The Ethics of Computing
暂无分享,去创建一个
Bernd Carsten Stahl | Job Timmermans | Brent Daniel Mittelstadt | B. Stahl | B. Mittelstadt | J. Timmermans
[1] Geoff Walsham,et al. Toward Ethical Information Systems: The Contribution of Discourse Ethics , 2010, MIS Q..
[2] Stuart Hannabuss. Intellectual Property Rights in a Networked World: Theory and Practice , 2006 .
[3] Kristopher Welsh,et al. The danger of big data: Social media as computational social science , 2012, First Monday.
[4] M. Eisenhower. The Cambridge Handbook Of Information And Computer Ethics , 2016 .
[5] Carl Mitcham,et al. Convivial software: an end-user perspective on free and open source software , 2009, Ethics and Information Technology.
[6] M. Angrist. Eyes wide open: the personal genome project, citizen science and veracity in informed consent. , 2009, Personalized medicine.
[7] Kenneth J. Christensen,et al. The pledge of the computing professional: recognizing and promoting ethics in the computing professions , 2012, CSOC.
[8] Michael Friedewald,et al. Perspectives of ambient intelligence in the home environment , 2005, Telematics Informatics.
[9] Govindan Parayil,et al. The Digital Divide and Increasing Returns: Contradictions of Informational Capitalism , 2005, Inf. Soc..
[10] Emilio Mordini,et al. Body identification, biometrics and medicine: ethical and social considerations. , 2007, Annali dell'Istituto Superiore di Sanità.
[11] Alison E. Adam,et al. Computer ethics in a different voice , 2001, Inf. Organ..
[12] Herman T. Tavani,et al. Readings in Cyberethics , 2001 .
[13] Kay Mathiesen,et al. What is Information Ethics? , 2004, CSOC.
[14] H. Joseph Wen,et al. Data mining: Consumer privacy, ethical policy, and systems development practices , 2003 .
[15] Immanuel Kant,et al. Kritik der praktischen Vernunft , 2003 .
[16] A. Edel,et al. After virtue, a study in moral theory , 1983 .
[17] Dinah M. Payne,et al. A uniform code of ethics: business and IT professional ethics , 2006, CACM.
[18] J. Bentham. An Introduction to the Principles of Morals and Legislation , 1945, Princeton Readings in Political Thought.
[19] N. Wiener. The Human Use of Human Beings , 1950 .
[20] M. Thelwall,et al. Researching Personal Information on the Public Web , 2011 .
[21] John P A Ioannidis,et al. Informed Consent, Big Data, and the Oxymoron of Research That Is Not Research , 2013, The American journal of bioethics : AJOB.
[22] Fariba Sadri,et al. Ambient intelligence: A survey , 2011, CSUR.
[23] Carlos Fernández-Valdivielso,et al. Enabling Personal Privacy for Pervasive Computing Environments , 2010, J. Univers. Comput. Sci..
[24] Guiou Kobayashi,et al. Ubiquitous Computing: Any Ethical Implications? , 2010, Int. J. Technoethics.
[25] E. Buchanan,et al. Online Survey Tools: Ethical and Methodological Concerns of Human Research Ethics Committees , 2009, Journal of empirical research on human research ethics : JERHRE.
[26] H. Borko,et al. Computer power and human reason: From judgement to calculation , 1976 .
[27] L. Floridi. The Cambridge Handbook of Information and Computer Ethics: Information ethics , 2010 .
[28] Antonio Marturano. The role of metaethics and the future of computer ethics , 2004, Ethics and Information Technology.
[29] Alan Borning,et al. Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.
[30] J. Hoven,et al. Information technology, privacy and the protection of personal data , 2008 .
[31] Shana M. Mason,et al. Digital Disempowerment in a Network Society , 2009, Int. J. Electron. Gov. Res..
[32] Betsy Van der Veer Martens,et al. The new competitive intelligence agents: "Programming" competitive intelligence ethics into corporate cultures , 2011, Webology.
[33] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[34] Richard O. Mason,et al. Studying cyborgs: re-examining internet studies as human subjects research , 2012, J. Inf. Technol..
[35] Immanuel Kant,et al. Grundlegung zur Metaphysik der Sitten , 1906 .
[36] N Baykal,et al. A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example , 2007, Journal of Medical Ethics.
[37] K. Himma. The Handbook of Information and Computer Ethics , 2007 .
[38] D. Tranfield,et al. Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review , 2003 .
[39] Michael T. McFall. Real character-friends: Aristotelian friendship, living together, and technology , 2012, Ethics and Information Technology.
[40] Kious Bm,et al. The Nuremberg Code: its history and implications. , 2001 .
[41] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[42] Paul Sollie,et al. Evaluating new technologies : methodological problems for the ethical assessment of technology developments , 2009 .
[43] D. Lyon. Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .
[44] J. Stilgoe,et al. Developing a framework for responsible innovation* , 2013, The Ethics of Nanotechnology, Geoengineering and Clean Energy.
[45] Bart W. Schermer,et al. The limits of privacy in automated profiling and data mining , 2011, Comput. Law Secur. Rev..
[46] Anja Bechmann,et al. Using APIs for Data Collection on Social Media , 2014, Inf. Soc..
[47] B. Russell,et al. Problems Of Philosophy , 2004, Synthese.
[48] Frantz Rowe,et al. What literature review is not: diversity, boundaries and recommendations , 2014, Eur. J. Inf. Syst..
[49] B. Latour,et al. Morality and Technology , 2002, The Ethics of Biotechnology.
[50] Rich Cohan. Compliance and ethics: a critical interdependence. Behaving ethically means more than just doing things right--it means doing the right things. , 2004, Healthcare executive.
[51] K Panico,et al. Care in the community , 1995, Nature.
[52] Luciano Floridi,et al. The Informational Nature of Personal Identity , 2011, Minds and Machines.
[53] Vincent Rialle,et al. Environmental Cognitive Remediation in Schizophrenia: Ethical Implications of “Smart Home” Technology , 2005, Canadian journal of psychiatry. Revue canadienne de psychiatrie.
[54] Björn Niehaves,et al. Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide , 2014, Eur. J. Inf. Syst..
[55] D Feil-Seifer,et al. Socially Assistive Robotics , 2011, IEEE Robotics & Automation Magazine.
[56] Armin Grunwald,et al. From Speculative Nanoethics to Explorative Philosophy of Nanotechnology , 2010 .
[57] David M. Wasieleski,et al. An enquiry into the ethical efficacy of the use of radio frequency identification technology , 2008, Ethics and Information Technology.
[58] Mark Shelton,et al. Computer and Information Ethics , 1999 .
[59] Nick Hine,et al. Care in the Community , 2004 .
[60] Paolo Dario,et al. Scientific models and ethical issues in hybrid bionic systems research , 2007, AI & SOCIETY.
[61] Gordon Hull,et al. Robert Merges: Justifying intellectual property , 2012, Ethics and Information Technology.
[62] Niels Nijsingh,et al. Interdisciplinarity, Applied Ethics and Social Science , 2009 .
[63] Larry W. Cornwell,et al. A question of ethics: Developing information system ethics , 1989 .
[64] M. Zimmer. “But the data is already public”: on the ethics of research in Facebook , 2010, Ethics and Information Technology.
[65] Philip A.E. Brey,et al. Philosophy of Computing and Information Technology , 2009 .
[66] Claire Marris,et al. The Transnational Governance of Synthetic Biology: Scientific uncertainty, cross-borderness and the ‘art’ of governance. For the Royal Society Science Policy Centre (UK). , 2011 .
[67] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[68] Philip Brey,et al. Freedom and Privacy in Ambient Intelligence , 2005, Ethics and Information Technology.
[69] Noëmi Manders-Huits,et al. Practical versus moral identities in identity management , 2010, Ethics and Information Technology.
[70] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[71] Lambèr M. M. Royakkers,et al. Ethical issues in web data mining , 2004, Ethics and Information Technology.
[72] Bernd Carsten Stahl,et al. Morality, Ethics, and Reflection: A Categorization of Normative IS Research , 2012, J. Assoc. Inf. Syst..
[73] Simon Rogerson,et al. Computer Ethics and Professional Responsibility: Introductory Text and Readings , 2003 .
[74] Aleksandra K Krotoski,et al. Data-driven research: open data opportunities for growing knowledge, and ethical issues that arise , 2012 .
[75] John Weckert,et al. Professionalism in the Information and Communication Technology Industry , 2013 .
[76] Linda Little,et al. Pervasive healthcare: the elderly perspective , 2009, PETRA '09.
[77] C. Gilligan. In a Different Voice: Psychological Theory and Women’s Development , 2009 .
[78] John Mingers,et al. Combining IS Research Methods: Towards a Pluralist Methodology , 2001, Inf. Syst. Res..
[79] Luciano Floridi,et al. The Ethics of Big Data: Current and Foreseeable Issues in Biomedical Contexts , 2015, Science and Engineering Ethics.
[80] Soon Ang,et al. Turnover of Information Technology Professionals: A Narrative Review, Meta-Analytic Structural Equation Modeling, and Model Development , 2007, MIS Q..
[81] Kevin W. Bowyer,et al. Face recognition technology: security versus privacy , 2004, IEEE Technology and Society Magazine.
[82] John Mack. Beyond HIPAA: ethics in the e-health arena. Ethical guidelines help ensure that credible health information appears on the Internet. , 2004, Healthcare executive.
[83] Mark A. Fuller,et al. Ethical Information Systems Development: A Baumanian Postmodernist Perspective , 2009, J. Assoc. Inf. Syst..
[84] Carina Girvan,et al. Ethical considerations for educational research in a virtual world , 2012, Interact. Learn. Environ..
[85] John P. Sullins. Ethics and Artificial life: From Modeling to Moral Agents , 2005, Ethics and Information Technology.
[86] Helge Toutenburg,et al. The Social Control of Technology , 1982 .
[87] Terry Williamson. Predicting building performance: the ethics of computer simulation , 2010 .
[88] E. Clayton. Informed Consent and Biobanks , 2005, Journal of Law, Medicine & Ethics.
[89] Bonnie Kaplan,et al. Ethical Challenges of Telemedicine and Telehealth , 2008, Cambridge Quarterly of Healthcare Ethics.
[90] Aristotle,et al. THE NICOMACHEAN ETHICS , 1990 .
[91] Wendell Wallach,et al. Implementing moral decision making faculties in computers and robots , 2008, AI & SOCIETY.
[92] Mary L Cummings,et al. Integrating ethics in design through the value-sensitive design approach , 2006, Science and engineering ethics.
[93] C. Allen,et al. Artificial Morality: Top-down, Bottom-up, and Hybrid Approaches , 2005, Ethics and Information Technology.
[94] Connie K. Varnhagen,et al. How Informed Is Online Informed Consent? , 2005, Ethics & behavior.
[95] Yueh-Hsuan Weng,et al. Beyond Robot Ethics: On a Legislative Consortium for Social Robotics , 2010, Adv. Robotics.
[96] Kenneth J. Christensen,et al. The need for a new graduation rite of passage , 2011, CACM.
[97] Lynne D. Roberts,et al. The Ethics of Outsourcing Online Survey Research , 2010, Int. J. Technoethics.
[98] E. Hildt. Brain-Computer Interaction and Medical Access to the Brain: Individual, Social and Ethical Implications , 2011 .
[99] Michelle L. McGowan,et al. Big data, open science and the brain: lessons learned from genomics , 2014, Front. Hum. Neurosci..
[100] Keith W. Miller. Joining the Conversation about IT Ethics , 2009, IT Professional.
[101] Woontack Woo,et al. Managing Disclosure of Personal Health Information in Smart Home Healthcare , 2007, HCI.
[102] Michael E. Gorman. Turning students into ethical professionals , 2001, IEEE Technol. Soc. Mag..
[103] Patrick Lin,et al. Ethics of Human Enhancement: 25 Questions & Answers , 2010 .
[104] Christian Montag,et al. Psycho-informatics: Big Data shaping modern psychometrics. , 2014, Medical hypotheses.
[105] A. Mostaghimi,et al. Professionalism in the Digital Age , 2011, Annals of Internal Medicine.
[106] Amy Gutmann,et al. The Ethics of Synthetic Biology: Guiding Principles for Emerging Technologies , 2011, The Hastings Center report.
[107] R. V. Schomberg. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields , 2011 .
[108] Wen-Bin Chiou,et al. A new look at software piracy: Soft lifting primes an inauthentic sense of self, prompting further unethical behavior , 2012, Int. J. Hum. Comput. Stud..
[109] Michael Friedewald,et al. Safeguards in a world of ambient intelligence , 2008 .
[110] Aimee van Wynsberghe,et al. Designing Robots for Care: Care Centered Value-Sensitive Design , 2013, Sci. Eng. Ethics.
[111] Keith W. Miller,et al. Computer society and ACM approve software engineering code of ethics , 1999 .
[112] Joshua A.T. Fairfield,et al. Big Data, Big Problems: Emerging Issues in the Ethics of Data Science and Journalism , 2014 .
[113] S. Nagel,et al. Self-Perception and Self-Determination in Surveillance Conditions , 2012, The American journal of bioethics : AJOB.
[114] J. Weizenbaum. Computer Power And Human Reason: From Judgement To Calculation , 1978 .
[115] Sebastian K. Boell,et al. A Hermeneutic Approach for Conducting Literature Reviews and Literature Searches , 2014, Commun. Assoc. Inf. Syst..
[116] Deborah G. Johnson,et al. Computers, ethics & social values , 1995 .
[117] Kevin Mentzer,et al. Foresight for a responsible future with ICT , 2014, Information Systems Frontiers.
[118] Michael L. Anderson. Why is AI so scary? , 2005, Artif. Intell..
[119] K. Himma. Artificial agency, consciousness, and the criteria for moral agency: what properties must an artificial agent have to be a moral agent? , 2009, Ethics and Information Technology.
[120] Timothy Paul Cronan,et al. Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..
[121] Norbert Wiener,et al. God and Golem, inc. : a comment on certain points where cybernetics impinges on religion , 1964 .
[122] Manning Li,et al. Advisory services in the virtual world: an empowerment perspective , 2012, Electron. Commer. Res..
[123] Catherine Heeney,et al. Breaching the Contract? Privacy and the UK Census , 2012, Inf. Soc..
[124] T. Bynum. Information Technology and Moral Philosophy: Norbert Wiener and the Rise of Information Ethics , 2008 .
[125] Ken Wakita,et al. Finding community structure in mega-scale social networks: [extended abstract] , 2007, WWW '07.
[126] Richard Owen,et al. Environmental science: Good governance for geoengineering , 2011, Nature.
[127] Jeroen van den Hoven,et al. Information Technology and Moral Philosophy , 2008 .
[128] Vic Lally,et al. Researching the ethical dimensions of mobile, ubiquitous and immersive technology enhanced learning (MUITEL): a thematic review and dialogue , 2012, Interact. Learn. Environ..
[129] Robert M. Davison,et al. The Ethics of IT Professionals in Japan and China , 2009, J. Assoc. Inf. Syst..
[130] C. Allen,et al. Stanford Encyclopedia of Philosophy , 2011 .
[131] Luciano Floridi,et al. On the Morality of Artificial Agents , 2004, Minds and Machines.
[132] G. Lăzăroiu. The Cambridge Handbook of Information and Computer Ethics , 2012 .
[133] Martin Dodge. Wright, David, Serge Gutwirth, Michael Friedewald, Elena Vildjiounaite and Yves Punie (eds.) 2008. Safeguards in a World of Ambient Intelligence. London: Springer. , 2009 .