


default search action
Ethics and Information Technology, Volume 16
Volume 16, Number 1, March 2014
- Luke Stark
, Matt Tierney:
Lockbox: mobility, privacy and values in cloud storage. 1-13 - Rath Kanha Sar, Yeslam Al-Saggaf
:
Contextual integrity's decision heuristic and the tracking by social network sites. 15-26 - Jenifer Sunrise Winter
:
Surveillance in ubiquitous network societies: normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things. 27-41 - Michael H. Nagenborg:
Surveillance and persuasion. 43-49 - Merel Noorman
, Deborah G. Johnson:
Negotiating autonomy and responsibility in military robots. 51-62 - Amanda J. C. Sharkey:
Robots and human dignity: a consideration of the effects of robot care on the dignity of older people. 63-75
Volume 16, Number 2, June 2014
- Daniel Lim
:
Brain simulation and personhood: a concern with the Human Brain Project. 77-89 - Garry Young
:
A meta-ethical approach to single-player gamespace: introducing constructive ecumenical expressivism as a means of explaining why moral consensus is not forthcoming. 91-102 - George Lekakos, Pavlos A. Vlachos
, Christos Koritos:
Green is good but is usability better? Consumer reactions to environmental initiatives in e-banking services. 103-117 - Nathan Cooper, Andrew Swan, David Townend
:
A confluence of new technology and the right to water: experience and potential from South Africa's constitution and commons. 119-134 - Isabel P. Riquelme
, Sergio Román
:
The relationships among consumers' ethical ideology, risk aversion and ethically-based distrust of online retailers and the moderating role of consumers' need for personal interaction. 135-155 - Paul B. de Laat:
From open-source software to Wikipedia: 'Backgrounding' trust by collective monitoring and reputation tracking. 157-169 - Bart W. Schermer, Bart Custers
, Simone van der Hof
:
The crisis of consent: how stronger legal protection may lead to weaker consent in data protection. 171-182
Volume 16, Number 3, September 2014
- Tom Sorell, Heather Draper
:
Robot carers, ethics, and older people. 183-195 - Patrick Chisan Hew:
Artificial moral agents are infeasible with foreseeable technologies. 197-206 - Tony Doyle, Judy Veranas:
Public anonymity and the connected world. 207-218 - Michael Madary:
Intentionality and virtual objects: the case of Qiu Chengwei's dragon sabre. 219-225 - Nils Ulltveit-Moe:
A roadmap towards improving managed security services from a privacy perspective. 227-240 - Luay Tahat
, Mohammad I. Elian, Nabeel N. Sawalha, Fuad N. Al-Shaikh:
The ethical attitudes of information technology professionals: a comparative study between the USA and the Middle East. 241-249 - Dan Weijers
, Jennifer Richardson:
Is the repugnance about betting on terrorist attacks misguided? 251-262
Volume 16, Number 4, December 2014
- Jeffrey Alan Johnson:
From open data to information justice. 263-274 - James Petrik, Talgat Kilybayev
, Dinara Shormanbayeva:
The internet, identity and intellectual capital: a response to Dreyfus's critique of e-learning. 275-284 - Hugh Mackay:
Alistair Duff: A normative theory of the information society. 285-286 - Alexis M. Elder
:
Excellent online friendships: an Aristotelian defense of social media. 287-297 - Jukka Varelius:
Do patents and copyrights give their holders excessive control over the material property of others? 299-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.