Switch to: References

Add citations

You must login to add citations.
  1. Identifiability, Risk, and Information Credibility in Discussions on Moral/Ethical Violation Topics on Chinese Social Networking Sites.Xi Chen, Chenli Huang & Yi Cheng - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Information-Sharing Behavior on WeChat Moments: The Role of Anonymity, Familiarity, and Intrinsic Motivation.Xi Chen, MingXue Sun, Dong Wu & Xiao Yu Song - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Cognitive Automata and the Law: Electronic Contracting and the Intentionality of Software Agents. [REVIEW]Giovanni Sartor - 2009 - Artificial Intelligence and Law 17 (4):253-290.
    I shall argue that software agents can be attributed cognitive states, since their behaviour can be best understood by adopting the intentional stance. These cognitive states are legally relevant when agents are delegated by their users to engage, without users’ review, in choices based on their the agents’ own knowledge. Consequently, both with regard to torts and to contracts, legal rules designed for humans can also be applied to software agents, even though the latter do not have rights and duties (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Unplanned Effects of Intelligent Agents on Internet Use: A Social Informatics Approach. [REVIEW]Alexander Serenko, Umar Ruhi & Mihail Cocosila - 2007 - AI and Society 21 (1-2):141-166.
    This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens of analysis, the study identifies several unanticipated consequences of using intelligent agents for information- and commerce-based tasks on the Internet. The effects include those that transpire over time at the organizational level, such as e-commerce transformation, operational encumbrance and security overload, as well as those that emerge on a cultural level, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation