Results for 'Software Studies'

1000+ found
Order:
  1.  22
    The Birth of Software Studies: Lev Manovich and Digital Materialism, on Manovich The Language of New Media.Michael Truscello - 2003 - Film-Philosophy 7 (7).
    Lev Manovich _The Language of New Media_ Cambridge, Massachusetts: MIT Press, 2002 ISBN 0-262-13374-1 hb; 0-262-63255-1 pb 354 pp.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  2.  86
    Case studies of constructivist comprehension in software engineering.Václav Rajlich - 2003 - Brain and Mind 4 (2):229-238.
    Program comprehension is an essential part of software engineering. The paper describes the constructivist theory of comprehension, a process based on assimilation and accommodation of knowledge. Assimilation means that the new facts are either added to the existing knowledge or rejected. Accommodation means that the existing knowledge is reorganized in order to absorb new facts. These processes are illustrated by case studies of knowledge-level reengineering of a legacy program and of incremental change. In both cases, we constructed preliminary (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  3.  8
    Software Theory: A Cultural and Philosophical Study.Federica Frabetti - 2014 - Rowman & Littlefield International.
    This book engages directly in close readings of technical texts and computer code in order to show how software works. It offers an analysis of the cultural, political, and philosophical implications of software technologies that demonstrates the significance of software for the relationship between technology, philosophy, culture, and society.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  34
    Designing trust with software agents: A case study.Stijn Bernaer, Martin Meganck, Greet Vanden Berghe & Patrick De Causmaecker - 2006 - Journal of Information, Communication and Ethics in Society 4 (1):37-48.
    In this paper, we will address anonymity, privacy and trust issues that arise during the research on a communication platform for multi-modal transport. Though most logistic information is currently available in electronic form, it is not widely accessible yet to all the parties concerned with transport. The major goal of a communication platform is to improve the conditions for exchanging information, which should lead to better organisation/collaboration within the transport sector. We need to merit credibility by faithfully modelling all the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5. Case study of company's relationship with open source community in open source software development.Juho Lindman & Topi Uitto - 2008 - Iris 31:1-22.
     
    Export citation  
     
    Bookmark  
  6.  16
    An Institutional Self-Study of Text-Matching Software in a Canadian Graduate-Level Engineering Program.Sarah Elaine Eaton, Katherine Crossman, Laleh Behjat, Robin Michael Yates, Elise Fear & Milana Trifkovic - 2020 - Journal of Academic Ethics 18 (3):263-282.
    This institutional self-study investigated the use of text-matching software to prevent plagiarism by students in a Canadian university that did not have an institutional license for TMS at the time of the study. Assignments from a graduate-level engineering course were analyzed using iThenticate®. During the initial phase of the study, similarity scores from the first student assignments were collected to determine a baseline level of textual similarity. Students were then offered an educational intervention workshop on academic integrity. Another set (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  7.  28
    Applying the new software engineering code of ethics to usability engineering: A study of four cases.Oliver K. Burmeister & John Weckert - 2003 - Journal of Information, Communication and Ethics in Society 1 (3):119-132.
    It has been argued that it is in the best interests of IT professionals, to adopt and enforce professional codes in the work place. But there is no code for usability engineers, unless one accepts that it is a branch of software engineering. The new joint ACM/IEEE‐CS Software Engineering Code of Ethics is applied to actual usability cases. This enables usability engineers to interpret this code in their profession. This is achieved by utilizing four case studies both (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  83
    Ethical issues in empirical studies of software engineering.Janice A. Singer & Norman G. Vinson - forthcoming - Philosophical Explorations.
    The popularity of empirical methods in software engineering research is on the rise. Surveys, experiments, metrics, case studies, and field studies are examples of empirical methods used to investigate both software engineering processes and products. The increased application of empirical methods has also brought about an increase in discussions about adapting these methods to the peculiarities of software engineering. In contrast, the ethical issues raised by empirical methods have received little, if any, attention in the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9.  53
    Unauthorized copying of software: an empirical study of reasons for and against.Mikko T. Siponen & Tero Vartiainen - 2007 - Acm Sigcas Computers and Society 37 (1):30-43.
    Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  10.  99
    An empirical study of software piracy.Eric Kin Wai Lau - 2003 - Business Ethics, the Environment and Responsibility 12 (3):233–245.
  11.  25
    An empirical study of software piracy.Eric Kin Wai Lau - 2003 - Business Ethics, the Environment and Responsibility 12 (3):233-245.
  12. Low Profile Domestic Software Market-A study of India's Case.T. H. John - 2004 - Science and Society 2 (2):57-64.
     
    Export citation  
     
    Bookmark  
  13.  46
    Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  14.  10
    Software Bug Detection Causes a Shift From Bottom-Up to Top-Down Effective Connectivity Involving the Insula Within the Error-Monitoring Network.Joao Castelhano, Isabel C. Duarte, Ricardo Couceiro, Julio Medeiros, Joao Duraes, Sónia Afonso, Henrique Madeira & Miguel Castelo-Branco - 2022 - Frontiers in Human Neuroscience 16.
    The neural correlates of software programming skills have been the target of an increasing number of studies in the past few years. Those studies focused on error-monitoring during software code inspection. Others have studied task-related cognitive load as measured by distinct neurophysiological measures. Most studies addressed only syntax errors. However, a recent functional MRI study suggested a pivotal role of the insula during error-monitoring when challenging deep-level analysis of code inspection was required. This raised the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  23
    Fighting Software Piracy: Some Global Conditional Policy Instruments.Simplice A. Asongu, Pritam Singh & Sara Le Roux - 2018 - Journal of Business Ethics 152 (1):175-189.
    This study examines the efficiency of tools for fighting software piracy in the conditional distributions of software piracy. Our paper examines software piracy in 99 countries over the period 1994–2010, using contemporary and non-contemporary quantile regressions. The intuition for modelling distributions contingent on existing levels of software piracy is that the effectiveness of tools against piracy may consistently decrease or increase simultaneously with the increasing levels of software piracy. Hence, blanket policies against software piracy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  16. Software piracy: Is it related to level of moral judgment?Jeanne M. Logsdon, Judith Kenner Thompson & Richard A. Reid - 1994 - Journal of Business Ethics 13 (11):849 - 857.
    The possible relationship between widespread unauthorized copying of microcomputer software (also known as software piracy) and level of moral judgment is examined through analysis of over 350 survey questionnaires that included the Defining Issues Test as a measure of moral development. It is hypothesized that the higher one''s level of moral judgment, the less likely that one will approve of or engage in unauthorized copying. Analysis of the data indicate a high level of tolerance toward unauthorized copying and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  17.  70
    A software agent model of consciousness.Stan Franklin & Art Graesser - 1999 - Consciousness and Cognition 8 (3):285-301.
    Baars (1988, 1997) has proposed a psychological theory of consciousness, called global workspace theory. The present study describes a software agent implementation of that theory, called ''Conscious'' Mattie (CMattie). CMattie operates in a clerical domain from within a UNIX operating system, sending messages and interpreting messages in natural language that organize seminars at a university. CMattie fleshes out global workspace theory with a detailed computational model that integrates contemporary architectures in cognitive science and artificial intelligence. Baars (1997) lists the (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  18.  14
    Physician thoughts on unnecessary noninvasive imaging and decision support software: A qualitative study.David E. Winchester, Ivette M. Freytes, Magda Schmitzberger, Kimberly Findley & Rebecca J. Beyth - 2020 - Clinical Ethics 15 (3):141-147.
    Objective Gather information from physicians about factors contributing to unnecessary noninvasive imaging and impact of possible solutions. Methods Qualitative study of 14 physicians using a phenomenological approach and the Theoretical Domains Framework. Results Most participants self-reported that >10% of the imaging tests they order are unnecessary. External sources of pressure included: peer-review, patient demands, nursing expectations, specialist requests, as well as prior experience with patient advocates, and the compensation and pension system. Internal sources of pressure included reliance on anecdote, self-doubt (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  48
    Software engineering standards for epidemiological models.Jack K. Horner & John F. Symons - 2020 - History and Philosophy of the Life Sciences 42 (4):1-24.
    There are many tangled normative and technical questions involved in evaluating the quality of software used in epidemiological simulations. In this paper we answer some of these questions and offer practical guidance to practitioners, funders, scientific journals, and consumers of epidemiological research. The heart of our paper is a case study of the Imperial College London covid-19 simulator, set in the context of recent work in epistemology of simulation and philosophy of epidemiology.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  24
    Software quality and group performance.Yuk Kuen Wong - 2009 - AI and Society 23 (4):559-573.
    Software quality is one of the important elements of project management. Software review is one of the most cost effective techniques for detect and remove defects for improving software quality during software development life cycle. Literature suggests that experience and training have positive effect on software review performance. However, there is no empirical study conducted to analysis the important relationships between, experience, training and performance. A laboratory study was conducted with 192 volunteer university students to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  22
    “To Pirate or Not to Pirate”: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision.Pola B. Gupta, Stephen J. Gould & Bharath Pola - 2004 - Journal of Business Ethics 55 (3):255-274.
    Consumers of software often face an acquisition-mode decision, namely whether to purchase or pirate that software. In terms of consumer welfare, consumers who pirate software may stand in opposition to those who purchase it. Marketers also face a decision whether to attempt to thwart that piracy or to ignore, if not encourage it as an aid to their software's diffusion, and policymakers face the decision whether to adopt interventionist policies, which are government-centric, or laissez faire policies, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  22.  11
    Methodological Factors Involved in the Study of Temporal Binding Using the Open Source Software Labclock Web.Carmelo P. Cubillas, Íñigo Landáburu & Helena Matute - 2020 - Frontiers in Psychology 11.
  23.  33
    Software vulnerability due to practical drift.Christian V. Lundestad & Anique Hommels - 2007 - Ethics and Information Technology 9 (2):89-100.
    The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Student attitudes on software piracy and related issues of computer ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  25.  78
    “To Pirate or Not to Pirate”: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision. [REVIEW]Pola B. Gupta, Stephen J. Gould & Bharath Pola - 2004 - Journal of Business Ethics 55 (3):255 - 274.
    Consumers of software often face an acquisition-mode decision, namely whether to purchase or pirate that software. In terms of consumer welfare, consumers who pirate software may stand in opposition to those who purchase it. Marketers also face a decision whether to attempt to thwart that piracy or to ignore, if not encourage it as an aid to their softwares diffusion, and policymakers face the decision whether to adopt interventionist policies, which are government-centric, or laissez faire policies, which (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  26.  21
    How actions and words come to make sense in a continuously changing world of work: A case study from software development.Josh Tenenberg, David Socha & Wolff-Michael Roth - 2021 - Semiotica 2021 (238):211-238.
    To be successful, collaboration at work requires its participants to have a common sense about what is happening and where things are heading. But how can collaborators have such a sense in common if what is going on continuously changes? This study investigates the joint communicative work participants in collaborative activity do to remain aligned on how things are going and where things are at for the purpose of maintaining a ground in common. Our test case for illustrating this joint (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  21
    Software Tool for Seismic Data Recorder and Analyser.Satish Kumar, Raman K. Attri, B. K. Sharma & M. A. Shamshi - 2000 - Iete Journal of Education 41 (1-2):23-30.
    Design and Development of software controlled stand-alone instruments have been identified as the most vital component of national and international programs on earthquake hazard and risk management. For in depth investigation and studies, the development of precise instruments designed around computer is emerging very fast. Interfacing of personal computer with seismic instrument is an important design task. A design technique based on minimum hardware has been worked out around the parallel printer interface of computer. Hardware and Software (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  53
    What Motivates Software Crackers?Sigi Goode & Sam Cruise - 2006 - Journal of Business Ethics 65 (2):173-201.
    Software piracy is a serious problem in the software industry. Software authors and publishing companies lose revenue when pirated software rather than legally purchased software is used. Policy developers are forced to invest time and money into restricting software piracy. Much of the published research literature focuses on software piracy by end-users. However, end-users are only able to copy software once the copy protection has been removed by a ‘cracker’. This research aims (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29. Organisational Processes in the Secondary Software Sector: A Case Study on Open Source Software Adoption.Brian Lings Erik Olsson - 2013 - Iris 34.
     
    Export citation  
     
    Bookmark  
  30.  43
    A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example.M. A. Mizani & N. Baykal - 2007 - Journal of Medical Ethics 33 (12):695-698.
    Paper-based privacy policies fail to resolve the new changes posed by electronic healthcare. Protecting patient privacy through electronic systems has become a serious concern and is the subject of several recent studies. The shift towards an electronic privacy policy introduces new ethical challenges that cannot be solved merely by technical measures. Structured Patient Privacy Policy (S3P) is a software tool assuming an automated electronic privacy policy in an electronic healthcare setting. It is designed to simulate different access levels (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  27
    Software-realized inquiry support for cultivatig a disciplinary stance.Iris Tabak & Brian Reiser - 2008 - Pragmatics and Cognition 16 (2):307-355.
    What role can technology play in cultivating a disciplinary stance — raising questions, planning investigations, interpreting data and constructing explanations in a way that reflects disciplinary values and principles? How can overt and tacit expert scientific knowledge be captured, represented and used to design software that enables novices to assume a disciplinary stance in their investigations? We present The Galapagos Finches software designed to foster a biological and evolutionary stance. Our approach, Discipline-Specific Strategic Support , translates the main (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  32.  13
    Software’s founding mother: Kurt W. Beyer: Grace Hopper and the invention of the information age. Cambridge, Mass.: MIT Press, 2009, 408 pp, $27.95, £20.95 HB.Janet Abbate - 2011 - Metascience 20 (1):215-218.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  38
    Agents of responsibility in software vulnerability processes.Ari Takanen, Petri Vuorijärvi, Marko Laakso & Juha Röning - 2004 - Ethics and Information Technology 6 (2):93-110.
    Modern software is infested with flaws having information security aspects. Pervasive computing has made us and our society vulnerable. However, software developers do not fully comprehend what is at stake when faulty software is produced and flaws causing security vulnerabilites are discovered. To address this problem, the main actors involved with software vulnerability processes and the relevant roles inside these groups are identified. This categorisation is illustrated through a fictional case study, which is scrutinised in the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  34.  23
    Software-realized inquiry support for cultivating a disciplinary stance.Iris Tabak & Brian J. Reiser - 2008 - Pragmatics and Cognition 16 (2):307-355.
    What role can technology play in cultivating a disciplinary stance — raising questions, planning investigations, interpreting data and constructing explanations in a way that reflects disciplinary values and principles? How can overt and tacit expert scientific knowledge be captured, represented and used to design software that enables novices to assume a disciplinary stance in their investigations? We present The Galapagos Finches software designed to foster a biological and evolutionary stance. Our approach, Discipline-Specific Strategic Support, translates the main variable (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  77
    Brittleness and Bureaucracy: Software as a Material for Science.Matt Spencer - 2015 - Perspectives on Science 23 (4):466-484.
    . Through examining a case study of a major fluids modelling code, this paper charts two key properties of software as a material for building models. Scientific software development is characterized by piecemeal growth, and as a code expands, it begins to manifest frustrating properties that provide an important axis of motivation in the laboratory. The first such feature is a tendency towards brittleness. The second is an accumulation of supporting technologies that sometimes cause scientists to express a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  47
    Conscious software: A computational view of mind.Stan Franklin - 2002
  37. Organisational Processes in the Secondary Software Sector: A Case Study on Open Source Software Adoption.Erik Olsson, Brian Lings & Björn Lundell - 2013 - Iris 34.
     
    Export citation  
     
    Bookmark  
  38. Situational determinants of software piracy: An equity theory perspective. [REVIEW]Richard S. Glass & Wallace A. Wood - 1996 - Journal of Business Ethics 15 (11):1189 - 1198.
    Software piracy has become recognized as a major problem for the software industry and for business. One research approach that has provided a theoretical framework for studying software piracy has been to place the illegal copying of software within the domain of ethical decision making assumes that a person must be able to recognize software piracy as a moral issue. A person who fails to recognize a moral issue will fail to employ moral decision making (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   56 citations  
  39.  15
    Coordination processes in open source software development: The Linux case study.Federico Iannacci - 2005 - Emergence: Complexity and Organization 7 (2).
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. Ethics in information technology and software use.Vincent J. Calluzzo & Charles J. Cante - 2004 - Journal of Business Ethics 51 (3):301-312.
    The emerging concern about software piracy and illegal or unauthorized use of information technology and software has been evident in the media and open literature for the last few years. In the course of conducting their academic assignments, the authors began to compare observations from classroom experiences related to ethics in the use of software and information technology and systems. Qualitatively and anecdotally, it appeared that many if not most, students had misconceptions about what represented ethical and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  41. Factors that Influence the Intention to Pirate Software and Media.Timothy Paul Cronan & Sulaiman Al-Rafee - 2008 - Journal of Business Ethics 78 (4):527-545.
    This study focuses on one of the newer forms of software piracy, known as digital piracy, and uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors that influence digital piracy (the illegal copying/downloading of copyrighted software and media files). This study examines factors, which could determine an individual’s intention to pirate digital material (software, media, etc.). Past piracy behavior and moral obligation, in addition to the prevailing theories of behavior (Theory of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  42. The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software.Mei-Fang Chen, Ching-Ti Pan & Ming-Chuan Pan - 2009 - Journal of Business Ethics 90 (3):361 - 373.
    Moral issues have been included in the studies of consumer misbehavior research, but little is known about the joint moderating effect of moral intensity and moral judgment on the consumer’s use intention of pirated software. This study aims to understand the consumer’s use intention of pirated software in Taiwan based on the theory of planned behavior (TPB) proposed by Ajzen (Organizational Behavior and Human Decision Processes, 50, 179, 1991). In addition, moral intensity and moral judgment are adopted (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  43.  25
    Free and Open Source Software in developing contexts.Gianluca Miscione & Kevin Johnston - 2010 - Journal of Information, Communication and Ethics in Society 8 (1):42-56.
    PurposeOriginating in the USA and Northern Europe, Free and Open Source Software (FOSS) found on the internet its fertile environment. In more recent years, FOSS is becoming an increasingly important element in strategies for development and implementation of information and communication technologies also in developing countries. Mainstream research on FOSS has catered to the underlying principles or freedom, open organizational forms, and on its economical aspects. The purpose of this paper is to shed new light on the actual consequences (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  44.  65
    The morality of software piracy: A cross-cultural analysis. [REVIEW]W. R. Swinyard, H. Rinne & A. Keng Kau - 1990 - Journal of Business Ethics 9 (8):655 - 664.
    Software piracy is a damaging and important moral issue, which is widely believed to be unchecked in particular areas of the globe. This cross-cultural study examines differences in morality and behavior toward software piracy in Singapore versus the United States, and reviews the cultural histories of Asia versus the United States to explore why these differences occur. The paper is based upon pilot data collected in the U.S. and Singapore, using a tradeoff analysis methodology and analysis. The data (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   57 citations  
  45.  57
    The Social Epistemologies of Software.David M. Berry - 2012 - Social Epistemology 26 (3-4):379-398.
    This paper explores the specific questions raised for social epistemology encountered in code and software. It does so because these technologies increasingly make up an important part of our urban environment, and stretch across all aspects of our lives. The paper introduces and explores the way in which code and software become the conditions of possibility for human knowledge, crucially becoming computational epistemes, which we share with non-human but crucially knowledge-producing actors. As such, we need to take account (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  7
    Trust, artificial intelligence and software practitioners: an interdisciplinary agenda.Sarah Pink, Emma Quilty, John Grundy & Rashina Hoda - forthcoming - AI and Society:1-14.
    Trust and trustworthiness are central concepts in contemporary discussions about the ethics of and qualities associated with artificial intelligence (AI) and the relationships between people, organisations and AI. In this article we develop an interdisciplinary approach, using socio-technical software engineering and design anthropological approaches, to investigate how trust and trustworthiness concepts are articulated and performed by AI software practitioners. We examine how trust and trustworthiness are defined in relation to AI across these disciplines, and investigate how AI, trust (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  22
    Free and open source software (FOSS) as a model domain for answering big questions about creativity.Scott Dexter & Aaron Kozbelt - 2013 - Mind and Society 12 (1):113-123.
    In free and open source software (FOSS), computer code is made freely accessible and can be modified by anyone. It is a creative domain with many unique features; the FOSS mode of creativity has also influenced many aspects of contemporary cultural production. In this article we identify a number of fundamental but unresolved general issues in the study of creativity, then examine the potential for the study of FOSS to inform these topics. Archival studies of the genesis of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  20
    Learning and social software: exploring the realities in India.Jehangir Bharucha - 2018 - Journal of Information, Communication and Ethics in Society 16 (1):75-89.
    Purpose Digital India’s attempts to transform India into a digitally empowered society and knowledge economy. This research examines three questions: What is the educational importance of social media in Indian higher education? What gains and dangers does it pose when used for formal learning? Could informal learning via technology powerfully supplement learning through the formal system? Design/methodology/approach In total, 640 students were contacted through email lists provided by their institutions after these institutions had obtained their consent to participate in the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  13
    Research on computer static software defect detection system based on big data technology.Rahul Neware, Jyoti Bhola, K. Arumugam, Jianxing Zhu & Zhaoxia Li - 2022 - Journal of Intelligent Systems 31 (1):1055-1064.
    To study the static software defect detection system, based on the traditional static software defect detection system design, a new static software defect detection system design based on big data technology is proposed. The proposed method can optimize the distribution of test resources and improve the quality of software products by predicting the potential defect program modules and design the software and hardware of the static software defect detection system of big data technology. It (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  10
    Explanations in Software Engineering: The Pragmatic Point of View.Jan Winter - 2010 - Minds and Machines 20 (2):277-289.
    This article reveals that explanatory practice in software engineering is in accordance with pragmatic explanatory pluralism, which states that explanations should at least partially be evaluated by their practical use. More specifically, I offer a defense of the idea that several explanation-types are legitimate in software engineering, and that the appropriateness of an explanation-type depends on (a) the engineer’s interests, and (b) the format of the explanation-seeking question he asks, with this format depending on his interests. This idea (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000