Unplanned effects of intelligent agents on Internet use: a social informatics approach
暂无分享,去创建一个
[1] John Gallaugher,et al. Managing Workplace Privacy Responsibility , 2004 .
[2] Clare-Marie Karat,et al. Editorial: why HCI research in privacy and security is critical now , 2005 .
[3] B. Anderson,et al. Digital Living , 2001 .
[4] Steven J. Plimpton,et al. Massively parallel methods for engineering and science problems , 1994, CACM.
[5] John P. Robinson,et al. Internet and Society , 2003 .
[6] Yao-Hua Tan,et al. The role of trust and deception in virtual societies , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[7] W. A. Lucas,et al. Effects of E-Mail on the Organization , 1998 .
[8] Yao-Hua Tan,et al. Trust and Deception in Virtual Societies , 2001, Springer Netherlands.
[9] Elayne W. Coakes,et al. Socio-Technical and Human Cognition Elements of Information Systems , 2002 .
[10] Zhengyou Xia,et al. Autonomous trust construction in multi-agent systems - a graph theory methodology , 2005, Adv. Eng. Softw..
[11] Pattie Maes,et al. Agent-mediated electronic commerce: issues, challenges and some viewpoints , 1998, AGENTS '98.
[12] Sudha Ram,et al. Intelligent Agents and the World Wide Web: Fact or Fiction? , 2002 .
[13] Janet Fulk,et al. Organizations and Communications Technology. , 1992 .
[14] N. Nie,et al. Internet and society: a preliminary report , 2001 .
[15] Rob Kling,et al. What Is Social Informatics and Why Does It Matter? , 2007, D Lib Mag..
[16] Tiffany Ya Tang,et al. I-TRUST: investigating trust between users and agents in a multi-agent portfolio management system , 2003, Electron. Commer. Res. Appl..
[17] Neil Postman,et al. Technopoly: The Surrender of Culture to Technology , 1993 .
[18] M.T. Maybury. The mind matters: artificial intelligence and its societal implications , 1990, IEEE Technology and Society Magazine.
[19] Tim Menzies,et al. Knowledge maintenance: the state of the art , 1999, The Knowledge Engineering Review.
[20] Rudy Hirschheim,et al. The effect of a priori views on the social implications of computing: the case of office automation , 1986, CSUR.
[21] Pattie Maes,et al. Collaborative Interface Agents , 1994, AAAI.
[22] E. Vesterinen,et al. Affective Computing , 2009, Encyclopedia of Biometrics.
[23] Parag C. Pendharkar,et al. Technical efficiency-based selection of learning cases to improve forecasting accuracy of neural networks under monotonicity assumption , 2003, Decis. Support Syst..
[24] Mervyn A. Jack,et al. Evaluating humanoid synthetic agents in e-retail applications , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[25] Deborah Dubartell,et al. Computer-Mediated Communication: Human-to-Human Communication across the Internet , 2006 .
[26] J. Weizenbaum. Computer Power And Human Reason: From Judgement To Calculation , 1978 .
[27] John Havick,et al. The impact of the Internet on a television-based society , 2000 .
[28] Morten Hertzum,et al. Trust in information sources: seeking information from people, documents, and virtual agents , 2002, Interact. Comput..
[29] Raymond Kurzweil,et al. Age of intelligent machines , 1990 .
[30] Roger LeRoy Miller. Intermediate microeconomics: Theory, issues, and applications , 1978 .
[31] T. P. Hughes,et al. The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .
[32] H. Braverman. Labor and Monopoly Capital: The Degradation of Work in the Twentieth Century , 1996 .
[33] Michael Wooldridge,et al. Applications of intelligent agents , 1998 .
[34] Henry Lieberman,et al. Aria: an agent for annotating and retrieving images , 2001, Computer.
[35] Pattie Maes,et al. Agents that reduce work and information overload , 1994, CACM.
[36] Stephen D. Tansey. Business, Information Technology and Society , 2002 .
[37] Henry Lieberman,et al. Letizia: An Agent That Assists Web Browsing , 1995, IJCAI.
[38] Riccardo Poli,et al. Simulating agents and their environments , 1995 .
[39] Hyacinth S. Nwana,et al. 2 Multi-Agent Systems : Promises and Reality , 1999 .
[40] N. Lin. Social Capital: Frontmatter , 2001 .
[41] N. Lin. Social Capital: A Theory of Social Structure and Action , 2001 .
[42] R. Kling,et al. Book Review: Computerization and Controversy: Value Conflicts and Social Choices , 1991 .
[43] Douglas E. Shook,et al. RELATIONSHIPS OF JOB CATEGORIES AND ORGANIZATIONAL LEVELS TO USE OF COMMUNICATION CHANNELS, INCLUDING ELECTRONIC MAIL: A META-ANALYSIS AND EXTENSION* , 1990 .
[44] Pattie Maes,et al. Agents that buy and sell , 1999, CACM.
[45] Marsha Woodbury. What, Me, Worry? The Empowerment of Employees , 2004 .
[46] Margaret A. Boden,et al. Social implications of intelligent machines , 1977, ACM '78.
[47] Brian Detlor. Towards Knowledge Portals: From Human Issues to Intelligent Agents , 2004 .
[48] Masoud Yazdani,et al. Artificial intelligence : human effects , 1984 .
[49] Martin L. Griss,et al. CoolAgent: Intelligent Digital Assistants for Mobile Professionals - Phase 1 Retrospective , 2002 .
[50] Nicholas R. Jennings,et al. Applied Artificial Intelligence: An International Journal , 2022 .
[51] Kevin C. Desouza,et al. Intelligent agents for competitive intelligence: Survey of applications , 2001 .
[52] Joseph M. Jones,et al. Do Internet Shopping Aids Make a Difference? An Empirical Investigation , 2001, Electron. Mark..
[53] David Schell,et al. User centered design in action: developing an intelligent agent application , 1997, SIGDOC '97.
[54] Kikuo Fujimura,et al. The intelligent ASIMO: system overview and integration , 2002, IEEE/RSJ International Conference on Intelligent Robots and Systems.
[55] Kwangtae Park,et al. Estimation of information value on the Internet: application of hedonic price model , 2003, Electron. Commer. Res. Appl..
[56] Pattie Maes,et al. Learning Interface Agents , 1993, AAAI.
[57] Jaron Lanier. Agents of alienation , 1995, INTR.
[58] Steffen Wettig,et al. A legal analysis of human and electronic agents , 2004, Artificial Intelligence and Law.
[59] Victor R. Lesser,et al. Evolving Real-Time Local Agent Control for Large-Scale Multi-agent Systems , 2001, ATAL.
[60] Vincenzo Della Mea,et al. Agents acting and moving in healthcare scenario - a paradigm for telemedical collaboration , 2001, IEEE Transactions on Information Technology in Biomedicine.
[61] Mahesh S. Raisinghani,et al. Intelligent software agents in electronic commerce: a socio-technical perspective , 2000, IRMA Conference.
[62] Brian Detlor,et al. The corporate portal as information infrastructure: towards a framework for portal design , 2000, Int. J. Inf. Manag..
[63] P. Maes. Smart Commerce: The Future of Intelligent Agents in Cyberspace , 1999 .
[64] Candace L. Sidner,et al. A collaborative assistant for email , 1999, CHI Extended Abstracts.
[65] Oscar Firschein,et al. Forecasting and Assessing the Impact of Artificial Intelligence on Society , 1973, IJCAI.
[66] José M. Molina López,et al. Intelligent Travel Planning: A MultiAgent Planning System to Solve Web Problems in the e-Tourism Domain , 2001, Autonomous Agents and Multi-Agent Systems.
[67] Jeffrey O. Kephart,et al. Dynamic pricing by software agents , 2000, Comput. Networks.
[68] Albert A. Angehrn,et al. Using conversational agents to support the adoption of knowledge sharing practices , 2003, Interact. Comput..
[69] A. M. Turing,et al. Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.
[70] Arnold Pacey,et al. Culture technology , 1986, CABI Compendium.
[71] Yael Ravin,et al. Machine intelligence and the Turing Test , 2002, IBM Syst. J..
[72] Alexander Serenko,et al. Intelligent agents as innovations , 2004, AI & SOCIETY.
[73] William J. McIver,et al. Global Perspectives on the Information Society , 2004 .
[74] Ben Shneiderman,et al. Direct Manipulation: A Step Beyond Programming Languages , 1983, Computer.
[75] Maureen S. Battistella,et al. Connections: New Ways of Working in the Networked Organization , 1991 .
[76] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[77] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[78] Robert E. Kraut,et al. Social impact of the Internet: what does it mean? , 1998, CACM.
[79] Patrick Henry Winston,et al. The Society Theory of Thinking , 1982 .
[80] Rob Kling,et al. A Reader's Guide to Computerization and Controversy , 1996, Computerization and Controversy, 2nd Ed..
[81] Mark Egan,et al. The executive guide to information security - threats, challenges and solutions , 2004 .
[82] Filippo Menczer,et al. Adaptive Assistants for Customized E-Shopping , 2002, IEEE Intell. Syst..
[83] Jeffrey M. Bradshaw,et al. An introduction to software agents , 1997 .
[84] Ida R. Hoos,et al. When the Computer Takes Over the Office , 1983 .
[85] Analía Amandi,et al. User - interface agent interaction: personalization issues , 2004, Int. J. Hum. Comput. Stud..
[86] Carlos José Pereira de Lucena,et al. V-Market: A framework for agent e-commerce systems , 2000, World Wide Web.
[87] Yang Yang,et al. SAFE: secure agent roaming for e-commerce , 2002 .
[88] Tao Jiang,et al. FOSTERING ROBUST LIBRARY PORTALS: AN ASSESSMENT OF THE McMASTER UNIVERSITY LIBRARY GATEWAY , 2003 .
[89] Miriam J. Metzger. Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..
[90] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[91] P. Chisnall. Mail and Internet Surveys: The Tailored Design Method , 2007, Journal of Advertising Research.
[92] Dirk Nicolas Wagner. Software Agents take the Internet as a Shortcut to Enter Society: A Survey of New Actors to Study for Social Theory , 2000, First Monday.
[93] Jack Cook,et al. Compliance with Data Management Laws , 2004 .
[94] John Pickering,et al. Human Identity in the Age of Software Agents , 2001, Cognitive Technology.
[95] Mahesh S. Raisinghani. Software Agents in Today's Digital Economy: Transition to the Knowledge Society , 2001 .
[96] Frances M. T. Brazier,et al. Anonymity and software agents: An interdisciplinary challenge , 2004, Artificial Intelligence and Law.
[97] Jane S. Webster,et al. Rational and social theories as complementary explanations of communication media choices: two polic , 1995 .
[98] Carol A. Hert,et al. Social Informatics in Information Science: An Introduction , 1998, J. Am. Soc. Inf. Sci..
[99] Efraim Turban,et al. Electronic commerce 2006: a managerial perspective , 2006 .
[100] Albert Angehrn,et al. Matching competencies to enhance organisational knowledge sharing : An Intelligent Agent approach i , 2001 .
[101] Michael R. Genesereth,et al. Software agents , 1994, CACM.
[102] Panagiotis Kanellis,et al. Trust and relationship building in electronic commerce , 2001, Internet Res..
[103] D. Christopher Dryer,et al. Getting Personal with Computers: How to Design Personalities for Agents , 1999, Appl. Artif. Intell..
[104] Jonathon N. Cummings,et al. The quality of online social relationships , 2002, CACM.
[105] Terry Winograd,et al. Understanding computers and cognition - a new foundation for design , 1987 .
[106] Bijan Fazlollahi,et al. Strategies for eCommerce Success , 2002 .
[107] Xueming Luo. Trust production and privacy concerns on the Internet , 2002 .
[108] Ying Shi,et al. Mobile agents on internet , 2008, Wuhan University Journal of Natural Sciences.
[109] Linda L. Brennan. Social, Ethical, and Policy Implications of Information Technology , 2004, IEEE Transactions on Engineering Management.
[110] Bonnie M. Muir,et al. Trust Between Humans and Machines, and the Design of Decision Aids , 1987, Int. J. Man Mach. Stud..
[111] A. M. Turing,et al. Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.
[112] Steve Clarke,et al. A social perspective on information security: theoretically grounding the domain , 2003 .
[113] Barbara Hayes-Roth,et al. An Architecture for Adaptive Intelligent Systems , 1995, Artif. Intell..
[114] J. Weizenbaum. From Computer Power and Human Reason From Judgment to Calculation , 2007 .
[115] Rosalind W. Picard. Affective computing: (526112012-054) , 1997 .
[116] Laurie G. Cuthbert,et al. Design of a trust model for a secure multi-agent marketplace , 2001, AGENTS '01.
[117] D. H. Mills. The Logic and Limits of Trust , 1983 .
[118] NICHOLAS R. JENNINGS,et al. An agent-based approach for building complex software systems , 2001, CACM.
[119] R. Kurzweil. The age of spiritual machines: when computers exceed human intelligence , 1998 .
[120] Carl Staelin,et al. A Personal Email Assistant , 2002 .
[121] Richard G. Epstein. The case of the killer robot , 1997 .
[122] N. Moray,et al. Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation. , 1996, Ergonomics.
[123] Clément Arsenault,et al. Web information seeking and retrieval in digital library contexts: towards an intelligent agent solution , 2002, Online Inf. Rev..
[124] S. Rahman,et al. Internet Commerce and Software Agents: Cases, Technologies and Opportunities , 2000 .
[125] Brian Detlor. Towards Knowledge Portals , 2004, Information Science and Knowledge Management.
[126] Andrew J. I. Jones. On the concept of trust , 2002, Decis. Support Syst..
[127] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[128] R. Daft,et al. Understanding Managers' Media Choices: A Symbolic Interactionist Perspective , 1990 .
[129] Varol Akman,et al. Turing Test: 50 Years Later , 2000, Minds and Machines.
[130] David J. Danelski,et al. Privacy and Freedom , 1968 .
[131] Deepak Kumar,et al. Curriculum descant: stories and plays about the ethical and social implications of artificial intelligence , 2000, INTL.
[132] Yoav Shoham,et al. An overview of agent-oriented programming , 1997 .
[133] Haralambos Mouratidis. Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05) , 2005, Comput. Secur..
[134] Katia P. Sycara,et al. Middle-Agents for the Internet , 1997, IJCAI.
[135] Maria L. Gini,et al. Security model for a multi-agent marketplace , 2003, ICEC '03.
[136] Richard Keeble,et al. Assistant agents for the world wide web intelligent interface design challenges , 2000, Interact. Comput..
[137] Alan Kay,et al. User Interface: A Personal View , 2005 .
[138] N. Nie. Sociability, Interpersonal Relations, and the Internet , 2001 .
[139] Katia P. Sycara,et al. Adding security and trust to multiagent systems , 2000, Appl. Artif. Intell..
[140] J. G. Holmes,et al. Trust in close relationships. , 1985 .
[141] Jon Bing. Electronic agents and intellectual property law , 2004, Artificial Intelligence and Law.
[142] P. Maes,et al. Pattie Maes On Sofware Agents: Humanizing The Global Computer , 1997, IEEE Internet Computing.
[143] Janet Fulk,et al. Organizational Colleagues, Media Richness, and Electronic Mail , 1991 .
[144] Robert E. Kraut,et al. Internet paradox. A social technology that reduces social involvement and psychological well-being? , 1998, The American psychologist.
[145] Chris D. Nugent,et al. Evaluation of inherent performance of intelligent medical decision support systems: utilising neural networks as an example , 2003, Artif. Intell. Medicine.
[146] Nicholas R. Jennings,et al. Constructing a virtual training laboratory using intelligent agents , 2002 .
[147] Alexander Serenko,et al. Importance of Interface Agent Characteristics from End-User Perspective , 2006, Int. J. Intell. Inf. Technol..
[148] Clare-Marie Karat,et al. Why HCI research in privacy and security is critical now , 2005, Int. J. Hum. Comput. Stud..
[149] Jennifer E. Rowley. Product searching with shopping bots , 2000, Internet Res..
[150] Clifford Nass,et al. Machines, social attributions, and ethopoeia: performance assessments of computers subsequent to "self-" or "other-" evaluations , 1994, Int. J. Hum. Comput. Stud..
[151] P. Howard,et al. Days and Nights on the Internet , 2001 .
[152] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[153] Linda L. Brennan. The Perils of Access and Immediacy: Unintended Consequences of Information Technology , 2004 .
[154] Philip E. Agre,et al. Reinventing Technology, Rediscovering Community: Critical Explorations of Computing as a Social Practice , 1997 .
[155] Joobin Choobineh,et al. Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[156] Clifford Nass,et al. Are computers scapegoats? Attributions of responsibility in human-computer interaction , 1998, Int. J. Hum. Comput. Stud..