Results for 'software contracts'

993 found
Order:
  1. Cognitive automata and the law: Electronic contracting and the intentionality of software agents. [REVIEW]Giovanni Sartor - 2009 - Artificial Intelligence and Law 17 (4):253-290.
    I shall argue that software agents can be attributed cognitive states, since their behaviour can be best understood by adopting the intentional stance. These cognitive states are legally relevant when agents are delegated by their users to engage, without users’ review, in choices based on their the agents’ own knowledge. Consequently, both with regard to torts and to contracts, legal rules designed for humans can also be applied to software agents, even though the latter do not have (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  2.  16
    Contract cheating advertisements: what they tell us about international students’ attitudes to academic integrity.Louise Kaktiņš - 2018 - Ethics and Education 13 (2):268-284.
    At a time when contract cheating advertisements are proliferating both online and offline, an analysis of their format, wording and approach furnishes critical information for educational providers about the attitudes of international students towards academic honesty. This analysis, in company with the available research literature, points to particular concerns regarding international students, especially those who are undertaking business-related degrees. There is much disquiet on the part of universities generally about the failure of such students to engage in the academic discourse (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  36
    Law and software agents: Are they “Agents” by the way?Emad Abdel Rahim Dahiyat - 2020 - Artificial Intelligence and Law 29 (1):59-86.
    Using intelligent software agents in the world of e-commerce may give rise to many difficulties especially with regard to the validity of agent-based contracts and the attribution of liability for the actions of such agents. This paper thus critically examines the main approaches that have been advanced to deal with software agents, and proposes the gradual approach as a way of overcoming the difficulties of such agents by adopting different standards of responsibility depending whether the action is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4. Role of Psychological Contracts in Enhancing Employee Creativity Through Knowledge Sharing: Do Boundary Conditions of Organization’s Socialization and Work-Related Curiosity Matter?Boliang Jiang, Tribhuwan Kumar, Nabeel Rehman, Rizwana Hameed, Mehmet Kiziloglu & Adan Israr - 2022 - Frontiers in Psychology 13.
    COVID-19 has had a huge impact on workers and workplaces across the world while putting regular work practices into disarray. Apart from the obvious effects of COVID-19, the pandemic is anticipated to have a variety of social–psychological, health-related, and economic implications for individuals at work. Despite extensive research on psychological contracts and knowledge sharing, these domains of pedagogic endeavor have received relatively little attention in the context of employee creativity subjected to the boundary conditions of the organization’s socialization and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Contracting agents: Legal personality and representation. [REVIEW]Francisco Andrade, Paulo Novais, José Machado & José Neves - 2007 - Artificial Intelligence and Law 15 (4):357-373.
    The combined use of computers and telecommunications and the latest evolution in the field of Artificial Intelligence brought along new ways of contracting and of expressing will and declarations. The question is, how far we can go in considering computer intelligence and autonomy, how can we legally deal with a new form of electronic behaviour capable of autonomous action? In the field of contracting, through Intelligent Electronic Agents, there is an imperious need of analysing the question of expression of consent, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Beyond Human: Smart Contracts, Smart-Machines, and Documentality.David Koepsell - 2022 - In Jason Grant Allen & Peter Hunn (eds.), Smart Legal Contracts: Computable Law in Theory and Practice. Oxford University Press. pp. 327-337.
    The theory of documentality is a way of describing social reality. Developed by Italian philosopher Maurizio Ferraris, it says that the world of social objects is a world of documents, fundamentally. Specifically, it attempts to fill in gaps regarding the existence of objects whose dependence precedes traditional, written documents. Borrowing from Derrida, Ferraris concludes that no part of social reality exists outside of texts, while expanding the notion of texts to include inscriptions as memories in minds. Social reality is constructed (...)
     
    Export citation  
     
    Bookmark  
  7.  49
    Intelligent agents and contracts: Is a conceptual rethink imperative? [REVIEW]Emad Abdel Rahim Dahiyat - 2007 - Artificial Intelligence and Law 15 (4):375-390.
    The emergence of intelligent software agents that operate autonomously with little or no human intervention has generated many doctrinal questions at a conceptual level and has challenged the traditional rules of contract especially those relating to the intention as an essential requirement of any contract conclusion. In this paper, we will try to explore some of these challenges, and shed light on the conflict between the traditional contract theory and the transactional practice in the case of using intelligent (...) agents. We will try further to examine how intelligent software agents differ from other software applications, and consider then how such differences are legally relevant. This paper, however, is not intended to provide the final answer to all questions and challenges in this regard, but to identify the main components, and provide perspectives on how to deal with such issue. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  13
    A theory of change for prioritised resilient and evolvable software systems.Giuseppe Primiero, Franco Raimondi & Taolue Chen - 2019 - Synthese 198 (S23):5719-5744.
    The process of completing, correcting and prioritising specifications is an essential but very complex task for the maintenance and improvement of software systems. The preservation of functionalities and the ability to accommodate changes are main objectives of the software development cycle to guarantee system reliability. Logical theories able to fully model such processes are still insufficient. In this paper we propose a full formalisation of such operations on software systems inspired by the Alchourrón–Gärdenfors–Makinson paradigm for belief revision (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9.  8
    The Organizational Commitment in the Company and Its Relationship With the Psychological Contract.Juan Herrera & Carlos De Las Heras-Rosas - 2021 - Frontiers in Psychology 11.
    Business organizations in their work environment, aspire to create a high level of performance and low levels of absenteeism and turnover. Organizational commitment is considered a key factor in achieving this objective, however, it can be conditioned by several factors, among which is the psychological contract. The literature has related the organizational commitment with the fulfillment of the psychological contract framing it as one of the explanatory variables. This work aims to investigate research trends on psychological contract and organizational commitment. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  7
    Impact of Knowledge Hiding Behaviors on Workplace Invincibility: Mediating Role of Psychological Contract Breach.Junqi Wen, Jiafeng Zheng & Ruijun Ma - 2022 - Frontiers in Psychology 12.
    In recent years, knowledge hiding has gained much popularity in the knowledge management literature. Apart from that, antecedents and consequences of knowledge hiding are being scrutinized at present. There have been many studies on the triggering forces of knowledge hiding; however, the uncivil behaviors at the workplace have led the organizations and employees in trouble due to its possible associating factors, which is well explained by social influence theory. One such factor that this study has identified is knowledge hiding behavior (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  51
    Global Ethics of Collective Internet Governance: Intrinsic Motivation and Open Source Software.Chong Ju Choi, Sae Won Kim & Shui Yu - 2009 - Journal of Business Ethics 90 (4):523-531.
    The ethical governance of the global Internet is an accelerating global phenomenon. A key paradox of the global Internet is that it allows individual and collective decision making to co-exist with each other. Open source software (OSS) communities are a globally accelerating phenomenon. OSS refers to groups of programs that allow the free use of the software and further the code sharing to the general and corporate users of the software. The combination of private provision and public (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Spyware – the ethics of Covert software.Mathias Klang - 2004 - Ethics and Information Technology 6 (3):193-202.
    Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know what is occurring therein. This paper discusses an unusual type of surveillance software which may be installed in many computers. The strange aspect of this software is that it has often been downloaded and installed by the user, but without her knowledge. The software is mainly designed to collect information about the user of (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  8
    Compliance revisited: pharmaceutical drug trials in the era of the contract research organization.Petra Jonvallen - 2009 - Nursing Inquiry 16 (4):347-354.
    Over the past decade, the management of clinical trials of pharmaceuticals has become a veritable industry, as evidenced by the emergence and proliferation of contract research organizations (CROs) that co‐ordinate and monitor trials. This article focuses on work performed by one CRO involved in the introduction of new software, modelled on industrial production processes, into clinical trial practices. It investigates how this new management technique relates to the work performed in the clinic to ensure that trial participants comply with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  57
    A legal ontology refinement support environment using a machine-readable dictionary.Masaki Kurematsu & Takahira Yamaguchi - 1997 - Artificial Intelligence and Law 5 (1-2):119-137.
    This paper discusses how to refine a given initial legal ontology using an existing MRD (Machine-Readable Dictionary). There are two hard issues in the refinement process. One is to find out those MRD concepts most related to given legal concepts. The other is to correct bugs in a given legal ontology, using the concepts extracted from an MRD. In order to resolve the issues, we present a method to find out the best MRD correspondences to given legal concepts, using two (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  22
    Electromyographic Patterns and the Identification of Subtypes of Awake Bruxism.Ubirakitan Maciel Monteiro, Vinicius Belém Rodrigues Barros Soares, Caio Belém Rodrigues Barros Soares, Tiago Coimbra Costa Pinto, Rosana Christine Cavalcanti Ximenes & Marcelo Araújo Cairrão Rodrigues - 2021 - Frontiers in Human Neuroscience 14:601881.
    The future of awake bruxism assessment will incorporate physiological data, possibly electromyography of the temporal muscles. But up to now, temporal muscle contraction patterns in awake bruxism have not been characterized to demonstrate clinical utility. The present study aimed to perform surface EMG evaluations of people assessed for awake bruxism to identify possible different subtypes. A 2-year active search for people with awake bruxism in three regions of the country resulted in a total of 303 participants. Their inclusion was confirmed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. Applied Ontology: A Marvin Farber Conference on Law and Institutions in Society.Barry Smith & David R. Koepsell (eds.) - 1998 - Buffalo: University at Buffalo.
    The application of ontology has thus far [in 1998] been confined almost exclusively to the field of knowledge representation. Ontology has been applied, for example, in the design of medical databases and in the construction of geographical information systems. One area which is naturally suited to ontological analysis is that of the law and of social institutions in general. -/- Legal systems are composed of legal entities, such as laws, contracts, obligations, and rights. Their application yields new categories of (...)
     
    Export citation  
     
    Bookmark  
  17.  14
    A close encounter with ghost-writers: an initial exploration study on background, strategies and attitudes of independent essay providers.Sharavan Ramachandran, Kalliopi Kostelidou & Shiva Sivasubramaniam - 2016 - International Journal for Educational Integrity 12 (1).
    Academic dishonesty presents in different forms, including fabrication of data, falsifying references, multiple submissions, collusion, and sabotage, with two forms haunting academia, namely plagiarism and contract cheating or ghost writing. These latter forms have received considerable attention and have been subjects for research. This interview-based study provides some further insight into the problem of ghost writing through presenting the attitudes, justifications and networking practices of some hired ‘ghost-writers’ from a developing country and discusses the depth of this emerging threat to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  18.  9
    Using corpora to reveal style in translation: The case of The Song of Everlasting Sorrow.Lingzi Meng & Feng Pan - 2022 - Frontiers in Psychology 13.
    This article reports on a corpus-based study of the English translation of Wang Anyi’s award-winning novel, The Song of Everlasting Sorrow [长恨歌, Chang Hen Ge] from the perspective of style. Using the keyword and concordance functions of corpus software packages AntConc and ParaConc, this research focuses on how the translator’s style reveals itself in the target text as well as how the style of the source text is represented in the TT. Findings show that the translators have a preference (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  4
    Perception of Justice and Employees’ Brand-Based Equity in the Service Sector: Evidence From Education Industry.Lu Li - 2022 - Frontiers in Psychology 13.
    This study aims to investigate the impact of justice perception of the employees on three dimensions of employee-based brand equity under the mediating role of psychological contract fulfillment. For this purpose, data have been collected from the employees of the education industry under the convenience sampling technique. In this regard, a survey method was used, and questionnaires were distributed among 420 respondents, out of which 310 questionnaires were received back, and after discarding 32 partially filled questionnaires, useable responses were left. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  23
    The bureaucratisation of the university: The case of Denmark.Stavros Moutsios - 2023 - Educational Philosophy and Theory 55 (3):379-391.
    The literature on ‘academic capitalism’ and the ‘entrepreneurial university’ has paid little attention to the role and function of bureaucracy or has considered it something different from the New Public Management (NPM) that has accompanied neoliberal reforms in higher education over the last decades. Following a brief account of the theory and history of bureaucracy, the article examines the institutional, intellectual, pedagogic, and psychic repercussions of the NPM that was introduced in Danish universities in 2003, and turned them into what (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  22
    Deontic Logic in Computer Science: Normative System Specification.John-Jules Ch Meyer & R. J. Wieringa - 1993 - Wiley.
    A useful logic in which to specify normative system behaviour, deontic logic has a broad spectrum of possible applications within the field: from legal expert systems to natural language processing, database integrity to electronic contracting and the specification of fault-tolerant software.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  8
    Using digital forensics in higher education to detect academic misconduct.Mike Reddy, Ross Davies & Clare Johnson - 2022 - International Journal for Educational Integrity 18 (1).
    Academic misconduct in all its various forms is a challenge for degree-granting institutions. Whilst text-based plagiarism can be detected using tools such as Turnitin™, Plagscan™ and Urkund™, contract cheating and collusion can be more difficult to detect, and even harder to prove, often falling to no more than a ‘balance of probabilities’ rather than fact. To further complicate the matter, some students will make deliberate attempts to obfuscate cheating behaviours by submitting work in Portable Document Format, in image form, or (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  13
    The Perils of Parity: Should Citizen Science and Traditional Research Follow the Same Ethical and Privacy Principles?Barbara J. Evans - 2020 - Journal of Law, Medicine and Ethics 48 (S1):74-81.
    The individual right of access to one’s own data is a crucial privacy protection long recognized in U.S. federal privacy laws. Mobile health devices and research software used in citizen science often fall outside the HIPAA Privacy Rule, leaving participants without HIPAA’s right of access to one’s own data. Absent state laws requiring access, the law of contract, as reflected in end-user agreements and terms of service, governs individuals’ ability to find out how much data is being stored and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  56
    A defense of ad blocking and consumer inattention.Alexander Zambrano & Caleb Pickard - 2018 - Ethics and Information Technology 20 (3):143-155.
    Ad blockers are a category of computer software program, typically run as web browser extensions, that allow users to selectively eliminate advertisements from the webpages they visit. Many people have alleged that using an ad blocker is morally problematic because it is bad for content providers and consumers, and it is morally akin to theft. We disagree. In this paper, we defend an independent argument for the conclusion that using an ad blocker is morally permissible. In doing so, we (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  46
    Classroom Video Data and the Time-Image: An-Archiving the Student Body.Elizabeth de Freitas - 2015 - Deleuze and Guatarri Studies 9 (3):318-336.
    Video data has now become the most common form of data for educational researchers studying classroom interaction and school culture. Software protocols for analysing vast archives of video data are deployed regularly, allowing researchers to annotate, code and sort images. These protocols are often applied by researchers without reflection or reference to the extensive philosophical work in film and media studies. Without exception, this research treats the video image as movement-image or picture, a recording of ‘raw data’, indexical of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  26.  41
    Aproximación al Derecho de la Informática.Antonio-Enrique Perez Luño - 1987 - Theoria: Revista de Teoría, Historia y Fundamentos de la Ciencia 3 (1-2):529-551.
    Side by side with legal informatics, understood as the study of the applications of computers in the legal field, computer law, in which numerous legal problems linked to the use of the new technology are taken into consideration, has now developped. Important sectors of research have been identified within the ambit of computers law, among these: the contracts for computer utilitation; the problem of the protection of ’software’; the protection of privacy with regard to informatics; the transborder data (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  35
    Aproximación al derecho de la informática.Luño Antonio-Enrique Perez - 1987 - Theoria 3 (1):529-551.
    Side by side with legal informatics, understood as the study of the applications of computers in the legal field, computer law, in which numerous legal problems linked to the use of the new technology are taken into consideration, has now developped. Important sectors of research have been identified within the ambit of computers law, among these: the contracts for computer utilitation; the problem of the protection of ’software’; the protection of privacy with regard to informatics; the transborder data (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  9
    Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology.Pingping Sun & Lingang Gu - 2021 - Complexity 2021:1-11.
    Based on the Internet of Things technology, this paper proposes building a cross-border e-commerce logistics supervision system and determines the evaluation index system from the overall framework design of the system, supply chain supervision process optimization, risk supervision optimization, and system order degree optimization. First of all, the framework adopts the national certification center to supervise the logistics service platform and logistics service platform to supervise the logistics participants of the secondary supervision system. Then, functions such as swarm intelligence contract, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  10
    Not Too Much and Not Too Little: Information Processing for a Good Purchase Decision.Claudia Vogrincic-Haselbacher, Joachim I. Krueger, Brigitta Lurger, Isabelle Dinslaken, Julian Anslinger, Florian Caks, Arnd Florack, Hilmar Brohmer & Ursula Athenstaedt - 2021 - Frontiers in Psychology 12.
    When deciding on an online purchase, consumers often face a plethora of information. Yet, individuals consumers differ greatly in the amount of information they are willing and able to acquire and process before making purchasing decisions. Extensively processing all available information does not necessarily promote good decisions. Instead, the empirical evidence suggests that reviewing too much information or too many choice alternatives can impair decision quality. Using simulated contract conclusion scenarios, we identify distinctive types of information processing styles and find (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. Toward a Philosophy of Blockchain: A Symposium: Introduction.Melanie Swan & Primavera de Filippi - 2017 - Metaphilosophy 48 (5):603-619.
    This article introduces the symposium “Toward a Philosophy of Blockchain,” which provides a philosophical contemplation of blockchain technology, the digital ledger software underlying cryptocurrencies such as bitcoin, for the secure transfer of money, assets, and information via the Internet without needing a third-party intermediary. The symposium offers philosophical scholarship on a new topic, blockchain technology, from a variety of perspectives. The philosophical themes discussed include mathematical models of reality, signification, and the sociopolitical institutions that structure human life and interaction. (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  31.  21
    A legal analysis of human and electronic agents.Steffen Wettig & Eberhard Zehender - 2004 - Artificial Intelligence and Law 12 (1-2):111-135.
    Currently, electronic agents are being designed and implemented that, unprecedentedly, will be capable of performing legally binding actions. These advances necessitate a thorough treatment of their legal consequences. In our paper, we first demonstrate that electronic agents behave structurally similar to human agents. Then we study how declarations of intention stated by an electronic agent are related to ordinary declarations of intention given by natural persons or legal entities, and also how the actions of electronic agents in this respect have (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  32.  28
    Software engineering code of ethics and professional practice: version 4.Corporate Ieee-cs-acm Joint Task Force On Software Engineering Ethics - 1998 - Acm Sigcas Computers and Society 28 (2):29-32.
  33.  20
    Cambridge companion to Rousseau's Social contract.David Lay Williams, Matthew William Maguire & Rousseau'S. Social Contract (eds.) - 2023 - New York: Cambridge University Press.
    Introduction -- "Every Legitimate Government is Republican": Rousseau's Debt to and Departure from Montesquieu on Republicanism -- What if There is no Legislator? Rousseau's History of the Government of Geneva -- Rousseau's Republican Citizenship: The Moral Psychology of The Social Contract -- Rousseau's negative liberty: Themes of domination and skepticism in The Social Contract -- Rousseau's Ancient Ends of Legislation: Liberty, Equality (& Fraternity) -- Property and Possession in Rousseau's Social Contract -- Political Equality Among Unequals -- On the Primacy (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  39
    The Laws of Robots: Crimes, Contracts, and Torts.Ugo Pagallo - 2013 - Dordrecht: Imprint: Springer.
    This book explores how the design, construction, and use of robotics technology may affect today's legal systems and, more particularly, matters of responsibility and agency in criminal law, contractual obligations, and torts. By distinguishing between the behaviour of robots as tools of human interaction, and robots as proper agents in the legal arena, jurists will have to address a new generation of "hard cases." General disagreement may concern immunity in criminal law (e.g., the employment of robot soldiers in battle), personal (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  35.  22
    Unique Ethical and Practical Considerations in the Use of Behavior Contracts for Families of Minors and Minoritized Populations in Pediatric Settings.Erin Talati Paquette, Lori Mendelsohn & Aleksandra E. Olszewski - 2023 - American Journal of Bioethics 23 (1):82-85.
    Fiester and Yuan discuss important ethical concerns regarding the use of behavior contracts in addressing conflict with patients and families labeled as “difficult” (Fiester and Yuan 2023). We agre...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  8
    Key n-Grams in EU Directives and in the UK National Legislation on Consumer Contracts.Patrizia Giampieri - 2023 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 37 (1):59-75.
    Key n-grams are useful in the analysis of legal discourse as they help bring recurrent key expressions to the fore and understand the patterning of legal language. This paper aims to generate, analyse and compare the key n-grams of two legal corpora: a corpus of European directives on distance consumer contracts and a UK national legislation corpus on the same subject-matter. The corpora are considered, alternatively, as both focus and reference corpora. In this way, keyness, i.e., the terminology that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  6
    Designing menus of contracts efficiently: The power of randomization.Matteo Castiglioni, Alberto Marchesi & Nicola Gatti - 2023 - Artificial Intelligence 318 (C):103881.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  6
    Infrastructural justice for responsible software engineering.Sarah Robinson, Jim Buckley, Luigina Ciolfi, Conor Linehan, Clare McInerney, Bashar Nuseibeh, John Twomey, Irum Rauf & John McCarthy - 2024 - Journal of Responsible Technology 19 (C):100087.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  15
    Compliance-aware engineering process plans: the case of space software engineering processes.Julieth Patricia Castellanos-Ardila, Barbara Gallina & Guido Governatori - 2021 - Artificial Intelligence and Law 29 (4):587-627.
    Safety-critical systems manufacturers have the duty of care, i.e., they should take correct steps while performing acts that could foreseeably harm others. Commonly, industry standards prescribe reasonable steps in their process requirements, which regulatory bodies trust. Manufacturers perform careful documentation of compliance with each requirement to show that they act under acceptable criteria. To facilitate this task, a safety-centered planning-time framework, called ACCEPT, has been proposed. Based on compliance-by-design, ACCEPT capabilities permit to design Compliance-aware Engineering Process Plans, which are able (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Integrative Social Contracts Theory.Thomas Donaldson - 1995 - Economics and Philosophy 11 (1):85-112.
    Difficult moral issues in economic life, such as evaluating the impact of hostile takeovers and plant relocations or determining the obligations of business to the environment, constitute the raison d'etre of business ethics. Yet, while the ultimate resolution of such issues clearly requires detailed, normative analysis, a shortcoming of business ethics is that to date it has failed to develop an adequate normative theory.1 The failing is especially acute when it results in an inability to provide a basis for fine-grained (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   70 citations  
  41.  20
    Integrative Social Contracts Theory.Thomas Donaldson & Thomas Dunfee - 1994 - Economics and Philosophy 10 (2):85-112.
    Difficult moral issues in economic life, such as evaluating the impact of hostile takeovers and plant relocations or determining the obligations of business to the environment, constitute the raison d'etre of business ethics. Yet, while the ultimate resolution of such issues clearly requires detailed, normative analysis, a shortcoming of business ethics is that to date it has failed to develop an adequate normative theory.1 The failing is especially acute when it results in an inability to provide a basis for fine-grained (...)
    Direct download  
     
    Export citation  
     
    Bookmark   57 citations  
  42. Application of Different Types of Employment Contracts in Lithuania – Related Heoretical and Practical Problems.Tomas Bagdanskis & Rasa Macijauskienė - 2012 - Jurisprudencija: Mokslo darbu žurnalas 19 (1):249-267.
    The article discusses theoretical and practical issues one may face when applying various types of employment contracts, refers to specific legal relations governed by Labour Code standards, and raises issues that would help to solve the existing troubles. Last decades as globalization processes were gaining pace, and market economy conditions changed, labour and production organization models were undergoing transformation. The more complex people’s social relationships are, the greater is the need to regulate these relationships, i. e. to adopt legislation (...)
     
    Export citation  
     
    Bookmark  
  43.  86
    Business Ethics and Extant Social Contracts.Thomas W. Dunfee - 1991 - Business Ethics Quarterly 1 (1):23-51.
    Extant social contracts, deriving from communities of individuals, constitute a significant source of ethical norms in business. When found consistent with general ethical theories through the application of a filtering test, these real social contracts generate prima facie duties of compliance on the part of those who expressly or impliedly consent to the terms of the social contract, and also on the part of those who take advantage of the instrumental value of the social contracts. Businesspeople typically (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   72 citations  
  44.  39
    Bare statistical evidence and the legitimacy of software-based judicial decisions.Eva Schmidt, Maximilian Köhl & Andreas Sesing-Wagenpfeil - 2023 - Synthese 201 (4):1-27.
    Can the evidence provided by software systems meet the standard of proof for civil or criminal cases, and is it individualized evidence? Or, to the contrary, do software systems exclusively provide bare statistical evidence? In this paper, we argue that there are cases in which evidence in the form of probabilities computed by software systems is not bare statistical evidence, and is thus able to meet the standard of proof. First, based on the case of State v. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45. The mind as the software of the brain.Ned Block - 1990 - In Daniel N. Osherson & Edward E. Smith (eds.), An Invitation to Cognitive Science: Visual cognition. 2. MIT Press. pp. 377-425.
    In this section, we will start with an influential attempt to define `intelligence', and then we will move to a consideration of how human intelligence is to be investigated on the machine model. The last part of the section will discuss the relation between the mental and the biological.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   61 citations  
  46.  8
    The lattice of envy-free many-to-many matchings with contracts.Agustin G. Bonifacio, Nadia Guiñazú, Noelia Juarez, Pablo Neme & Jorge Oviedo - 2023 - Theory and Decision 96 (1):113-134.
    We study envy-free allocations in a many-to-many matching model with contracts in which agents on one side of the market (doctors) are endowed with substitutable choice functions and agents on the other side of the market (hospitals) are endowed with responsive preferences. Envy-freeness is a weakening of stability that allows blocking contracts involving a hospital with a vacant position and a doctor that does not envy any of the doctors that the hospital currently employs. We show that the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  56
    A critique of the empirical methods of integrative social contracts theory.Bryan W. Husted - 1999 - Journal of Business Ethics 20 (3):227 - 235.
    Integrative social contracts theory (ISCT) uses empirical methods to develop guidelines for international business ethics. This article criticizes ISCT in terms of the way people actually think about contracts and agreements around the globe. Differences in orientations to communications context, moral reasoning, and institutional and structural conditions make the identification of authentic norms, hypernorms, and relevant communities problematic. The difficulties of the empirical methods suggest recourse to more traditional theoretical approaches for the identification of hypernorms as well as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   28 citations  
  48.  12
    The material consequences of “chipification”: The case of software-embedded cars.M. C. Forelle - 2022 - Big Data and Society 9 (1).
    Today's modern car is an assemblage of mechanical and digital components, of metal panels that comprise its structure and silicon chips that run its functions. Communication and information studies scholars have interrogated the problematic aspects of the programs that run those functions, revealing serious issues surrounding privacy and security, worker surveillance, and racial, gendered, and class-based bias. This article contributes to that work by taking a step back and asking about the issues inherent not in the software running on (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  34
    How can we act morally in a merger process? A stimulation based on implicit contracts.Olaf Karitzki & Alexander Brink - 2003 - Journal of Business Ethics 43 (1-2):137 - 152.
    The intention of the article is to offer stakeholders affected by mergers a criterion from which moral arguments may be generated for the organization of each individual case. The criterion: "Any operation causing legitimate interests to suffer vital infringement should be avoided in a merger process." A vital infringement of these interests is assumed when the merger undermines unique positive opportunities or considerable impairment in the future, impossible to overcome for the person affected without an unacceptable level of difficulty. Therefore, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  50.  17
    Realtime polymorphic malicious behavior detection in blockchain-based smart contracts.Darius Galiş, Ciprian Pungilǎ & Viorel Negru - 2024 - Logic Journal of the IGPL 32 (2):210-223.
    This paper proposes an innovative approach to achieving real-time polymorphic behavior detection, and its direct application to blockchain-focused smart-contracts. We devise a method based on a non-deterministic finite state machine to perform approximate pattern-matching, using a look-ahead mechanism implemented through a concept similar to that of a sliding window, and using threshold-based similarity checking at every state in the automaton. We introduce and formalize our approach, discuss the challenges we faced and then test it in a real-world environment. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 993