology
doi:10.1007/s10676-012-9294-x
Observing bodies. Camera surveillance and the significance of the body
Lynsey Dubbeld
2003
|
Ethics and Information Technology
doi:10.1023/b:etin.0000006946.01426.26
Can we trust robots?
Mark Coeckelbergh
2011
|
Ethics and Information Technology
doi:10.1007/s10676-011-9279-1
Strategy mapping: a method for making value tensions explicit in design and deployment of IT systems
Åke Walldius
2018
|
Ethics and Information Technology
doi:10.1007/s10676-018-9465-5
Studying the ethical implications of e-trust in the lab
Cristina Bicchieri, Azi Lev-On
2010
|
Ethics and Information Technology
doi:10.1007/s10676-010-9258-y
Friendly AI
Barbro Fröding, Martin Peterson
2020
|
Ethics and Information Technology
doi:10.1007/s10676-020-09556-w
Blind-sided by privacy? Digital contact tracing, the Apple/Google API and big tech's newfound role as global health policy makers
Tamar Sharon
2020
|
Ethics and Information Technology
doi:10.1007/s10676-020-09547-x pmcid:PMC7368642
Why value sensitive design needs ethical commitments
Naomi Jacobs, Alina Huldtgren
2018
|
Ethics and Information Technology
doi:10.1007/s10676-018-9467-3
Ethical issues in web data mining
Lita van Wel, Lambèr Royakkers
2004
|
Ethics and Information Technology
doi:10.1023/b:etin.0000047476.05912.3d
Beware! Uncle Sam has Your DNA: Legal Fallout from its Use and Misuse in the U.S.
Marcia J. Weiss
2004
|
Ethics and Information Technology
doi:10.1023/b:etin.0000036159.90081.cc
Going dark: anonymising technology in cyberspace
Ross W. Bellaby
2018
|
Ethics and Information Technology
doi:10.1007/s10676-018-9458-4
The virtual simulation of child sexual abuse: online gameworld users' views, understanding and responses to sexual ageplay
Carla Reeves
2018
|
Ethics and Information Technology
doi:10.1007/s10676-018-9449-5
« Previous
Showing results 0 — 25 out of 765 results
Next »