Nothing Special   »   [go: up one dir, main page]

skip to main content
survey
Open access

The Ethics of Computing: A Survey of the Computing-Oriented Literature

Published: 22 February 2016 Publication History

Abstract

Computing technologies and artifacts are increasingly integrated into most aspects of our professional, social, and private lives. One consequence of this growing ubiquity of computing is that it can have significant ethical implications that computing professionals need to be aware of. The relationship between ethics and computing has long been discussed. However, this is the first comprehensive survey of the mainstream academic literature of the topic. Based on a detailed qualitative analysis of the literature, the article discusses ethical issues, technologies that they are related to, and ethical theories, as well as the methodologies that the literature employs, its academic contribution, and resulting recommendations. The article discusses general trends and argues that the time has come for a transition to responsible research and innovation to ensure that ethical reflection of computing has practical and manifest consequences.

References

[1]
Alison Adam. 2001. Computer ethics in a different voice. Information and Organization 11, 4, 235--261.
[2]
M. Al Ameen, J. Liu, and K. Kwak. 2012. Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems 36, 1, 93--101.
[3]
Bill Albrecht, Ken Christensen, Venu Dasigi, Jim Huggins, and Jody Paul. 2012. The pledge of the computing professional: Recognizing and promoting ethics in the computing professions. SIGCAS Computers and Society 42, 1, 6--8.
[4]
C. Allen, I. Smit, and W. Wallach. 2005. Artificial morality: Top-down, bottom-up, and hybrid approaches. Ethics and Information Technology 7, 3, 149--155.
[5]
P. J. Allen and L. D. Roberts. 2010. The ethics of outsourcing online survey research. International Journal of Technoethics 1, 3, 35--48.
[6]
F. Allhoff, P. Lin, J. Moor, and J. Weckert. 2010. Ethics of human enhancement: 25 questions & answers. Studies in Ethics, Law, and Technology 4, 1.
[7]
M. L. Anderson. 2005. Why is AI so scary? Artificial Intelligence 169, 2, 201--208.
[8]
M. Angrist. 2009. Eyes wide open: The personal genome project, citizen science and veracity in informed consent. Personalized Medicine 6, 691--699.
[9]
Aristotle. 2007. The Nicomachean Ethics. Filiquarian Publishing, LLC, Minneapolis, MN.
[10]
S. A. Bagüés, A. Zeidler, C. Klein, F. Valdivielso, and R. Matias. 2010. Enabling personal privacy for pervasive computing environments. Journal of Universal Computer Science 16, 341--371.
[11]
D. Banerjee, T. P. Cronan, and T. W. Jones. 1998. Modeling IT ethics: A study in situational ethics. MIS Quarterly 22, 1, 31--60.
[12]
Jeremy Bentham. 1789. An Introduction to the Principles of Morals and Legislation. Dover Publications Inc., Mineola, NY.
[13]
Sebastian Boell and Dubravka Cecez-Kecmanovic. 2014. A hermeneutic approach for conducting literature reviews and literature searches. Communications of the Association for Information Systems 34, 1.
[14]
K. W. Bowyer. 2004. Face recognition technology: Security versus privacy. IEEE Technology and Society Magazine 23, 1, 9--20.
[15]
P. Brey. 2005. Freedom and privacy in ambient intelligence. Ethics and Information Technology 7, 3, 157--166.
[16]
Philip Brey and Johnny H. Soraker. 2009. Philosophy of computing and information technology. In Dov M. Gabbay, Anthonie W. M. Meijers, John Woods, and Paul Thagard (Eds). Philosophy of Technology and Engineering Sciences: 9. North Holland, 1341--1408.
[17]
S. Brown, N. Hine, A. Sixsmith, and P. Garner. 2004. Care in the community. BT Technology Journal 22, 3, 56--64.
[18]
Elizabeth A. Buchanan and Erin E. Hvizdak. 2009. Online survey tools: Ethical and methodological concerns of human research ethics committees. Journal of Empirical Research on Human Research Ethics 4, 2, 37--48.
[19]
T. Bynum. 2008a. Norbert Wiener and the rise of information ethics. In Jeroen van den Hoven and John Weckert (Eds). Information Technology and Moral Philosophy. Cambridge University Press, New York, NY, 8--25.
[20]
Terrell Bynum. 2008b. Computer and information ethics. In Stanford Encyclopedia of Philosophy. Retrieved January 14, 2016 from http://plato.stanford.edu/entries/ethics-computer/.
[21]
Terrell Ward Bynum and Simon Rogerson. 2003. Computer Ethics and Professional Responsibility: Introductory Text and Readings. WileyBlackwell, Hoboken, NJ.
[22]
C. Cary, H. J. Wen, and P. Mahatanankoon. 2003. Data mining: Consumer privacy, ethical policy, and systems development practices. Human Systems Management 22, 4, 157--168.
[23]
W. B. Chiou, P. H. Wan, and C. S. Wan. 2012. A new look at software piracy: Soft lifting primes an inauthentic sense of self, prompting further unethical behavior. International Journal of Human Computer Studies 70, 2, 107--115.
[24]
Suparna Choudhury, Jennifer R. Fishman, Michelle L. McGowan, and Eric T. Juengst. 2014. Big data, open science and the brain: lessons learned from genomics. Frontiers in Human Neuroscience 8, 239.
[25]
Ellen Wright Clayton. 2005. Informed consent and biobanks. Journal of Law, Medicine & Ethics 33, 1, 15--21.
[26]
Eli Cohen and Larry Cornwell. 1989. A question of ethics: Developing information system ethics. Journal of Business Ethics 8, 6, 431--437.
[27]
D. Collingridge. 1980. The Social Control of Technology. Palgrave Macmillan, Basingstoke, UK.
[28]
Mary L. Cummings. 2006. Integrating ethics in design through the value-sensitive design approach. Science and Engineering Ethics 12, 4, 701--715.
[29]
J. K. Estell and K. Christensen. 2011. The need for a new graduation rite of passage. Communications of the ACM 54, 2, 113--115.
[30]
Joshua Fairfield and Hannah Shtein. 2014. Big data, big problems: Emerging issues in the ethics of data science and journalism. Journal of Mass Media Ethics 29, 1, 38--51.
[31]
D. Feil-Seifer and M. J. Mataric. 2011. Socially assistive robotics: Ethical issues related to technology. IEEE Robotics and Automation Magazine 18, 1, 24--31.
[32]
Luciano Floridi. 2010. Information ethics. In Luciano Floridi (Ed.). The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press, New York, NY, 77--97.
[33]
Luciano Floridi. 2011. The informational nature of personal identity. Minds and Machines 21, 4, 549--566.
[34]
Luciano Floridi. 2013. The Philosophy of Information Reprint edition., Oxford University Press, Oxford, UK.
[35]
Luciano Floridi and J. W. Sanders. 2004. On the morality of artificial agents. Minds and Machines 14, 3, 349--379.
[36]
M. Friedewald, O. D. Costa, Y. Punie, P. Alahuhta, and S. Heinonen. 2005. Perspectives of ambient intelligence in the home environment. Telematics and Informatics 22, 3, 221--238.
[37]
Batya Friedman, Peter Kahn, and Alan Borning. 2008. Value sensitive design and information systems. In Ken Himma and Herman Tavani (Eds.). The Handbook of Information and Computer Ethics. Wiley Blackwell, Hoboken, NJ, 69--102.
[38]
General Medical Council. 2008. Consent: patients and doctors making decisions together. Retrieved January 14, 2016 from http://www.gmc-uk.org/guidance/ethical_guidance/consent_guidance_index.asp.
[39]
Carol Gilligan. 1990. In a Different Voice: Psychological Theory and Women's Development. Harvard University Press, Cambridge, MA.
[40]
C. Girvan and T. Savage. 2012. Ethical considerations for educational research in a virtual world. Interactive Learning Environments 20, 3, 239--251.
[41]
Emilie Steele Giustozzi and Betsy Van derVeer Martens. 2011. The new competitive intelligence agents: “Programming” competitive intelligence ethics into corporate cultures. Webology 8, 2.
[42]
M. E. Gorman. 2001. Turning students into ethical professionals. IEEE Technology and Society Magazine 20, 4, 21--27.
[43]
Don Gotterbarn, Keith Miller, and Simon Rogerson. 1999. Computer society and ACM approve software engineering code of ethics. Computer 32, 10, 84--88.
[44]
Armin Grunwald. 2010. From speculative nanoethics to explorative philosophy of nanotechnology. Nanoethics 4, 2, 91--101.
[45]
Amy Gutmann. 2011. The ethics of synthetic biology: Guiding principles for emerging technologies. Hastings Center Report 41, 4, 17--22.
[46]
K. L. Hacker, S. M. Mason, and E. L. Morgan. 2009. Digital disempowerment in a network society. International Journal of Electronic Government Research 5, 2, 57--71.
[47]
C. Heeney. 2012. Breaching the contract? Privacy and the UK census. Information Society 28, 5, 316--328.
[48]
E. Hildt. 2010. Brain--Computer interaction and medical access to the brain: Individual, social and ethical implications. Studies in Ethics, Law, and Technology 4, 3.
[49]
K. E. Himma. 2009. Artificial agency, consciousness, and the criteria for moral agency: What properties must an artificial agent have to be a moral agent? Ethics and Information Technology 11, 1, 19--29.
[50]
K. E. Himma and H. T. Tavani. 2008. The handbook of information and computer ethics. Wiley, Hoboken, NJ.
[51]
Jeroen van den Hoven and John Weckert (Eds.) 2008. Information Technology and Moral Philosophy. Cambridge University Press, New York, NY.
[52]
Gordon Hull. 2012. Robert Merges: Justifying intellectual property. Ethics and Information Technology 14, 2, 169--177.
[53]
John P. A. Ioannidis. 2013. Informed consent, big data, and the oxymoron of research that is not research. American Journal of Bioethics 13, 4, 40--42.
[54]
Deborah G. Johnson. 1985. Computer Ethics. Prentice-Hall, Upper Saddle River, NJ.
[55]
Deborah G. Johnson and Helen Nissenbaum. 1995. Computers, Ethics and Social Values. Pearson, New York, NY.
[56]
Damien Joseph, Kok-Yee Ng, Christine Koh, and Soon Ang. 2007. Turnover of information technology professionals: a narrative review, meta-analytic structural equation modeling, and model development. MIS Quarterly 31, 3, 547--577.
[57]
Immanuel Kant. 1797. Grundlegung zur Metaphysik der Sitten. Reclam, Ditzingen.
[58]
Immanuel Kant. 1788. Kritik der praktischen Vernunft. Reclam, Ditzingen.
[59]
Bonnie Kaplan and Sergio Litewka. 2008. Ethical challenges of telemedicine and telehealth. Cambridge Quarterly of Healthcare Ethics 17, 4, 401--416.
[60]
B. M. Kious. 2001. The Nuremberg Code: its history and implications. Princeton Journal of Bioethics 4, 7--19.
[61]
Aleksandra K. Krotoski. 2012. Data-driven research: Open data opportunities for growing knowledge, and ethical issues that arise. Insights: the UKSG Journal 25, 1, 28--32.
[62]
V. Lally, M. Sharples, F. Tracy, N. Bertram, and S. Masters. 2012. Researching the ethical dimensions of mobile, ubiquitous and immersive technology enhanced learning (MUITEL): A thematic review and dialogue. Interactive Learning Environments 20, 3, 217--238.
[63]
Bruno Latour and Couze Venn. 2002. Morality and technology: The end of the means. Theory Culture Society 19, 5--6, 247--260.
[64]
M. Li and S. Buchthal. 2012. Advisory services in the virtual world: An empowerment perspective. Electronic Commerce Research 12, 1, 53--96.
[65]
L. Little and P. Briggs. 2009. Pervasive healthcare: The elderly perspective. In 2nd International Conference on PErvasive Technologies Related to Assistive Environments (PETRA’09). Corfu.
[66]
Stine Lomborg and Anja Bechmann. 2014. Using APIs for data collection on social media. Inf. Soc. 30, 4 (2014), 256--265.
[67]
David Lyon. 2003. Surveillance as social sorting: Privacy, Risk, and Digital Discrimination. Routledge, London, UK.
[68]
Alasdair C. MacIntyre. 2007. After Virtue: A Study in Moral Theory. University of Notre Dame Press, Notre Dame, IN.
[69]
John Mack. 2004. Beyond HIPAA: Ethics in the e-health arena. Ethical guidelines help ensure that credible health information appears on the Internet. Healthcare Executive 19, 5, 32--3.
[70]
Phil Macnaghten and Richard Owen. 2011. Good governance for geoengineering. Nature 479, 7373, 293.
[71]
N. Manders-Huits. 2010. Practical versus moral identities in identity management. Ethics and Information Technology 12, 1, 43--55.
[72]
Alexander Markowetz, Konrad Błaszkiewicz, Christian Montag, Christina Switala, and Thomas E. Schlaepfer. 2014. Psycho-informatics: Big data shaping modern psychometrics. Medical Hypotheses 82, 4, 405--411.
[73]
M. Lynne Markus and Kevin Mentzer. 2014. Foresight for a responsible future with ICT. Information System Frontiers 1--16.
[74]
Maris Martinsons, et al. 2009. The Ethics of IT Professionals in Japan and China. Journal of the Association for Information Systems 10, 11, 834--859.
[75]
A. Marturano. 2002. The role of metaethics and the future of computer ethics. Ethics and Information Technology 4, 1, 71--78.
[76]
M. T. McFall. 2012. Real character-friends: Aristotelian friendship, living together, and technology. Ethics and Information Technology 14, 3, 221--230.
[77]
K. W. Miller. 2009. Joining the conversation about IT ethics. IT Professional 11, 5, 48--50.
[78]
John Stuart Mill. 1861. Utilitarianism (2nd rev. ed)., Hackett Publishing Co, Inc., Cambridge, MA.
[79]
John Mingers. 2001. Combining IS research methods: Towards a pluralist methodology. Information Systems Research 12, 3, 240--259.
[80]
John Mingers and Geoff Walsham. 2010. Towards ethical information systems: The contribution of discourse ethics. MIS Quarterly 34, 4, 833--854.
[81]
C. Mitcham. 2009. Convivial software: An end-user perspective on free and open source software. Ethics and Information Technology 11, 4, 299--310.
[82]
Brent Mittelstadt and Luciano Floridi. 2015. The ethics of big data: Current and foreseeable issues in biomedical contexts. Science and Engineering Ethics online firsts (2015).
[83]
M. A. Mizani and N. Baykal. 2007. A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example. Journal of Medical Ethics 33, 12, 695--698.
[84]
Emilio Mordini and Corinna Ottolini. 2007. Body identification, biometrics and medicine: Ethical and social considerations. Annali dell’Istituto Superiore di Sanita 43, 1, 51--60.
[85]
Arash Mostaghimi and Bradley H. Crotty. 2011. Professionalism in the digital age. Annals of Internal Medicine 154, 8, 560--W197.
[86]
Saskia K. Nagel and Hartmut Remmers. 2012. Self-perception and self-determination in surveillance conditions. American Journal of Bioethics 12, 9, 53--55.
[87]
Björn Niehaves and Ralf Plattfaut. 2014. Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide. European Journal of Information Systems 23, 6, 708--726.
[88]
Niels Nijsingh and Marcus Duwell. 2009. Interdisciplinary, applied ethics and social science. In Paul Sollie and Marcus Düwell (Eds.). Evaluating New Technologies: Methodological Problems for the Ethical Assessment of Technology Developments. The International Library of Ethics, Law and Technology. Springer, New York, NY, 79--92.
[89]
Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Social Science Research Network, Rochester, NY.
[90]
Andre Oboler, K. Welsh, and L. Cruz. 2012. The danger of big data: Social media as computational social science. First Monday 17, 7.
[91]
Govindan Parayil. 2005. The digital divide and increasing returns: Contradictions of informational capitalism. The Information Society 21, 1, 41--51.
[92]
Dinah Payne and Brett J. L. Landry. 2006. A uniform code of ethics: Business and IT professional ethics. Communications of the ACM 49, 11, 80--84.
[93]
J. A. Quilici-Gonzalez, G. Kobayashi, M. C. Broens, and M. E. Q. Gonzalez. 2010. Ubiquitous computing: Any ethical implications? International Journal of Technoethics 1, 3, 11--23.
[94]
U. Rashid, H. Schmidtke, and N. Woo. 2007. Managing disclosure of personal health information in smart home healthcare. In 4th International Conference on Universal Access in Human-Computer Interaction (UAHCI’07). Beijing.
[95]
Frantz Rowe. 2014. What literature review is not: diversity, boundaries and recommendations. European Journal of Information Systems 23, 3, 241--255.
[96]
Bertrand Russell. 2001. The Problems of Philosophy. Oxford University Press, New York, NY.
[97]
Fariba Sadri. 2011. Ambient intelligence: A survey. ACM Computing Surveys 43, 4, 36.1--36.66.
[98]
P. Salvini, E. Datteri, C. Laschi, and P. Dario. 2008. Scientific models and ethical issues in hybrid bionic systems research. AI and Society 22, 3, 431--448.
[99]
Suprateek Sarker, Mark Fuller, and Sutirtha Chatterjee. 2009. Ethical information systems development: A Baumanian postmodernist perspective. Journal of the Association for Information Systems 10, 11, 787--815.
[100]
Geoff Sayre-McCord. 2014. Metaethics. In Edward N. Zalta (Ed.). The Stanford Encyclopedia of Philosophy. Retrieved January 14, 2016 from http://plato.stanford.edu/entries/metaethics/.
[101]
B. W. Schermer. 2011. The limits of privacy in automated profiling and data mining. Computer Law and Security Review 27, 1, 45--52.
[102]
Ferdinand Schoeman. 1984. Privacy and intimate information. In Philosophical dimensions of privacy: An anthology, Fertinand Schoeman (Ed.). Cambridge University Press, Cambridge. 403--408.
[103]
U. Schultze and R. O. Mason. 2012. Studying cyborgs: Re-examining internet studies as human subjects research. Journal of Information Technology 27, 4, 301--312.
[104]
Richard A. Spinello and Herman T. Tavani. 2004. Intellectual Property Rights in a Networked World: Theory and Practice. Information Science Publishing, Hershey, PA.
[105]
Richard A. Spinello and Herman T. Tavani. 2001. Readings in CyberEthics. Jones and Bartlett Publishers, Inc., Burlington, MA.
[106]
Bernd Stahl. 2012. Morality, Ethics, and Reflection: A categorization of normative IS research. Journal of the Association for Information Systems 13, 8.
[107]
Jack Stilgoe, Richard Owen, and Phil Macnaghten. 2013. Developing a framework for responsible innovation. Research Policy 42, 9, 1568--1580.
[108]
E. Stip and V. Rialle. 2005. Environmental cognitive remediation in schizophrenia: Ethical implications of “smart home” technology. Canadian Journal of Psychiatry-Revue Canadienne De Psychiatrie 50, 5, 281--291.
[109]
J. P. Sullins. 2005. Ethics and artificial life: From modeling to moral agents. Ethics and Inforvvmation Technology 7, 3, 139--148.
[110]
David R. Tranfield, David Denyer, and Palminder Smart. 2003. Towards a methodology for developing evidence-informed management knowledge by means of systematic review. British Journal of Management 14, 207--222.
[111]
J. van den Hoven. 2008. Information technology, privacy, and the protection of personal data. In Information Technology and Moral Philosophy. Cambridge Studies in Philosophy and Public Policy. Cambridge University Press, New York, NY.
[112]
L. Van Wel and L. Royakkers. 2004. Ethical issues in web data mining. Ethics and Information Technology 6, 2, 129--140.
[113]
C. K. Varnhagen et al. 2005. How informed is online informed consent? Ethics & Behavior 15, 1, 37--48.
[114]
Rene Von Schomberg (Ed.): 2011. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields. Publication Office of the European Union, Luxembourg.
[115]
Ken Wakita and Toshiyuki Tsurumi. 2007. Finding community structure in mega-scale social networks: [Extended Abstract]. In Proceedings of the 16th International Conference on World Wide Web (WWW’07). ACM, New York, NY, 1275--1276.
[116]
W. Wallach. 2008. Implementing moral decision making faculties in computers and robots. AI and Society 22, 4, 463--475.
[117]
D. M. Wasieleski and M. Gal-Or. 2008. An enquiry into the ethical efficacy of the use of radio frequency identification technology. Ethics and Information Technology 10, 1, 27--40.
[118]
John Weckert and Richard Lucas (Eds.). 2013. Professionalism in the Information and Communication Technology Industry. The Australian National University, Canberra, Australia.
[119]
Joseph Weizenbaum. 1977. Computer Power and Human Reason: From Judgement to Calculation. W. H. Freeman & Co Ltd.
[120]
Y. H. Weng. 2010. Beyond robot ethics: On a legislative consortium for social robotics. Advanced Robotics 24, 13, 1919--1926.
[121]
Alan F. Westin. 1970. Privacy and Freedom. The Bodley Head, London, UK.
[122]
Norbert Wiener. 1964. God and Golem, Inc. A Comment on Certain Points where Cybernetics Impinges on Religion. MIT Press, Cambridge, MA.
[123]
Norbert Wiener. 1954. The Human Use of Human Beings. Doubleday, New York, NY.
[124]
David Wilkinson and Mike Thelwall. 2011. Researching personal information on the public web methods and ethics. Social Science Computer Review 29, 4, 387--401.
[125]
T. J. Williamson. 2010. Predicting building performance: The ethics of computer simulation. Building Research and Information 38, 4, 401--410.
[126]
D. Wright, S. Gutwirth, M. Friedewald, E. Vildjiounaite, and Y. Punie. 2008. Safeguards in a World of Ambient Intelligence. Springer-Verlag, New York, NY.
[127]
Aimee van Wynsberghe. 2013. Designing robots for care: Care centered value-sensitive design. Science and Engineering Ethics 19, 2, 407--433.
[128]
Joy Y. Zhang, Claire Marris, and Nikolas Rose. 2011. The transnational governance of synthetic biology—Scientific uncertainty, cross-borderness and the “art” of governance. London School of Economics and Political Science, London, UK.
[129]
M. Zimmer. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics and Information Technology 12, 4, 313--325.

Cited By

View all
  • (2024)The Evolution of Ethical Standards and Guidelines in AIResponsible Implementations of Generative AI for Multidisciplinary Use10.4018/979-8-3693-9173-0.ch003(45-84)Online publication date: 20-Sep-2024
  • (2024)From Corporate Digital Responsibility to Responsible Digital EcosystemsSustainability10.3390/su1612497216:12(4972)Online publication date: 11-Jun-2024
  • (2024)Surveying a Landscape of Ethics-Focused Design MethodsACM Journal on Responsible Computing10.1145/36789881:3(1-32)Online publication date: 17-Jul-2024
  • Show More Cited By

Index Terms

  1. The Ethics of Computing: A Survey of the Computing-Oriented Literature

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 48, Issue 4
      May 2016
      605 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/2891449
      • Editor:
      • Sartaj Sahni
      Issue’s Table of Contents
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 February 2016
      Accepted: 01 November 2015
      Revised: 01 November 2015
      Received: 01 June 2015
      Published in CSUR Volume 48, Issue 4

      Check for updates

      Author Tags

      1. Computer ethics
      2. information ethics
      3. responsible research and innovation

      Qualifiers

      • Survey
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1,255
      • Downloads (Last 6 weeks)131
      Reflects downloads up to 01 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)The Evolution of Ethical Standards and Guidelines in AIResponsible Implementations of Generative AI for Multidisciplinary Use10.4018/979-8-3693-9173-0.ch003(45-84)Online publication date: 20-Sep-2024
      • (2024)From Corporate Digital Responsibility to Responsible Digital EcosystemsSustainability10.3390/su1612497216:12(4972)Online publication date: 11-Jun-2024
      • (2024)Surveying a Landscape of Ethics-Focused Design MethodsACM Journal on Responsible Computing10.1145/36789881:3(1-32)Online publication date: 17-Jul-2024
      • (2024)A DSL for Testing LLMs for Fairness and BiasProceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems10.1145/3640310.3674093(203-213)Online publication date: 22-Sep-2024
      • (2024)Case Studies About Moral Dilemas to Apply Ethical Theories in Engineering EducationIEEE Revista Iberoamericana de Tecnologias del Aprendizaje10.1109/RITA.2024.336860919(1-6)Online publication date: 2024
      • (2024)Responsible retrospection: adapting responsible innovation to the liminal innovation of ICTsJournal of Responsible Innovation10.1080/23299460.2024.232623211:1Online publication date: 24-Mar-2024
      • (2024)Ethics in the Governance of Data and Digital Technology: An Analysis of European Data Regulations and PoliciesDigital Society10.1007/s44206-024-00101-63:1Online publication date: 4-Mar-2024
      • (2024)AI ethics with Chinese characteristics? Concerns and preferred solutions in Chinese academiaAI & Society10.1007/s00146-022-01578-w39:3(1261-1274)Online publication date: 1-Jun-2024
      • (2023)Ethical Considerations for Artificial Intelligence in Educational AssessmentsCreative AI Tools and Ethical Implications in Teaching and Learning10.4018/979-8-3693-0205-7.ch003(32-79)Online publication date: 29-Dec-2023
      • (2023)A Comparative Study on the Ethical Responsibilities of Key Role Players in Software DevelopmentSoftware10.3390/software20400232:4(504-516)Online publication date: 5-Dec-2023
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media