Stop the war!
Остановите войну!
for scientists:
default search action
SIGCAS Computers and Society, Volume 47
Volume 47, Number 1, April 2017
- Dee A. B. Weikle:
Editors opine: 2017 - a time when computing matters more than ever. 4 - Michael Goldweber:
Letter from the SIGCAS chair: thanks for the last year and what is coming... 5-7 - Simon Rogerson:
The data shadow. 8-9 - Carl Stephen Guynes, Richard G. Vedder:
IT personnel and corporate identification: corporate identification issues can jeopardize an organization's security. 10-14 - Jeremy St. John, Richard G. Vedder, Carl Steve Guynes:
Offshoring and social exchange: a social exchange theory perspective on offshoring relationships. 15-23 - Douglas Schuler:
Imagining a new public information and communication infrastructure: a DIY multispace for civic intelligence. 24-31
Volume 47, Number 2, June 2017
- Dee A. B. Weikle:
Editors opine. 4 - Swati Agarwal, Nitish Mittal, Ashish Sureka:
Minority ethnic groups in computer science research: what is the bibliography data telling us? 5-15 - Chris Kanich:
The costs and benefits of treating the browser like an operating system: how ad blockers help us better understand how different browser features are used and who they benefit. 16-18 - Nancy Y. McGovern:
Data rescue: observations from an archivist. 19-26
Volume 47, Number 3, September 2017
- Dee A. B. Weikle:
Editors opine: a new SIGCAS executive committee and CEPE/ethicomp. 4 - Karla Carter:
Welcome: the new SIGCAS chair: Karla Carter. 5-6 - Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
Dynamic technology challenges static codes of ethics: a case study. 7-24 - Simon Rogerson:
Is professional practice at risk following the Volkswagen and Tesla revelations?: software engineering under scrutiny. 25-38 - Paul B. de Laat:
Big data and algorithmic decision-making: can transparency restore accountability? 39-53 - Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky:
Why we should have seen that coming: comments on Microsoft's tay "experiment, " and wider implications. 54-64 - Nick Breems:
Subject-by-proxy: a tool for reasoning about programmer responsibility in artificial agents. 65-71 - Kiyoshi Murata, Andrew A. Adams, Yasunori Fukuta, Yohko Orito, Mario Arias Oliva, Jorge Pelegrín-Borondo:
From a science fiction to reality: cyborg ethics in Japan. 72-85 - Janne Lahtiranta, Sami Hyrynsalmi, Jani Simo Sakari Koskinen:
The false prometheus: customer choice, smart devices, and trust. 86-97 - Erica L. Neely:
No player is ideal: why video game designers cannot ethically ignore players' real-world identities. 98-111 - Randy W. Connolly, Janet Miller:
Offline, but on track: reassessing young people's understanding of citizenship. 112-123 - Eduardo Magrani:
Threats of the internet of things in a techno-regulated society: a new legal challenge of the information revolution. 124-138
Volume 47, Number 4, July 2018
- Dee A. B. Weikle:
Editors opine: a robust end to 2017. 4 - Carlos E. Jimenez-Gomez:
Following OCDE recommendations on digital government: open innovation and data science: digital government editor's introduction. 5-6 - Mila Gascó-Hernández:
Reflection on new research trends: ICT-enabled innovation in the public sector. 7-11 - Luis Felipe Luna-Reyes:
The search for the data scientist: creating value from data. 12-16 - Robin Cohen, Nivedha Mathiarasu, R. Aarif, S. Ansari, D. Fraser, M. Hegde, J. Henderson, I. Kajic, A. Khan, Z. Liao, Aitziber Mancisidor, S. Nagpal, A. Pham, A. Saini, J. Shen, H. Singh, Cátia Tavares, S. Thandra:
An education-based approach to aid in the prevention of cyberbullying. 17-28 - Michael James Heron, Pauline Belford:
Disclosure and disavowal: professional issues in the scandal in academia. 29-45 - Bonnie A. Nardi, Hamid R. Ekbia:
The future of human labor: a look at manufacturing and war. 46-53 - Richard Volkman:
Exchanging IRL for VR: experience machines and opportunity costs. 54-67 - Antti Hakkala, Olli I. Heimo, Sami Hyrynsalmi, Kai K. Kimppa:
Security, privacy'); drop table users; - and forced trust in the information age?: when trusting an information system is not optional and why it matters. 68-80 - Lachlan Urquhart:
Ethical dimensions of user centric regulation. 81-95 - Wessel Reijers, Mark Coeckelbergh:
Narrative technologies meets virtue ethics in alternate reality: investigating the possibility of a narrative virtue ethics of technology, using the example of pokémon go. 96-106 - Wilhelm E. J. Klein, Vivian Wenli Lin:
"Sex robots" revisited: a reply to the campaign against sex robots. 107-121 - Anders Persson, Iordanis Kavathatzopoulos:
How to make decisions with algorithms: ethical decision-making using algorithms within predictive analytics. 122-133 - Wade L. Robison:
Digital privacy: Leibniz 2.0. 134-144 - Rebecca Slayton:
Certifying "ethical hackers". 145-150
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.