Automation and Ethics
暂无分享,去创建一个
[1] J. Lave. Cultural psychology: The culture of acquisition and the practice of understanding , 1990 .
[2] J. Kleinfeld,et al. Changes in Problem Solving Abilities of Students Taught through Case Methods. , 1991 .
[3] Richard Lucas. Moral Theories for Autonomous Software Agents , 2004, CSOC.
[4] Doug Downey,et al. Models of Searching and Browsing: Languages, Studies, and Application , 2007, IJCAI.
[5] Msw,et al. Teaching from Cases , 1991 .
[6] Ronald C. Arkin,et al. Governing lethal behavior: Embedding ethics in a hybrid deliberative/reactive robot architecture part I: Motivation and philosophy , 2008, 2008 3rd ACM/IEEE International Conference on Human-Robot Interaction (HRI).
[7] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[8] Kevin Treu,et al. Ten suggestions for a gender-equitable CS classroom , 2002, SGCS.
[9] Richard Lucas. Why bother?: ethical computers - that's why! , 2000 .
[10] Joseph Migga Kizza. Computer Network Security and Cyber Ethics, 2d edition , 2006 .
[11] James E. Pitkow,et al. Characterizing Browsing Strategies in the World-Wide Web , 1995, Comput. Networks ISDN Syst..
[12] Daqing He,et al. Analysing Web Search Logs to Determine Session Boundaries for User-Oriented Learning , 2000, AH.
[13] J Mcgrath Cohoon,et al. Recruiting and retaining women in undergraduate computing majors , 2002, SGCS.
[14] Perri. Ethics, regulation and the new artificial intelligence, part II: autonomy and liability , 2001 .
[15] Melissa Dark,et al. An information security ethics education model , 2008 .
[16] Monika Henzinger,et al. Analysis of a very large web search engine query log , 1999, SIGF.
[17] Eugene Agichtein,et al. Towards Privacy-Preserving Query Log Publishing , 2007 .
[18] Selmer Bringsjord,et al. Toward a General Logicist Methodology for Engineering Ethically Correct Robots , 2006, IEEE Intelligent Systems.
[19] Giannis Stamatellos. Computer ethics - a global perspective , 2007 .
[20] Valerie A. Larsen,et al. Compelling Case Experiences; Performance, Practice, and Application for Emerging Instructional Designers , 2008 .
[21] Joseph Migga Kizza. Ethical and Social Issues in the Information Age (Texts in Computer Science) , 2007 .
[22] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[23] Sara Baase,et al. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet , 1996 .
[24] Barbara B. Levin. Using the case method in teacher education: The role of discussion and experience in teachers' thinking about cases , 1995 .
[25] John P. Sullins. When Is a Robot a Moral Agent , 2006 .
[26] Coskun Bayrak,et al. Concept set extraction with user session context , 2007, ACM-SE 45.
[27] Wim H. Gijselaers,et al. Bringing Problem-Based Learning To Higher Education: Theory And Practice , 1996 .
[28] Lawrence H. Cox,et al. Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information Technology in a Digital Age" , 2010, J. Priv. Confidentiality.
[29] K. Himma. Artificial agency, consciousness, and the criteria for moral agency: what properties must an artificial agent have to be a moral agent? , 2009, Ethics and Information Technology.
[30] Herman T. Tavani. Ethics and technology - ethical issues in an age of information and communication technology (2. ed.) , 2007 .
[31] Srini Ramaswamy,et al. Societal-Consciousness in the Computing Curricula: A Time for Serious Introspection , 2007, 2007 IEEE International Symposium on Technology and Society.
[32] P. James,et al. Transformative learning: promoting change across cultural worlds , 1997 .