Creating moral buffers in weapon control interface design
暂无分享,去创建一个
[1] Kevin W. Bowyer,et al. Face recognition technology: security versus privacy , 2004, IEEE Technology and Society Magazine.
[2] J. Lantos,et al. The rise and fall of the futility movement. , 2000, The New England journal of medicine.
[3] W. V. O'brien,et al. The Conduct of Just and Limited War. , 1982, American Journal of International Law.
[4] Kathleen L. Mosier,et al. Does automation bias decision-making? , 1999, Int. J. Hum. Comput. Stud..
[5] M. Mcluhan. The Gutenberg galaxy : the making of typographic man , 1963 .
[6] Clifford Nass,et al. Computers are social actors , 1994, CHI '94.
[7] E. Eisenstein. The printing press as an agent of change , 1969 .
[8] Christopher D. Wickens,et al. A model for types and levels of human interaction with automation , 2000, IEEE Trans. Syst. Man Cybern. Part A.
[9] Philip A.E. Brey,et al. The Politics of Computer Systems and the Etics of Design , 1998 .
[10] Carl E. Landwehr,et al. A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .
[11] K. Mosier,et al. Human Decision Makers and Automated Decision Aids: Made for Each Other? , 1996 .
[12] Clifford Nass,et al. The media equation - how people treat computers, television, and new media like real people and places , 1996 .
[13] Raja Parasuraman,et al. Humans and Automation: Use, Misuse, Disuse, Abuse , 1997, Hum. Factors.
[14] Monica Duffy Toft,et al. Encyclopedia of violence, peace, and conflict , 2000 .
[15] L. Jean Camp,et al. Trust and Risk in Internet Commerce , 2000 .
[16] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[17] G JohnsonDeborah,et al. Using the new ACM code of ethics in decision making , 1993 .
[18] Aaron Strauss,et al. Carnival Booth: An Algorithm for Defeating the Computer-Assisted Passenger Screening System , 2002, First Monday.
[19] Ellen Alderman,et al. Right to Privacy , 2001, Challenging Human Rights Violations: Using International Law in U.S. Courts.
[20] Max Boot. The New American Way of War , 2003 .
[21] Batya Friedman,et al. Human agency and responsible computing: Implications for computer system design , 1992, J. Syst. Softw..
[22] A. D. Jones,et al. Obedience to Authority , 1974 .
[23] H. Jonas. The Imperative of Responsibility: In Search of an Ethics for the Technological Age , 1985 .
[24] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[25] E R Wold,et al. The rise and fall of the futility movement. , 2000, The New England journal of medicine.
[26] Lynette I. Millett,et al. Reasoning about computers as moral agents: a research note , 1997 .
[27] J. Fountain. Building the Virtual State: Information Technology and Institutional Change , 2001 .
[28] A. D. Jones,et al. Obedience to Authority , 1974 .