Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijt/ijt5.bht:"
@article{DBLP:journals/ijt/Baeva14, author = {Liudmila V. Baeva}, title = {New Challenges for Humans in the Context of E-Culture}, journal = {Int. J. Technoethics}, volume = {5}, number = {1}, pages = {59--68}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014010105}, doi = {10.4018/IJT.2014010105}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/Baeva14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/Beauchere14, author = {Jacqueline F. Beauchere}, title = {Preventing Online Bullying: What Companies and Others Can Do}, journal = {Int. J. Technoethics}, volume = {5}, number = {1}, pages = {69--77}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014010106}, doi = {10.4018/IJT.2014010106}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/Beauchere14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/Forge14, author = {John Forge}, title = {The Case Against Weapons Research}, journal = {Int. J. Technoethics}, volume = {5}, number = {2}, pages = {1--10}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014070101}, doi = {10.4018/IJT.2014070101}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/Forge14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/Linder14, author = {Christian Linder}, title = {Are Persuasive Technologies Really Able to Communicate?: Some Remarks to the Application of Discourse Ethics}, journal = {Int. J. Technoethics}, volume = {5}, number = {1}, pages = {44--58}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014010104}, doi = {10.4018/IJT.2014010104}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/Linder14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/MittelstadtFSM14, author = {Brent D. Mittelstadt and N. Ben Fairweather and Mark Christopher Shaw and Neil McBride}, title = {The Ethical Implications of Personal Health Monitoring}, journal = {Int. J. Technoethics}, volume = {5}, number = {2}, pages = {37--60}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014070104}, doi = {10.4018/IJT.2014070104}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/MittelstadtFSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/Odella14, author = {Francesca Odella}, title = {Privacy Concerns and Networks of Communication among Classmates}, journal = {Int. J. Technoethics}, volume = {5}, number = {2}, pages = {61--81}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014070105}, doi = {10.4018/IJT.2014070105}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/Odella14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/OrbonsR14, author = {Sjef Orbons and Lamb{\`{e}}r M. M. Royakkers}, title = {Non-Lethal Weapons: Striking Experiences in a Non-Cooperative Environment}, journal = {Int. J. Technoethics}, volume = {5}, number = {1}, pages = {15--27}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014010102}, doi = {10.4018/IJT.2014010102}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/OrbonsR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/RoyakkersO14, author = {Lamb{\`{e}}r M. M. Royakkers and Peter Olsthoorn}, title = {Military Robots and the Question of Responsibility}, journal = {Int. J. Technoethics}, volume = {5}, number = {1}, pages = {1--14}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014010101}, doi = {10.4018/IJT.2014010101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/RoyakkersO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/StraderFBS14, author = {Troy J. Strader and J. Royce Fichtner and Geoffrey D. Bartlett and Lou Ann Simpson}, title = {Online and Offline Content Piracy Activities: Characteristics and Ethical Perceptions}, journal = {Int. J. Technoethics}, volume = {5}, number = {2}, pages = {22--36}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014070103}, doi = {10.4018/IJT.2014070103}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/StraderFBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/Trivino14, author = {Jos{\'{e}} Luis P{\'{e}}rez Trivi{\~{n}}o}, title = {Sport Enhancement: From Natural Doping to Brain Stimulation}, journal = {Int. J. Technoethics}, volume = {5}, number = {2}, pages = {82--93}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014070106}, doi = {10.4018/IJT.2014070106}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/Trivino14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/WeijersR14, author = {Dan Weijers and Jennifer Richardson}, title = {A Moral Analysis of Effective Prediction Markets on Terrorism}, journal = {Int. J. Technoethics}, volume = {5}, number = {1}, pages = {28--43}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014010103}, doi = {10.4018/IJT.2014010103}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/WeijersR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijt/Wynsberghe14, author = {Aimee van Wynsberghe}, title = {The Leadership Role of the Ethicist: Balancing between the Authoritative and the Passive}, journal = {Int. J. Technoethics}, volume = {5}, number = {2}, pages = {11--21}, year = {2014}, url = {https://doi.org/10.4018/ijt.2014070102}, doi = {10.4018/IJT.2014070102}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijt/Wynsberghe14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.