353 found

Order:
  1. Books and reviews.W. Aa - 1976 - International Logic Review: Rassegna Internazionale di Logica 13:106.
     
    Export citation  
     
    Bookmark  
  2. Nonstandard set theories and information management.Varol Akman & Mujdat Pakkan - 1996 - Journal of Intelligent Information Systems 6:5-31.
    The merits of set theory as a foundational tool in mathematics stimulate its use in various areas of artificial intelligence, in particular intelligent information systems. In this paper, a study of various nonstandard treatments of set theory from this perspective is offered. Applications of these alternative set theories to information or knowledge management are surveyed.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Digital Piracy: Factors that Influence Attitude Toward Behavior.Sulaiman Al-Rafee & Timothy Paul Cronan - 2006 - Journal of Business Ethics 63 (3):237-259.
    A new form of software piracy known as digital piracy has taken the spotlight. Lost revenues due to digital piracy could reach $5 billion by the end of 2005.Preventives and deterrents do not seem to be working – losses are increasing. This study examines factors that influence an individual’s attitude toward pirating digital material. The results of this study suggest that attitude toward digital pirating is influenced by beliefs about the outcome of behavior (cognitive beliefs), happiness and excitement (affective beliefs), (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   32 citations  
  4.  70
    Software libre 2004.Andoni Alonso & Carl Mitcham - 2004 - Ethics and Information Technology 6 (1):65-67.
  5. Software Process Change, ser.A. Amescua, J. Garcia, M. I. Sanchez-Segura & F. Medina-Dominguez - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag.
     
    Export citation  
     
    Bookmark  
  6. What Web Ads, Blurbs and Introductions Tell Potential Dictionary Buyers about Users, User Needs and Lexicographic Functions.Birger Andersen - 2012 - Hermes 49.
     
    Export citation  
     
    Bookmark  
  7.  2
    Book and Software Reviews-The Extended Organism.Carl Anderson - 2000 - Complexity 6 (2):58-58.
  8.  61
    The Problem of Justification of Empirical Hypotheses in Software Testing.Nicola Angius - 2014 - Philosophy and Technology 27 (3):423-439.
    This paper takes part in the methodological debate concerning the nature and the justification of hypotheses about computational systems in software engineering by providing an epistemological analysis of Software Testing, the practice of observing the programs’ executions to examine whether they fulfil software requirements. Property specifications articulating such requirements are shown to involve falsifiable hypotheses about software systems that are evaluated by means of tests which are likely to falsify those hypotheses. Software Reliability metrics, used to measure the growth of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  9.  42
    Computational Idealizations in Software Intensive Science: a Comment on Symons’ and Horner’s paper.Nicola Angius - 2014 - Philosophy and Technology 27 (3):479-484.
    This commentary on John Symons’ and Jack Horner’s paper, besides sharing its main argument, challenges the authors’ statement that there is no effective method to evaluate software-intensive systems as a distinguishing feature of software intensive science. It is underlined here how analogous methodological limitations characterise the evaluations of empirical systems in non-software intensive sciences. The authors’ claim that formal methods establish the correctness of computational models rather than of the represented programme is here compared with the empirical adequacy problem typifying (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Discovering Empirical Theories of Modular Software Systems. An Algebraic Approach.Nicola Angius & Petros Stefaneas - 2016 - In Vincent C. Müller (ed.), Computing and philosophy: Selected papers from IACAP 2014. Cham: Springer. pp. 99-115.
    This paper is concerned with the construction of theories of software systems yielding adequate predictions of their target systems’ computations. It is first argued that mathematical theories of programs are not able to provide predictions that are consistent with observed executions. Empirical theories of software systems are here introduced semantically, in terms of a hierarchy of computational models that are supplied by formal methods and testing techniques in computer science. Both deductive top-down and inductive bottom-up approaches in the discovery of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. Logical Foundations of Computer Science (Lecture Notes in Computer Science 7734).Sergei Artemov & Anil Nerode (eds.) - 2013 - Springer.
     
    Export citation  
     
    Bookmark  
  12. Open Source.S. Asiri - 2003 - Acm Sigcas, Computers and Society 32 (5).
     
    Export citation  
     
    Bookmark  
  13.  23
    Caribbean piracy and youth restiveness in Niger delta: A comparative analysis.O. O. Asukwo - 2006 - Sophia: An African Journal of Philosophy 8 (1).
  14.  19
    Megalithic Software. Part 1: EnglandL. B. Borst B. M. Borst.Elizabeth Chesley Baity - 1977 - Isis 68 (2):312-314.
  15. Books and Software Reviews-Multifractals and 1/f Noise-Wild Self-Affinity in Physics.Per Bak - 2000 - Complexity 5 (3):46-46.
     
    Export citation  
     
    Bookmark  
  16.  7
    Bergson: il filosofo del software.Renato Barilli - 2005 - Milano: R. Cortina.
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  66
    Critical studies / book reviews.Jon Barwise - 1999 - Philosophia Mathematica 7 (2):238-240.
  18. Book and Software Reviews-The Garden of Ediacara: Discovering the First Complex Life.Tomasz Baumiller - 1999 - Complexity 4 (3):39-40.
     
    Export citation  
     
    Bookmark  
  19. Is an OWL ontology adequate for foreign software agents communication?Jesús Bermúdez, Alfredo Goñi, Arantza Illarramendi & Simone Santini - 2007 - Applied Ontology 2 (3):351-372.
     
    Export citation  
     
    Bookmark  
  20.  36
    Designing trust with software agents: A case study.Stijn Bernaer, Martin Meganck, Greet Vanden Berghe & Patrick De Causmaecker - 2006 - Journal of Information, Communication and Ethics in Society 4 (1):37-48.
    In this paper, we will address anonymity, privacy and trust issues that arise during the research on a communication platform for multi-modal transport. Though most logistic information is currently available in electronic form, it is not widely accessible yet to all the parties concerned with transport. The major goal of a communication platform is to improve the conditions for exchanging information, which should lead to better organisation/collaboration within the transport sector. We need to merit credibility by faithfully modelling all the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21.  53
    Software sensors to monitor the dynamics of microbial communities: Application to anaerobic digestion.Olivier Bernard, Zakaria Hadj-Sadok & Denis Dochain - 2000 - Acta Biotheoretica 48 (3-4):197-205.
    A mass balance based model has been derived to represent the dynamical behavior of the ecosystem contained in an anaerobic digester. The model considers two bacterial populations: acidogenic and methanogenic bacteria. It forms the basis for the design of a software sensor considering both a model of the biological system and on-line gaseous measurements. The software sensor computes the concentration of inorganic carbon and volatile fatty acids (VFA) in the digester. Another software sensor is dedicated to the estimation of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  60
    The Social Epistemologies of Software.David M. Berry - 2012 - Social Epistemology 26 (3-4):379-398.
    This paper explores the specific questions raised for social epistemology encountered in code and software. It does so because these technologies increasingly make up an important part of our urban environment, and stretch across all aspects of our lives. The paper introduces and explores the way in which code and software become the conditions of possibility for human knowledge, crucially becoming computational epistemes, which we share with non-human but crucially knowledge-producing actors. As such, we need to take account of this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  40
    The philosophy of software: code and mediation in the digital age.David M. Berry - 2011 - New York: Palgrave-Macmillan.
    This book is a critical introduction to code and software that develops an understanding of its social and philosophical implications in the digital age. Written specifically for people interested in the subject from a non-technical background, the book provides a lively and interesting analysis of these new media forms.
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  24.  62
    Kant and the software crisis: Suggestions for the construction of human-centred software systems. [REVIEW]Marco C. Bettoni - 1995 - AI and Society 9 (4):396-401.
    -/- In this article I deal with the question “How could we renew and enrich computer technology with Kant's help?”. By this I would like to invite computer scientists and engineers to initiate or intensify their cooperation with Kant experts. -/- What I am looking for is a better “method of definition” for software systems, particularly for the development of object-oriented and knowledge-based systems. -/- After a description of the “software crisis”, I deal first with the question why this crisis (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  79
    Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy.Kanika Tandon Bhal & Nivedita D. Leekha - 2008 - Journal of Business Ethics 81 (3):635-646.
    The article reports findings of a study conducted to explore the cognitive moral logics used for considering software piracy as ethical or unethical. Since the objective was to elicit the moral logics from the respondents, semi-structured in-depth interviews of 38 software professionals of India were conducted. The content of the interviews was analyzed using the grounded theory framework which does not begin with constructs and their interlinkages and then seek proof instead it begins with an area of study and allows (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26.  24
    Book review: the future of software. [REVIEW]David K. Billings - 1997 - Acm Sigcas Computers and Society 27 (1):22-23.
  27.  45
    Hermeneutic practices in software development.Viktor Binzberger - 2009 - Techné: Research in Philosophy and Technology 13 (1):27-49.
    This paper shows the relevance of hermeneutic philosophy to understand how info­communication technologies frame our contemporary lifeworld. It demonstrates that the programming languages are the result of collective interpretations of the general lifeworld of programmers, management and political decision-makers. By having been inscribed into the processes of language use, this general interpretation permeates the particular practices of understanding that are possible within the language framework.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28. Ensuring Transparency-Migrating a Closed Software Development to an Open Source Software Project.Wolf-Gideon Bleek & Matthias Finck - 2005 - Iris 28:6-9.
     
    Export citation  
     
    Bookmark  
  29. The Mind as Software in the Brain.Ned Block - 2003 - In John Heil (ed.), Philosophy of Mind: A Guide and Anthology. Oxford University Press.
     
    Export citation  
     
    Bookmark   2 citations  
  30. The mind as the software of the brain.Ned Block - 1995 - In Daniel N. Osherson, Lila Gleitman, Stephen M. Kosslyn, S. Smith & Saadya Sternberg (eds.), An Invitation to Cognitive Science, Second Edition, Volume 3. Cambridge MA: MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   61 citations  
  31. Expanding the scope of software product families: Problems and alternative approaches.Jan Bosch - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4034--4.
     
    Export citation  
     
    Bookmark  
  32. Books and reviews.M. Boudot - 1972 - International Logic Review: Rassegna Internazionale di Logica 5:268.
     
    Export citation  
     
    Bookmark  
  33.  74
    Anonymity and software agents: An interdisciplinary challenge. [REVIEW]Frances Brazier, Anja Oskamp, Corien Prins, Maurice Schellekens & Niek Wijngaards - 2004 - Artificial Intelligence and Law 12 (1-2):137-157.
    Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are allowed to be anonymous under the relevant legal regimes and whether an adequate interaction and balance between law and anonymity can be realised from both the perspective of Computer Systems and the perspective of Law.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  11
    Current Issues in Computing and Philosophy.P. Brey, A. Briggle & K. Waelbers (eds.) - 2008 - IOS Press.
    The theme of this volume is the multi-faceted 'computational turn' that is occurring through the interaction of the disciplines of philosophy and computing. In computer and information sciences, there are significant conceptual and methodological questions that require reflection and analysis. Moreover, digital, information and communication technologies have had tremendous impact on society, which raises further philosophical questions. This book tries to facilitate the task to continuously work to ensure that its diversity of perspectives and methods proves a source of strength (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  74
    The irrationality of the free software movement.Selmer Bringsjord - manuscript
    Approximately 48 hours ago, knowing that I would, Lord willing, be stand- ing here on this podium two days hence, I tapped http://www.fsf.org into Safari in order to begin learning at least something about the Free Software Movement (FSM). My online education has been augmented by many propo- nents of FSM in attendance at this conference, including Richard Stallman. What I have learned is that this movement is populated by a lot of seem- ingly well-intentioned people who are, at least (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  8
    Crossbows, von Clauswitz, and the Eternality of Software Shrouds: Reply to Christianson.Selmer Bringsjord & John Licato - 2015 - Philosophy and Technology 28 (3):365-367.
  37. Software Art. Potentials.Andreas Broeckmann - 2003 - Art Inquiry. Recherches Sur les Arts 5:69-74.
     
    Export citation  
     
    Bookmark  
  38. Ethics in information technology and software use.Vincent J. Calluzzo & Charles J. Cante - 2004 - Journal of Business Ethics 51 (3):301-312.
    The emerging concern about software piracy and illegal or unauthorized use of information technology and software has been evident in the media and open literature for the last few years. In the course of conducting their academic assignments, the authors began to compare observations from classroom experiences related to ethics in the use of software and information technology and systems. Qualitatively and anecdotally, it appeared that many if not most, students had misconceptions about what represented ethical and unethical behaviors in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  39.  33
    Code as speech: A discussion of Bernstein V. USDOJ, karn V. USDOS, and junger V. Daley in light of the U.s. Supreme court's recent shift to federalism. [REVIEW]Jean Camp & K. Lewis - 2001 - Ethics and Information Technology 3 (1):21-33.
    The purpose of this paper is to address the question of whethercomputer source code is speech protected by the First Amendmentto the United States Constitution or whether it is merelyfunctional, a ``machine'', designed to fulfill a set task andtherefore bereft of protection. The answer to this question is acomplex one. Unlike all other forms of ``speech'' computer sourcecode holds a unique place in the law: it can be copyrighted, likea book and it can be patented like a machine or process.Case (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  40.  18
    Varieties of software and their implications for effective democratic government.L. Jean Camp - 2006 - In Transparency: The Key to Better Governance? pp. 183-185.
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  16
    BOOKS Reviews.James Campbell & Ann Kramer Clark - 1994 - Metaphilosophy 25 (4):392-400.
    William James and the Reinstatement of the Vague. By William Joseph Gavin. Anti‐foundationalism Old and New. Edited by Tom Rockmore and Beth Singer.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  51
    Libronix Digital Library System, Liddell (H.G.), Scott (R.) A Greek–English Lexicon (9th edition, Oxford 1996, revised H.S. Jones and R. McKenzie, revised Supplement P.G.W. Glare). Bellingham, WA: Logos Bible Software, 2003. CD-ROM, US$145. [REVIEW]D. M. Carter - 2007 - The Classical Review 57 (01):228-.
  43.  46
    They Review Software, Don't They? [REVIEW]Robert J. Cavalier - 1985 - Teaching Philosophy 8 (3):242-244.
  44.  23
    Without Copyrights: Piracy, Publishing, and the Public Domain.William M. Chace - 2014 - Common Knowledge 20 (3):503-504.
  45. The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software.Mei-Fang Chen, Ching-Ti Pan & Ming-Chuan Pan - 2009 - Journal of Business Ethics 90 (3):361 - 373.
    Moral issues have been included in the studies of consumer misbehavior research, but little is known about the joint moderating effect of moral intensity and moral judgment on the consumer’s use intention of pirated software. This study aims to understand the consumer’s use intention of pirated software in Taiwan based on the theory of planned behavior (TPB) proposed by Ajzen (Organizational Behavior and Human Decision Processes, 50, 179, 1991). In addition, moral intensity and moral judgment are adopted as a joint (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  46. The Antecedents of Music Piracy Attitudes and Intentions.Jyh-Shen Chiou, Chien-yi Huang & Hsin-hui Lee - 2005 - Journal of Business Ethics 57 (2):161-174.
    Piracy is the greatest threat facing the music industry worldwide today. This study developed and empirically tested a model examining the antecedents of consumer attitude and behavioral intention toward music piracy behavior. Two types of music piracy behavior, unauthorized duplication/download and pirated music product purchasing, were examined. Based on a field survey in Taiwan, the results showed that attributive satisfaction, perceived prosecution risk, magnitude of consequence, and social consensus are very important in influencing customers attitude and behavioral intention toward two (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   30 citations  
  47.  57
    How to Encourage Customers to Use Legal Software.Hung-Chang Chiu, Yi-Ching Hsieh & Mei-Chien Wang - 2008 - Journal of Business Ethics 80 (3):583-595.
    This study attempts to identify customer retention strategies for legal software and discusses their effectiveness for three consumer groups (stayers, dissatisfied switchers, and satisfied switchers). Although previous studies propose several antipirating strategies, they do not discuss how to enhance customer intentions to use legal software, which is crucial for software companies. The authors provide four generic retention strategies developed from both antipiracy and customer loyalty literature. The results indicate lower-pricing, legal, communication, and product strategies all enhance customer purchase intentions toward (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Tools for Program Development and Analysis in Computational Science-A Performance Profile and Test Tool for Development of Embedded Software Using Various Report Views.Yongyun Cho & Chae-Woo Yoo - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3992--510.
  49.  75
    Global Ethics of Collective Internet Governance: Intrinsic Motivation and Open Source Software.Chong Ju Choi, Sae Won Kim & Shui Yu - 2009 - Journal of Business Ethics 90 (4):523-531.
    The ethical governance of the global Internet is an accelerating global phenomenon. A key paradox of the global Internet is that it allows individual and collective decision making to co-exist with each other. Open source software (OSS) communities are a globally accelerating phenomenon. OSS refers to groups of programs that allow the free use of the software and further the code sharing to the general and corporate users of the software. The combination of private provision and public knowledge and software, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  76
    Free software and the economics of information justice.S. Chopra & S. Dexter - 2011 - Ethics and Information Technology 13 (3):173-184.
    Claims about the potential of free software to reform the production and distribution of software are routinely countered by skepticism that the free software community fails to engage the pragmatic and economic ‘realities’ of a software industry. We argue to the contrary that contemporary business and economic trends definitively demonstrate the financial viability of an economy based on free software. But the argument for free software derives its true normative weight from social justice considerations: the evaluation of the basis for (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  51.  34
    Free software, economic 'realities', and information justice.S. Chopra & S. Dexter - 2009 - Acm Sigcas Computers and Society 39 (3):12-26.
    Free and open source software is taking an increasingly significant role in our software infrastructure. Yet many questions still exist about whether a software economy based on FOSS would be viable. We argue that contemporary trends definitively demonstrate this viability. Claiming that an economy must be evaluated as much by the ends it brings about as by its size or vigor, we draw on widely accepted notions of redistributive justice to show the ethical superiority of a software economy based on (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  52.  31
    Free software and the political philosophy of the cyborg world.S. Chopra & S. Dexter - 2007 - Acm Sigcas Computers and Society 37 (2):41-52.
    Our freedoms in cyberspace are those granted by code and the protocols it implements. When man and machine interact, co-exist, and intermingle, cyberspace comes to interpenetrate the real world fully. In this cyborg world, software retains its regulatory role, becoming a language of interaction with our extended cyborg selves. The mediation of our extended selves by closed software threatens individual autonomy. We define a notion of freedom for software that does justice to our conception of it as language, sketching the (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  53. A comparative ethical assessment of free software licensing schemes.Samir Chopra - manuscript
    Software is much more than sequences of instructions for a computing machine: it can be an enabler (or disabler) of political imperatives and policies. Hence, it is subject to the same assessment in a normative dimension as other political and social phenomena. The core distinction between free software and its proprietary counterpart is that free software makes available to its user the knowledge and innovation contributed by the creator(s) of the software, in the form of the created source code. From (...)
     
    Export citation  
     
    Bookmark   1 citation  
  54.  48
    Decoding liberation: The promise of free and open source software.Samir Chopra & Scott Dexter - manuscript
    Routledge (New Media and Cyberculture Series), July 2007.
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  55.  79
    The freedoms of software and its ethical uses.Samir Chopra & Scott Dexter - 2009 - Ethics and Information Technology 11 (4):287-297.
    The “free” in “free software” refers to a cluster of four specific freedoms identified by the Free Software Definition. The first freedom, termed “Freedom Zero,” intends to protect the right of the user to deploy software in whatever fashion, towards whatever end, he or she sees fit. But software may be used to achieve ethically questionable ends. This highlights a tension in the provision of software freedoms: while the definition explicitly forbids direct restrictions on users’ freedoms, it does not address (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  56.  71
    A note on the evolutionary theory of software development.L. Jonathan Cohen - 1987 - British Journal for the Philosophy of Science 38 (3):381-384.
  57. Software, Abstraction, and Ontology.Timothy R. Colburn - 1999 - The Monist 82 (1):3-19.
    This paper analyzes both philosophical and practical assumptions underlying claims for the dual nature of software, including software as a machine made of text, and software as a concrete abstraction. A related view of computer science as a branch of pure mathematics is analyzed through a comparative examination of the nature of abstraction in mathematics and computer science. The relationship between the concrete and the abstract in computer programs is then described by exploring a taxonomy of approaches borrowed from philosophy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  58.  45
    Information modeling aspects of software development.Timothy R. Colburn - 1998 - Minds and Machines 8 (3):375-393.
    The distinction between the modeling of information and the modeling of data in the creation of automated systems has historically been important because the development tools available to programmers have been wedded to machine oriented data types and processes. However, advances in software engineering, particularly the move toward data abstraction in software design, allow activities reasonably described as information modeling to be performed in the software creation process. An examination of the evolution of programming languages and development of general programming (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  59.  14
    Les temps d'Indymedia.Biella Coleman - 2005 - Multitudes 2 (2):41-48.
    Indymedia is a network of activist media centers which appeared in Seattle in 1999. The free software let the technical experts of the beginning organize and teach a lot of new groups. The groups themselves become collective medias instead of asking mainstream medias to speak about them. For Indymedia free software technology enables free speech if it is used in a basic manner giving access to everybody. Still, Indymedia teaches its new members a common culture. A process of collective integration (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  60.  11
    Coding Freedom: The Ethics and Aesthetics of Hacking.E. Gabriella Coleman - 2012 - Princeton University Press.
    Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software movement in the United States and Europe, Coding Freedom details the ethics behind hackers' devotion to F/OSS, the social codes that guide its production, and the political (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  61. Books and reviews.Arte Combinatoria - 1980 - International Logic Review: Rassegna Internazionale di Logica 11:81.
     
    Export citation  
     
    Bookmark  
  62. Evolutionary Contagion in Mental Software.Evolving Thought Contagions - 2002 - In Robert J. Sternberg & J. Kaufman (eds.), The Evolution of Intelligence. Lawrence Erlbaum.
     
    Export citation  
     
    Bookmark  
  63. Nik Software Captured: The Complete Guide to Using Nik Software's Photographic Tools.Tony L. Corbell & Joshua A. Haftel - 2011 - Wiley.
  64.  24
    Smart objects: come il digitale organizza la nostra vita.Emanuele Crescimanno - 2014 - Aisthesis: Pratiche, Linguaggi E Saperi Dell’Estetico 7 (1):73-91.
    Computer, tablet, smartphone are the most important everyday objects in our life because we made experiences by them; they run due to their software: so it is necessary to understand it, his form, his design and his tradeoffs to understand the role of these objects and the possibilities of a conscious use of them.
    Direct download  
     
    Export citation  
     
    Bookmark  
  65. Factors that Influence the Intention to Pirate Software and Media.Timothy Paul Cronan & Sulaiman Al-Rafee - 2008 - Journal of Business Ethics 78 (4):527-545.
    This study focuses on one of the newer forms of software piracy, known as digital piracy, and uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors that influence digital piracy (the illegal copying/downloading of copyrighted software and media files). This study examines factors, which could determine an individual’s intention to pirate digital material (software, media, etc.). Past piracy behavior and moral obligation, in addition to the prevailing theories of behavior (Theory of Planned Behavior), were (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  66.  28
    Hierarchy and centralization in free and open source software team communications.Kevin Crowston & James Howison - 2006 - Knowledge, Technology & Policy 18 (4):65-85.
    Free/Libre Open Source Software (FLOSS) development teams provide an interesting and convenient setting for studying distributed work. We begin by answering perhaps the most basic question: what is the social structure of these teams? We conducted social network analyses of bug-fixing interactions from three repositories: Sourceforge, GNU Savannah and Apache Bugzilla. We find that some OSS teams are highly centralized, but contrary to expectation, others are not. Projects are mostly quite hierarchical on four measures of hierarchy, consistent with past research (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  67.  19
    The priority of piracy: Adrian Johns: Piracy: The intellectual property wars from Gutenberg to Gates. Chicago and London: The University of Chicago Press, 2010, 640pp, $38.00 HB, $22.50 PB.Alex Csiszar - 2013 - Metascience 22 (3):625-628.
  68. 'S introduction: The challenge of a sociotechnical perspective to software engineering'.Henrique Cukierman - 2007 - Scientia 18 (1):4-6.
     
    Export citation  
     
    Bookmark  
  69.  4
    Books and Software Reviews-The Stir over Robert Wright.A. J. Dajer - 2000 - Complexity 5 (5):45-46.
    Direct download  
     
    Export citation  
     
    Bookmark  
  70. Software Livre: Genealogia e "ideologias" de um movimento social.Flora Dauphin - 2008 - Logos: Comuniação e Univerisdade 15 (2):71-85.
    O artigo tenta compreender como o software livre tornou-se vetor de um movimento social militante para criação e difusão de bens comuns. Como, para além de suas características de “meio” esses softwares foram transformados em questões de política, economia, sociedade, cultura e ética? São emergência, os modos de organização e as ideologias desse movimento que o artigo se propõe a analisar.
     
    Export citation  
     
    Bookmark  
  71.  39
    Books reviews.Pauls Heldon Davies - 1996 - Mind 105 (418):337-341.
  72. Digital Rights and Freedoms: A Framework for Surveying Users and Analyzing Policies.Todd Davies - 2014 - In Luca Maria Aiello & Daniel McFarland (eds.), Social Informatics: Proceedings of the 6th International Conference (SocInfo 2014). Springer Lecture Notes in Computer Science Vol. 8851. pp. 428-443.
    Interest has been revived in the creation of a "bill of rights" for Internet users. This paper analyzes users' rights into ten broad principles, as a basis for assessing what users regard as important and for comparing different multi-issue Internet policy proposals. Stability of the principles is demonstrated in an experimental survey, which also shows that freedoms of users to participate in the design and coding of platforms appear to be viewed as inessential relative to other rights. An analysis of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  73.  33
    Rethinking free, libre and open source software.Ruben van Wendel de Joode, Yuwei Lin & Shay David - 2006 - Knowledge, Technology & Policy 18 (4):5-16.
    This special issue includes seven articles that make significant contribution to the literature pertaining to knowledge and public policy around Free, Libre and Open Source Software (FLOSS). Focusing on questions in two themes (i) motivation and organization and (ii) public policy, the articles in this volume develop new analytic models and report on new empirical findings, as an important step in bridging the wide gap that exists in public policy literature around FLOSS. Warning against rhetorical pitfalls that have been prevalent (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  74.  24
    Rethinking free, libre and open source software.Ruben van Wendel de Joode, Yuwei Lin & Shay David - 2006 - Knowledge, Technology & Policy 18 (4):5-16.
    This special issue includes seven articles that make significant contribution to the literature pertaining to knowledge and public policy around Free, Libre and Open Source Software (FLOSS). Focusing on questions in two themes (i) motivation and organization and (ii) public policy, the articles in this volume develop new analytic models and report on new empirical findings, as an important step in bridging the wide gap that exists in public policy literature around FLOSS. Warning against rhetorical pitfalls that have been prevalent (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  75. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either protected from (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  76. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is argued that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  77. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining corporate interest. As (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  78.  11
    Une technologie de base : l’intergiciel.Giuditta de Prato - 2012 - Hermès: La Revue Cognition, communication, politique 62 (1):, [ p.].
    Cet article analyse le rôle croissant, la signification et la fonction d’une couche logicielle intermédiaire : les intergiciels en tant que technologie de base dans un environnement en évolution rapide. Il montre leur rôle clé dans une nouvelle ère de moteurs modulaires.This article analyses the increasing role, significance and function of “middleware”, the intermediate software layer that drives interactive gaming, as a fundamental technology in a rapidly evolving environment, to illustrate its key role in the new age of modular game (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  79.  24
    Piracy and Republican Politics. [REVIEW]Philip De Souza - 1995 - The Classical Review 45 (1):99-101.
  80. Explanations in Software Engineering: The Pragmatic Point of View. [REVIEW]Jan De Winter - 2010 - Minds and Machines 20 (2):277-289.
    This article reveals that explanatory practice in software engineering is in accordance with pragmatic explanatory pluralism, which states that explanations should at least partially be evaluated by their practical use. More specifically, I offer a defense of the idea that several explanation-types are legitimate in software engineering, and that the appropriateness of an explanation-type depends on (a) the engineer’s interests, and (b) the format of the explanation-seeking question he asks, with this format depending on his interests. This idea is defended (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  81.  17
    Open Genetic Code: on open source in the life sciences.Eric Deibel - 2014 - Life Sciences, Society and Policy 10 (1):1-23.
    The introduction of open source in the life sciences is increasingly being suggested as an alternative to patenting. This is an alternative, however, that takes its shape at the intersection of the life sciences and informatics. Numerous examples can be identified wherein open source in the life sciences refers to access, sharing and collaboration as informatic practices. This includes open source as an experimental model and as a more sophisticated approach of genetic engineering. The first section discusses the greater flexibly (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  82.  18
    Three steps multiobjective decision process for software release planning.Isabel M. Del Águila & José Del Sagrado - 2016 - Complexity 21 (S1):250-262.
    Direct download  
     
    Export citation  
     
    Bookmark  
  83.  14
    Software implementation of cryptographic sequence generators over extended fields.O. Delgado-Mohatar & A. Fuster-Sabater - 2015 - Logic Journal of the IGPL 23 (1):73-87.
  84.  53
    Relationships between obligations and actions in the context of institutional agents, human agents or software agents.Robert Demolombe - 2011 - Artificial Intelligence and Law 19 (2-3):99-115.
    The paper presents a logical framework for the representation of interactions between institutional agents, human agents and software agents. A case study is used to analyze how obligations on institutional agents are “propagated” to human and software agents, and how actions performed by these agents count as actions that satisfy the obligations imposed to institutional agents. It is shown that the relationship between the different kinds of obligations and actions can be represented in terms of the concept of “count as” (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  85. Julian Jaynes' software archaeology.Daniel C. Dennett - 1986 - Canadian Psychology 27:149-54.
  86.  5
    Book and Software Reviews-Information Flow: The Logic of Distributed Systems.Keith Devlin - 1998 - Complexity 4 (2):30-31.
    Direct download  
     
    Export citation  
     
    Bookmark  
  87.  24
    Free and open source software (FOSS) as a model domain for answering big questions about creativity.Scott Dexter & Aaron Kozbelt - 2013 - Mind and Society 12 (1):113-123.
    In free and open source software (FOSS), computer code is made freely accessible and can be modified by anyone. It is a creative domain with many unique features; the FOSS mode of creativity has also influenced many aspects of contemporary cultural production. In this article we identify a number of fundamental but unresolved general issues in the study of creativity, then examine the potential for the study of FOSS to inform these topics. Archival studies of the genesis of FOSS projects, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  88. Collaborative and Transdisciplinar Practices in Cyberart: from Multimedia to Software Art Installations.Diana Domingues & Eliseo Reategui - 2006 - Art Inquiry. Recherches Sur les Arts 8:113-144.
     
    Export citation  
     
    Bookmark  
  89. A bundle of software rights and duties.David M. Douglas - 2011 - Ethics and Information Technology 13 (3):185-197.
    Like the ownership of physical property, the issues computer software ownership raises can be understood as concerns over how various rights and duties over software are shared between owners and users. The powers of software owners are defined in software licenses, the legal agreements defining what users can and cannot do with a particular program. To help clarify how these licenses permit and restrict users’ actions, here I present a conceptual framework of software rights and duties that is inspired by (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  90.  73
    The Social Disutility of Software Ownership.David M. Douglas - 2011 - Science and Engineering Ethics 17 (3):485-502.
    Software ownership allows the owner to restrict the distribution of software and to prevent others from reading the software’s source code and building upon it. However, free software is released to users under software licenses that give them the right to read the source code, modify it, reuse it, and distribute the software to others. Proponents of free software such as Richard M. Stallman and Eben Moglen argue that the social disutility of software ownership is a sufficient justification for prohibiting (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  91. Mathematics of Language 10/11, Lecture Notes in Computer Science 6149.C. Ebert, G. Jäger, M. Kracht & J. Michaelis (eds.) - 2010 - Springer.
     
    Export citation  
     
    Bookmark  
  92. Introducción a la calidad de software.Ana Maria L. Pez Echeverry, Cesar Cabrera & Luz Estela Valencia Ayala - 2008 - Scientia 14.
     
    Export citation  
     
    Bookmark  
  93.  49
    Problems in the ontology of computer programs.Amnon H. Eden & Raymond Turner - 2007 - Applied Ontology 2 (1):13-36.
  94.  27
    Open access for social simulation.Bruce Edmonds - manuscript
    We consider here issues of open access to social simulations, with a particular focus on software licences, though also briefly discussing documentation and archiving. Without any specific software licence, the default arrangements are stipulated by the Berne Convention (for those countries adopting it), and are unsuitable for software to be used as part of the scientific process (i.e. simulation software used to generate conclusions that are to be considered part of the scientific domain of discourse). Without stipulating any specific software (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  95.  27
    How to think about algorithms.Jeff Edmonds - 2008 - New York: Cambridge University Press.
    There are many algorithm texts that provide lots of well-polished code and proofs of correctness. Instead, this book presents insights, notations, and analogies to help the novice describe and think about algorithms like an expert. By looking at both the big picture and easy step-by-step methods for developing algorithms, the author helps students avoid the common pitfalls. He stresses paradigms such as loop invariants and recursion to unify a huge range of algorithms into a few meta-algorithms. Part of the goal (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  96.  9
    Strategies for De facto compatibility: Standardization, proprietary and open source approaches to Java.Tineke Egyedi - 2001 - Knowledge, Technology & Policy 14 (2):113-128.
  97.  7
    Book and Software Reviews-Size Matters.Olaf Ellers - 2001 - Complexity 6 (4):23-25.
    Direct download  
     
    Export citation  
     
    Bookmark  
  98.  40
    Ulf Hashagen, Reinhard Keil-Slawik and Arthur L. Norberg (eds): History of computing: software issues. [REVIEW]Richard Ennals - 2004 - AI and Society 18 (1):82-83.
  99. Organisational Processes in the Secondary Software Sector: A Case Study on Open Source Software Adoption.Brian Lings Erik Olsson - 2013 - Iris 34.
     
    Export citation  
     
    Bookmark  
  100. Books and reviews.Pens&E. et le Mouvartt - 1974 - International Logic Review: Rassegna Internazionale di Logica 9:151.
     
    Export citation  
     
    Bookmark  
  101.  47
    Biosecurity and Open-Source Biology: The Promise and Peril of Distributed Synthetic Biological Technologies.Nicholas G. Evans & Michael J. Selgelid - 2015 - Science and Engineering Ethics 21 (4):1065-1083.
    In this article, we raise ethical concerns about the potential misuse of open-source biology : biological research and development that progresses through an organisational model of radical openness, deskilling, and innovation. We compare this organisational structure to that of the open-source software model, and detail salient ethical implications of this model. We demonstrate that OSB, in virtue of its commitment to openness, may be resistant to governance attempts.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  102. Object-oriented ontology, or programming's creative fold.Aden Evens - 2006 - Angelaki 11 (1):89 – 97.
    This article asks what is creative about the act of programming. Observing that in most programming contexts, each line of code is written with a specific end in mind, it would seem as though there is little room for creativity, as the ends constrain the choices of means. However, there are many features of coding languages that open up creative possibilities. Object-oriented coding environments purport to make programming more about structures that humans might work with and less about features of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  103. Cognitive-decision-making issues for software agents.Behrouz Homayoun Far & Romi Satria Wahono - 2003 - Brain and Mind 4 (2):239-252.
    Rational decision making depends on what one believes, what one desires, and what one knows. In conventional decision models, beliefs are represented by probabilities and desires are represented by utilities. Software agents are knowledgeable entities capable of managing their own set of beliefs and desires, and they can decide upon the next operation to execute autonomously. They are also interactive entities capable of filtering communications and managing dialogues. Knowledgeability includes representing knowledge about the external world, reasoning with it, and sharing (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  104.  6
    Book and Software Reviews-The Number Sense: How The Mind Creates Mathematics.William G. Faris - 1998 - Complexity 4 (1):46-47.
    Direct download  
     
    Export citation  
     
    Bookmark  
  105.  59
    Hippias major, version 1.0: Software for post-colonial, multicultural technology systems.Gene Fendt - 2003 - Journal of Philosophy of Education 37 (1):89–99.
    The first half of Plato’s Hippias Major exhibits the interfacing of the first teacher (Socrates) with the first version of a post-colonial, multi-cultural information technology system (Hippias). In this interface the purposes, results, and values of two contradictory types of operating system for educational servicing units are exhibited to, and can be discovered by, anyone who is not an information technologist.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  106. A chaos-based robust software watermarking, information security practice and experience.Liu Fenlin, Lu Bin & Luo Xiangyang - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3903--355.
     
    Export citation  
     
    Bookmark  
  107.  8
    Document supply: "legalized piracy in Britain".Eamon T. Fennessy - 1990 - Logos. Anales Del Seminario de Metafísica [Universidad Complutense de Madrid, España] 1 (3):26-29.
  108.  13
    Books Reviews.Robert J. Fogelin - 1987 - Mind 96 (383):418-421.
  109.  8
    Software Theory: A Cultural and Philosophical Study.Federica Frabetti - 2014 - Rowman & Littlefield International.
    This book engages directly in close readings of technical texts and computer code in order to show how software works. It offers an analysis of the cultural, political, and philosophical implications of software technologies that demonstrates the significance of software for the relationship between technology, philosophy, culture, and society.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  110.  47
    Conscious software: A computational view of mind.Stan Franklin - 2002
  111.  26
    Action selection and language generation in "conscious" software agents.Stan Franklin - 1999
  112.  72
    A software agent model of consciousness.Stan Franklin & Art Graesser - 1999 - Consciousness and Cognition 8 (3):285-301.
    Baars (1988, 1997) has proposed a psychological theory of consciousness, called global workspace theory. The present study describes a software agent implementation of that theory, called ''Conscious'' Mattie (CMattie). CMattie operates in a clerical domain from within a UNIX operating system, sending messages and interpreting messages in natural language that organize seminars at a university. CMattie fleshes out global workspace theory with a detailed computational model that integrates contemporary architectures in cognitive science and artificial intelligence. Baars (1997) lists the psychological (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  113. The instructional information processing account of digital computation.Nir Fresco & Marty J. Wolf - 2014 - Synthese 191 (7):1469-1492.
    What is nontrivial digital computation? It is the processing of discrete data through discrete state transitions in accordance with finite instructional information. The motivation for our account is that many previous attempts to answer this question are inadequate, and also that this account accords with the common intuition that digital computation is a type of information processing. We use the notion of reachability in a graph to defend this characterization in memory-based systems and underscore the importance of instructional information for (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  114.  39
    Analyzing concerns of people from Weblog articles.Tomohiro Fukuhara, Toshihiro Murayama & Toyoaki Nishida - 2007 - AI and Society 22 (2):253-263.
    A system for analyzing concerns of people from Weblog articles is proposed. The system called KANSHIN analyzes concerns of people by collecting Japanese, Chinese, and Korean Weblog articles. Users can find concerns of people in each language. Users can also compare differences of concerns between Japanese, Chinese, and Korean language communities. We describe several analysis results: (1) patterns of social concerns, (2) change of focuses on a problem along with the time, (3) differences of concerns on a problem between Japanese, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  115.  32
    On the Notions of Specification and Implementation.Antony Galton - 1993 - Royal Institute of Philosophy Supplement 34:111-136.
    In this paper we consider two key concepts from software engineering—‘specification’ and ‘implementation’—and explore their possible applications outside software engineering to other disciplines, notably the philosophy of action, evolutionary biology, and cognitive science. Throughout, the emphasis is on the gain in conceptual clarity that can be afforded by these concepts; it is not so much a matter of new knowledge or new theories but of a reorganization of existing knowledge and theories in a way that facilitates the transfer of insights (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  116. Book and Software Reviews-The New Rules of the Working World.Manoj Gambhir - 2001 - Complexity 6 (3):50-50.
     
    Export citation  
     
    Bookmark  
  117.  43
    The institutionalization of Open Source.Robert A. Gehring - 2006 - Poiesis and Praxis 4 (1):54-73.
    Using concepts of neoinstitutional economics, such as transaction cost economics, institutional economics, property rights theory, and information economics, the development of the Open Source movement is investigated. Following the evolution of institutions in Open Source, it is discussed what the comparative institutional advantages of this model are. The conclusion is that it is the institutional framework of Open Source, not merely the low cost of Open Source software that makes it an attractive alternative mode of organizing the production and distribution (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  118.  49
    Ethical education in software engineering: Responsibility in the production of complex systems.Gonzalo Génova, M. Rosario González & Anabel Fraga - 2007 - Science and Engineering Ethics 13 (4):505-522.
    Among the various contemporary schools of moral thinking, consequence-based ethics, as opposed to rule-based, seems to have a good acceptance among professionals such as software engineers. But naïve consequentialism is intellectually too weak to serve as a practical guide in the profession. Besides, the complexity of software systems makes it very hard to know in advance the consequences that will derive from professional activities in the production of software. Therefore, following the spirit of well-known codes of ethics such as the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  119. Trust in agile teams: Overcoming the obstacles of distributed software development.Mette Fransgård and Signe Skalkam Gitte Tjørnehøj - 2014 - Iris 35.
     
    Export citation  
     
    Bookmark  
  120. Situational determinants of software piracy: An equity theory perspective. [REVIEW]Richard S. Glass & Wallace A. Wood - 1996 - Journal of Business Ethics 15 (11):1189 - 1198.
    Software piracy has become recognized as a major problem for the software industry and for business. One research approach that has provided a theoretical framework for studying software piracy has been to place the illegal copying of software within the domain of ethical decision making assumes that a person must be able to recognize software piracy as a moral issue. A person who fails to recognize a moral issue will fail to employ moral decision making schemata. There is substantial evidence (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   56 citations  
  121. Nine Ways to Bias Open-Source AGI Toward Friendliness.Ben Goertzel & Joel Pitt - 2011 - Journal of Evolution and Technology 22 (1):116-131.
    While it seems unlikely that any method of guaranteeing human-friendliness on the part of advanced Artificial General Intelligence systems will be possible, this doesn’t mean the only alternatives are throttling AGI development to safeguard humanity, or plunging recklessly into the complete unknown. Without denying the presence of a certain irreducible uncertainty in such matters, it is still sensible to explore ways of biasing the odds in a favorable way, such that newly created AI systems are significantly more likely than not (...)
     
    Export citation  
     
    Bookmark   8 citations  
  122.  37
    Ancient Piracy Piracy in the Ancient World. By Professor H. A. Ormerod. Pp. 286; frontispiece and 2 maps. University Press of Liverpool, Ltd., 1924. 10s. 6d. [REVIEW]A. W. Gomme - 1925 - The Classical Review 39 (5-6):127-128.
  123.  53
    What Motivates Software Crackers?Sigi Goode & Sam Cruise - 2006 - Journal of Business Ethics 65 (2):173-201.
    Software piracy is a serious problem in the software industry. Software authors and publishing companies lose revenue when pirated software rather than legally purchased software is used. Policy developers are forced to invest time and money into restricting software piracy. Much of the published research literature focuses on software piracy by end-users. However, end-users are only able to copy software once the copy protection has been removed by a ‘cracker’. This research aims to explore why, if copy protection is so (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  124.  38
    Specifying the standard---make it right: a software engineering code of ethics and professional practice.Don Gotterbarn - 1999 - Acm Sigcas Computers and Society 29 (3):13-16.
  125. Not all codes are created equal: The software engineering code of ethics, a success story. [REVIEW]Don Gotterbarn - 1999 - Journal of Business Ethics 22 (1):81 - 89.
    There has been a transition in the way software developers work. Mistakes in software have been treated as "normal" occurrences. "All software has bugs." However, software engineering is an emerging profession which as a profession has now said that a caviler approach to software errors is unacceptable. They have asserted a very strong ethical position in the Software Engineering Code of Ethics and Professional Practice, a position which mandates concern for all those affected by their work. The Code has several (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  126.  40
    The uniqueness of software errors and their impact on global policy.Don Gotterbarn - 1998 - Science and Engineering Ethics 4 (3):351-356.
    The types of errors that emerge in the development and maintenance of software are essentially different from the types of errors that emerge in the development and maintenance of engineered hardware products. There is a set of standard responses to actual and potential hardware errors, including: engineering ethics codes, engineering practices, corporate policies and laws. The essential characteristics of software errors require new ethical, policy, and legal approaches to the development of software in the global arena.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  127.  22
    Raising the bar: a software engineering code of ethics and professional practice.Don Gotterbarn - 1998 - Acm Sigcas Computers and Society 28 (2):26-28.
  128. Software engineering code of ethics and professional practice.Donald Gotterbarn, K. Miller & S. Rogerson - 2001 - Science and Engineering Ethics 7 (2):231-238.
    The Software Engineering Code of Ethics and Professional Practice, intended as a standard for teaching and practicing software engineering, documents the ethical and professional obligations of software engineers. The code should instruct practitioners about the standards society expects them to meet, about what their peers strive for, and about what to expect of one another. In addition, the code should also inform the public about the responsibilities that are important to the profession. Adopted in 2000 by the IEEE Computer Society (...)
     
    Export citation  
     
    Bookmark   2 citations  
  129. Umysł - software czy hardware?Paweł Grabarczyk - 2008 - Hybris. Internetowy Magazyn Filozoficzny 7.
     
    Export citation  
     
    Bookmark  
  130.  5
    Some thoughts on the importance of open source and open access for emerging digital scholarship.Stefan Gradmann - 2008 - In Herbert Hrachovec & Alois Pichler (eds.), Philosophy of the Information Society: Proceedings of the 30th International Ludwig Wittgenstein-Symposium in Kirchberg, 2007. De Gruyter. pp. 275-286.
    Direct download  
     
    Export citation  
     
    Bookmark  
  131. Books and reviews.M. J. Green-Pedersen - 1983 - International Logic Review 28:67.
     
    Export citation  
     
    Bookmark  
  132. Econometric Software.William Greene - 2001 - In N. J. Smelser & B. Baltes (eds.), International Encyclopedia of the Social and Behavioral Sciences.
     
    Export citation  
     
    Bookmark  
  133.  33
    An ontology of suspicious software behavior.André Grégio, Rodrigo Bonacin, Antonio Carlos de Marchi, Olga Fernanda Nabuco & Paulo Lício de Geus - 2016 - Applied ontology 11 (1):29-49.
  134.  15
    Influences on and incentives for increasing software reliability.F. S. Grodzinsky, K. Miller & M. J. Wolf - 2006 - Journal of Information, Communication and Ethics in Society 4 (2):103-113.
    We contend that software developers have an ethical responsibility to strive for reliable software. We base that obligation on long standing engineering traditions that place the public good as a central tenant and on the professional relationship between a software developer and the users of the software developed.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  135.  50
    Ethical issues in open source software.F. S. Grodzinsky, K. Miller & M. J. Wolf - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):193-205.
    In this essay we argue that the current social and ethical structure in the Open Source Software Community stem from its roots in academia. The individual developers experience a level of autonomy similar to that of a faculty member. Furthermore, we assert that the Open Source Software Community’s social structure demands benevolent leadership. We argue that it is difficult to pass off low quality open source software as high quality software and that the Open Source development model offers strong accountability. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  136.  34
    This is not an app, this is not an artwork: Exploring mobile selfie-posting software.Maia Grotepass - 2014 - Technoetic Arts 12 (2):281-291.
    Creating a mobile software-based exploration (artwork?/app?) puts the artist-coder in a position to interact with the mediated image streams that connect people on the Internet. The mediated streams often contain portraits and self-portraits, selfies, of the participants. These selfies are visual status messages of the people participating in the data streams. They can be used by the poster to identify themselves in the data stream and represent a way the creator of the selfie wants to be seen by the social (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  137. Problems for a Philosophy of Software Engineering.Stefan Gruner - 2011 - Minds and Machines 21 (2):275-299.
    On the basis of an earlier contribution to the philosophy of computer science by Amnon Eden, this essay discusses to what extent Eden’s ‘paradigms’ of computer science can be transferred or applied to software engineering. This discussion implies an analysis of how software engineering and computer science are related to each other. The essay concludes that software engineering can neither be fully subsumed by computer science, nor vice versa. Consequently, also the philosophies of computer science and software engineering—though related to (...)
    Direct download (14 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  138.  55
    Software Engineering Between Technics and Science: Recent Discussions about the Foundations and the Scientificness of a Rising Discipline.Stefan Gruner - 2010 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 41 (1):237-260.
  139.  78
    “To Pirate or Not to Pirate”: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision. [REVIEW]Pola B. Gupta, Stephen J. Gould & Bharath Pola - 2004 - Journal of Business Ethics 55 (3):255 - 274.
    Consumers of software often face an acquisition-mode decision, namely whether to purchase or pirate that software. In terms of consumer welfare, consumers who pirate software may stand in opposition to those who purchase it. Marketers also face a decision whether to attempt to thwart that piracy or to ignore, if not encourage it as an aid to their softwares diffusion, and policymakers face the decision whether to adopt interventionist policies, which are government-centric, or laissez faire policies, which are marketer-centric. Here (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  140.  14
    Nik Software Tools Bundle.Joshua A. Haftel - 2012 - Visual.
    This e-book set includes two winning guides on Nik Software tools Designed to save time in the digital workflow, Nik Software?s entire suite of products (Dfine 2.0, Color Efex Pro 4.0, Sharpener Pro 3.0, Silver Efex Pro 2, VIVEZA 2.0, and ...
    Direct download  
     
    Export citation  
     
    Bookmark  
  141. Could the Soul Be Software?John Haldane - 1997 - Ends and Means 1 (2).
     
    Export citation  
     
    Bookmark  
  142. Book and Software Reviews-Asymmetry, Developmental Stability, and Evolution.Benedikt Hallgrimsson - 1999 - Complexity 4 (4):53-54.
     
    Export citation  
     
    Bookmark  
  143. Electronic chart systems software (ecs) an introduction.Yousong Han, Lin Wang, Peter Kaczmarski & Fernand Vandamme - 2009 - Communication and Cognition. Monographies 42 (3-4):155-228.
     
    Export citation  
     
    Bookmark  
  144.  52
    Using Argument Diagramming Software to Teach Critical Thinking Skills.Maralee Harrell - 2007 - Proceedings of the 5th International Conference on Education and Information Systems, Technologies and Applications 5.
    There is substantial evidence from many domains that visual representations aid various forms of cognition. We aimed to determine whether visual representations of argument structure enhanced the acquisition and development of critical thinking skills within the context of an introductory philosophy course. We found a significant effect of the use of argument diagrams, and this effect was stable even when multiple plausible correlates were controlled for. These results suggest that natural and relatively minor modifications to standard critical thinking courses could (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  145. Using Argument Diagramming Software in the Classroom.Maralee Harrell - 2005 - Teaching Philosophy 28 (2):163-177.
    Many undergraduates, philosophy majors included, read philosophical texts similar to the way they read stories. One method for teaching students how to discern the argumentative structure of a philosophy text is through argument diagrams (text boxes used to represent claims with arrows and lines used to represent connections between these claims). This paper provides criteria for an ideal argument diagramming software and then reviews the strengths and weaknesses of such software currently available, e.g. Araucaria, Argutect, Athena Standard, Inspiration, and Reason!Able.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  146. Software Design for E-Services.Maike Hecht & Susanne Maass - 2013 - Iris 34.
     
    Export citation  
     
    Bookmark  
  147.  28
    The Enemy of All: Piracy and the Law of Nations.Daniel Heller-Roazen - 2009 - Zone Books.
    The pirate is the original enemy of humankind. As Cicero famously remarked, there are certain enemies with whom one may negotiate and with whom, circumstances permitting, one may establish a truce. But there is also an enemy with whom treaties are in vain and war remains incessant. This is the pirate, considered by ancient jurists considered to be "the enemy of all."In this book, Daniel Heller-Roazen reconstructs the shifting place of the pirate in legal and political thought from the ancient (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  148.  24
    Reviews of books.Olaf Helmer, M. Strauss & Alexander Herzberg - 1939 - Erkenntnis 8 (1):372-383.
  149. Axioms of distinction in social software.Vincent Hendricks - manuscript
    ‘Over a ten year period starting in the mid 90’s I became convinced that all these topics –game theory, economic design, voting theory –belonged to a common area which I called Social Software.’ — Rohit Parikh, [Parikh 05]: p. 252..
     
    Export citation  
     
    Bookmark  
  150.  19
    Allowing digital piracy for strategic benefits to businesses.Halimin Herjanto, Sanjaya S. Gaur, Chayanin Saransomrurtai & Wee Hock Quik - 2014 - Journal of Information, Communication and Ethics in Society 12 (4):314-322.
    Purpose– The purpose of this paper is to review the digital piracy literature and present the positive impacts of digital piracy and its benefit to businesses. A great deal of the literature discusses the consequences of digital piracy, but, in most cases, the focus is on the negative consequences.Design/methodology/approach– The authors draw on both the theoretical and empirical academic literature on digital piracy so as to analyze the ways in which digital piracy positively contributes to digital businesses.Findings– The paper provides (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  151.  86
    Samir Chopra, Scott D. Dexter, decoding liberation: The promise of free and open source software. [REVIEW]Benjamin Mako Hill - 2008 - Minds and Machines 18 (2):297-299.
  152. Neutralization theory and online software piracy: An empirical analysis. [REVIEW]Sameer Hinduja - 2007 - Ethics and Information Technology 9 (3):187-204.
    Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly related (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  153.  92
    Trends and patterns among online software pirates.Sameer Hinduja - 2003 - Ethics and Information Technology 5 (1):49-61.
    Computer crime on the Internet poses asignificant threat to the well-being ofbusinesses and individuals, and none are immunefrom the repercussions that can result. Onetype of this unethical and unlawful activity isonline software piracy. In this work, thesignificance of piracy as a topic for academicinquiry is first presented, followed by asummary of the conflicting stances on thisissue. Then, a review of scholarly literaturepreviously conducted in this area is given toprovide a backdrop for the current research. Univariate and bivariate findings from aquantitative (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  154. The ethics of software testing.Dale Hites - 1999 - Journal of Information Ethics 8 (1):63-71.
     
    Export citation  
     
    Bookmark  
  155. Collaborative, problem-based learning with the argument-visualization software “AGORA-net”.Michael H. G. Hoffmann - 2013 - 4th International Conference on Argumentation, Rhetoric, Debate, and the Pedagogy of Empowerment.
     
    Export citation  
     
    Bookmark  
  156.  20
    Situated (un-)learning in software design: a deconstructive approach.Roswitha Hofmann & Doris Allhutter - 2010 - Poiesis and Praxis 7 (1-2):87-98.
    Constructive technology assessment aims at anticipating societal impacts of technological innovations and suggests incorporating reflexivity and social learning into technology development. Social learning involves fostering the ability of diverse social actors to cultivate sociotechnical critical skills, thus allowing technological and social change to be governed with consideration for social values and diverging interests. Based on this demand, our paper presents a discourse-theoretical, interventionist approach to software design introducing deconstruction and (un-)learning as reflective practices to guide development processes. Inspired by Donna (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  157. Involving distant users in packaged software development: a user community approach.Helena Holmström - 2004 - Iris 27:159-179.
     
    Export citation  
     
    Bookmark  
  158.  6
    Books Reviews.Terence Horgan - 1991 - Mind 100 (398):290-293.
  159.  26
    Reply to Angius and Primiero on Software Intensive Science.Jack Horner & John Symons - 2014 - Philosophy and Technology 27 (3):491-494.
    This paper provides a reply to articles by Nicola Angius and Guiseppe Primiero responding to our paper “Software Intensive Science”.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  160.  6
    Understanding software technology.Richard A. Howey - 2002 - Knowledge, Technology & Policy 15 (3):70-81.
  161.  64
    Consumers' willingness to pay for non-pirated software.Jane L. Hsu & Charlene W. Shiue - 2008 - Journal of Business Ethics 81 (4):715 - 732.
    This study analyzed consumers' willingness to pay for non-pirated computer software and examined how attitudes toward intellectual property rights and perceived risk affect WTPs. Two commonly used software products, Microsoft Windows and Microsoft Office, were used in the study as objects to reveal consumer assessed values. A consumer survey was administered in Taiwan and the total valid samples were 799. Respondents in this study included students from senior high schools, colleges, and graduate schools, and general consumers who were no longer (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  162. 622 Reviews of Books.Diane Owen Hughes - forthcoming - Medioevo.
     
    Export citation  
     
    Bookmark  
  163. Cyberarts, Codes and Coders: Contextualizing Software Art.Erkki Huhtamo - 2003 - Art Inquiry. Recherches Sur les Arts 5:49-68.
     
    Export citation  
     
    Bookmark  
  164.  56
    Overblocking autonomy: The case of mandatory library filtering software.Gordon Hull - 2009 - Continental Philosophy Review 42 (1):81-100.
    In U.S. v. American Library Association (2003), the Supreme Court upheld the Child Internet Protection Act (CIPA), which mandated that libraries receiving federal funding for public Internet access install content-filtering programs on computers which provide that access. These programs analyze incoming content, and block the receipt of objectionable material, in particular pornography. Thus, patrons at public libraries are protected from unintentionally (or intentionally) accessing objectionable material, and, in the case of minors, from accessing potentially damaging material. At least, that is (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  165. Implementing Urdu Grammar as Open Source Software.Muhammad Humayoun, Harald Hammarström & Aarne Ranta - unknown
     
    Export citation  
     
    Bookmark  
  166. The impact of national culture on software piracy.Bryan W. Husted - 2000 - Journal of Business Ethics 26 (3):197 - 211.
    This paper examines the impact of the level of economic development, income inequality, and five cultural variables on the rate of software piracy at the country level. The study finds that software piracy is significantly correlated to GNP per capita, income inequality, and individualism. Implications for anti-piracy programs and suggestions for future research are developed.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   58 citations  
  167. An Enlightened Way to Curb Piracy of Digitalized Intellectual Property.M. R. Hyman & K. J. Shanahan - forthcoming - B> Quest.
     
    Export citation  
     
    Bookmark  
  168.  15
    Coordination processes in open source software development: The Linux case study.Federico Iannacci - 2005 - Emergence: Complexity and Organization 7 (2).
    Direct download  
     
    Export citation  
     
    Bookmark  
  169.  28
    Software engineering code of ethics and professional practice: version 4.Corporate Ieee-cs-acm Joint Task Force On Software Engineering Ethics - 1998 - Acm Sigcas Computers and Society 28 (2):29-32.
  170.  38
    Justice, Ethics and Piracy: On doing the right thing.Lucas Introna - forthcoming - Levinas, Business Ethics.
    Direct download  
     
    Export citation  
     
    Bookmark  
  171.  56
    Singular justice and software piracy.Lucas D. Introna - 2007 - Business Ethics: A European Review 16 (3):264-277.
    This paper assumes that the purpose of ethics is to open up a space for the possibility of moral conduct in the flow of everyday life. If this is the case then we can legitimately ask: "How then do we do ethics"? To attempt an answer to this important question, the paper presents some suggestions from the work of Emmanuel Levinas and Jacques Derrida. With Levinas, it is argued that ethics happens in the singularity of the face of the Other (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  172.  18
    Notations for software engineering class structures.Pourang Irani - 2004 - In A. Blackwell, K. Marriott & A. Shimojima (eds.), Diagrammatic Representation and Inference. Springer. pp. 441--445.
  173.  39
    Fourth international symposium on theoretical aspects of computer software (TACS2001).Takayasu Ito - 2002 - Bulletin of Symbolic Logic 8 (2):321.
  174. When international intellectual “piracy” is fair.Aaron James - unknown
    One of the more troubling developments in recent human history is the emergence of a single, nearly global system of intellectual property (IP). As I will explain, the usual moral arguments for IP—arguments from social utility, piracy, and natural or human rights—are clearly inadequate as justifications for the emerging global IP system. Indeed, the arguments are so weak that it is natural to conclude that the system should simply be abolished. I sympathize with this conclusion, but here defend a somewhat (...)
     
    Export citation  
     
    Bookmark  
  175.  10
    An Influence Diagram Based Approach for Estimating Staff Training in Software Industry.K. Jeet, V. K. Mago, B. Prasad & R. S. Minhas - 2009 - Journal of Intelligent Systems 18 (4):267-284.
    Direct download  
     
    Export citation  
     
    Bookmark  
  176.  17
    Falsificationism and Software Engineering.Yasuyuki Kageyama - 1999 - Annals of the Japan Association for Philosophy of Science 9 (4):165-176.
  177.  55
    Piracy and the Venetian State: The Dilemma of Maritime Defense in the Fourteenth Century.Irene B. Katele - 1988 - Speculum 63 (4):865-889.
    The favored economic position that Venice enjoyed in the eastern Mediterranean and the Black Sea following the Fourth Crusade lasted only until the fall of the Latin Empire of Constantinople in 1261. During the next century the republic sought to reinstate its hegemony over the waterways and engaged in a prolonged struggle for maritime supremacy with its Ligurian rival, Genoa. The two cities were unable to resolve their debates over commercial privileges in key ports until 1381, following the conclusion of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  178. Embodied Minds and Software.Tim Kenyon - 1999 - Ends and Means 3 (2).
     
    Export citation  
     
    Bookmark  
  179.  15
    Agent-based model for economic impact of free software.Asif Khalak - 2003 - Complexity 8 (3):45-55.
    This article describes the potential impact that free (i.e., open source) software can have on an existing commercial software market. A model for the software market is constructed in terms of autonomous agents, which represent the users, the companies, and the free software providers. The model specifies a reservation price for each user agent and develops a gradient learning strategy for revenue-maximizing company agents. Simulations explore parameters such as the demand distribution, and the relative importance of market share, advertising and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  180. The Matrix-Graph Method Of Choice And Verification Of Software Reliability Models.V. S. Kharchenko, O. M. Tarasyuk & V. V. Sklyar - forthcoming - Philosophy of Science.
     
    Export citation  
     
    Bookmark  
  181.  33
    Interaction effects in software piracy.Eric Kin-wai Lau - 2007 - Business Ethics, the Environment and Responsibility 16 (1):34-47.
    The paper presents an exploratory attempt to analyse self‐reported leniency toward software piracy systematically, using an approach based on empirical factors, rather than ethical factors. The empirical factors studied were: social acceptance of software piracy; the cost of original software; urgency of the subject's need for software; availability of original software; knowledge of computer software copyright law; gender; monthly household income; and education level. It provides new insights to software companies and government officials who are developing programmes to promote the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  182.  24
    Interaction effects in software piracy.Eric Kin-wai Lau - 2007 - Business Ethics: A European Review 16 (1):34-47.
    The paper presents an exploratory attempt to analyse self‐reported leniency toward software piracy systematically, using an approach based on empirical factors, rather than ethical factors. The empirical factors studied were: (i) social acceptance of software piracy; (ii) the cost of original software; (iii) urgency of the subject's need for software; (iv) availability of original software; (v) knowledge of computer software copyright law; (vi) gender; (vii) monthly household income; and (viii) education level. It provides new insights to software companies and government (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  183.  46
    Shaping of moral intensity regarding software piracy: A comparison between thailand and U.s. Students. [REVIEW]Ranjan B. Kini, H. V. Ramakrishna & B. S. Vijayaraman - 2004 - Journal of Business Ethics 49 (1):91-104.
    Software piracy is a major global concern forbusinesses that generate their revenues throughsoftware products. Moral intensity regardingsoftware piracy has been argued to be relatedto the extent of software piracy. Anunderstanding of the development of moralintensity regarding software piracy inindividuals would aid businesses in developingand implementing policies that may help themreduce software piracy. In this research westudied the similarities and differences indevelopment of moral intensity regardingsoftware piracy among university students intwo different cultures, the U.S. and Thailand. In particular, we studied the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  184.  7
    Working with values: software of the mind: a systematic and practical account of purpose, value, and obligation in organizations and society: the original reference text as used by consultants in SIGMA, the Centre for Transdisciplinary Science.Warren Kinston - 1995 - London, U.K.: The Centre.
  185. Spyware – the ethics of Covert software.Mathias Klang - 2004 - Ethics and Information Technology 6 (3):193-202.
    Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know what is occurring therein. This paper discusses an unusual type of surveillance software which may be installed in many computers. The strange aspect of this software is that it has often been downloaded and installed by the user, but without her knowledge. The software is mainly designed to collect information about the user of the computer and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  186.  5
    Books and Software Reviews-The Art of Genes: How Organisms Make Themselves.Christian Peter Klingenberg - 2000 - Complexity 5 (4):46.
    Direct download  
     
    Export citation  
     
    Bookmark  
  187.  14
    Selected papers on design of algorithms.Donald Ervin Knuth - 2010 - Stanford, Calif.: Center for the Study of Language and Information.
    Donald E. Knuth has been making foundational contributions to the field of computer science for as long as computer science has been a field. His award-winning textbooks are often given credit for shaping the field, and his scientific papers are widely referenced and stand as milestones of development over a wide variety of topics. The present volume, the seventh in a series of his collected papers, is devoted to his work on the design of new algorithms. Nearly thirty of Knuth’s (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  188. Towards mkm in the large: Modular representation and scalable software architecture.Michael Kohlhase - unknown
    MKM has been defined as the quest for technologies to manage mathematical knowledge. MKM “in the small” is well-studied, so the real problem is to scale up to large, highly interconnected corpora: “MKM in the large”. We contend that advances in two areas are needed to reach this goal. We need representation languages that support incremental processing of all primitive MKM operations, and we need software architectures and implementations that implement these operations scalably on large knowledge bases. We present instances (...)
     
    Export citation  
     
    Bookmark   1 citation  
  189.  14
    CCP4 Software Suite: history, evolution, content, challenges and future developments.Eugene Krissinel - 2015 - Arbor 191 (772):a220.
  190. Experiments in (Social) Software Curating: Reprogramming Curatorial Practice for Networks.Joanna Krysa - 2008 - Art Inquiry. Recherches Sur les Arts 10:63-84.
     
    Export citation  
     
    Bookmark  
  191.  85
    Development and validation of ethical computer self-efficacy measure: The case of softlifting. [REVIEW]Feng-Yang Kuo & Meng-Hsiang Hsu - 2001 - Journal of Business Ethics 32 (4):299 - 315.
    The concept of self-efficacy is concerned with people''s beliefs in their ability to produce given attainment. It has been widely applied to study human conduct in various settings. This study, based on Albert Bandura''s social cognitive theory, proposes the employment of self-efficacy for investigating people''s ethical conduct related to computer use. Specifically, an ethical computer self-efficacy (ECSE) construct concerning software piracy is developed and validated. The measurement model of the construct was rigorously tested and validated through confirmatory factor analysis. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  192. Software agents and their bodies.Nicholas Kushmerick - 1997 - Minds and Machines 7 (2):227-247.
    Within artificial intelligence and the philosophy of mind,there is considerable disagreement over the relationship between anagent's body and its capacity for intelligent behavior. Some treatthe body as peripheral and tangential to intelligence; others arguethat embodiment and intelligence are inextricably linked. Softwareagents–-computer programs that interact with software environmentssuch as the Internet–-provide an ideal context in which to studythis tension. I develop a computational framework for analyzingembodiment. The framework generalizes the notion of a body beyondmerely having a physical presence. My analysis sheds (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark  
  193.  18
    Propriété intellectuelle et brevets logiciels.Thierry Laronde - 2001 - Multitudes 2 (2):66-77.
    Thierry Laronde basing on the statement of the social utility of ideas, to denounce the policy of the European Office of Patents in which he blames for accepting in facts, software patenting and limit so the social circulation of ideas. Indeed in the case of the software, originality, only patentable, does not lie as in the theory as in an implementation by a soft-engineer which participates in a chain in which the assertion of an individual right is difficult even impossible. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  194. The challenges of open source software in IT adoption: Enterprise architecture versus total cost of ownership.Michael Holm Larsen, Jesper Holck & Mogens Kühn Pedersen - forthcoming - Iris’27.
     
    Export citation  
     
    Bookmark  
  195.  99
    An empirical study of software piracy.Eric Kin Wai Lau - 2003 - Business Ethics, the Environment and Responsibility 12 (3):233–245.
  196. Interaction effects in software piracy.Kin‐wai Lau - 2007 - Business Ethics: A European Review 16 (1):34-47.
     
    Export citation  
     
    Bookmark   1 citation  
  197.  25
    The Ethics of Innovation: p2p Software Developers and Designing Substantial Noninfringing Uses Under the Sony Doctrine.Edward Lee - 2005 - Journal of Business Ethics 62 (2):147-162.
    This essay explores the controversy over peer-to-peer (p2p) software, examining the legal and ethical dimensions of allowing software companies to develop p2p technologies. It argues that, under the Supreme Court’s ruling in the Sony betamax case, technology developers must be accorded the freedom to innovate and develop technologies that are capable of substantial noninfringing uses. This doctrine, known as the Sony doctrine, provides an important safe harbor for technological development, including p2p. The safe harbor, however, does not immunize conduct beyond (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  198.  10
    Government policy toward open source software: The puzzles of neutrality and competition.Jyh-An Lee - 2006 - Knowledge, Technology & Policy 18 (4):113-141.
    For a variety of policy reasons, governments throughout the world are now adopting different legislative and administrative strategies that support the development of FLOSS. Some governments have actually begun to procure FLOSS, whereas others have channeled public funds to large-scale FLOSS projects. This study demonstrates both the benefits and the risks of government policy favoring FLOSS from the perspective of economics, technology, and politics, and to further analyze whether these same policy goals can be achieved through government support of FLOSS. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  199. A brief history of software resources for qualitative analysis.Christophe Lejeune - 2010 - In Bernard Reber & Claire Brossaud (eds.), Digital cognitive technologies: epistemology and the knowledge economy. Hoboken, NJ: Wiley. pp. 169--186.
     
    Export citation  
     
    Bookmark  
  200. Short history of software resources at the service of qualitative sociology.Christophe Lejeune - 2010 - In Bernard Reber & Claire Brossaud (eds.), Digital cognitive technologies: epistemology and the knowledge economy. Hoboken, NJ: Wiley.
     
    Export citation  
     
    Bookmark  
  201. Constraining the Choice Set: Lessons from the Software Revolution.David Levy - 1985 - Reason Papers 10:77-88.
     
    Export citation  
     
    Bookmark  
  202. Digital Photography for Next to Nothing: Free and Low Cost Hardware and Software to Help You Shoot Like a Pro.John Lewell - 2011 - Wiley.
     
    Export citation  
     
    Bookmark  
  203.  83
    Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four perceived risk components related to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  204. Case study of company's relationship with open source community in open source software development.Juho Lindman & Topi Uitto - 2008 - Iris 31:1-22.
     
    Export citation  
     
    Bookmark  
  205.  1
    Book and Software Reviews-Encountering the World: Toward an Ecological Psychology.Gavan Lintern - 1998 - Complexity 3 (6):61-62.
    Direct download  
     
    Export citation  
     
    Bookmark  
  206.  13
    Books Reviews.Peter Lipton - 1991 - Mind 100 (398):293-295.
  207.  8
    Books reviews.Don Locke - 1978 - Mind 87 (4):631-633.
  208. Software piracy: Is it related to level of moral judgment?Jeanne M. Logsdon, Judith Kenner Thompson & Richard A. Reid - 1994 - Journal of Business Ethics 13 (11):849 - 857.
    The possible relationship between widespread unauthorized copying of microcomputer software (also known as software piracy) and level of moral judgment is examined through analysis of over 350 survey questionnaires that included the Defining Issues Test as a measure of moral development. It is hypothesized that the higher one''s level of moral judgment, the less likely that one will approve of or engage in unauthorized copying. Analysis of the data indicate a high level of tolerance toward unauthorized copying and limited support (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  209.  64
    A Philosophy of Maintenance? Engaging with the Concept of Software.David Love - 2007 - Philosophy of Management 6 (2):27-30.
    Although reducing the costs of software maintenance has long been held as an important goal, few researchers have studied software maintenance — except in the context of software design. However, thinking in software design is itself muddled by the frequent confusion over the term ‘software’ and ‘programs’. In this paper we argue for a re-examination of the underlying philosophical foundations of programs, in order to establish software as a phenomenon in its own right. Once we understand the basic structure of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  210. A Brief History of Open Source: Working to Make Knowledge Free.Charlie Lowe - 2001 - Kairos: A Journal of Rhetoric, Technology, and Pedagogy 6 (2).
     
    Export citation  
     
    Bookmark  
  211.  36
    Software vulnerability due to practical drift.Christian V. Lundestad & Anique Hommels - 2007 - Ethics and Information Technology 9 (2):89-100.
    The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  212. Evolutionary contagion in mental software.Aaron Lynch - 2002 - In Robert J. Sternberg & J. Kaufman (eds.), The Evolution of Intelligence. Lawrence Erlbaum. pp. 289--314.
     
    Export citation  
     
    Bookmark   1 citation  
  213.  6
    Books and Software Reviews-The Unknowable.Robert S. MacKay - 1999 - Complexity 5 (1):44-44.
    Direct download  
     
    Export citation  
     
    Bookmark  
  214.  19
    The Performativity of Code.Adrian Mackenzie - 2005 - Theory, Culture and Society 22 (1):71-92.
    This article analyses a specific piece of computer code, the Linux operating system kernel, as an example of how technical operationality figures in contemporary culture. The analysis works at two levels. First of all, it attempts to account for the increasing visibility and significance of code or software-related events. Second, it seeks to extend familiar concepts of performativity to include cultural processes in which the creation of meaning is not central, and in which processes of circulation play a primary role. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   13 citations  
  215.  45
    Cyberpiracy and morality: Some utilitarian and deontological challenges.Zeljko Mancic - 2010 - Filozofija I Društvo 21 (3):103-117.
    This paper analyses one of the main problems of our time in the world of Internet? cyber piracy. It is often said that it is illegal, since pirates who practice it violate certain domestic and international laws. When we ask for justification of this laws and their enforcement, philosophers and legalists usually apply to one of the two sorts of philosophical arguments - deontology and utilitarianism. The former think that piracy is immoral in itself, while the others argue it should (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  216.  21
    A manglish way of working: Agile software development.Brian Marick - 2008 - In Andrew Pickering & Keith Guzik (eds.), The mangle in practice: science, society, and becoming. Durham: Duke University Press. pp. 185--202.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  217. Open, But How Much? Growth, Conflict and Institutional Evolution in Open Source Communities.Juan Mateos-Garcia & Ed Steinmueller - 2008 - In Ash Amin & Joanne Roberts (eds.), Community, Economic Creativity, and Organization. Oxford University Press.
     
    Export citation  
     
    Bookmark  
  218.  9
    The FLOSS alternative: TRIPs, non-proprietary software and development.Christopher May - 2006 - Knowledge, Technology & Policy 18 (4):142-163.
  219.  5
    Book and Software Reviews-Cognitive Economics.Dennis K. McBride - 1998 - Complexity 4 (2):32-35.
    Direct download  
     
    Export citation  
     
    Bookmark  
  220.  48
    An Exploration of the Ideologies of Software Intellectual Property: The Impact on Ethical Decision Making.Matthew K. McGowan, Paul Stephens & Dexter Gruber - 2007 - Journal of Business Ethics 73 (4):409-424.
    This article helps to clarify and articulate the ideological, legal, and ethical attitudes regarding software as intellectual property (IP). Computer software can be viewed as IP from both ethical and legal perspectives. The size and growth of the software industry suggest that large profits are possible through the development and sale of software. The rapid growth of the open source movement, fueled by the development of the Linux operating system, suggests another model is possible. The large number of unauthorized copies (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  221.  2
    Book and Software Reviews-An Intriguing Journey.Barry McMullin - 2001 - Complexity 6 (5):22-22.
    Direct download  
     
    Export citation  
     
    Bookmark  
  222. Book and Software Reviews-Experienced-Based Decision-Making Processes.Paul Melby - 2001 - Complexity 6 (4):26-27.
     
    Export citation  
     
    Bookmark  
  223. Books and reviews.L. D. Meshalkin - 1976 - International Logic Review: Rassegna Internazionale di Logica 13:246.
     
    Export citation  
     
    Bookmark  
  224. Research Proposal: Design & Evaluation of Social Software.Cédric Mesnage - 2008 - Social Research: An International Quarterly 7:8.
     
    Export citation  
     
    Bookmark  
  225.  1
    Book and Software Reviews-Evolution and Ecology: The Pace of Life.Arnold I. Miller - 1998 - Complexity 4 (1):48.
    Direct download  
     
    Export citation  
     
    Bookmark  
  226.  45
    Software informed consent: Docete emptorem, not caveat emptor. [REVIEW]Keith Miller - 1998 - Science and Engineering Ethics 4 (3):357-362.
    Should software be sold “as is”, totally guaranteed, or something else? This paper suggests that “informed consent”, used extensively in medical ethics, is an appropriate way to envision the buyer/developer relationship when software is sold. We review why the technical difficulties preclude delivering perfect software, but allow statistical predictions about reliability. Then we borrow principles refined by medical ethics and apply them to computer professionals.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  227.  25
    Free and Open Source Software in developing contexts.Gianluca Miscione & Kevin Johnston - 2010 - Journal of Information, Communication and Ethics in Society 8 (1):42-56.
    PurposeOriginating in the USA and Northern Europe, Free and Open Source Software (FOSS) found on the internet its fertile environment. In more recent years, FOSS is becoming an increasingly important element in strategies for development and implementation of information and communication technologies also in developing countries. Mainstream research on FOSS has catered to the underlying principles or freedom, open organizational forms, and on its economical aspects. The purpose of this paper is to shed new light on the actual consequences of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  228.  26
    Reviews of books.R. V. Mises - 1939 - Erkenntnis 8 (1):261-263.
  229.  64
    Convivial software: An end-user perspective on free and open source software. [REVIEW]Carl Mitcham - 2009 - Ethics and Information Technology 11 (4):299-310.
    The free and open source software (Foss) movement deserves to be placed in an historico-ethical perspective that emphasizes the end user. Such an emphasis is able to enhance and support the Foss movement by arguing the ways it is heir to a tradition of professional ethical idealism and potentially related to important issues in the history of science, technology, and society relations. The focus on software from an end-user’s perspective also leads to the concept of program conviviality. From a non-technical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  230.  44
    A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example.M. A. Mizani & N. Baykal - 2007 - Journal of Medical Ethics 33 (12):695-698.
    Paper-based privacy policies fail to resolve the new changes posed by electronic healthcare. Protecting patient privacy through electronic systems has become a serious concern and is the subject of several recent studies. The shift towards an electronic privacy policy introduces new ethical challenges that cannot be solved merely by technical measures. Structured Patient Privacy Policy (S3P) is a software tool assuming an automated electronic privacy policy in an electronic healthcare setting. It is designed to simulate different access levels and rights (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  231.  23
    Software implementation of the SNOW 3G Generator on iOS and Android platforms.J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil & A. Fúster-Sabater - 2016 - Logic Journal of the IGPL 24 (1).
  232.  42
    Expert-System Software and Knowledge-Intensive Problem Solving.Brian D. Monahan & Sandra E. Belkin - 1986 - Thought: Fordham University Quarterly 61 (4):497-507.
  233.  40
    An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates.Trevor T. Moores - 2008 - Journal of Business Ethics 81 (1):39-51.
    A number of studies have investigated and found a significant relationship among economic wealth, Hofstede’s national culture dimensions, and software piracy rates (SPR). No study, however, has examined the relationship between economic wealth, culture, and the fact that national SPRs have been declining steadily since 1994. Using a larger sample than has previously been available (57 countries), we confirm the expected negative relationship between economic wealth, culture (individualism and masculinity) and levels of software piracy. The rate of decline in software (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  234.  30
    An ontology of online user feedback in software engineering.Itzel Morales-Ramirez, Anna Perini & Renata S. S. Guizzardi - 2015 - Applied ontology 10 (3-4):297-330.
  235. Open source as a complex adaptive system.M. Moreno & M. Faldani - 2003 - Emergence: Complexity and Organization 5 (3).
     
    Export citation  
     
    Bookmark  
  236.  7
    Books and Software Reviews-The New Renaissance: Computers and the Next Level of Civilization.Harold J. Morowitz - 1999 - Complexity 5 (2):35-35.
    Direct download  
     
    Export citation  
     
    Bookmark  
  237. How do we read a dictionary (as machines and as humans)? Kinds of information in dictionaries constructed and reconstructed.Vincent C. Müller - 2000 - In Evangelos Dermatas (ed.), Proceedings of COMLEX2000: Computational lexicography. Patras University Press. pp. 141-144.
    Two large lexicological projects for the Center for the Greek Language, Thessaloniki, were to be published in print and on the WWW, which meant that two conversions were needed: a near-database file had to be converted to fully formatted file for printing and a fully formatted file had to be converted to a database for WWW access. As it turned out, both conversions could make use of existing clues that indicated the kinds of information contained in each particular piece of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  238. Winny and the Pirate Bay: A comparative analysis of P2P software usage in Japan and Sweden from a socio-cultural perspective.Kenya Murayama, Thomas Taro Lennerfors & Kiyoshi Murata - 2010 - International Review of Information Ethics 13:10.
    In this paper, we examine the ethico-legal issue of P2P file sharing and copyright infringement in two different countries - Japan and Sweden - to explore the differences in attitude and behaviour towards file sharing from a socio-cultural perspective. We adopt a comparative case study approach focusing on one Japanese case, the Winny case, and a Swedish case, the Pirate Bay case. Whereas similarities in attitudes and behaviour towards file sharing using P2P software between the two countries are found in (...)
     
    Export citation  
     
    Bookmark  
  239.  18
    Computer software patents: Some perspectives and misunderstandings.Kathleen Mykytyn, Peter P. Mykytyn & Vicki McKinney - 1998 - Knowledge, Technology & Policy 11 (1-2):91-106.
  240. Ontological representation of tactile information for software development.Eirini V. Myrgioti, Vasilios G. Chouvardas & Amalia N. Miliou - 2009 - Applied ontology 4 (2):139-167.
  241. An action selection mechanism for "conscious" software agents.Aregahegn S. Negatu & Stan Franklin - 2002 - Cognitive Science Quarterly. Special Issue 2 (3):362-384.
  242. Phil 3200 - deductive logic.Lex Newman - manuscript
    It is not uncommon for students to try, and indeed to succeed, in buying the course texts used. This often makes a great deal of sense. But for this course, you must buy the textbook new . Here's why. The textbook comes with software that you will use to submit all of the course homeworks. The problem is that only one student can register the software , per book — period. So, if you buy the textbook used, not only do (...)
     
    Export citation  
     
    Bookmark  
  243. Minisymposia-VIII Advanced Algorithms and Software Components for Scientific Computing-Software Architecture Issues in Scientific Component Development.Boyana Norris - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3732--629.
     
    Export citation  
     
    Bookmark  
  244. Towards a Philosophy of Software Development: 40 Years after the Birth of Software Engineering.Mandy Northover, Derrick G. Kourie, Andrew Boake, Stefan Gruner & Alan Northover - 2008 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 39 (1):85-113.
    Over the past four decades, software engineering has emerged as a discipline in its own right, though it has roots both in computer science and in classical engineering. Its philosophical foundations and premises are not yet well understood. In recent times, members of the software engineering community have started to search for such foundations. In particular, the philosophies of Kuhn and Popper have been used by philosophically-minded software engineers in search of a deeper understanding of their discipline. It seems, however, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  245.  8
    Book and Software Reviews-Large-scale Perspectives in Community Ecology.Philip M. Novack-Gottshall - 2000 - Complexity 6 (1):58-59.
    Direct download  
     
    Export citation  
     
    Bookmark  
  246. Daniel Heller-Roazen, The Enemy of All: Piracy and the Law of Nations.Benjamin Noys - 2010 - Radical Philosophy 160:49.
     
    Export citation  
     
    Bookmark  
  247. Towards ontologies for formalizing modularization and communication in large software systems.Daniel Oberle, Steffen Lamparter, Stephan Grimm, D. Vrandeči&Cacute, Steffen Staab & Aldo Gangemi - 2006 - Applied Ontology 1 (2):163-202.
     
    Export citation  
     
    Bookmark   1 citation  
  248.  22
    Free software and copyright enforcement: A tool for global copyright policy?Ville Oksanen & Mikko Välimäki - 2006 - Knowledge, Technology & Policy 18 (4):101-112.
    One of the paradoxes of the free software ideology is its reliance on the legal institutions it was created to object to. One could argue that Free Software Foundation is using copyright to enforce their free software licenses as aggressively as the Business Software Alliance is enforcing its clients’ copyrights. We will show that the reality is more complex and that there is a significant difference: the free software community uses primarily non-legal enforcement methods and trusts on social norms. We (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  249. Book and Software Reviews-Inalienable Thoughts.James L. Olds - 2001 - Complexity 6 (5):23-26.
     
    Export citation  
     
    Bookmark   1 citation  
  250. Organisational Processes in the Secondary Software Sector: A Case Study on Open Source Software Adoption.Erik Olsson, Brian Lings & Björn Lundell - 2013 - Iris 34.
     
    Export citation  
     
    Bookmark  
  251.  85
    An Invitation to Cognitive Science: Visual cognition. 2.Daniel N. Osherson & Edward E. Smith (eds.) - 1990 - MIT Press.
    The volumes are self contained and can be used individually in upper-level undergraduate and graduate courses ranging from introductory psychology, linguistics, ...
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  252.  30
    Trust and Community in Open Source Software Production.Margit Osterloh & Sandra Rota - 2004 - Analyse & Kritik 26 (1):279-301.
    Open source software production is a successful new innovation model which disproves that only private ownership of intellectual property rights fosters innovations. It is analyzed here under which conditions the open source model may be successful in general. We show that a complex interplay of situational, motivational, and institutional factors have to be taken into account to understand how to manage the ‘tragedy of the commons’ as well as the ‘tragedy of the anticommons’. It is argued that the success of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  253.  3
    Book and Software Reviews-Complexity and Information.Edward W. Packel - 1999 - Complexity 4 (5):39-40.
    Direct download  
     
    Export citation  
     
    Bookmark  
  254.  33
    An interactive ethical assessment of surveillance‐capable software within the home‐help service sector.Elin Palm - 2013 - Journal of Information, Communication and Ethics in Society 11 (1):43-68.
  255.  7
    Book and Software Reviews-Review of" The Emergent Ego: Complexity and Coevolution in the Psychoanalytic Process".Stanley R. Palombo & Fred M. Levin - 2001 - Complexity 6 (6):28-28.
    Direct download  
     
    Export citation  
     
    Bookmark  
  256.  39
    A logic for describing, not verifying, software.David Lorge Parnas - 1995 - Erkenntnis 43 (3):321 - 338.
    An important perquisite for verification of the correctness of software is the ability to write mathematically precise documents that can be read by practitioners and advanced users. Without such documents, we won't know what properties we should verify. Tabular expressions, in which predicate expressions may appear, have been found useful for this purpose. We frequently use partial functions in our tabular documentation. Conventional interpretations of expressions that describe predicates are not appropriate for our application because they do not deal with (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  257. Free Software and non-exclusive individual rights.Sao Paulo - 2008 - Archiv für Rechts- Und Sozialphilosophie 94 (2):237-252.
     
    Export citation  
     
    Bookmark  
  258.  11
    FÖGEN (T.) Ed. Antike Fachtexte = Ancient Technical Texts. Berlin: De Gruyter, 2005. Pp. viii + 378. 88. 9783110181227.Caroline Petit - 2007 - Journal of Hellenic Studies 127:176-177.
  259.  28
    Open source software and software patents: A constitutional perspective.Bryan Pfaffenberger - 1999 - Knowledge, Technology & Policy 12 (3):94-112.
    Imagine if each square of pavement on the sidewalk had an owner, and pedestrians required a license to step on it. Imagine the negotiations necessary to walk an entire block under this system. That is what writing a program will be like if software patents continue. The sparks of creativity and individualism that have driven the computer revolution will be snuffed out. Imagine if each square of pavement on the sidewalk had an owner, and pedestrians required a license to step (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  260.  54
    Predictors of Usage Intentions of Pirated Software.Ian Phau & James Ng - 2010 - Journal of Business Ethics 94 (1):23-37.
    The purpose of this study is to investigate the salient factors influencing consumers’ attitudes and usage intentions towards pirated software. Using the Theory of Planned Behaviour, this study investigates the relationships between three sets of factors, i.e. personal, social and perceived behavioural control onto attitudes towards pirated software. Through a multiple regression, only personal factors have shown significant relationship with attitudes towards software piracy. Further results from this study have supported that favourable attitudes towards pirated software is likely to result (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  261. Applying Computer Software Technology to Develop English as a Foreign Language Vocabulary Acquisition.Rowles Phillip - 2010 - Fenomenologia. Diálogos Possíveis Campinas: Alínea/Goiânia: Editora da Puc Goiás 10:91-100.
     
    Export citation  
     
    Bookmark  
  262.  11
    Ideas, expressions, universals, and particulars: Metaphysics in the realm of software copyright law.Thomas M. Powers - 2004 - In H. Tavani & R. Spinello (eds.), Intellectual Property Rights in a Networked World. Idea Group.
    in Intellectual Property Rights in a Networked World, eds. H. Tavani and R. Spinello, 2004.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  263. These aliens who live in us: from parasitism to genetic piracy.Thomas Pradeu - 2008 - Critique 64 (733-34):496--509.
     
    Export citation  
     
    Bookmark  
  264. On the Ontology of the Computing Process and the Epistemology of the Computed.Giuseppe Primiero - 2014 - Philosophy and Technology 27 (3):485-489.
    Software-intensive science challenges in many ways our current scientific methods. This affects significantly our notion of science and scientific interpretation of the world, driving at the same time the philosophical debate. We consider some issues prompted by SIS in the light of the philosophical categories of ontology and epistemology.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  265. On malfunctioning software.Giuseppe Primiero, Nir Fresco & Luciano Floridi - 2015 - Synthese 192 (4):1199-1220.
    Artefacts do not always do what they are supposed to, due to a variety of reasons, including manufacturing problems, poor maintenance, and normal wear-and-tear. Since software is an artefact, it should be subject to malfunctioning in the same sense in which other artefacts can malfunction. Yet, whether software is on a par with other artefacts when it comes to malfunctioning crucially depends on the abstraction used in the analysis. We distinguish between “negative” and “positive” notions of malfunction. A negative malfunction, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   28 citations  
  266.  5
    Books and Software Reviews-Sex and Death: An Introduction to the Philosophy of Biology.Anne Pringle - 2000 - Complexity 5 (4):44-45.
    Direct download  
     
    Export citation  
     
    Bookmark  
  267.  16
    Standardizing management of software engineering projects.Roy Rada & John S. Craparo - 2001 - Knowledge, Technology & Policy 14 (2):67-77.
    Knowledge must forever govern ignorance, and a people who would be their own governors must arm themselves with the power which knowledge gives. Popular government, without popular information, or the means of acquiring it, is but a Prologue to a Farce or a Tragedy—or perhaps both.—James Madison, 1815.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  268.  86
    Case studies of constructivist comprehension in software engineering.Václav Rajlich - 2003 - Brain and Mind 4 (2):229-238.
    Program comprehension is an essential part of software engineering. The paper describes the constructivist theory of comprehension, a process based on assimilation and accommodation of knowledge. Assimilation means that the new facts are either added to the existing knowledge or rejected. Accommodation means that the existing knowledge is reorganized in order to absorb new facts. These processes are illustrated by case studies of knowledge-level reengineering of a legacy program and of incremental change. In both cases, we constructed preliminary knowledge from (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  269.  17
    Modelo para la exposición de la materia de ingeniería de software I (Model for teaching the software engineering I class).L. Rayas & J. L. Abreu - 2008 - Daena 3 (1):701-750.
    Direct download  
     
    Export citation  
     
    Bookmark  
  270. Operationalizing software reuse as a problem in machine learning.R. G. Reynolds, J. I. Maletic & E. Zannoni - forthcoming - Proceedings of the Fourth Florida Artificial Intelligence Research Symposium, Florida Ai Research Society.
     
    Export citation  
     
    Bookmark  
  271.  32
    Attention-seeking: technics, publics and software individuation.Ben Roberts - unknown
  272. M. Dorato, The software of the universe: An introduction to the history and philosophy of laws of nature, Ashgate, Aldershot (2005) ISBN 0754639940 (174pp. £ 40.00 hardback). [REVIEW]J. Roberts - 2006 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 37 (4):738-744.
  273.  44
    Trade Liberalization, Corruption, and Software Piracy.Christopher Robertson, K. M. Gilley & William F. Crittenden - 2008 - Journal of Business Ethics 78 (4):623-634.
    As multinational firms explore new and promising national markets two of the most crucial elements in the strategic decision regarding market-entry are the level of corruption and existing trade barriers. One form of corruption that is crucially important to firms is the theft of intellectual property. In particular, software piracy has become a hotly debated topic due to the deep costs and vast levels of piracy around the world. The purpose of this paper is to assess how laissez-faire trade policies (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  274.  7
    Software Blueprints: Lightweight Uses of Logic in Conceptual Modelling.David S. Robertson & Jaume Agustí - 1999 - Addison-Wesley Professional.
    Conceptual models are descriptions of our ideas about a problem, used to shape the implementation of a solution to it. Everyone who builds complex information systems uses such models - be they requirements analysts, knowledge modellers or software designers - but understanding of the pragmatics of model design tends to be informal and parochial. Lightweight uses of logic can add precision without destroying the intuitions we use to interpret our descriptions. Computing with logic allows us to make use of this (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  275.  30
    (Out of) Control Demons: Software Agents, Complexity Theory and the Revolution in Military Affairs.Ian Roderick - 2007 - Theory and Event 10 (2).
  276.  20
    Books Reviews.G. A. J. Rogers - 1987 - Mind 96 (383):427-429.
  277. The ethics of software project management.Simon Rogerson & Donald Gotterbarn - 1998 - In Göran Collste (ed.), Ethics and Information Technology. Delhi: New Academic Publishers. pp. 137-154.
    In this paper are identified several critical ethical issues that arise in most software projects. Proactive ways to address these issues are detailed. These approaches are consistent with most professional software development standards.
     
    Export citation  
     
    Bookmark   4 citations  
  278. The Penn lambda calculator: Pedagogical software for natural language semantics.Maribel Romero - manuscript
    This paper describes a novel pedagogical software program that can be seen as an online companion to one of the standard textbooks of formal natural language semantics, Heim and Kratzer (1998). The Penn Lambda Calculator is a multifunctional application designed for use in standard graduate and undergraduate introductions to formal semantics: Teachers can use the application to demonstrate complex semantic derivations in the classroom and modify them interactively, and students can use it to work on problem sets provided by the (...)
     
    Export citation  
     
    Bookmark   3 citations  
  279. The brain as hardware, culture as software.Richard Rorty - 2004 - Inquiry: An Interdisciplinary Journal of Philosophy 47 (3):219-235.
  280.  33
    The brain as hardware, culture as software: Symposium: Vincent Descombes, The Mind's Provisions.Richard Rorty - 2004 - Inquiry: An Interdisciplinary Journal of Philosophy 47 (3):219-235.
  281. Coordination technology for active support networks: context, needfinding, and design.Stanley J. Rosenschein & Todd Davies - 2018 - AI and Society 33 (1):113-123.
    Coordination is a key problem for addressing goal–action gaps in many human endeavors. We define interpersonal coordination as a type of communicative action characterized by low interpersonal belief and goal conflict. Such situations are particularly well described as having collectively “intelligent”, “common good” solutions, viz., ones that almost everyone would agree constitute social improvements. Coordination is useful across the spectrum of interpersonal communication—from isolated individuals to organizational teams. Much attention has been paid to coordination in teams and organizations. In this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  282.  6
    Books Reviews.Jay F. Rosernberg - 1991 - Mind 100 (398):305-308.
  283.  78
    The fate of the analysts: Aristotle's revenge*: Software everywhere.James F. Ross - manuscript
    SUMMARY: If you think of analytic philosophy as disciplined argumentation, but with distinctive doctrinal commitments [to: positivism, logical atomism, ideal languages, verificationism, physicalistic reductionism, materialism, functionalism, connectivism, computational accounts of perception, and inductive accounts of language learning], then THAT analytic philosophy is fast going the way of acid rock and the plastic LP. Not because the method has betrayed the doctrines. Rather, the doctrines disintegrate under the method.
    Direct download  
     
    Export citation  
     
    Bookmark  
  284. Internet selection software and the acquisition/removal distinction.Lawrence Ross - 2000 - Journal of Information Ethics 9 (2):46-50.
     
    Export citation  
     
    Bookmark  
  285. La construcción democrática del conocimiento tecnológico: una visión sociológica del software libre.Felipe Andrés Aliaga Sáez - 2005 - Aposta 20:1.
    Este artículo introduce el tema del Software Libre, de gran vigencia sobre todo en Internet. Desde un enfoque sociológico, muestra la importancia del conocimiento tecnológico en nuestras sociedades, y señala los retos principales que todos debemos afrontar para que ese conocimiento tecnológico sea auténticamente democrático. Una misión en la que el Software Libre, como herramienta y como movimiento social, tiene un papel protagonista.This article introduces the topic of the Free Software, of great force especially in Internet. From a sociological approach, (...)
     
    Export citation  
     
    Bookmark  
  286.  54
    Software Piracy in Research: A Moral Analysis.Gary Santillanes & Ryan Marshall Felder - 2015 - Science and Engineering Ethics 21 (4):967-977.
    Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by preserving personal rights to authored (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  287. Cognitive automata and the law: Electronic contracting and the intentionality of software agents. [REVIEW]Giovanni Sartor - 2009 - Artificial Intelligence and Law 17 (4):253-290.
    I shall argue that software agents can be attributed cognitive states, since their behaviour can be best understood by adopting the intentional stance. These cognitive states are legally relevant when agents are delegated by their users to engage, without users’ review, in choices based on their the agents’ own knowledge. Consequently, both with regard to torts and to contracts, legal rules designed for humans can also be applied to software agents, even though the latter do not have rights and duties (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  288.  38
    Cutting the Trees of Knowledge: Social Software, Information Architecture and Their Epistemic Consequences.Michael Schiltz, Frederik Truyen & Hans Coppens - 2007 - Thesis Eleven 89 (1):94-114.
    This article inquires whether and to which degree some fundamental traits of the World Wide Web may encourage us to revise traditional conceptions of what constitutes scientific information and knowledge. Turning to arguments for `open access' in scientific publishing and its derivatives (open content, open archives, etc.), contemporary tendencies in `social software' and knowledge sharing, the authors project a new look on knowledge, dissociated with linear notions of cumulation, progression, and hierarchy (e.g. of scientific argument), but related to circularity, heterarchy, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  289.  31
    Leveraging open source software and design based research principles for development of a 3D virtual learning environment.Matthew Schmidt, Krista Galyen, James Laffey, Nan Ding & Xianhui Wang - 2010 - Acm Sigcas Computers and Society 40 (4):45-53.
    Design based research has been acknowledged as a productive approach for advancing educational technology. Coincidentally, open source software has been found to be a good fit for implementing design based research. This report presents a case study of a software project using a design-based research approach and free/open source software. The project, iSocial, is developing a 3D virtual environment for youth with autism spectrum disorders to develop social competence. The study illustrates how the flexibility and community features of FOSS fit (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  290. Mauro Dorato * The Software of the Universe: An Introduction to the History and Philosophy of the Laws of Nature. [REVIEW]Markus Schrenk - 2010 - British Journal for the Philosophy of Science (E-Version) 62 (1):225-232.
    This is a review of Mauro Dorato's book "The Software of the Universe: An Introduction to the History and Philosophy of the Laws of Nature ".
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  291.  97
    Mind as hardware and matter as software.Jan-Markus Schwindt - 2008 - Journal of Consciousness Studies 15 (4):5-27.
    We present an argument against physicalism in two steps: 1) Physics reduces the world to a mathematical structure; 2) The notion of 'structure' only makes sense when carried by something and interpreted by something else. Physicalism does not allow such a carrier and interpreter at a fundamental level, hence it must be wrong. An extended notion of Mind is presented as the fundamental 'hardware' which is necessary by the argument. In particular, qualia correspond to the 'monitor component' of mind. Some (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  292.  9
    Open source and these United States.C. Justin Seiferth - 1999 - Knowledge, Technology & Policy 12 (3):50-79.
  293. Motivators and enablers of SCOURing: A study of online piracy in the US and UK.K. J. Shanahan & M. R. Hyman - 2010 - Journal of Business Research 63 (9):1095--1102.
     
    Export citation  
     
    Bookmark   4 citations  
  294. JM Balkin, Cultural Software: A Theory of Ideology Reviewed by.Emily Sherwin - 1999 - Philosophy in Review 19 (3):160-163.
     
    Export citation  
     
    Bookmark  
  295. J.M. Balkin, Cultural Software: A Theory Of Ideology. [REVIEW]Emily Sherwin - 1999 - Philosophy in Review 19:160-163.
     
    Export citation  
     
    Bookmark  
  296.  27
    Student goal orientation in learning inquiry skills with modifiable software advisors.Todd A. Shimoda, Barbara Y. White & John R. Frederiksen - 2002 - Science Education 86 (2):244-263.
  297.  19
    An Architecture Paradigm for Providing Cloud Services in School Labs Based on Open Source Software to Enhance ICT in Education.Yannis Siahos, Iasonas Papanagiotou, Alkis Georgopoulos, Fotis Tsamis & Ioannis Papaioannou - 2012 - International Journal of Cyber Ethics in Education 2 (1):44-57.
    The authors present their experience and practices of introducing cloud services, as a means to simplify the adoption of ICT in education, using Free/Open Source Software. The solution creates a hybrid cloud infrastructure, in order to provide a pre-installed virtual machine, acting as a server inside the school, providing desktop environment based on the Software as a Service cloud model, where legacy PCs act as stateless devices. Classroom management is accomplished using the application “Epoptes.” To minimize administration tasks, educational software (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  298. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  299.  80
    Softlifting: A model of motivating factors. [REVIEW]Penny M. Simpson, Debasish Banerjee & Claude L. Simpson - 1994 - Journal of Business Ethics 13 (6):431 - 438.
    Softlifting (software piracy by individuals) is an unethical behavior that pervades today''s computer dependent society. Since a better understanding of underlying considerations of the behavior may provide a basis for remedy, a model of potential determinants of softlifting behavior is developed and tested. The analysis provides some support for the hypothesized model, specifically situational variables, such as delayed acquisition times, and personal gain variables, such as the challenge of copying, affect softlifting behavior. Most importantly, the analysis indicated that ethical perception (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   42 citations  
  300.  81
    Toward a profile of student software piraters.Ronald R. Sims, Hsing K. Cheng & Hildy Teegen - 1996 - Journal of Business Ethics 15 (8):839 - 849.
    Efforts to counter software piracy are an increasing focus of software publishers. This study attempts to develop a profile of those who illegally copy software by looking at undergraduate and graduate students and the extent to which they pirate software. The data indicate factors that can be used to profile the software pirater. In particular, males were found to pirate software more frequently than females and older students more than younger students, based on self-reporting.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   37 citations  
1 — 300 / 353