9 found
Order:
  1.  62
    Developing Artificial Agents Worthy of Trust: “Would You Buy a Used Car From This Artificial Agent?”. [REVIEW]F. S. Grodzinsky, K. W. Miller & M. J. Wolf - 2011 - Ethics and Information Technology 13 (1):17-27.
    There is a growing literature on the concept of e-trust and on the feasibility and advisability of “trusting” artificial agents. In this paper we present an object-oriented model for thinking about trust in both face-to-face and digitally mediated environments. We review important recent contributions to this literature regarding e-trust in conjunction with presenting our model. We identify three important types of trust interactions and examine trust from the perspective of a software developer. Too often, the primary focus of research in (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  2.  15
    Why We Should Have Seen That Coming.M. J. Wolf, K. Miller & F. S. Grodzinsky - 2017 - Acm Sigcas Computers and Society 47 (3):54-64.
    In this paper we examine the case of Tay, the Microsoft AI chatbot that was launched in March, 2016. After less than 24 hours, Microsoft shut down the experiment because the chatbot was generating tweets that were judged to be inappropriate since they included racist, sexist, and anti-Semitic language. We contend that the case of Tay illustrates a problem with the very nature of learning software that interacts directly with the public, and the developer's role and responsibility associated with it. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  27
    Privacy in the Cloud: Applying Nissenbaum's Theory of Contextual Integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  55
    On the Meaning of Free Software.M. J. Wolf, K. W. Miller & F. S. Grodzinsky - 2009 - Ethics and Information Technology 11 (4):279-286.
    To many who develop and use free software, the GNU General Public License represents an embodiment of the meaning of free software. In this paper we examine the definition and meaning of free software in the context of three events surrounding the GNU General Public License. We use a case involving the GPU software project to establish the importance of Freedom 0 in the meaning of free software. We analyze version 3 of the GNU General Public License and conclude that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  27
    Ethical Issues in Open Source Software.F. S. Grodzinsky, K. Miller & M. J. Wolf - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):193-205.
  6.  18
    The Development of the 'Ethical' ICT Professional: And the Vision of an Ethical on-Line Society: How Far Have We Come and Where Are We Going?F. S. Grodzinsky - 2000 - Acm Sigcas Computers and Society 30 (1):3-7.
    It has been a decade since Computer Ethics came into prominence within the field of computer science and engineering, changing not only the profession but the classroom as well. The commercialization and globalization of the World Wide Web has impacted us all, both producers and consumers alike. What was once the province of the few has become the virtual society of the multitudes. Ethical issues concerning security, privacy, information, identity, community and equity of access once contained and localized, have assumed (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  15
    Moral Responsibility for Computing Artifacts: The Rules and Issues of Trust.F. S. Grodzinsky, K. Miller & M. J. Wolf - 2012 - Acm Sigcas Computers and Society 42 (2):15-25.
    "The Rules" are found in a collaborative document that states principles for responsibility when a computer artifact is designed, developed and deployed into a sociotechnical system. At this writing, over 50 people from nine countries have signed onto The Rules. Unlike codes of ethics, The Rules are not tied to any organization, and computer users as well as computing professionals are invited to sign onto The Rules. The emphasis in The Rules is that both users and professionals have responsibilities in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  16
    Private Use as Fair Use: Is It Fair?F. S. Grodzinsky & M. C. Bottis - 2007 - Acm Sigcas Computers and Society 37 (2):11-24.
    The age of digital technology has introduced new complications into the issues of fair and private use of copyrighted material. In fact, the question of private use of another's work has been transformed from a side issue in intellectual property jurisprudence into the very center of intellectual property discussions about rights and privileges in a networked world. This paper will explore the nuanced difference between fair and private use as articulated in the US and the European Copyright Laws. Part One (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  2
    Influences on and Incentives for Increasing Software Reliability.F. S. Grodzinsky, K. Miller & M. J. Wolf - 2006 - Journal of Information, Communication and Ethics in Society 4 (2):103-113.