![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/ethicsit/ethicsit16.bht:"
@article{DBLP:journals/ethicsit/CooperST14, author = {Nathan Cooper and Andrew Swan and David Townend}, title = {A confluence of new technology and the right to water: experience and potential from South Africa's constitution and commons}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {2}, pages = {119--134}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9340-y}, doi = {10.1007/S10676-014-9340-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ethicsit/CooperST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/DoyleV14, author = {Tony Doyle and Judy Veranas}, title = {Public anonymity and the connected world}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {3}, pages = {207--218}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9346-5}, doi = {10.1007/S10676-014-9346-5}, timestamp = {Thu, 14 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/DoyleV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Elder14, author = {Alexis M. Elder}, title = {Excellent online friendships: an Aristotelian defense of social media}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {4}, pages = {287--297}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9354-5}, doi = {10.1007/S10676-014-9354-5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ethicsit/Elder14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Hew14, author = {Patrick Chisan Hew}, title = {Artificial moral agents are infeasible with foreseeable technologies}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {3}, pages = {197--206}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9345-6}, doi = {10.1007/S10676-014-9345-6}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Hew14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Johnson14, author = {Jeffrey Alan Johnson}, title = {From open data to information justice}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {4}, pages = {263--274}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9351-8}, doi = {10.1007/S10676-014-9351-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ethicsit/Johnson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Laat14, author = {Paul B. de Laat}, title = {From open-source software to Wikipedia: 'Backgrounding' trust by collective monitoring and reputation tracking}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {2}, pages = {157--169}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9342-9}, doi = {10.1007/S10676-014-9342-9}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Laat14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/LekakosVK14, author = {George Lekakos and Pavlos A. Vlachos and Christos Koritos}, title = {Green is good but is usability better? Consumer reactions to environmental initiatives in e-banking services}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {2}, pages = {103--117}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9337-6}, doi = {10.1007/S10676-014-9337-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ethicsit/LekakosVK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Lim14, author = {Daniel Lim}, title = {Brain simulation and personhood: a concern with the Human Brain Project}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {2}, pages = {77--89}, year = {2014}, url = {https://doi.org/10.1007/s10676-013-9330-5}, doi = {10.1007/S10676-013-9330-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ethicsit/Lim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Mackay14, author = {Hugh Mackay}, title = {Alistair Duff: {A} normative theory of the information society}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {4}, pages = {285--286}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9353-6}, doi = {10.1007/S10676-014-9353-6}, timestamp = {Thu, 14 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Mackay14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Madary14, author = {Michael Madary}, title = {Intentionality and virtual objects: the case of Qiu Chengwei's dragon sabre}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {3}, pages = {219--225}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9347-4}, doi = {10.1007/S10676-014-9347-4}, timestamp = {Thu, 14 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Madary14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Nagenborg14, author = {Michael H. Nagenborg}, title = {Surveillance and persuasion}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {1}, pages = {43--49}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9339-4}, doi = {10.1007/S10676-014-9339-4}, timestamp = {Sat, 30 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Nagenborg14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/NoormanJ14, author = {Merel Noorman and Deborah G. Johnson}, title = {Negotiating autonomy and responsibility in military robots}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {1}, pages = {51--62}, year = {2014}, url = {https://doi.org/10.1007/s10676-013-9335-0}, doi = {10.1007/S10676-013-9335-0}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/NoormanJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/PetrikKS14, author = {James Petrik and Talgat Kilybayev and Dinara Shormanbayeva}, title = {The internet, identity and intellectual capital: a response to Dreyfus's critique of e-learning}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {4}, pages = {275--284}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9352-7}, doi = {10.1007/S10676-014-9352-7}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/PetrikKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/RiquelmeR14, author = {Isabel P. Riquelme and Sergio Rom{\'{a}}n}, title = {The relationships among consumers' ethical ideology, risk aversion and ethically-based distrust of online retailers and the moderating role of consumers' need for personal interaction}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {2}, pages = {135--155}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9341-x}, doi = {10.1007/S10676-014-9341-X}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/RiquelmeR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/SarA14, author = {Rath Kanha Sar and Yeslam Al{-}Saggaf}, title = {Contextual integrity's decision heuristic and the tracking by social network sites}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {1}, pages = {15--26}, year = {2014}, url = {https://doi.org/10.1007/s10676-013-9329-y}, doi = {10.1007/S10676-013-9329-Y}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/SarA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/SchermerCH14, author = {Bart W. Schermer and Bart Custers and Simone van der Hof}, title = {The crisis of consent: how stronger legal protection may lead to weaker consent in data protection}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {2}, pages = {171--182}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9343-8}, doi = {10.1007/S10676-014-9343-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ethicsit/SchermerCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Sharkey14, author = {Amanda J. C. Sharkey}, title = {Robots and human dignity: a consideration of the effects of robot care on the dignity of older people}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {1}, pages = {63--75}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9338-5}, doi = {10.1007/S10676-014-9338-5}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ethicsit/Sharkey14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/SorellD14, author = {Tom Sorell and Heather Draper}, title = {Robot carers, ethics, and older people}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {3}, pages = {183--195}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9344-7}, doi = {10.1007/S10676-014-9344-7}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/SorellD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/StarkT14, author = {Luke Stark and Matt Tierney}, title = {Lockbox: mobility, privacy and values in cloud storage}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {1}, pages = {1--13}, year = {2014}, url = {https://doi.org/10.1007/s10676-013-9328-z}, doi = {10.1007/S10676-013-9328-Z}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/StarkT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/TahatESA14, author = {Luay Tahat and Mohammad I. Elian and Nabeel N. Sawalha and Fuad N. Al{-}Shaikh}, title = {The ethical attitudes of information technology professionals: a comparative study between the {USA} and the Middle East}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {3}, pages = {241--249}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9349-2}, doi = {10.1007/S10676-014-9349-2}, timestamp = {Fri, 23 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ethicsit/TahatESA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Ulltveit-Moe14, author = {Nils Ulltveit{-}Moe}, title = {A roadmap towards improving managed security services from a privacy perspective}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {3}, pages = {227--240}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9348-3}, doi = {10.1007/S10676-014-9348-3}, timestamp = {Thu, 14 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Ulltveit-Moe14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Varelius14, author = {Jukka Varelius}, title = {Do patents and copyrights give their holders excessive control over the material property of others?}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {4}, pages = {299--305}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9355-4}, doi = {10.1007/S10676-014-9355-4}, timestamp = {Thu, 14 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Varelius14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/WeijersR14, author = {Dan Weijers and Jennifer Richardson}, title = {Is the repugnance about betting on terrorist attacks misguided?}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {3}, pages = {251--262}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9350-9}, doi = {10.1007/S10676-014-9350-9}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/WeijersR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Winter14, author = {Jenifer Sunrise Winter}, title = {Surveillance in ubiquitous network societies: normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {1}, pages = {27--41}, year = {2014}, url = {https://doi.org/10.1007/s10676-013-9332-3}, doi = {10.1007/S10676-013-9332-3}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Winter14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ethicsit/Young14, author = {Garry Young}, title = {A meta-ethical approach to single-player gamespace: introducing constructive ecumenical expressivism as a means of explaining why moral consensus is not forthcoming}, journal = {Ethics Inf. Technol.}, volume = {16}, number = {2}, pages = {91--102}, year = {2014}, url = {https://doi.org/10.1007/s10676-014-9336-7}, doi = {10.1007/S10676-014-9336-7}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ethicsit/Young14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.