Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-8bhkd Total loading time: 0 Render date: 2024-11-13T02:50:28.427Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  05 June 2012

Luciano Floridi
Affiliation:
University of Hertfordshire
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ackerman, B. and Fishkin, J. 2004. Deliberation Day. New Haven and London: Yale University Press.Google Scholar
Adam, A. 1998. Artificial Knowing: Gender and the Thinking Machine. New York and London: Routledge.Google Scholar
Adam, A. 2002. ‘Cyberstalking and Internet Pornography’, Ethics and Information Technology 4, 133–142.CrossRefGoogle Scholar
Adam, A. 2005. Gender, Ethics and Information Technology. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
Adam, A., Griffiths, M., Keogh, C., Moore, K., Richardson, H. and Tattersall, A. 2006. ‘Being an it in IT – Gendered Identities in the IT Workplace’, European Journal of Information Systems 15(4), 368–378.CrossRefGoogle Scholar
Adam, A. and Kreps, D. 2006. ‘Enabling or Disabling Technologies? A Critical Approach to Web Accessibility’, Information Technology and People 19(3), 203–218.CrossRefGoogle Scholar
Adams, J. 1998. The Next World War: Computers Are the Weapons and the Front Line is Everywhere. New York: Simon and Schuster.Google Scholar
Adler, M. and Posner, E. A. (eds.) 2001. Cost-Benefit Analysis: Economic, Philosophical and Legal Perspectives. Chicago: University of Chicago Press.
Agre, P. and Mailloux, C. 1997. ‘Social Choice about Privacy: Intelligent Vehicle-Highway Systems in the United States’, in Friedman, B. (ed.), Human Values and the Design of Computer Technology. Cambridge: Cambridge University Press.Google Scholar
Akrich, M. 1992. ‘The Description of Technical Objects’, in Bijker, W. and Law, J. E., (eds.), Shaping Technology/Building Society. Cambridge, MA: MIT Press.Google Scholar
Albrecht, K. and Macintyre, L. 2006. The Spychips Threat: Why Christians Should Resist RFID and Electronic Surveillance. Nashville: Nelson Current.Google Scholar
Albrechtslund, A. 2008. ‘Online Social Networking as Participatory Surveillance’, First Monday 13(3), 3 March. www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2142/1949
Alexander, J. 1999. Future War. New York: St. Martin's Press.Google Scholar
Alterman, A., 2003. ‘“A Piece of Yourself”: Ethical Issues in Biometric Identification’, Ethics and Information Technology 5(3),139–150.CrossRefGoogle Scholar
Anderson, M. and Anderson, S. L. 2006. ‘Computing an Ethical Theory with Multiple Prima Facie Duties’, in Proceeding EthicALife/ALifeX.Google Scholar
Anderson, M. and Anderson, S. L. 2007. ‘Machine Ethics: Creating an Ethical Intelligent Agent’, Artificial Intelligence Magazine 28(4), Winter, 15.Google Scholar
Anderson, M. and Anderson, S. L. 2008. ‘Ethical Healthcare Agents. Advanced Computational Intelligence Paradigms’, in Jain, L. C. (ed.), Healthcare-3 pp. 233–257. Berlin: Springer.Google Scholar
Anderson, N. 2007. ‘California Outlaws the Forced Subdermal RFID Tagging of Humans’, http://arstechnica.com/news.ars/post/20070904-california-outlaws-forced-rfid-tagging-of-humans.html
Anscombe, G. E. M. 1958. ‘Modern Moral Philosophy’, Philosophy33.CrossRef
Arendt, H. 1958. The Human Condition (2nd edn). Chicago: University of Chicago Press.Google Scholar
Arendt, H. 1968. ‘Crisis in Culture’, in Between Past and Future: Eight Exercises in Political Thought, pp. 197–227. New York: Meridian.Google Scholar
Aristotle, , On the Motion of Animals, On the Soul, Nicomachean Ethics.
Arkin, R. 2004. ‘Bombs, Bonding, and Bondage: Human-Robot Interaction and Related Ethical Issues’. Paper presented at the First International Conference on Roboethics, San Remo, Italy, January 2004.Google Scholar
Arkin, R. 2007. Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture. Technical Report GIT-GVU-07–11, College of Computing, Georgia Institute of Technology.
Arquilla, J. and Ronfeldt, D. 1997. In Athena's Camp: Preparing for Conflict in the Information Age. Santa Monica, CA: RAND.Google Scholar
Audi, R. 2007. Moral Value and Human Diversity. New York: Oxford University Press.CrossRefGoogle Scholar
Avgerou, C. 2003. ‘The Link Between ICT and Economic Growth in the Discourse of Development’, in Korpeal, M., Montealegre, R. and Poulymenakou, A. 2003, Organizational Information Systems in the Context of Globalization, pp. 373–386. Dordrecht: Kluwer.CrossRefGoogle Scholar
Bailenson, J. N., Yee, N., Blascovich, J. and Guadagno, R. E. 2008. ‘Transformed Social Interaction in Mediated Interpersonal Communication’, in Konijn, E., Tanis, M., Utz, S. and Linden, A. (eds.), Mediated Interpersonal Communication. Mahwah, NJ: Lawrence Erlbaum Associates.Google Scholar
Bainbridge, W. S. and Roco, M. C. (eds.) 2006. Managing Nano-bio-info-cogno Innovations: Converging Technologies in Society. Dordrecht: Springer.CrossRef
Barab, S., Dodge, T., Thomas, M. K., Jackson, C. and Tuzun, H. 2007. ‘Our Designs and the Social Agendas They Carry’, Journal of the Learning Sciences 16, 263–305.CrossRefGoogle Scholar
Barbaro, M. and Zeller Jr., T. 2006. ‘A Face is Exposed for AOL Searcher No. 4417749’, The New York Times, 9 August.
Barcan Marcus, R. 1987. ‘Moral Dilemmas and Consistency’, in Gowans (1987), pp. 188–204.
Barger, R. N. 2008. Computer Ethics: A Case-Based Approach. New York: Cambridge University Press.CrossRefGoogle Scholar
Barlow, J. 1995. ‘Coming into the Country’, in Johnson, D. G. and Nissenbaum, H. (eds.), Computers, Ethics and Social Value, pp. 15–18. Upper Saddle River: Prentice Hall.Google Scholar
Barnaby, F. 1986. The Automated Battlefield. New York: The Free Press.Google Scholar
Barnes, S. B. 2006. ‘A Privacy Paradox: Social Networking in the United States’, First Monday 11(9). www.firstmonday.org/issues/issue11_9/barnes/index.html#authorCrossRefGoogle Scholar
Beauchamp, T. L. and Childress, J. F. 2001. Principles of Biomedical Ethics. Oxford: Oxford University Press.Google Scholar
Beckenstein, J. D. 2003. ‘Information in the Holographic Universe’, Scientific American, August, 58–65.CrossRefGoogle Scholar
Beitz, C. 2001. ‘Does Global Inequality Matter?’, in Pogge, T. W., Global Justice, pp. 106–122. Oxford: Blackwell.Google Scholar
Bell, T. W. 1995. ‘Anonymous Speech,’ Wired, October, http://www.wired.com/wired/archive/3.10/cyber.rights.html.
Bellin, D. and Chapman, G. 1987. Computers in Battle: Will They Work? New York: Harcourt, Brace and Jovanovich.Google Scholar
Benhabib, S. 1992. Situating the Self. Cambridge: Polity Press.Google Scholar
Benkler, Y. 2001. ‘The Battle over the Institutional Ecosystem in the Digital Environment’, Communications of the ACM 44(2), 84–90.CrossRefGoogle Scholar
Berlin, I. 1957. The Hedgehog and the Fox: An Essay on Tolstoy's View of History. New York: Weidenfeld and Nicolson.Google Scholar
Berlin, I. 1958. Two Concepts of Liberty: An Inaugural Lecture Delivered before the University of Oxford on 31 October 1958. Oxford: Clarendon Press.Google Scholar
Berlin, I. 1969. Four Essays on Liberty. Oxford: Clarendon Press.Google Scholar
Bijker, W. and Law, J. (eds.) 1992. Shaping Technology/Building Society. Studies in Sociotechnical Change. Cambridge, MA: MIT Press.
Black, H. C. 1990. Black's Law Dictionary: Definitions of the Terms and Phrases of American and English Jurisprudence, Ancient and Modern (6th edn). St Paul, MN: West Publishing.Google Scholar
Blackwell, A. H. 2003. ‘Don't Expect Any Privacy in the Workplace’, WWWiz.Com. wwwiz.com/issue45/
Bloor, D. 1976. Knowledge and Social Imagery. London: Routledge & Kegan Paul.Google Scholar
Boella, G. and Torre, L. 2004. ‘Fulfilling or Violating Obligations in Normative Multiagent Systems’, IAT 2004, 483–486.
Bohman, J. 1996. Public Deliberation: Pluralism, Complexity and Democracy. Cambridge, MA: MIT Press.Google Scholar
Boltuc, P. (ed.) 2008. APA Newsletter on Computers and Philosophy, Spring 7(2) and Fall 8(1).
Boran, M. 2007. ‘Data Centres Make Big Carbon Footprint’, Siliconrepublic.com, 10 October. www.siliconrepublic.com/news/news.nv?storyid=single9387
Boscarol, M. 2006. ‘Working with Others: Accessibility and User Research’, Accessibility 225, 9 October 09. http://alistapart.com/articles/workingwithothersGoogle Scholar
Bostrom, N. 2002. ‘Existential Risks: Analyzing Human Extinction Scenarios and Related Hazards’, Journal of Evolution and Technology 9, 1–30.Google Scholar
Bostrom, N. 2003. ‘The Transhumanist FAQ, Version 2.1’, www.transhumanism.org/resources/faq.html
Bourdieu, P. 1977. Outline of a Theory of Practice. Trans. Nice, R.. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Bowker, G. C. and Star, S. L. 1999. Sorting Things Out: Classification and Its Consequences. Boston: MIT Press.Google Scholar
Boyle, James. 2001. ‘A Politics of Intellectual Property: Environmentalism for the Net?’, in Spinello, R. A. and Tavani, H. T. (eds.), Readings in Cyberethics, pp. 231–251. Sudbury, MA: Jones and Bartlett.Google Scholar
Brandt, D. and Henning, K. 2002. ‘Information and Communication Technologies: Perspectives and Their Impact on Society’, AI and Society 16(3), 210–223.CrossRefGoogle Scholar
Bratman, M. E. 1987. Intention, Plans and Practical Reasoning. Cambridge: Harvard University Press.Google Scholar
Breazeal, C. 2002. Designing Sociable Robots. Cambridge, MA: MIT Press.Google Scholar
Brey, P. 1998. ‘The Politics of Computer Systems and the Ethics of Design’, in Hoven, J. (ed.), Computer Ethics: Philosophical Enquiry. Rotterdam: Rotterdam University Press.Google Scholar
Brey, P. 1999a. ‘Method in Computer Ethics: Towards a Multi-Level Interdisciplinary Approach’, Ethics and Information Technology 2(3), 1–5.Google Scholar
Brey, P. 1999b. ‘The Ethics of Representation and Action in Virtual Reality’, Ethics and Information Technology 1(1), 5–14.CrossRefGoogle Scholar
Brey, P. 1999c. ‘Worker Autonomy and the Drama of Digital Networks in Organizations’, Journal of Business Ethics 22(1), 15–25.CrossRefGoogle Scholar
Brey, P. 2000. ‘Disclosive Computer Ethics’, Computers and Society 30(4), 10–16.CrossRefGoogle Scholar
Brey, P. 2008. ‘Virtual Reality and Computer Simulation’, in Himma, K. E. and Tavani, H. T. (eds.), The Handbook of Information and Computer Ethics. Hoboken, NJ: John Wiley & Sons.Google Scholar
Briggle, A., Mitcham, C. and Ryder, M. 2005. ‘Technology: Overview’, in Mitcham, C. (ed.), Encyclopedia of Science, Technology and Ethics, pp. 908–1912. Detroit: Thomson, Gale.Google Scholar
Brin, D. 1999. The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom? New York: Perseus Books.Google Scholar
Bringsjord, S. 2007. ‘Ethical Robots: The Future Can Heed Us’, AI and Society (online).
Britz, J. 2007. ‘The Internet: The Missing Link Between the Information Rich and the Information Poor?’, in Capurro, R., Frühbauer, J. and Hausmaningers, T. (eds.), Localizing the Internet: Ethical aspects in intercultural perspective, pp. 265–277. Munich: Wilhelm Fink.Google Scholar
Brooks, R. A. 2002. Flesh and Machines: How Robots Will Change Us. New York: Pantheon.Google Scholar
Brooks, R. 2007. ‘Robotkind: On the Battlefield and in the Home’, Lecture to the British Computer Society, June 2007. Video online at http://74.125.95.132/server.php?show=ConWebDoc.10440
Brown, C. 2003. Lost Liberties: Ashcroft and the Assault on Personal Freedom. New York: The New Press.Google Scholar
Buchanan, E. A. 2004. ‘Ethical Considerations for the Information Professions’, in Spinello, R. A. and Tavani, H. T., (eds.), Readings in Cyberethics (2nd edn), pp. 613–624. Sudbury, MA: Jones and Bartlett.Google Scholar
Buchanan, E. and Campbell, J. 2005. ‘New Threats to Intellectual Freedom: The Loss of the Information Commons through Law and Technology in the US’, in Spinello, R. A. and Tavani, H. T. (eds.), Intellectual Property Rights in a Networked World: Theory and Practice, pp. 205–242. Hershey, PA: INFOSCI.Google Scholar
Budinger, T. F. and Budinger, M. D. 2006. Ethics of Emerging Technologies: Scientific Facts and Moral Challenges. Hoboken, NJ: Wiley.Google Scholar
Burk, D. 2001. ‘Copyrightable Functions and Patentable Speech’, Communications of the ACM 44(2), 69–76.CrossRefGoogle Scholar
Burk, D. 2007. ‘Privacy and Property in the Global Datasphere’, in Hongladarom, S. and Ess, C. (eds.), Information Technology Ethics: Cultural Perspectives, pp. 94–107. Hershey, PA: IGI Global.CrossRefGoogle Scholar
,Business Services Industry, 2007. ‘TopTenREVIEWS Reports Worldwide Pornography Market at Least $97 Billion; Every Second 28,258 Internet Users View Pornography’, bNet Business Network (12 March). http://findarticles.com/p/articles/mi_m0EIN/is_/ai_n27186769
Butler, S, 1985 (1872), Erewhon. London: Penguin Books.Google Scholar
Bynum, T. W. 1985. Editor's Introduction to James Moor, ‘What is Computer Ethics?’, Metaphilosophy 16(4), 263–265.CrossRefGoogle Scholar
Bynum, T. W. 1986. ‘Aristotle's Theory of Human Action’, a doctoral dissertation at the Graduate School of the City University of New York. www.southernct.edu/organizations/rccs/
Bynum, T. W. 2000a. ‘The Foundation of Computer Ethics’, Computers and Society 30(2), 6–13.CrossRefGoogle Scholar
Bynum, T. W. 2000b. ‘A Very Short History of Computer Ethics’, Newsletter of the American Philosophical Association on Philosophy and Computing. www.southernct.edu/organizations/rccs/resources/research/introduction/bynum_shrt_hist.html
Bynum, T. W. 2001. ‘Computer Ethics: Basic Concepts and Historical Overview’, Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/entries/ethics-computer/
Bynum, T. W. 2004. ‘Ethical Challenges to Citizens of the “Automatic Age”: Norbert Wiener on the Information Society’, Journal of Information, Communication and Ethics in Society 2(2), 65–74.CrossRefGoogle Scholar
Bynum, T. W. 2005. ‘Norbert Wiener's Vision: The Impact of the “Automatic Age” on Our Moral Lives’, in Cavalier, R. (ed.), The Impact of the Internet on Our Moral Lives, pp. 11–25. Albany, NY: State University of New YorkPress.Google Scholar
Bynum, T. W. 2006a. ‘Flourishing Ethics’, Ethics and Information Technology 8(4), 157–173.CrossRefGoogle Scholar
Bynum, T. W. 2006b. ‘A Copernican Revolution in Ethics?’, in Dodig-Crnkovi, G. and Stuart, S. (eds.), Computing, Philosophy, and Cognitive Science. Newcastle upon Tyne: Cambridge Scholars Press.Google Scholar
Bynum, T. W. and Rogerson, S. 1996, ‘Global Information Ethics: Introduction and Overview’, Science and Engineering Ethics 2(2), 131–136.CrossRefGoogle Scholar
Camp, J. 1999. ‘Democratic Implications of Internet Protocols,’ The Information Society 15, 249–256.CrossRefGoogle Scholar
Camp, L. J. 2003. ‘First Principles of Copyright for DRM Design’, IEEE Internet Computing 7(3), 59–65.CrossRefGoogle Scholar
Canellopoulou-Bottis, M. and Himma, K. E. 2008. ‘The Digital Divide: A Perspective for the Future’, in Himma, K. E. and Tavani, H. T. (eds.), The Handbook of Information and Computer Ethics, pp. 621–637. Hoboken, NJ: Wiley.CrossRefGoogle Scholar
Castells, M. 2000. The Information Age: Economy, Society, and Culture. Volume I: The Rise of the Network Society (2nd edn). Oxford: Blackwell.Google Scholar
Chakraborty, R., Stivers, D. N., Su, B., Zhong, Y. and Budowle, B. 1999. ‘The Utility of Short Tandem Repeat Loci Beyond Human Identification: Implications for Development of New DNA Typing’, Electrophoresis 20(8), 1682–1696.3.0.CO;2-Z>CrossRefGoogle ScholarPubMed
Chan, J. 2003. ‘Confucian Attitudes towards Ethical Pluralism’, in Madsen, R. and Strong, T. B. (eds.), The Many and the One: Religions and Secular Perspectives on Ethical Pluralism in the Modern World, pp. 129–153. Princeton: Princeton University Press.Google Scholar
Ciro, T. 2005. ‘The Scarcity of Intellectual Property’, Journal of Information, Law and Technology, www2.warwick.ac.uk/fac/soc/law/elj/jilt/Google Scholar
Clark, J. 2006. ‘To Hell with WCAG2’, Accessibility 217, 23 May 2006. http://alistapart.com/articles/tohellwithwcag2Google Scholar
Clarke, S. 2001. ‘Informed Consent in Medicine in Comparison with Consent in Other Areas of Human Activity’, Southern Journal of Philosophy 39, 169–187.CrossRefGoogle Scholar
Clarke, S. 2005. ‘Future Technologies, Dystopic Futures and the Precautionary Principle”, Ethics and Information Technology 7, 121–126.CrossRefGoogle Scholar
Clarke, S. 2009. ‘New Technologies, Common Sense and the Paradoxical Precautionary Principle’, in Duwell, M. and Sollie, P. (eds.), Evaluating New Technologies: Methodological Problems for the Assessment of Technological Developments, pp. 159–173. Dordrecht: Springer.CrossRefGoogle Scholar
Clarke, S. G. and Simpson, E. 1989. Anti-Theory in Ethics and Moral Conservatism. Albany, NY: State University of NewYork Press.Google Scholar
Clouser, K. D. 1980. Teaching Bioethics: Strategies, Problems, and Resources. Hastings Center, Institute for Society, Ethics, and the Life Sciences.Google Scholar
Cockburn, C. and Ormrod, S. 1993. Gender and Technology in the Making. Thousand Oaks, CA: Sage.Google Scholar
Coeckelbergh, M. 2007. ‘Violent Computer Games, Empathy, and Cosmopolitanism’, Ethics and Information Technology 9(3), 219–231.CrossRefGoogle Scholar
Coleman, S. and Gøtze, J. 2001/2004. ‘Bowling Together: Online Public Engagement in Policy Deliberation, Hansard Society’. Online at bowlingtogether.net
Collins, H. M. 1990. Artificial Experts: Social Knowledge and Intelligent Machines. Cambridge, MA/London: MIT Press.Google Scholar
Collste, G. 2002. ‘The Internet Doctor and Medical Ethics’, Medicine, Healthcare and Philosophy 5(2), 121–125.CrossRefGoogle ScholarPubMed
Combes, R. 2005. ‘A Taxonomy of Technics’, International Philosophical Quarterly 46, 5–24.CrossRefGoogle Scholar
Couldry, N. 2003. ‘Digital Divide or Discursive Design? On the Emerging Ethics of Information Space’, Ethics and Information Technology 5(2), 89–97.CrossRefGoogle Scholar
Cowan, R. S. 1989. More Work for Mother: The Ironies of Household Technology from the Open Hearth to the Microwave. London: Free Association Books.Google Scholar
Critcher, C. 2006. Critical Readings: Moral Panics and the Media. Maidenhead: Open University Press.Google Scholar
Cushman, M. and Klecun, E. 2006. ‘How (Can) Nonusers Engage with Technology: Bringing in the Digitally Excluded’, in Trauth, E. M., Howcroft, D., Butler, T., Fitzgerald, B. and DeGross, J. I., Social Inclusion: Societal and Organizational Implications for Information Systems (IFIP Volume 208), pp. 347–364. New York: Springer.CrossRefGoogle Scholar
Dastani, M., Boer, F., Dignum, F., Hoek, W., Kroese, M. and Meyer, J. J., ‘Implementing Cognitive Agents in 3APL’, www.cs.uu.nl/3apl/
Davies, S. 2003. ‘New Techniques and Technologies of Surveillance in the Workplace’, www.amicus-itpa.org//juneconf3.shtml
Davis, R. 2001. ‘The Digital Dilemma’, Communications of the ACM 44(2), 77–83.CrossRefGoogle Scholar
George, R. T. 1998. ‘Computers, Ethics, and Business’, Philosophic Exchange 1997–1998, 45–55.
Landa, M. 1991. War in the Age of Intelligent Machines. Cambridge, MA: MIT Press.Google Scholar
Dennett, D. C. 1987. The Intentional Stance. Cambridge, MA: MIT Press.Google Scholar
Dennett, D. C. 1996. ‘When Hal Kills, Who's to Blame?’, in Stork, D. (ed.), Hal's Legacy, pp. 351–365. Cambridge, MA: MIT Press.Google Scholar
Dennis, L. 1997. ‘Kant's Ethics and Duties to Oneself’, Pacific Philosophical Quarterly 78(4), 321–348.CrossRefGoogle Scholar
Devon, R. 2004. ‘Towards a Social Ethics of Technology: A Research Prospect’, Techné: Research in Philosophy and Technology 8(1), 99–115.Google Scholar
Dewan, S. and Riggins, F. J. 2005. ‘The Digital Divide: Current and Future Research Directions’, Journal of the Association for Information Systems 6(12), 298–337.Google Scholar
Dewey, J. 1927. The Public and its Problems. New York: Henry Holt & Co.Google Scholar
Dobransky, K. and Hargittai, E. 2006. ‘The Disability Divide in Internet Access and Use’, Information, Communication and Society 9(3), 313–334.CrossRefGoogle Scholar
Donaldson, T. and Dunfee, T. W. 1999. Ties that Bind: A Social Contracts Approach to Business Ethics. Boston, MA: Harvard Business School Press.Google Scholar
Drexler, E. K. 1986. Engines of Creation. Garden City: Doubleday.Google Scholar
Dreyfus, H. L. 2001. On the Internet. London: Routledge.Google Scholar
Dryzek, J. 2001. Deliberative Democracy and Beyond: Liberals, Critics, Contestations. Oxford: Oxford University Press.Google Scholar
Dunnigan, J. 1996. Digital Soldiers. New York: St. Martin's Press.Google Scholar
Dusek, V. 2006. Philosophy of Technology: An Introduction. Malden: Blackwell.Google Scholar
Dyson, L., Hendriks, M. and Grant, S. (eds.). 2007. Information Technology and Indigenous People. Hershey, PA: Information Science Publishing.CrossRef
Eickelman, D. F. 2003. ‘Islam and Ethical Pluralism’, in Madsen, R. and Strong, T. B. (eds.), The Many and the One: Religious and Secular Perspectives on Ethical Pluralism in the Modern World, pp. 161–180. Princeton: Princeton University Press.Google Scholar
Einstein, A. 1954. Ideas and Opinions. New York: Crown Publishers.Google Scholar
Elberfeld, R. 2002. ‘Resonanz als Grundmotiv ostasiatischer Ethik’ [Resonance as a Fundamental Motif of East Asian Ethics], in Elberfeld, R. and Wohlfart, G. (eds.), Kamparative Ethik: Das gute Leben Zwischen den Kulturen [Comparative Ethics: The Good Life between Cultures], pp. 131–141. Cologne: Edition Chora.Google Scholar
,Electronic Frontier Foundation. www.EFF.org
Elgesem, D. 2005. ‘Deliberative Technology?’ in Thorseth, M. and Ess, C. (eds.), Technology in a Multicultural and Global Society, pp. 61–77. Trondheim: NTNU, Programme for Applied Ethics, publ. series no. 6.Google Scholar
Ellul, J. 1964. The Technological Society (trans. Wilkinson, John). New York: Alfred A. Knopf.Google Scholar
Ess, C. 1996. ‘The Political Computer: Democracy, CMC, and Habermas’ in , Ess, C. (ed.), Philosophical Perspectives on Computer-Mediated Communication, pp. 197–230. Albany, NY: State University of New York Press.Google Scholar
Ess, C. 2002. ‘Computer-Mediated Colonization, the Renaissance, and Educational Imperatives for an Intercultural Global Village’, Ethics and Information Technology 4(1), 11–22.CrossRefGoogle Scholar
Ess, C. 2006a. ‘Ethical Pluralism and Global Information Ethics’, Ethics and Information Technology 8(4), 215–226.CrossRefGoogle Scholar
Ess, C. 2006b. ‘From Computer-Mediated Colonization to Culturally-Aware ICT Usage and Design’, in Zaphiris, P. and Kurniawan, S. (eds.), Advances in Universal Web Design and Evaluation: Research, Trends and Opportunities, pp. 178–197. Hershey, PA: Idea Publishing.Google Scholar
Ess, C. 2007. ‘Cybernetic Pluralism in an Emerging Global Information and Computing Ethics’, International Review of Information Ethics 7 www.i-r-i-e.net/inhalt/007/11-ess.pdf
Ess, C. 2009. Digital Media Ethics. Malden, MA: Polity Press.Google Scholar
Ess, C. and Thorseth, M. 2006. ‘Neither Relativism nor Imperialism: Theories and Practices for a Global Information Ethics’, Ethics and Information Technology 8(3), 91–154.CrossRefGoogle Scholar
,ETC Group. 2005. ‘A Tiny Primer on Nano-Scale Technologies and “the Little Bang Theory”’, www.etcgroup.org/documents/TinyPrimer_English.pdf
,European Commission Scientific Committee on Emerging and Newly Identified Health Risks. 2006. ‘The Appropriateness of Existing Methodologies to Assess the Potential Risks Associated with Engineered and Adventitious Products of Nanotechnologies’, http://ec.europa.eu/health/ph_risk/committees/04_scenihr/docs/scenihr_o_003b.pdf
,European Group on Ethics in Science and New Technologies. 2005. ‘Ethical Aspects of ICT Implants in the Human Body’, http://ec.europa.eu/european_group_ethics/docs/avis20_en.pdf
Fairweather, N. B. and Rogerson, S. 2001. ‘A Moral Approach to Electronic Patient Records’, Medical Informatics and the Internet in Medicine 26(3), 219–234.Google ScholarPubMed
Fallows, J. 2008. ‘The Connection Has Been Reset,’ The Atlantic, www.theatlantic.com/doc/200803/chinese-firewall
Farmer, J. D. and Belin, A. d'A. 1992. ‘Artificial Life: The Coming Evolution”, in Langton, C. G., Taylor, C. E, Farmer, J. D. and Rasmussen, S. (eds.) Artificial Life II: Proceedings of the Workshop on Synthesis and Simulation of Living Systems, Santa Fe, 1990. Redwood City, CA: Addison Wesley.Google Scholar
Farrell, G., Isaacs, S. and Trucano, M. 2007. ‘The NEPAD e-Schools Demonstration Project: A Work in Progress. Washington, DC: infoDTheWorld Bank’, www.infodev.org/en/Publication.355.html
Ferré, Frederick. 1995. Philosophy of Technology. Athens: University of Georgia Press.Google Scholar
,Final Declaration of the First European ‘Seas at Risk’ Conference. 1994. www.seas-at-risk.org/n2_archive.php?page=9
Fish, S. 1994. There's No Such Thing as Free Speech…and it's a Good Thing too. New York: Oxford University Press.Google Scholar
Fisher, E., Jones, J. S. and Schomberg, R. 2006. Implementing the Precautionary Principle: Perspectives and Prospects. Cheltenham: Edward Elgar.CrossRefGoogle Scholar
Fishkin, J. 1997. Voice of the People. Yale University Press.Google Scholar
Flanagan, M., Howe, D. and Nissenbaum, H. 2005. ‘Values at Play: Design Tradeoffs in Socially-Oriented Game Design’, in Proceedings of the CHI 2005 Conference on Human Factors in Computing Systems. CHI 2005, 2–7 April, Portland, Oregon. New York: ACM Press.
Flanagan, M., Howe, D. and Nissenbaum, H. 2008. ‘Embodying Values in Technology: Theory and Practice’, in Hoven, J. and Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press.Google Scholar
Fleischmann, K. R. 2007. ‘Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies’, Library Quarterly 77(4), 409–427.
Floridi, L. 1995. ‘Internet: Which Future for Organized Knowledge, Frankenstein or Pygmalion?’, International Journal of Human-Computer Studies 43, 261–274.CrossRefGoogle Scholar
Floridi, L. 1999a. Philosophy and Computing: An Introduction. London: Routledge.Google Scholar
Floridi, L. 1999b. ‘Information Ethics: On the Philosophical Foundations of Computer Ethics’, Ethics and Information Technology 1(1), 37–56.CrossRefGoogle Scholar
Floridi, L. 2002a. ‘Information Ethics: An Environmental Approach to the Digital Divide’, Philosophy in the Contemporary World 9(1), 39–45.CrossRefGoogle Scholar
Floridi, L. 2002b. ‘What Is the Philosophy of Information?’, in Moor, J. H. and Bynum, T. W. (eds.), Cyberphilosophy: The Intersection of Computing and Philosophy, pp. 117–138. Oxford: Blackwell.Google Scholar
Floridi, L. 2003. ‘On the Intrinsic Value of Information Objects and the Infosphere’, Ethics and Information Technology 4(4), 287–304.CrossRefGoogle Scholar
Floridi, L. 2004. ‘Open Problems in the Philosophy of Information’, Metaphilosophy 35(4), 554–582.CrossRefGoogle Scholar
Floridi, L. 2005a. ‘An Interpretation of Informational Privacy and of Its Moral Value’, Proceedings of CEPE 2005 – 6th Computer Ethics: Philosophical Enquiries Conference, Ethics of New Information Technologies, University of Twente, Enschede, the Netherlands.Google Scholar
Floridi, L. 2005b. ‘Information Ethics: Its Nature and Scope’, Computers and Society 36(3), 21–36.CrossRefGoogle Scholar
Floridi, L. 2005c. ‘Presence: From Epistemic Failure to Successful Observability’, Presence: Teleoperators and Virtual Environments 14(6), 656–667.CrossRefGoogle Scholar
Floridi, L. 2005d. ‘The Ontological Interpretation of Informational Privacy,’ Ethics and Information Technology 7(4), 185–200.CrossRefGoogle Scholar
Floridi, L. 2006a. ‘Four Challenges for a Theory of Informational Privacy’, Ethics and Information Technology 8(3), 109–119.CrossRefGoogle Scholar
Floridi, L. 2006b. ‘Information Technologies and the Tragedy of the Good Will’, Ethics and Information Technology 8(4), 253–262.CrossRefGoogle Scholar
Floridi, L. 2006c. ‘Informational Privacy and its Ontological Interpretation’, Computers and Society 36(3), 37–40.CrossRefGoogle Scholar
Floridi, L. 2007a. ‘A Look into the Future Impact of ICT on Our Lives’, The Information Society 23(1), 59–64.CrossRefGoogle Scholar
Floridi, L., 2007b. ‘Understanding Information Ethics’, APA Newsletter on Philosophy and Computers 7(1), http://76.12.57.18/publications/newsletters/v07n1_Computers_04.aspx
Floridi, L. 2008a. ‘Artificial Intelligence's New Frontier: Artificial Companions and the Fourth Revolution’, Metaphilosophy 39 (4/5), 651–655.CrossRefGoogle Scholar
Floridi, L. 2008b. ‘The Method of Levels of Abstraction’, Minds and Machines, 18(3), 303–329.CrossRefGoogle Scholar
Floridi, L. 2008c. ‘Replies to “Commentaries on Floridi”’, APA Newsletter on Philosophy and Computers, 72.Google Scholar
Floridi, L. 2008d. ‘Information Ethics, its Nature and Scope’, in Hoven, J. and Weckert, J. (eds.), Information Technology and Moral Philosophy, pp. 40–65. Cambridge: Cambridge University Press.Google Scholar
Floridi, L. 2008e. ‘Foundations of Information Ethics’ in Himma, K. E. and Tavani, H. T. (eds.), The Handbook of Information and Computer Ethics, pp. 3–23. Hoboken, NJ: Wiley.Google Scholar
Floridi, L. 2008f. ‘A Defence of Informational Structural Realism’, Synthese 161(2), 219–253.CrossRefGoogle Scholar
Floridi, L. (forthcoming, a). ‘The Information Society and Its Philosophy’, The Information Society.
Floridi, L. (forthcoming, b). Response to S. Hongladarom in special issue of Floridi and his Critics
Floridi, L. (forthcoming, c). The Philosophy of Information. Oxford: Oxford University Press.
Floridi, L., and Sanders, J. W. 1999. ‘Entropy as Evil in Information Ethics’, Etica & Politica, special issue on Computer Ethics 1(2).Google Scholar
Floridi, L. and Sanders, J. W. 2001. ‘Artificial Evil and the Foundation of Computer Ethics’, Ethics and Information Technology 3, 55–66.CrossRefGoogle Scholar
Floridi, L. and Sanders, J. W. 2002. ‘Mapping the Foundationalist Debate in Computer Ethics,’ Ethics and Information Technology 4(1), 1–9. A revised version is printed in Spinello, R. A. and Tavani, H. T. (eds.), Readings in Cyberethics (2nd edn), pp. 84–95. Sudbury, MA: Jones and Bartlett.CrossRefGoogle Scholar
Floridi, L. and Sanders, J. W. 2004. ‘On the Morality of Artificial Agents’. Minds and Machines 14(3), 349–379.CrossRefGoogle Scholar
Floridi, L. and Sanders, J. W. 2005. ‘Internet Ethics: The Constructionist Values of Homo Poieticus’, in Cavalier, R. (ed.), The Impact of the Internet on Our Moral Lives, pp. 195–214. Albany, NY: SUNY Press.Google Scholar
Foot, P. 1967. ‘The Problem of Abortion and the Doctrine of the Double Effect’, Oxford Review 5, 5–15.Google Scholar
Foster, K. R. and Jaeger, J. (forthcoming). ‘Ethical Implications of Implantable Radiofrequency Identification Tags in Humans’, American Journal of Bioethics.
Frankena, W. 1973. Ethics (2nd edn). Englewood Cliffs, NJ: Prentice-Hall Inc.Google Scholar
Freud, S. 1917. ‘A Difficulty in the Path of Psycho-Analysis’, The Standard Edition of the Complete Psychological Works of Sigmund Freud, XVII(1917–1919), pp. 135–144.Google Scholar
Friedman, B. (ed.) 1997. Human Values and the Design of Computer Technology. Cambridge: Cambridge University Press.
Friedman, B. and Freier, N. 2005. ‘Value Sensitive Design’, in Fisher, E., Erdelez, S. and McKechnie, E. (eds.), Theories of Information Behavior: A Researcher's Guide. Medford, NJ: Information Today.Google Scholar
Friedman, B., Howe, D. and Felten, E. 2002. ‘Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design’, in Proceedings of the Thirty-Fifth Annual Hawai'i International Conference on System Sciences. Abstract, p. 247; CD-ROM of full-paper, OSPE101. Los Alamitos, CA: IEEE Computer Society.Google Scholar
Friedman, B. and Kahn, P. 2003. ‘Human Values, Ethics, and Design’, in Jacko, J. and Sears, A. (eds.), The Human-Computer Interaction Handbook. Mahwah, NJ: Lawrence Erlbaum Associates.Google Scholar
Friedman, B., Kahn, P. H. and Borning, A. 2006. ‘Value Sensitive Design and Information Systems’ in Zhang, P. and Galletta, D. (eds.), Human-Computer Interaction in Management Information Systems. Foundations, New York: M. E. Sharpe.Google Scholar
Friedman, B., Kahn, P. H.. and Borning, A. 2008. ‘Value Sensitive Design and Information System’, in Himma, K. E. and Tavani, H. T. (eds.), The Handbook of Information and Computer Ethics, pp. 69–102. Hoboken, NJ: John Wiley & Sons.CrossRefGoogle Scholar
Friedman, B., Lin, P. and Miller, J. K. 2005. ‘Informed Consent by Design’, in Cranor, L. F. and Garfinkel, S. (eds.), Designing Secure Systems that People Can Use. O'Reilly.Google Scholar
Friedman, B. and Nissenbaum, H. 1996. ‘Bias in Computer Systems’, ACM Transactions on Computer Systems 14(3), 330–347.Google Scholar
Friedman, T. 2005. ‘It's a Flat World, After All’, New York Times, 3 April. www.nytimes.com/2005/04/03/magazine/03DOMINANCE.htmlGoogle Scholar
Froomkin, A. Michael. 2001. ‘The Collision of Trademarks, Domain Names, and Due Process in Cyberspace’, Communications of the ACM 44(2), 91–97.CrossRefGoogle Scholar
Fukuyama, F. 2002. Our Posthuman Future. New York: Farrar, Straus and Giroux.Google Scholar
Fulcher, G. 1989. Disabling Policies? London: Falmer Press.Google Scholar
Gall, C. and Waal, T. 1998. Chechnya: Calamity in the Caucasus. New York: New York University Press.Google Scholar
Gallie, W. B. 1956. ‘Essentially Contested Concepts’, Proceedings of the Aristotelian Society 56, 167–198.CrossRefGoogle Scholar
Galston, W. A. 2002. Liberal Pluralism. New York: Cambridge University Press.CrossRefGoogle Scholar
Gardiner, S. M. 2006. ‘A Core Precautionary Principle’, Journal of Political Philosophy 14(1), 33–60.CrossRefGoogle Scholar
Gemmey, J., Bell, G., Lueder, R., Drucker, S. and Wong, C. 2002MyLifeBits: Fulfilling the Memex Vision’, ACM Multimedia '02, 1–6 December 2002, Juan-les-Pins, France, pp. 235–238. Retrieved January 2008 from http://research.microsoft.com/apps/pubs/default.aspx?id=64165CrossRefGoogle Scholar
George, Carlisle E. 2006. ‘Copyright Management Systems: Accessing the Power Balance’, in Zielinski, C., Duquenoy, P. and Kimppa, K. (eds.), The Information Society: Emerging Landscapes (IFIP WG 9.2 Proceedings), pp. 211–222. New York: Springer.CrossRefGoogle Scholar
Gert, B. 1998. Morality: Its Nature and Justification. Oxford: Oxford University Press.Google Scholar
Gert, Bernard. 1999. ‘Common Morality and Computing’, Ethics and Information Technology 1(1), 57–64.CrossRefGoogle Scholar
Ghemawat, P. 2007. ‘Why the World Isn't Flat’, Foreign Policy 159 (March/April), 54–60.
,Global Forum for Health Research. ‘The 10/90 Gap’, www.globalforumhealth.org/
Goggin, G. and Newell, C. 2000. ‘An End to Disabling Policies? Toward Enlightened Universal Service’, The Information Society 16, 127–133.Google Scholar
Goggin, G. and Newell, C. 2006. ‘Disability, Identity, and Interdependence: ICTs and New Social Forms’, Information, Communication and Society 9(3), 309–311.CrossRefGoogle Scholar
Goode, R. 2004. Commercial Law (3rd edn). London: Penguin Books.Google Scholar
Goodstein, A. 2007. Totally Wired: What Teens and Tweens are Really Doing Online. St Martin's: Griffin.Google Scholar
Goodwin, I. 2004. ‘Book Reviews: The Virtual Community’, Westminster Papers in Communication and Culture 1(1), 103–109.CrossRefGoogle Scholar
Górniak-Kocikowska, K. 1996. ‘The Computer Revolution and the Problem of Global Ethics’, Global Information Ethics (a special issue of Science and Engineering Ethics) 2(2), 177–190.Google Scholar
Gotterbarn, D. 1995. ‘Computer Ethics: Responsibility Regained’, in Johnson, D. G. and Nissenbaum, H. (eds.), Computers, Ethics and Social Values, pp. 18–24. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
Gowans, C. W. 1987. Moral Dilemmas. New York: Oxford University Press.Google Scholar
Greco, G. M. and Floridi, L. 2004. ‘The Tragedy of the Digital Commons’, Ethics and Information Technology 6(2), 73–82.CrossRefGoogle Scholar
Greenhill, A. and Wilson, M. 2006. ‘Haven or Hell? Telework, Flexibility and Family in the E-Society: A Marxist Analysis’, European Journal of Information Systems 15(3), 379–388.CrossRefGoogle Scholar
Grier, D. A. 2005. When Computers Were Human. Princeton, NJ: Princeton University Press.Google Scholar
Griffin, J. 1993. “How We Do Ethics Now', in Phillips Griffiths, A. (ed.), Ethics. Cambridge: Cambridge University Press.Google Scholar
Griffin, J. 1996. Value Judgement: Improving Our Ethical Beliefs. Oxford: Oxford University Press.Google Scholar
Griffiths, M. and Light, B. 2008. ‘Social Networking and Digital Gaming Media Convergence: Consequences for Appropriation in Habbo Hotel’, Under the Mask: Perspectives on the Gamer Conference, the Research Institute for Media, Art and Design, University of Bedfordshire.Google Scholar
Grodzinsky, F. S., Miller, K. W. and Wolf, M. J. 2008. ‘The Ethics of Designing Artificial Agents’, Ethics and Information Technology 10, 115–121.CrossRefGoogle Scholar
Grundy, F. 1996. Women and Computing. Exeter: Intellect.Google Scholar
Gutman, A. and Thompson, D. 1996. Democracy and Disagreement. Cambridge, MA: Belknap Press.Google Scholar
Habermas, J. 1983. Moralbewußtsein und Kommunikatives Handelns. Frankfurt am Main: Suhrkamp.Google Scholar
Habermas, J. 1990. Moral Consciousness and Communicative Ethics. Cambridge, MA: MIT Press.Google Scholar
Habermas, J. 1993. ‘Remarks on Discourse Ethics’, in Justification and Application, pp. 19–113. Cambridge, MA: MIT Press.Google Scholar
Hacker, K. and Mason, S. M. 2003. ‘Ethical Gaps in Studies of the Digital Divide’, Ethics and Information Technology 5(2), 99–115.CrossRefGoogle Scholar
Haga, S. B. and Willard, H. F. 2006. ‘Defining the Spectrum of Genome Policy’, Nature Reviews Genetics 7(12), 966–972.CrossRefGoogle ScholarPubMed
Haldane, J. H. 2003. ‘Natural Law and Ethical Pluralism’, in Madsen, R. and Strong, T. B. (eds.), The Many and the One: Religious and Secular Perspectives on Ethical Pluralism in the Modern World, pp. 89–114. Princeton: Princeton University Press.
Hallion, R. 1992. Storm Over Iraq. Washington, DC: Smithsonian Institution Press.Google Scholar
Hamilton, E. and Cairns, H. (eds.). 1989. Plato, The Collected Dialogues. Princeton: Princeton University Press.
Hanson, R. 1994. ‘If Uploads Come First’, Extropy 6(2). http://hanson.gmu.edu/uploads.htmlGoogle Scholar
Hare, R. M. 1984. ‘Supervenience’. Paper read at Aristotelian Society Supplementary Volume 56.
Harvey, L. 1990. Critical Social Research. London: Unwin Hyman.Google Scholar
Held, D. and McGrew, A. 2001. ‘Globalization’ in Krieger, J. (ed.), Oxford Companion to Politics of the World. Oxford and New York: Oxford University Press. Also available online at www.polity.co.uk/global/globocp.htm.Google Scholar
Held, D., McGrew, A., Goldblatt, D. and Perraton, J. 1999. Global Transformations: Politics, Economics and Culture. Cambridge: Polity Press.Google Scholar
Henwood, F. 1993. ‘Establishing Gender Perspectives on Information Technology: Problems Issues and Opportunities’, in Green, E., Owen, J. and Pain, D. (eds.), Gendered by Design? Information Technology and Office Systems, pp. 31–49. London: Taylor and Francis.Google Scholar
Hepburn, R. W. 1984. ‘Wonder’ and Other Essays: Eight Studies in Aesthetics and Neighbouring Fields. Edinburgh: Edinburgh University Press.Google Scholar
Herold, K. 2005. ‘A Buddhist Model for the Informational Person’, Proceedings of the Second Asia Pacific Computing and Philosophy Conference, 7–9 January, Bangkok, Thailand.Google Scholar
Herring, S. 1996. ‘Posting in a Different Voice: Gender and Ethics in CMC’, in Ess, C. (ed.), Philosophical Perspectives on Computer-Mediated Communication, pp. 115–145. Albany NY: State University of New York Press.CrossRefGoogle Scholar
Heymann, P. 2003. Terrorism, Security, and Freedom. Cambridge, MA: MIT Press.Google Scholar
Himanen, P. 2001. The Hacker Ethic and the Spirit of the Information Age. London: Secker & Warburg.Google Scholar
Himma, K. E. 2003. ‘The Relationship between the Uniqueness of Computer Ethics and Its Independence as a Discipline in Applied Ethics’, Ethics and Information Technology 5(4), 225–237.CrossRefGoogle Scholar
Himma, K. E. 2004. ‘There's Something About Mary: The Moral Value of Things Qua Information Objects’, Ethics and Information Technology 6(3), 145–159.CrossRefGoogle Scholar
Himma, K. E. 2007a. ‘Foundational Issues in Information Ethics’, Library Hi Tech 25(1), 79–94.CrossRefGoogle Scholar
Himma, K. E. 2007b. ‘Artificial Agency, Consciousness, and the Criteria for Moral Agency: What Properties Must an Artificial Agent Have to be a Moral Agent?’, SSRN: http://ssrn.com/abstract=983503
Himma, K. E. and Tavani, H. T. (eds.) 2008. The Handbook of Information and Computer Ethics. Hoboken, NJ: John Wiley & Sons.CrossRef
Hinman, L. 2002. ‘The Impact of the Internet on Our Moral Lives in Academia’, Ethics and Information Technology 4(1), 31–35.CrossRefGoogle Scholar
Hinman, L. 2004. ‘Virtual Virtues: Reflections on Academic Integrity in the Age of the Internet’, in Cavalier, R. (ed.), The Internet and Our Moral Lives, pp. 49–68. Albany, NY: SUNY Press.Google Scholar
Hinman, L. 2008. Ethics: A Pluralistic Approach to Moral Theory (4th edn). Belmont, CA: Thomson-Wadsworth.Google Scholar
Hobsbawm, E. 1969. Bandits. London: Weidenfeld and Nicolson.Google Scholar
Hodel, T. B., Holderegger, A. and Lüthi, A. 1998. ‘Ethical Guidelines for a Networked World under Construction’, Journal of Business Ethics 17(9–10), 1057–1071.CrossRefGoogle Scholar
Holland, J. H. 1975. Adaptation in Natural and Artificial Systems. Ann Arbor: University of Michigan Press.Google Scholar
Hollis, D. 2007. ‘Rules of Cyberwar?’, The Los Angeles Times, 8 October.Google Scholar
Hongladarom, S. 2004. ‘Making Information Transparent as a Means to Close the Global Digital Divide’, Minds and Machines 14(1), 85–99.CrossRefGoogle Scholar
Hongladarom, S. 2007. ‘Analysis and Justification of Privacy from a Buddhist Perspective’, in Hongladarom, S. and Ess, C. (eds.), Information Technology Ethics: Cultural Perspectives, pp. 108–122. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
Hongladarom, S. 2008. ‘Floridi and Spinoza on Global Information Ethics’, Ethics and Information Technology 10(2–3), 175–187.CrossRefGoogle Scholar
Hoque, K. and Noon, M. 2004. ‘Equal Opportunities Policy and Practice in Britain: Evaluating the “empty shell” hypothesis’, Work, Employment and Society 18(3), 418–505.CrossRefGoogle Scholar
Howard, M., Andreopoulos, G. and Shulman, M. 1994. The Laws of War. New Haven: Yale University Press.Google Scholar
Huizinga, J. 1998. Homo Ludens: A Study of the Play-Element in Culture. Abingdon: Routledge. First published in 1938 with the title Homo Ludens : Proeve Eener Bepaling Van Het Spel-Element Der Cultuur. Haarlem: H. D. Tjeenk Willink.Google Scholar
Huxley, A. 2006. Brave New World. New York: Harper Perennial Modern Classics.Google Scholar
Ihde, D. 1990, Technology and the Lifeworld. Bloomington/Minneapolis: Indiana University Press.Google Scholar
Ihde, D. 1998. Expanding Hermeneutics. Evanston, IL: Northwestern University Press.Google Scholar
,Independent Expert Group on Mobile Phones. 2000. ‘Mobile phones and health’, www.iegmp.org.uk/
Inness, J. C. 1992. Privacy, Intimacy, and Isolation. New York: Oxford University Press.Google Scholar
,International Herald Tribune, Europe. 2008. ‘Heathrow Begins Requiring Iris scans, Fingerprints from Some Passengers’, the Associated Press. 1 February. www.iht.com/articles/ap/2008/02/01/europe/EU-GEN-Britain-Heathrow-Biometric-Data.php
,Internet World Stats: Usage and Population Statistics. 2008. World Internet Users: March 2008. www.internetworldstats.com/stats.htm
Introna, L. 2005. ‘Disclosive Ethics and Information Technology: Disclosing Facial Recognition Systems’, Ethics and Information Technology 7(2), 75–86.CrossRefGoogle Scholar
Introna, L. 2007. ‘Maintaining the Reversibility of Foldings: Making the Ethics (Politics) of Information Technology Visible’, Ethics and Information Technology 9(1), 11–25.CrossRefGoogle Scholar
Introna, L. 2008. ‘Phenomenological Approaches to Ethics and Information Technology’, in Zalta, E. N. (ed.), The Stanford Encyclopedia of Philosophy (Fall 2008 edition).
Introna, L. and Nissenbaum, H. 2000. ‘Shaping the Web: Why the Politics of Search Engines Matters’, The Information Society 16(3), 1–17.Google Scholar
Jackson, P., Gharavi, H. and Klobas, J. 2006. ‘Technologies of the Self: Virtual Work and the Inner Panopticon’, Information Technology and People 19(3), 219–243.CrossRefGoogle Scholar
Jerrard, A. A. and Chang, T. Y. 2003. ‘A Case Study of How Technology and Trust Enable the Projectized Team-Based Organization’, in Joia, Luiz Antonio (ed.), IT-Based Management: Challenges and Solutions, pp. 111–129. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
Johnson, D. G. 1985. Computer Ethics. Englewood Cliffs, NJ: Prentice Hall. (2nd edn, 1994; 3rd edn, 2001.)Google Scholar
Johnson, D. G. 1997. ‘Is the Global Information Infrastructure a Democratic Technology?’, Computers and Society 27, 20–26.CrossRefGoogle Scholar
Johnson, D. G. 2000. ‘Should Computer Programs be Owned?’, in Baird, R. M., Ramsower, R. and Rosenbaum, S. E. (eds.), Cyberethics – Social and Moral Issues in the Computer Age, pp. 222–235. New York: Prometheus Books.Google Scholar
Johnson, D. G. 2006. ‘Computer Systems: Moral Entities but Not Moral Agents’, Ethics and Information Technology 8(4), 195–204.CrossRefGoogle Scholar
Johnson, D. G. and Miller, K. W. 2008. ‘Un-making Artificial Moral Agents’, Ethics and Information Technology 10, 123–133.CrossRefGoogle Scholar
Johnstone, J. 2007. ‘Technology as Empowerment: A Capability Approach to Computer Ethics’, Ethics and Information Technology 9(1), 73–87.CrossRefGoogle Scholar
Jonas, H. 1984. The Imperative of Responsibility: In Search of an Ethics for the Technological Age. Chicago, IL: University of Chicago Press.Google Scholar
Jones, R. A. L. 2007. ‘Debating Nanotechnologies’, in Allhof, F., Lin, P., Moor, J. and Weckert, J. (eds.) Nanoethics: The Ethical and Social Implications of Nanotechnology, pp. 71–79. Hoboken, NJ: Wiley Interscience.Google Scholar
Jordan, T. and Taylor, P. A. 2004. Hacktivism and Cyberwars: Rebels With a Cause? London and New York: Routledge.Google Scholar
Kant, Immanuel 1952. The Critique of Judgment. Trans. Meredith, J. M.. Oxford: Clarendon.Google Scholar
Kass, L. 2003. ‘Ageless Bodies, Happy Souls: Biotechnology and the Pursuit of Perfection’, The New Atlantis, Spring, 9–28.Google Scholar
Kim, T. K. 2005. ,‘Electronic Storm: Stormfront Grows a Thriving Neo-Nazi Community’, Intelligence Report, Southern Poverty Law Center, Summer 2005. www.splcenter.org/intel/intelreport/article.jsp?aid=551
Klein, N. 2000. No Logo: No Space, No Choice, No Jobs. London: Flamingo.Google Scholar
Klein, Naomi. 2008. ‘China's All-Seeing Eye’, Rolling Stone Magazine (29 May). www.rollingstone.com/politics/story/20797485/chinas_allseeing_eyeGoogle Scholar
Kleinig, J. 1982. ‘The Ethics of Consent’, in Neilsen, K. and Patten, S. C. (eds.), New Essays in Ethics and Public Policy. Guelph, Ontario: Canadian Association for Publishing in Philosophy.Google Scholar
Korsgaard, C. M. 2003. ‘The Dependence of Value on Humanity’, in Raz, J., The Practice of Value, pp. 63–86. (ed.) J. Wallace, R.. Oxford: Clarendon Press.Google Scholar
Kreps, D. and Adam, A. 2006. ‘Failing the Disabled Community?: The Continuing Problem of Web Accessibility’, in Zaphiris, P. and Kurniawan, S. (eds.), Human Computer Interaction Research in Web Design and Evaluation. Hershey, PA: Idea Group Publishing.Google Scholar
Kroes, P. (forthcoming). The Moral Significance of Technical Artefacts.
Kroes, P. and Meijers, A. 2006. ‘The Dual Nature of Technical Artefacts’, Studies in History and Philosophy 37, 1–4.CrossRefGoogle Scholar
Ladd, J. 2000. ‘Ethics and the Computer World – A New Challenge for Philosophers’, in Baird, R. M., Ramsower, R. and Rosenbaum, S. E. (eds.), Cyberethics – Social and Moral Issues in the Computer Age, pp. 44–55. New York: Prometheus Books.Google Scholar
Latour, B. 1992, ‘Where are the Missing Masses? – The Sociology of a Few Mundane Artefacts’, in Bijker, W. E. and Law, J. (eds.), Shaping Technology/Building Society, pp. 225–258. Cambridge, MA: MIT Press.Google Scholar
Latour, B. 2002. ‘Morality and Technology: The End of the Means’, Theory, Culture and Society 19(5–6), 247–260.CrossRefGoogle Scholar
Laurent, L. and Petit, J. C. 2005. ‘Nanoscience and Its Convergence with Other Technologies’, Hyle 11(1), 45–76.Google Scholar
Law, J. and Hassard, J. 1999. Actor Network Theory and After. Oxford and Malden, MA: Blackwell.Google Scholar
Lebedev, M. A. and Nicolelis, M. A. L. 2006. ‘Brain Machine Interfaces: Past, Present, and Future’, Trends in Neurosciences 29(9), 536–546.CrossRefGoogle Scholar
Leone, R. and Anrig, G. 2004. The War on Our Freedoms: Civil Liberties in an Age of Terrorism. New York: Public Affairs Press.Google Scholar
Leopold, A. 1949. The Sand County Almanac. New York: Oxford University Press.Google Scholar
Lessig, L. 1999. Code and Other Laws of Cyberspace. New York: Basic Books.Google Scholar
Lessig, L. 2006. Code: Version 2.0. New York: Basic Books.Google Scholar
Lewis, S. 2004. ‘How Much is Stronger DRM Worth?’, in Camp, L. J. and Lewis, S. (eds.), Economics of Information Security, pp. 53–57. Dordrecht: Kluwer.CrossRefGoogle Scholar
Libicki, M. 2007. Conquest in Cyberspace: National Security and Information Warfare. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Lieven, A. 1998. Chechnya: Tombstone of Russian Power. New Haven: Yale University Press.Google Scholar
Liu, Z. and Sarkar, S. 2007. ‘Outdoor Recognition at a Distance by Fusing Gait and Face’, Image and Vision Computing 25(6), 817–832.CrossRefGoogle Scholar
Lloyd, S. 2006. Programming the Universe. New York: Knopf.Google Scholar
Lohn, J. D. and Hornsby, G. S. 2006. ‘Evolvable Hardware: Using Evolutionary Computation to Design and Optimize Hardware Systems’, IEEE Computational Intelligence Magazine 1, 19–27.CrossRefGoogle Scholar
, Y. 2005. ‘Privacy and Data Privacy Issues in Contemporary China’, Ethics and Information Technology 7(1), 7–15.Google Scholar
Ludlow, P. 1996. High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Boston: MIT Press.Google Scholar
Ludlow, P. and Wallace, M. 2007. The Second Life Herald: The Virtual Tabloid that Witnessed the Dawn of the Metaverse. Boston: MIT Press.Google Scholar
Lyman, P. and Varian, H. R. 2003. ‘How Much Information?’, www.sims.berkeley.edu/research/projects/how-much-info-2003/execsum.htm#summary
Lyon, D. 1994. The Electronic Eye: The Rise of Surveillance Society. Cambridge: Polity PressGoogle Scholar
MacKinnon, R. 2008. ‘Asia's Fight for Web Rights’, Far Eastern Economic Review, April. www.feer.com/essays/2008/april/asias-fight-for-web-rights
Maner, W. 1980. Starter Kit in Computer Ethics. Hyde Park, NY: Helvetia Press and the National Information and Resource Center for Teaching Philosophy. (Originally self-published in 1978.)
Maner, W. 1996, ‘Unique Ethical Problems in Information Technology’, Global Information Ethics (a special issue of Science and Engineering Ethics) 2(2), 137–154.Google Scholar
Maner, W. 2004. ‘Unique Ethical Problems in Information Technology’, in Bynum, T. W. and Rogerson, S. (eds.), Computer Ethics and Professional Responsibilty, pp. 39–59. Oxford: Blackwell Publishing.Google Scholar
Mann, S. 1997. ‘Wearable Computing: A First Step Toward Personal Imaging’, Computer 30(2), 25–31.CrossRefGoogle Scholar
Mann, S. 2001. ‘Wearable Computing: Toward Humanistic Intelligence’, IEEE Intelligent Systems 16(3), 10–15.CrossRefGoogle Scholar
Manson, N. A. 2002. ‘Formulating the Precautionary Principle’, Environmental Ethics 24, 263–274.CrossRefGoogle Scholar
Manson, N. C. and O'Neill, O. 2007. ‘Rethinking Informed Consent’, in Bioethics. Cambridge: Cambridge University Press.Google Scholar
Marber, P. 2005. ‘Globalization and Its Contents’, World Policy Journal, Winter 2004/2005, 29–37.Google Scholar
Markoff, J. 2005. What the Dormouse Said: How the 60s Counterculture Shaped the Personal Computer. New York: Viking Adult.Google Scholar
Marquie, J. C., Jourdan-Boddaert, L. and Huet, N. 2002. ‘Do Older Adults Underestimate Their Actual Computer Knowledge?’, Behaviour and Information Technology 24(4), 273–280.CrossRefGoogle Scholar
Mason, R. O. 2000. ‘Intellectual Property and Open Systems’, in Proceedings of the 33rd Hawaii International Conference on System Sciences.
Mather, K. 2005. ‘Object Oriented Goodness: A Response to Mathiesen's “What Is Information Ethics?”’, Computers and Society 34(4).Google Scholar
Mathiesen, K. 2004. ‘What Is Information Ethics?’, Computers and Society, 32(8), www.computersandsociety.org/sigcas_ofthefuture2/sigcas/subpage/sub_page.cfm?article=909&page_number_nb=901
McCalman, J. 2003. ‘What Can We Do for Corporate Nomads? IT and Facilities Management’, in Joia, Luiz Antonio (ed.), IT-Based Management: Challenges and Solutions, pp. 130–142. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
McCormick, M. 2001. ‘Is It Wrong to Play Violent Video Games?’ Ethics and Information Technology 3(4), 277–287.CrossRefGoogle Scholar
McFarland, M. C. 2001. ‘Intellectual Property, Information, and the Common Good’, in Spinello, R. A. and Tavani, H. T. (eds.) Readings in Cyberethics, pp. 252–262. Sudbury, MA: Jones and Bartlett.Google Scholar
McKenzie, D. and Wajcman, J. (eds.) 1999. The Social Shaping of Technology. Milton Keynes: Open University Press.
McLaughlin, B. and Bennet, K. 2005. ‘Supervenience’, Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/entries/supervenience/
McSorley, K. 2003. ‘The Secular Salvation Story of the Digital Divide’, Ethics and Information Technology 5(2), 75–87.CrossRefGoogle Scholar
Mellor, C. 2004. ‘Google's Storage Strategy’, TechWorld (6 April).
Michelfelder, D. 2001. ‘The Moral Value of Informational Privacy in Cyberspace’, Ethics and Information Technology 3(2), 129–135.CrossRefGoogle Scholar
,Microsoft-Research 2005. ‘The Towards 2020 Science’.
Midgley, Mary. 1996. ‘Trying Out One's New Sword’, in Arthur, J. (ed.), Morality and Moral Controversies (4th edn), pp. 116–119. Upper Saddle River, NJ: Simon and Schuster.Google Scholar
Midgley, M. 1985. ‘Persons and Non-Persons’, in Singer, P. (ed.), Defence of Animals, pp. 52–62. Oxford: BasilBlackwell.Google Scholar
Mill, J. S. 2007. On Liberty and The Subjection of Women. New York: Penguin Classics.Google Scholar
Miller, S. and Weckert, J. 2000. ‘Privacy, the Workplace and the Internet’, Journal of Business Ethics 28, 255–265.CrossRefGoogle Scholar
Moor, J. H. 1985. ‘What is Computer Ethics’, Metaphilosophy 16(4), 266–275.CrossRefGoogle Scholar
Moor, J. H. 1998. ‘Reason, Relativity and Responsibility in Computer Ethics’, Computers and Society 28(1), 14–21.CrossRefGoogle Scholar
Moor, J. H. 1999. ‘Just Consequentialism and Computing’, Ethics and Information Technology 1(1), 65–69.Google Scholar
Moor, J. H. 2001. ‘Just Consequentialism and Computing’, in Spinello, R. A. and Tavani, H. T (eds.), Readings in Cyberethics, pp. 98–105. Sudbury, MA: Jones and Bartlett.Google Scholar
Moor, J. H. 2006. ‘The Nature, Importance, and Difficulty of Machine Ethics’, IEEE Intelligent Systems 21, 18–21.CrossRefGoogle Scholar
Moore, G. 1965. ‘Cramming More Components onto Integrated Circuits’, Electronics 38, 114–117.Google Scholar
Moores, T. T. and Chang, J. 2006. ‘Ethical Decision Making in Software Privacy: Initial Development and Test of a Four-Component Model’, MIS Quarterly 30(1), 167–180.CrossRefGoogle Scholar
Morgan, R. 2008. ‘,Juicy Campus: College Gossip Leaves the Bathroom Wall and Goes Online’, International Herald Tribune, 18 March. www.iht.com/articles/2008/03/18/arts/gossip.php
Moser, I. 2006. ‘Disability and the Promises of Technology: Technology, Subjectivity and Embodiment within an Order of the Normal’, Information, Communication and Society 9(3), 373–395.CrossRefGoogle Scholar
Moss, J. 2002. ‘Power and the Digital Divide’, Ethics and Information Technology 4(2), 159–165.CrossRefGoogle Scholar
Naess, A. 1973. ‘The Shallow and the Deep, Long-Range Ecology Movement’, Inquiry 16, 95–100.CrossRefGoogle Scholar
Nagel, T. 1986. The View from Nowhere. Oxford: Oxford University Press.Google Scholar
Nagel, T. 1987. ‘The Fragmentation of Value’, in Gowans, C. W. Moral Dilemmas, pp. 174–187. New York: Oxford University Press.Google Scholar
Nakada, M. and Tamura, T. 2005. ‘Japanese Conceptions of Privacy: An Intercultural Perspective’, Ethics and Information Technology 7(1), 27–36.CrossRefGoogle Scholar
Nash, R. F. 1989. The Rights of Nature. Madison, WI: The University of Wisconsin Press.Google Scholar
,National Institute of Health. ‘Nuremburg Code’http://ohsr.od.nih.gov/guidelines/index.html.]
,Nature. 2006, ‘2020 – Future of Computing’, 440.
Nietzsche, F. W. 2003. Beyond Good and Evil: Prelude to a Philosophy of the Future. Horstmann, R.-P. (ed.); Judith Norman (trans). Cambridge: Cambridge University Press.Google Scholar
Nissenbaum, H. 1998. ‘Values in the Design of Computer Systems’, Computers and Society, March 1998, 38–39.CrossRefGoogle Scholar
Nissenbaum, H. 2001. ‘How Computer Systems Embody Values’, IEEE Computer 34, March, 118–120.CrossRefGoogle Scholar
Nissenbaum, H. 2004. ‘Privacy as Contextual Integrity’, Washington Law Review 79, 119–158.Google Scholar
Nozick, R. 1993. The Nature of Rationality. Princeton: Princeton University Press.Google Scholar
,Nuffield Council on Bioethics. 2003. Pharmacogenetics: Ethical Issues. London: Nuffield Council On Bioethics.Google Scholar
Ofcom, 2008. ‘The Communications Market 2008’, www.ofcom.org.uk/research/cm/cmr08/
O'Neill, O. 2004. ‘Modern Moral Philosophy and the Problem of Relevant Descriptions’, in Modern Moral Philosophy, pp. 301–316. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
O'Reilly, T. 2005. ‘What Is Web 2.0 – Design Patterns and Business Models for the Next Generation of Software’, www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html
Ortega Y Gasset, J. 1961. ‘Man the Technician’, in Weyl, H. (trans.), History as a System: And Other Essays Toward a Philosophy of History, pp. 87–161. New York: W. W. Norton & Company.Google Scholar
Orwell, G. 1949. Nineteen Eighty-Four. London: Secker and Warburg.Google Scholar
Ossorio, Pilar N. 2006. ‘About Face: Forensic Genetic Testing for Race and Visible Traits’, Journal of Law, Medicine and Ethics 34(2), 277–292.CrossRefGoogle ScholarPubMed
Pape, R. 1996. Bombing to Win. Ithaca: Cornell University Press.Google Scholar
Parker, D. 1968. ‘Rules of Ethics in Information Processing’, Communications of the ACM 11, 198–201.CrossRefGoogle Scholar
Parker, D. 1979. Ethical Conflicts in Computer Science and Technology. Arlington, VA: AFIPS Press.Google Scholar
Parker, D.et al. 1990. Ethical Conflicts in Information and Computer Science, Technology and Business. Wellesley, MA: QED Information Sciences.Google Scholar
Paterson, B. 2007. ‘We Cannot Eat Data: The Need for Computer Ethics to Address the Cultural and Ecological Impacts of Computing’, in Hongladarom, S. and Ess, C. (eds.), Information Technology Ethics: Cultural Perspectives, pp. 153–168. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
Patton, M. F. J. 1988. ‘Tissues in the Profession: Can Bad Men Make Good Brains Do Bad Things?’, Proceedings and Addresses of the American Philosophical Association, 61(3).CrossRefGoogle Scholar
PBS Online. 1998. ‘Nerds 2.0.1: Wiring the World’, www.pbs.org/opb/nerds2.0.1/wiring_world/
Pearson, C. and Watson, N. 2007. ‘Tackling Disability Discrimination in the United Kingdom: The British Disability Discrimination Act’, Journal of Law and Policy 23: 95–120. http://law.wustl.edu/Journal.index.asp?ID=5697
Pennell, C. 2001. Bandits at Sea: A Pirates Reader. New York: New York University Press.Google Scholar
Pennings, J. 1998. ‘Innovations as Precursors of Organizational Performance’, in Galliers, R. D. and Baets, W. R. J. (eds.), Information Technology and Organizational Transformation: Innovation for the 21st Century, pp. 153–178. Chichester: John Wiley & Sons.Google Scholar
Phillips, A. 1995. The Politics of Presence. Oxford: Oxford University Press.Google Scholar
Phillips, J. and Firth, A. 2001. Introduction to Intellectual Property Law (4th edn). London: Butterworths LexisNexis.Google Scholar
Plant, S. 1997. Zeros and Ones. London: Fourth Estate.Google Scholar
,Plato. 1993. Symposium, Robin Waterfield (ed. and trans.). Oxford/New York: Oxford University Press.Google Scholar
Pohl, F. 1981. The Cool War. New York: Ballantine Books.Google Scholar
Posner, R. A. 1997, ‘Problematics of Moral and Legal Theory’, The Harvard Law Review 111, 1637–1637.CrossRefGoogle Scholar
Potter, S. M., Wagenaar, D. A. and DeMarse, T. B. 2006. ‘Closing the Loop: Stimulation Feedback Systems for Embodied MEA Cultures’, in Taketani, M. and Baudry, M. (eds.), Advances in Network Electrophysiology Using Multi-Electrode Arrays, pp. 215–242. New York: Springer.CrossRefGoogle Scholar
Putnam, H. 2004. Ethics Without Ontology. Cambridge, MA: Harvard University Press.Google Scholar
Putnam, R. 2001. Bowling Alone: The Collapse and Revival of American Community. New York: Simon & Schuster.Google Scholar
Rattray, G. 2001. Strategic Warfare in Cyberspace. Cambridge, MA: MIT Press.Google Scholar
Rawls, J. 1993. Political Liberalism. New York: Columbia University Press.Google Scholar
Rawls, J. 1999. A Theory of Justice (rev. edn). Oxford: Oxford University Press.Google Scholar
Rees, T. L. 1998. Mainstreaming Equality in the European Union. London and New York: Routledge.Google Scholar
Reidenberg, J. R. 2000. ‘Resolving Conflicting International Data Privacy Rules in Cyberspace’, Stanford Law Review 52, 1315–1376.CrossRefGoogle Scholar
Rheingold, H. 2000. The Virtual Community: Homesteading on the Electronic Frontier (2nd edn). Cambridge, MA and London: MIT Press.Google Scholar
Rosen, J. 2004. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York: Random House.Google Scholar
Ross, D.et al. (eds.) 2000. Dennett's Philosophy. Cambridge, MA: MIT Press.
,Royal Society and the Royal Academy of Engineering. 2004. ‘Nanoscience and Nanotechnologies: Opportunities and Uncertainties’, www.nanotec.org.uk/finalReport.htm
Rucker, R. 2006. The Lifebox, the Seashell, and the Soul: What Gnarly Computation Taught Me About Ultimate Reality, the Meaning of Life, and How to Be Happy. New York: Basic Books.Google Scholar
Saletan, W. 2005. ‘The Beam in Your Eye: If Steroids are Cheating Why isn't LASIK?’, Slate, 18 April. www.slate.com/id/2116858/
Samuelson, P. and Scotchmer, S. 2002. ‘The Law and Economics of Reverse Engineering’, The Yale Law Journal 111(7), 1575–1673.CrossRefGoogle Scholar
Sandberg, A. and Bostrom, N. 2007. ‘Cognitive Enhancement: A Review of Technology’, www.enhanceproject.org/documents/Cognitive%20Enhancement%20Tech%20Review.pdf
Sandel, M. 2007. The Case Against Perfection: Ethics in the Age of Genetic Engineering. Cambridge, MA: Harvard University Press.Google Scholar
Sandin, P. 2007. ‘Common Sense Precaution and Varieties of the Precautionary Principle’, in Lewen, T. (ed.), Risk: Philosophical Perspectives, pp. 99–112. London: Routledge.Google Scholar
Saponas, T. S., Jonathan, L., Carl, H., Sameer, A. and Tadayoshi, K. (eds.) 2007. Special issue on ‘Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing’, USENIX Association.
Schelling, T. 1966. Arms and Influence. New Haven: Yale University Press.Google Scholar
Schiffman, B. 2008. ‘Turns Out Porn Isn't Recession-Proof’, Wired Blog Network, http://blog.wired.com/business/2008/07/turns-out-por-1.html
Schneiderman, F. B. (ed.) 1999. Trust in Cyberspace. Washington, DC:National Academic Press.
Schrödinger, E. 1944. What is Life? The Physical Aspect of the Living Cell. Cambridge: Cambridge University Press.Google Scholar
Seife, C. 2006. Decoding the Universe: How the New Science of Information is Explaining Everything in the Cosmos, from Our Brains to Black Holes. New York: Viking, the Penguin Group.Google Scholar
Servon, L. 2002. Bridging the Digital Divide: Technology, Community, and Public Policy. Malden, MA: Blackwell.CrossRefGoogle Scholar
Severson, R. J. 1997. The Principles of Information Ethics. New York: Armonk and London: M. E. Sharpe.Google Scholar
Shakespeare, T. 2006. Disability Rights and Wrongs. London and New York: Routledge.Google Scholar
Shapira, N., Barak, A. and Gal, I. 2007. ‘Promoting Older Adults’ Well-being through Internet Training and Use'. Aging and Mental Health, 11(5), 477–484.CrossRefGoogle Scholar
Shrader-Frechette, K. and Westra, L. (eds.) 1997. Technology and Values. New York: Rowman & Littlefield.
Sicart, M. 2005. ‘On the Foundations of Evil in Computer Game Cheating’, Proceedings of the Digital Games Research Association's 2nd International Conference – Changing Views: Worlds in Play, June 16–20, Vancouver, British Columbia, Canada.Google Scholar
Sicart, M. and Studies, G. 2009. The Ethics of Computer Games. Cambridge MA: MIT Press.CrossRefGoogle Scholar
Siponen, M. 2004. ‘A Pragmatic Evaluation of the Theory of Information Ethics’, Ethics and Information Technology 6(4), 279–290.CrossRefGoogle Scholar
Siponen, M. and Vartiainen, T. 2002. ‘Teaching End-User Ethics: Issues and a Solution Based on Universalizability’, Communications of the Association for Information Systems 8, 422–443.Google Scholar
Small, Luc. 2007. ‘Theft in a Wireless World’, Ethics and Information Technology 9, 179–186.CrossRefGoogle Scholar
Smart, A., Martin, P. and Parker, M. 2004. ‘Tailored Medicine: Whom Will it Fit? The Ethics of Patient and Disease Stratification’, Bioethics 18(4), 322–343.CrossRefGoogle ScholarPubMed
Smart, J. J. C. and Williams, B. A. O. 1987. Utilitarianism: For and Against. Cambridge: Cambridge University Press. (First published 1973, reprinted with corrections and supplementary bibliography.)Google Scholar
Smith, M. M. 1996. ‘Information Ethics: An Hermeneutical Analysis of an Emerging Area in Applied Ethics’, PhD thesis, The University of North Carolina at Chapel Hill, Chapel Hill, D.C.
Smith, M. M. 2002, ‘Global Information Ethics: A Mandate for Professional Education’, Proceedings of the 68th IFLA Council and General Conference, Glasgow. Also available online at www.ifla.org/IV/ifla68/papers/056-093e.pdf.
Som, C., Hilty, L. M. and Ruddy, T. F. 2004. ‘The Precautionary Principle in the Information Society’, Human and Ecological Risk Assessment 10, 787–799.CrossRefGoogle Scholar
Spencer, R. 2008. ‘Footprints Faked, Admit Organizers’, The Age, www.theage.com.au/news/latest-news/footprints-faked-admit-organisers/2008/08/11/1218306780009.html
Spier, R. M. 2001. Science and Technology Ethics. London: Routledge.Google Scholar
Spinello, R. A. 2000. Cyberethics: Morality and Law in Cyberspace. London: Jones and Bartlett.Google Scholar
Spinello, R. A. 2003. ‘The Future of Intellectual Property’, Ethics and Information Technology 5(1), 1–16.CrossRefGoogle Scholar
Spinello, R. A. and Tavani, H. T. 2005. ‘Intellectual Property Rights: From Theory to Practical Implementation’, in Spinello, R. A. and Tavani, H. T. (eds.), Intellectual Property Rights in a Networked World: Theory and Practice, pp. 1–65. Hershey, PA: INFOSCI.CrossRefGoogle Scholar
Stahl, B. C. 2005. ‘The Impact of Open Source Development on the Social Construction of Intellectual Property’, in Koch, S. (ed.) Free/Open Source Software Development, pp. 259–272. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
Stahl, B. C. 2007. ‘Social Justice and Market Metaphysics: A Critical Discussion of Philosophical Approaches to Digital Divides’, in Rookby, E. and Weckert, J. (eds.) Information Technology and Social Justice, pp. 148–170. Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
Stahl, B. C. 2008a. ‘Empowerment through ICT: A Critical Discourse Analysis of the Egyptian ICT Policy’, in Proceedings of the Human Choice and Computers 8 Conference, 25–27 September 2008, Pretoria, South Africa.Google Scholar
Stahl, B. C. 2008b. Information Systems: Critical Perspectives. London: Routledge.CrossRefGoogle Scholar
Stahl, B. C. 2008c. ‘The Ethical Nature of Critical Research in Information Systems’, Information Systems Journal 18(2), special issue on ‘Exploring the Critical Agenda in IS Research’, Brooke, C., Cecez-Kecmanovic, D. and Klein, H. K. (eds.), 137–163.CrossRefGoogle Scholar
Stallman, R. 1995. ‘Why Software Should Be Free’, in Johnson, D. G. and Nissenbaum, H. (eds.), Computers, Ethics and Social Values, pp. 190–200. Upper Saddle River: Prentice Hall.Google Scholar
Stanton, J. M. and Julian, A. L. 2002, ‘The Impact of Electronic Monitoring on Quality and Quantity of Performance’, Computers in Human Behavior 18(1), 85–101.CrossRefGoogle Scholar
Stienstra, D. 2006. ‘The Critical Space between: Access, Inclusion and Standards in Information Technologies’, Information, Communication and Society 9(6), 335–354.CrossRefGoogle Scholar
Stuart, S. 2008. ‘From Agency to Apperception: Through Kinaesthesia to Cognition and Creation’. (Special issue on Kant and Information Ethics), Ethics and Information Technology.
Sullins, J. P. 2006a. ‘Ethics and Artificial Life: From Modeling to Moral Agents’. Ethics and Information Technology 7(3), 139–148.CrossRefGoogle Scholar
Sullins, J. P. 2006b. ‘When Is a Robot a Moral Agent?’, International Review of Information Ethics 6, 23–30.Google Scholar
Sullins, J. P. 2007. ‘Friends by Design: A Design Philosophy for Personal Robotics Technology’, in Vermaas, P. E., Kroes, P., Light, A. and Moore, S. A. (eds.), Philosophy and Design: From Engineering to Architecture. Dordrecht: Springer.Google Scholar
Sullins, J. P. 2008. ‘The Role of Artificial Moral Agency in Technoethics’, in Handbook of Research on Technoethics, New York: Idea Group Inc.Google Scholar
,Sunderland City Council 2008. ‘Digital Challenge’, www.sunderland.gov.uk/wherepeoplematter/
Sunstein, C. 2001. republic.com. New Jersey: Princeton University Press.Google Scholar
Sunstein, C. 2005. Laws of Fear: Beyond the Precautionary Principle. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Tavani, H. T. 1999. ‘Informational Privacy, Data Mining, and the Internet’, Ethics and Information Technology 1(2), 137–145.CrossRefGoogle Scholar
Tavani, H. T. 2002. ‘The Uniqueness Debate in Computer Ethics: What Exactly Is at Issue, and Why Does it Matter?’, Ethics and Information Technology 4(1), 37–54.CrossRefGoogle Scholar
Tavani, H. T. 2005. ‘The Impact of the Internet on Our Moral Condition: Do We Need a New Framework of Ethics’, in Cavalier, R. (ed.), The Impact of the Internet on Our Moral Lives, pp. 215–238. Albany, NY: SUNY Press.Google Scholar
Tavani, H. T. 2007. Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology (2nd edn). Hoboken, NJ: John Wiley & Sons.Google Scholar
Tavani, H. T. 2008. ‘Floridi's Ontological Theory of Informational Privacy: Some Implications and Challenges’, Ethics and Information Technology 10(2–3), 155–156.CrossRefGoogle Scholar
Tavani, H. T. 2010. Ethics and Technology: Controversies: Questions and Strategies for Ethical Computing. (3rd edn) Hoboken, NJ: John Wiley & Sons.Google Scholar
Taylor, C. 2002. ‘Democracy, Inclusive and Exclusive’, in Madsen, R., Sullivan, W. M., Swiderl, A. and Tipton, S. M. (eds.), Meaning and Modernity: Religion, Polity, and Self, pp. 181–194. Berkeley: University of California Press.Google Scholar
Tedjasaputra, A. 2007. ‘Digestible RFID Tag: An Alternative for Your Internal Body Monitoring’, RFID Community in Asia: www.rfid-asia.info/2007/02/digestible-rfid-tag-alternative-for.htm
Thaler, R. H. and Sunstein, C. R., 2008. Nudge: Improving Decisions about Health, Wealth, and Happiness. New Haven: Yale University Press.Google Scholar
,The Economist, 18 December 1997, ‘1897 and 1997 – the Century the Earth Stood Still’.
,The High Court of Australia: Dow Jones and Company Inc v Gutnick [2002] HCA 56; 210 CLR 575; 194 ALR 433; 77 ALJR 255 (10 December 2002), www.austlii.edu.au/au/cases/cth/HCA/2002/56.html
Thomas, J. 2004. ‘Cyberpoaching behind the keyboard: Uncoupling the ethics of “virtual infidelity”’, in Waskul, D. D. (ed.), net.seXXX: Readings on Sex, Pornography, and the Internet, pp. 149–77. New York: Peter Lang.Google Scholar
Thomas, T. 1997. ‘The Threat of Information Operations: A Russian Perspective’, in Pfaltzgraff, R. and Shultz, R. (eds.), War in the Information Age. London: Brassey's.Google Scholar
Thomasson, A. L. 2003. ‘Realism and Human Kinds’, in Philosophy and Phenomenological Research, LXVII (3), 580–609.CrossRefGoogle Scholar
Thompson, A. 1996. Hardware Evolution: Automatic Design of Electronic Circuits in Reconfigurable Hardware by Artificial Evolution. London: Springer-Verlag.Google Scholar
Thorseth, M. 2006. ‘Worldwide Deliberation and Public Use of Reason Online’, Ethics and Information Technology 8(4), 243–252.CrossRefGoogle Scholar
Thorseth, M. 2007. ‘Ethical Pluralism’, in Collste, G. (ed.), Perspectives on Applied Ethics (Studies in Applied Ethics 10), pp. 41–55. Linköping: Centre for Applied Ethics, Linköping University.Google Scholar
Thorseth, M. 2008. ‘Reflective Judgment and Enlarged Thinking Online’, Ethics and Information Technology 10(4), 221–231.CrossRefGoogle Scholar
Torremans, P. 2005. Holyoak and Torremans Intellectual Property Law (4th edn). Oxford: Oxford University Press.Google Scholar
Turilli, M. 2007. ‘Ethical Protocols Design’, Ethics and Information Technology 9, 49–62.CrossRefGoogle Scholar
Turilli, M. 2008. ‘Ethics and the Practice of Software Design’, in Waelbers, K.Brey, P. A. and Briggle, A. (eds.), Current Issues in Computing and Philosophy, pp. 171–183. IOS Press.Google Scholar
Turing, A. M. 1950. ‘Computing Machinery and Intelligence’, Mind 59, 433–460.CrossRefGoogle Scholar
Turkle, S. 2005. ‘Relational Artifacts/Children/Elders: The Complexities of Cybercompanions’. In ‘Toward Social Mechanisms of Android Science. A CogSci-2005 Workshop’, Cognitive Science Society62–73. www.androidscience.com/proceedings2005/TurkleCogSci2005AS.pdfGoogle Scholar
Turkle, S., Taggart, W., Kidd, C. D. and Dasté, O. 2006. ‘Relational Artifacts with Children and Elders: The Complexities of Cybercompanionship’, Connection Science 18, 347–361.CrossRefGoogle Scholar
Turner, E. 1998. ‘The Case for Responsibility of the Computing Industry to Promote Equal Presentation of Women and Men in Advertising Campaigns’, ETHICOMP98, Rotterdam.Google Scholar
Turner, E. 1999. ‘Gender and Ethnicity of Computing, Perceptions of the Future Generation’, ETHICOMP99, Rome.Google Scholar
,UNDP (United Nations Development Programme) 1998. Human Development Report 1998. New York, Oxford: Oxford University Press.Google Scholar
,United Nations. 1948. ‘Universal Declaration of Human Rights’, www.un.org/Overview/rights.html
,United Nations Environment Programme. 1992. ‘Rio Declaration on Environment and Development 1992’, www.unep.org/Documents.Multilingual/Default.asp?ArticleID=1163&DocumentID=78&l=en
,US Patent and Trademark Office. 2007. ‘United States Patent Application 20070300174’ Kind Code, A1, Macbeth; Steven, W. et al., (http://patft.uspto.gov) re US Patent Application 20070300174.
Amerongen, M. 2008, ‘The Interpretation of Artefacts’, Simon Stevin series in the Philosophy of Technology, Delft.Google Scholar
Caenegem, W. 2003. ‘Intellectual Property Law and the Idea of Progress’, Intellectual Property Quarterly 3, 237–256.Google Scholar
Delden, J., Bolt, I., Kalis, A., Derjiks, J. and Leufkins, H. 2004. ‘Tailormade Pharmacotherapy: Future Developments and Ethical Challenges in the Field of Pharmacogenomics’, Bioethics 18(4), 303–321.CrossRefGoogle Scholar
Hoven, J. 1995. ‘Equal Access and Social Justice: Information as a Primary Good’, ETHICOMP9, Leicester: De Montfort University.Google Scholar
Hoven, J. 1997. ‘Computer Ethics and Moral Methodology’, Metaphilosophy 28(3), 234–248.CrossRefGoogle Scholar
Hoven, J. 2005. ‘E-democracy, E-contestation and the Monitorial Citizen’, Ethics and Information Technology 7(2), 51–59.CrossRefGoogle Scholar
Hoven, J. 2008. ‘Moral Methodology and Information Technology’ in Himma, K. E. and Tavani, H. T. (eds.), 2008. The Handbook of Information and Computer Ethics, pp. 49–69.
Hoven, J., Miller, S. and Pogge, T. (2010, forthcoming). The Design Turn in Applied Ethics. Cambridge: Cambridge University Press.Google Scholar
Hoven, J. and Rooksby, E. 2008. ‘Distributive Justice and the Value of Information: A (Broadly) Rawlsian Approach’, in Hoven, J. and Weckert, J. (eds.) Information Technology and Moral Philosophy, pp. 376–397. Cambridge: Cambridge University Press.Google Scholar
Hoven, J. and Vermaas, P. 2007. ‘Nano-technology and Privacy: On Continuous Surveillance outside the Panopticon’, Journal of Medicine and Philosophy 32(3), 283–297.CrossRefGoogle ScholarPubMed
Hoven, J. and Weckert, J. (eds.) 2008. Information Technology and Moral Philosophy. Cambridge: Cambridge University Press.
Verbeek, P. P. 2005. What Things Do: Philosophical Reflections on Technology, Agency, and Design. PA: Penn State Press.Google Scholar
Verton, D. 2003. Black Ice: The Invisible Threat of Cyber-Terrorism. New York: McGraw-Hill.Google Scholar
W3C. 2004. ‘HTML and XHTML Frequently Answered Questions’. Available at www.w3.org/MarkUp/2004/xhtml-faq
Waddington, D. 2007. ‘Locating the Wrongness in Ultra-violent Video Games’, Ethics and Information Technology 9(2), 121–128.CrossRefGoogle Scholar
Wajcman, J. 2004. TechnoFeminism. Cambridge, UK and Malden, MA: Polity.Google Scholar
Wallach, W. and Allen, C. 2008. Moral Machines: Teaching Robots Right from Wrong. New York: Oxford University Press.Google Scholar
Walsham, G. 1995. ‘Interpretive Case Studies in IS Research: Nature and Method’, European Journal of Information Systems 4(2), 74–81.CrossRefGoogle Scholar
Walsham, G. 2001. Making a World of Difference – IT in a Global Context. Chichester: Wiley.Google Scholar
Waltz, K. 1959. Man, the State, and War. New York: Columbia University Press.Google Scholar
Walzer, M. 1977. Just and Unjust Wars. New York: Basic Books.Google Scholar
Warschauer, Mark. 2003. ‘Dissecting the “Digital Divide”: A Case Study in Egypt’, The Information Society 19, 297–304.CrossRefGoogle Scholar
Warwick, K. 2004. I, Cyborg. Champaign, IL: University of Illinois Press.Google Scholar
Warwick, S. 2001. ‘Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in the United States’, in Spinello, R. A. and Tavani, H T. (eds.), Readings in Cyberethics, pp. 263–279. Sudbury, MA: Jones and Bartlett.Google Scholar
Waters, R. 2006. ‘US Group Implants Electronic Tags in Workers’, Financial Times, 12 February, www.commondreams.org/headlines06/0213-07.htm
Wear, S. 1998. Informed Consent: Patient Autonomy and Physician Beneficence within Healthcare (2nd edn). Dordrecht: Kluwer.Google Scholar
Weckert, J. 2001. ‘Computer Ethics: Future Directions’, Ethics and Information Technology 3(2), 93–96.CrossRefGoogle Scholar
Weckert, J. 2002. Trust, Corruption, and Surveillance in the Electronic Workplace', in Brunnstein, K. and Berleur, J. (eds.), Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society, 17th IFIP World Computer Congress, Montreal, pp. 109–120. Boston: Kluwer.CrossRefGoogle Scholar
Weckert, J. 2005. ‘On-line Trust’, in Cavalier, R. (ed.), The Impact of the Internet on Our Moral Lives, pp. 95–117. Albany, NJ: SUNY Press.Google Scholar
Weckert, J. (ed.) 2005. Electronic Monitoring in the Workplace: Controversies and Solutions. Hershey, PA: Idea Group Publishing.CrossRef
Weckert, J. 2007. ‘Computer Ethics’ The International Library of Essays in Public and Professional Ethics. Aldershot: Ashgate.Google Scholar
Weckert, J. and Moor, J. 2006. ‘The Precautionary Principle in Nanotechnology’, International Journal of Applied Philosophy 20(2), 191–204.CrossRefGoogle Scholar
Weimann, G. 2006. Terror on the Internet. Washington, DC: The United States Institute of Peace Press.Google Scholar
Weinert, F. 2009. Copernicus, Darwin, and Freud: Revolutions in the History and Philosophy of Science. Oxford: Blackwell.Google Scholar
Weizenbaum, J. 1965. ‘Eliza – a Computer Program for the Study of Natural Language Communication between Man and Machine’, Communications of the Association for Computing Machinery 9, 36–45.Google Scholar
Weizenbaum, J. 1976. Computer Power and Human Reason. San Francisco: W. H. Freeman.Google Scholar
Westin, A. F. 1968. Privacy and Freedom. New York: Atheneum.Google Scholar
Wheeler, D. 2006. ‘Gender Sensitivity and the Drive for IT: Lessons from the NetCorps Jordan Project’, Ethics and Information Technology 8(3), 131–142.CrossRefGoogle Scholar
Wheeler, J. 1990. Information, Physics, Quantum: The Search for Links. Boulder, CO: Westview Press.Google Scholar
White, H., McConnell, E., Clipp, E., Branch, L. G., Sloane, R., Pieper, C. and Box, T. L. 2002. ‘A Randomized Controlled Trial of the Psychosocial Impact of Providing Internet Training and Access to Older Adults’, Aging and Mental Health 6(3), 213–221.CrossRefGoogle ScholarPubMed
White, L. J. 1967. ‘The Historical Roots of Our Ecological Crisis’, Science 155, 1203–1207.CrossRefGoogle Scholar
Wiegel, V.et al. 2005. ‘Privacy, Deontic Epistemic Action Logic and Software Agents’, Ethics and Information Technology 7(4), 251–264.CrossRefGoogle Scholar
Wiegel, V. 2006, ‘Building Blocks for Artificial Moral Agents’, in Proceeding EthicALife/ALifeX.
Wiegel, V. 2007, Sopholab, Volker Stevin Series in Philosophy of Technology. Delft: Delft University of Technology.Google Scholar
Wiener, N. 1948. Cybernetics: or Control and Communication in the Animal and the Machine. Cambridge, MA: MIT Press.Google Scholar
Wiener, N. 1950. The Human Use of Human Beings: Cybernetics and Society. Houghton Mifflin.Google Scholar
Wiener, N. 1954. The Human Use of Human Beings (2nd rev. edn). New York: Doubleday Anchor.Google Scholar
Wiener, N. 1964. God & Golem, Inc.: A Comment on Certain Points Where Cybernetics Impinges on Religion. Cambridge, MA: MIT Press.Google Scholar
Winner, L. 1986. The Whale and the Reactor: A Search for Limits in an Age of High Technology. Chicago: University of Chicago Press.Google Scholar
Winner, L. 1997. ‘Cyberlibertarian Myths and the Prospect for Community’, ACM Computers and Society 27(3), 14–19.CrossRefGoogle Scholar
Winner, L. 1999. ‘Do Artefacts Have Politics?’, in McKenzie, D. and Wajcman, J. (eds.) The Social Shaping of Technology, pp. 2–40. Buckingham: Open University Press.Google Scholar
Winston, M. and Edelbach, R. 2008. Society, Ethics and Technology. (4th edn) Florence, KY: Wadsworth.Google Scholar
Wittgenstein, L. 1953. Philosophical Investigations, Anscombe, G. E. M. and Rhees, R. (eds.), Anscombe, G. E. M. (trans.). Oxford: Blackwell.Google Scholar
Wonderly, M. 2008. ‘A Humean Approach to Assessing the Moral Significance of Ultra-violent Video Games’, Ethics and Information Technology 10(1), 1–10.CrossRefGoogle Scholar
Wooldridge, M., 2000. Reasoning about Rational Agents, Cambridge, MA: MIT Press.Google Scholar
York, P. F. 2005. ‘Respect for the World: Universal Ethics and the Morality of Terraforming’, PhD Thesis, the University of Queensland.
Young, I. M. 2000. Inclusion and Democracy. Oxford: Oxford University Press.Google Scholar
Yudkowsky, E. 2008. ‘Artificial Intelligence as a Positive and Negative Factor in Global Risk’, in Bostrom, N. and Circovic, M. (eds.) Global Catastrophic Risks, pp. 308–345. Oxford: Oxford University Press.Google Scholar
,ZDNet. 2007. ‘Facebook Users Open to Cyberattacks, ID Theft?’, ZDNet, http://news.zdnet.com/2100-1009_22-157855.html

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Edited by Luciano Floridi, University of Hertfordshire
  • Book: The Cambridge Handbook of Information and Computer Ethics
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511845239.018
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Edited by Luciano Floridi, University of Hertfordshire
  • Book: The Cambridge Handbook of Information and Computer Ethics
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511845239.018
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Edited by Luciano Floridi, University of Hertfordshire
  • Book: The Cambridge Handbook of Information and Computer Ethics
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511845239.018
Available formats
×