


default search action
Ethics and Information Technology, Volume 16
Volume 16, Number 1, March 2014
- Luke Stark

, Matt Tierney:
Lockbox: mobility, privacy and values in cloud storage. 1-13 - Rath Kanha Sar, Yeslam Al-Saggaf

:
Contextual integrity's decision heuristic and the tracking by social network sites. 15-26 - Jenifer Sunrise Winter

:
Surveillance in ubiquitous network societies: normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things. 27-41 - Michael H. Nagenborg

:
Surveillance and persuasion. 43-49 - Merel Noorman

, Deborah G. Johnson:
Negotiating autonomy and responsibility in military robots. 51-62 - Amanda J. C. Sharkey:

Robots and human dignity: a consideration of the effects of robot care on the dignity of older people. 63-75
Volume 16, Number 2, June 2014
- Daniel Lim

:
Brain simulation and personhood: a concern with the Human Brain Project. 77-89 - Garry Young

:
A meta-ethical approach to single-player gamespace: introducing constructive ecumenical expressivism as a means of explaining why moral consensus is not forthcoming. 91-102 - George Lekakos, Pavlos A. Vlachos

, Christos Koritos
:
Green is good but is usability better? Consumer reactions to environmental initiatives in e-banking services. 103-117 - Nathan Cooper

, Andrew Swan, David Townend
:
A confluence of new technology and the right to water: experience and potential from South Africa's constitution and commons. 119-134 - Isabel P. Riquelme

, Sergio Román
:
The relationships among consumers' ethical ideology, risk aversion and ethically-based distrust of online retailers and the moderating role of consumers' need for personal interaction. 135-155 - Paul B. de Laat:

From open-source software to Wikipedia: 'Backgrounding' trust by collective monitoring and reputation tracking. 157-169 - Bart W. Schermer, Bart Custers

, Simone van der Hof
:
The crisis of consent: how stronger legal protection may lead to weaker consent in data protection. 171-182
Volume 16, Number 3, September 2014
- Tom Sorell, Heather Draper

:
Robot carers, ethics, and older people. 183-195 - Patrick Chisan Hew:

Artificial moral agents are infeasible with foreseeable technologies. 197-206 - Tony Doyle, Judy Veranas:

Public anonymity and the connected world. 207-218 - Michael Madary

:
Intentionality and virtual objects: the case of Qiu Chengwei's dragon sabre. 219-225 - Nils Ulltveit-Moe:

A roadmap towards improving managed security services from a privacy perspective. 227-240 - Luay Tahat

, Mohammad I. Elian
, Nabeel N. Sawalha, Fuad N. Al-Shaikh:
The ethical attitudes of information technology professionals: a comparative study between the USA and the Middle East. 241-249 - Dan Weijers

, Jennifer Richardson:
Is the repugnance about betting on terrorist attacks misguided? 251-262
Volume 16, Number 4, December 2014
- Jeffrey Alan Johnson:

From open data to information justice. 263-274 - James Petrik, Talgat Kilybayev

, Dinara Shormanbayeva:
The internet, identity and intellectual capital: a response to Dreyfus's critique of e-learning. 275-284 - Hugh Mackay:

Alistair Duff: A normative theory of the information society. 285-286 - Alexis M. Elder

:
Excellent online friendships: an Aristotelian defense of social media. 287-297 - Jukka Varelius

:
Do patents and copyrights give their holders excessive control over the material property of others? 299-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














