메뉴 건너뛰기




Volumn 9, Issue 1, 2007, Pages 49-62

Ethical protocols design

Author keywords

Ethical protocols; Ethical requirements; Informational privacy; Protocols design; Systems pecification

Indexed keywords

CAMERA PHONE; COMPUTATIONAL SYSTEM; ETHICAL PRINCIPLES; ETHICAL REQUIREMENTS; INFORMATIONAL PRIVACIES;

EID: 33847670279     PISSN: 13881957     EISSN: 15728439     Source Type: Journal    
DOI: 10.1007/s10676-006-9128-9     Document Type: Article
Times cited : (37)

References (28)
  • 1
    • 35048823342 scopus 로고    scopus 로고
    • Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
    • W.M.P. van der Aalst (2004) Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management. Lecture Notes in Computer Science 3098: 1-65
    • (2004) Lecture Notes in Computer Science , vol.3098 , pp. 1-65
    • van der Aalst, W.M.P.1
  • 2
    • 33744492586 scopus 로고    scopus 로고
    • Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine?
    • A. Adam. (2005) Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine? Ethics and Information Technology 7(4): 233-242
    • (2005) Ethics and Information Technology , vol.7 , Issue.4 , pp. 233-242
    • Adam, A.1
  • 3
    • 33646899267 scopus 로고    scopus 로고
    • Artificial Morality: Top-Down, Bottom-up, and Hybrid Approaches
    • C. Allen, I. Smit, W. Wallach. (2005) Artificial Morality: Top-Down, Bottom-up, and Hybrid Approaches. Ethics and Information Technology 7(3): 149-155
    • (2005) Ethics and Information Technology , vol.7 , Issue.3 , pp. 149-155
    • Allen, C.1    Smit, I.2    Wallach, W.3
  • 5
    • 84986057230 scopus 로고
    • The Classification of Requirements Engineering Methods
    • In S. Fickas and A. Finkelstein, editors IEEE Computer Society Press
    • M. Bickerton and J. Siddiqi. The Classification of Requirements Engineering Methods. In S. Fickas and A. Finkelstein, editors, Requirements Engineering 93, pp. 182-186. IEEE Computer Society Press, 1993
    • (1993) Requirements Engineering , vol.93 , pp. 182-186
    • Bickerton, M.1    Siddiqi, J.2
  • 10
  • 11
    • 33744479964 scopus 로고    scopus 로고
    • The Ontological Interpretation of Informational Privacy
    • L. Floridi (2006) The Ontological Interpretation of Informational Privacy. Ethics and Information Technology 7(4):185-200
    • (2006) Ethics and Information Technology , vol.7 , Issue.4 , pp. 185-200
    • Floridi, L.1
  • 13
    • 3242774495 scopus 로고    scopus 로고
    • On the Morality of Artificial Agents
    • L. Floridi, J.W. Sanders. (2004) On the Morality of Artificial Agents. Minds and Machines 14(3): 349-379
    • (2004) Minds and Machines , vol.14 , Issue.3 , pp. 349-379
    • Floridi, L.1    Sanders, J.W.2
  • 14
    • 85083928636 scopus 로고    scopus 로고
    • Robots Benefit Patients and Staff in Hospitals and Community Pharmacies
    • R. Graham. (2004) Robots Benefit Patients and Staff in Hospitals and Community Pharmacies. The Pharmaceutical Journal 273: 534
    • (2004) The Pharmaceutical Journal , vol.273 , pp. 534
    • Graham, R.1
  • 16
    • 33847635109 scopus 로고    scopus 로고
    • Attack of the Machines. Is Your Stockbroker a Robot?
    • Jan. 18
    • D. Gross. Attack of the Machines. Is Your Stockbroker a Robot? Slate, Jan. 18, 2005
    • (2005) Slate
    • Gross, D.1
  • 18
    • 0011442353 scopus 로고
    • A Universal Modular Actor Formalism for Artificial Intelligence
    • Stanford, CL
    • C. Hewitt, P. Bishop and R. Steiger. A Universal Modular Actor Formalism for Artificial Intelligence. IJC AI3, pp. 235-245. Stanford, CL, 1973
    • (1973) IJC AI3 , pp. 235-245
    • Hewitt, C.1    Bishop, P.2    Steiger, R.3
  • 19
    • 4043167020 scopus 로고    scopus 로고
    • Business Codes of Multinational Firms: What Do They Say?
    • M. Kaptein. (2004) Business Codes of Multinational Firms: What Do They Say?. Journal of Business Ethics 50(1): 13-31
    • (2004) Journal of Business Ethics , vol.50 , Issue.1 , pp. 13-31
    • Kaptein, M.1
  • 21
    • 33847685761 scopus 로고    scopus 로고
    • Identity Theft: Stealing Your Name
    • Monday, 18 June
    • J. Penycate. Identity Theft: Stealing Your Name. BBC News, Monday, 18 June, 2001
    • (2001) BBC News
    • Penycate, J.1
  • 22
    • 33847682577 scopus 로고    scopus 로고
    • Bank Automates to Boost Customer Service. Case Study: HSBC Speeds up Queries with Workflow Automation
    • Monday 06 February
    • S. Ranger. Bank Automates to Boost Customer Service. Case Study: HSBC Speeds up Queries with Workflow Automation. Silicon.com, Monday 06 February, 2006
    • (2006) Silicon.com
    • Ranger, S.1
  • 23
    • 33847668712 scopus 로고    scopus 로고
    • Synovate. Federal Trade Commission
    • Synovate. Identity Theft Survey. Federal Trade Commission, 2003
    • (2003) Identity Theft Survey
  • 24
    • 2542469289 scopus 로고    scopus 로고
    • Privacy Protection, Control of Information, and Privacy-Enhancing Technologies
    • Herman T. Tavani, James H. Moor. (2001) Privacy Protection, Control of Information, and Privacy-Enhancing Technologies. SIGCAS Computer Society 31(1):6-11
    • (2001) SIGCAS Computer Society , vol.31 , Issue.1 , pp. 6-11
    • Tavani, H.T.1    Moor, J.H.2
  • 25
    • 0343076651 scopus 로고
    • Computers Amplify Black Monday
    • M.M. Waldrop (1987) Computers Amplify Black Monday. Science 238(4827):602-604
    • (1987) Science , vol.238 , Issue.4827 , pp. 602-604
    • Waldrop, M.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.