Search dblp for Publications

export results for "toc:db/journals/ethicsit/ethicsit16.bht:"

 download as .bib file

@article{DBLP:journals/ethicsit/CooperST14,
  author       = {Nathan Cooper and
                  Andrew Swan and
                  David Townend},
  title        = {A confluence of new technology and the right to water: experience
                  and potential from South Africa's constitution and commons},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {119--134},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9340-y},
  doi          = {10.1007/S10676-014-9340-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ethicsit/CooperST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/DoyleV14,
  author       = {Tony Doyle and
                  Judy Veranas},
  title        = {Public anonymity and the connected world},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {207--218},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9346-5},
  doi          = {10.1007/S10676-014-9346-5},
  timestamp    = {Thu, 14 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/DoyleV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Elder14,
  author       = {Alexis M. Elder},
  title        = {Excellent online friendships: an Aristotelian defense of social media},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {4},
  pages        = {287--297},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9354-5},
  doi          = {10.1007/S10676-014-9354-5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Elder14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Hew14,
  author       = {Patrick Chisan Hew},
  title        = {Artificial moral agents are infeasible with foreseeable technologies},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {197--206},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9345-6},
  doi          = {10.1007/S10676-014-9345-6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Hew14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Johnson14,
  author       = {Jeffrey Alan Johnson},
  title        = {From open data to information justice},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {4},
  pages        = {263--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9351-8},
  doi          = {10.1007/S10676-014-9351-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Johnson14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Laat14,
  author       = {Paul B. de Laat},
  title        = {From open-source software to Wikipedia: 'Backgrounding' trust by collective
                  monitoring and reputation tracking},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {157--169},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9342-9},
  doi          = {10.1007/S10676-014-9342-9},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Laat14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/LekakosVK14,
  author       = {George Lekakos and
                  Pavlos A. Vlachos and
                  Christos Koritos},
  title        = {Green is good but is usability better? Consumer reactions to environmental
                  initiatives in e-banking services},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {103--117},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9337-6},
  doi          = {10.1007/S10676-014-9337-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ethicsit/LekakosVK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Lim14,
  author       = {Daniel Lim},
  title        = {Brain simulation and personhood: a concern with the Human Brain Project},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {77--89},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-013-9330-5},
  doi          = {10.1007/S10676-013-9330-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Lim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Mackay14,
  author       = {Hugh Mackay},
  title        = {Alistair Duff: {A} normative theory of the information society},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {4},
  pages        = {285--286},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9353-6},
  doi          = {10.1007/S10676-014-9353-6},
  timestamp    = {Thu, 14 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Mackay14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Madary14,
  author       = {Michael Madary},
  title        = {Intentionality and virtual objects: the case of Qiu Chengwei's dragon
                  sabre},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {219--225},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9347-4},
  doi          = {10.1007/S10676-014-9347-4},
  timestamp    = {Thu, 14 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Madary14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Nagenborg14,
  author       = {Michael H. Nagenborg},
  title        = {Surveillance and persuasion},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {43--49},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9339-4},
  doi          = {10.1007/S10676-014-9339-4},
  timestamp    = {Sat, 30 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Nagenborg14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/NoormanJ14,
  author       = {Merel Noorman and
                  Deborah G. Johnson},
  title        = {Negotiating autonomy and responsibility in military robots},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {51--62},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-013-9335-0},
  doi          = {10.1007/S10676-013-9335-0},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/NoormanJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/PetrikKS14,
  author       = {James Petrik and
                  Talgat Kilybayev and
                  Dinara Shormanbayeva},
  title        = {The internet, identity and intellectual capital: a response to Dreyfus's
                  critique of e-learning},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {4},
  pages        = {275--284},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9352-7},
  doi          = {10.1007/S10676-014-9352-7},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/PetrikKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/RiquelmeR14,
  author       = {Isabel P. Riquelme and
                  Sergio Rom{\'{a}}n},
  title        = {The relationships among consumers' ethical ideology, risk aversion
                  and ethically-based distrust of online retailers and the moderating
                  role of consumers' need for personal interaction},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {135--155},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9341-x},
  doi          = {10.1007/S10676-014-9341-X},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/RiquelmeR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/SarA14,
  author       = {Rath Kanha Sar and
                  Yeslam Al{-}Saggaf},
  title        = {Contextual integrity's decision heuristic and the tracking by social
                  network sites},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {15--26},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-013-9329-y},
  doi          = {10.1007/S10676-013-9329-Y},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/SarA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/SchermerCH14,
  author       = {Bart W. Schermer and
                  Bart Custers and
                  Simone van der Hof},
  title        = {The crisis of consent: how stronger legal protection may lead to weaker
                  consent in data protection},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {171--182},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9343-8},
  doi          = {10.1007/S10676-014-9343-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ethicsit/SchermerCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Sharkey14,
  author       = {Amanda J. C. Sharkey},
  title        = {Robots and human dignity: a consideration of the effects of robot
                  care on the dignity of older people},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {63--75},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9338-5},
  doi          = {10.1007/S10676-014-9338-5},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Sharkey14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/SorellD14,
  author       = {Tom Sorell and
                  Heather Draper},
  title        = {Robot carers, ethics, and older people},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {183--195},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9344-7},
  doi          = {10.1007/S10676-014-9344-7},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/SorellD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/StarkT14,
  author       = {Luke Stark and
                  Matt Tierney},
  title        = {Lockbox: mobility, privacy and values in cloud storage},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {1--13},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-013-9328-z},
  doi          = {10.1007/S10676-013-9328-Z},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/StarkT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/TahatESA14,
  author       = {Luay Tahat and
                  Mohammad I. Elian and
                  Nabeel N. Sawalha and
                  Fuad N. Al{-}Shaikh},
  title        = {The ethical attitudes of information technology professionals: a comparative
                  study between the {USA} and the Middle East},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {241--249},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9349-2},
  doi          = {10.1007/S10676-014-9349-2},
  timestamp    = {Fri, 23 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ethicsit/TahatESA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Ulltveit-Moe14,
  author       = {Nils Ulltveit{-}Moe},
  title        = {A roadmap towards improving managed security services from a privacy
                  perspective},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {227--240},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9348-3},
  doi          = {10.1007/S10676-014-9348-3},
  timestamp    = {Thu, 14 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Ulltveit-Moe14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Varelius14,
  author       = {Jukka Varelius},
  title        = {Do patents and copyrights give their holders excessive control over
                  the material property of others?},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {4},
  pages        = {299--305},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9355-4},
  doi          = {10.1007/S10676-014-9355-4},
  timestamp    = {Thu, 14 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Varelius14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/WeijersR14,
  author       = {Dan Weijers and
                  Jennifer Richardson},
  title        = {Is the repugnance about betting on terrorist attacks misguided?},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {251--262},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9350-9},
  doi          = {10.1007/S10676-014-9350-9},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/WeijersR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Winter14,
  author       = {Jenifer Sunrise Winter},
  title        = {Surveillance in ubiquitous network societies: normative conflicts
                  related to the consumer in-store supermarket experience in the context
                  of the Internet of Things},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {27--41},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-013-9332-3},
  doi          = {10.1007/S10676-013-9332-3},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Winter14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ethicsit/Young14,
  author       = {Garry Young},
  title        = {A meta-ethical approach to single-player gamespace: introducing constructive
                  ecumenical expressivism as a means of explaining why moral consensus
                  is not forthcoming},
  journal      = {Ethics Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {91--102},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10676-014-9336-7},
  doi          = {10.1007/S10676-014-9336-7},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ethicsit/Young14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics