Quarantining online hate speech: technical and ethical perspectives
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09516-z
Data science ethical considerations: a systematic literature review and proposed project framework
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09502-5
Toward inclusive tech policy design: a method for underrepresented voices to strengthen tech policy documents
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09497-z
Reassessing values for emerging big data technologies: integrating design-based and application-based approaches
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09503-4
Meaningful human control as reason-responsiveness: the case of dual-mode vehicles
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09519-w
Getting away with murder: why virtual murder in MMORPGs can be wrong on Kantian grounds
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09498-y
Privacy challenges in smart homes for people with dementia and people with intellectual disabilities
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09507-0
Distributive justice as an ethical principle for autonomous vehicle behavior beyond hazard scenarios
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09504-3
Autonomous vehicles, trolley problems, and the law
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09506-1
Presumptuous aim attribution, conformity, and the ethics of artificial social cognition
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09512-3
Drones in humanitarian contexts, robot ethics, and the human–robot interaction
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09514-1
Digital health fiduciaries: protecting user privacy when sharing health data
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09499-x
The moral limits of the market: the case of consumer scoring data
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09500-7
Introducing the pervert’s dilemma: a contribution to the critique of Deepfake Pornography
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09522-1
From privacy to anti-discrimination in times of machine learning
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09510-5
Trust and resilient autonomous driving systems
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09517-y
The interpersonal is political: unfriending to promote civic discourse on social media
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09511-4
The ethics of Smart City (EoSC): moral implications of hyperconnectivity, algorithmization and the datafication of urban digital society
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09523-0
Edward Snowden: Permanent record
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09521-2
Agile ethics: an iterative and flexible approach to assessing ethical, legal and social issues in the agile development of crisis management information systems
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09501-6
Could robots strengthen the sense of autonomy of older people residing in assisted living facilities?—A future-oriented study
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09524-z
Objections to Simpson’s argument in ‘Robots, Trust and War’
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09505-2
Kevin Macnish: The ethics of surveillance: an introduction
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09513-2
Measuring morality in videogames research
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09515-0
Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09508-z
Splintering the gamer’s dilemma: moral intuitions, motivational assumptions, and action prototypes
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09518-x
The disciplinary power of predictive algorithms: a Foucauldian perspective
来源期刊:Ethics and Information TechnologyDOI:10.1007/s10676-019-09509-y