Linked bibliography for the SEP article "Information Technology and Moral Values" by John Sullins
This is an automatically generated and experimental page
If everything goes well, this page should display the bibliography of the aforementioned article as it appears in the Stanford Encyclopedia of Philosophy, but with links added to PhilPapers records and Google Scholar for your convenience. Some bibliographies are not going to be represented correctly or fully up to date. In general, bibliographies of recent works are going to be much better linked than bibliographies of primary literature and older works. Entries with PhilPapers records have links on their titles. A green link indicates that the item is available online at least partially.
This experiment has been authorized by the editors of the Stanford Encyclopedia of Philosophy. The original article and bibliography can be found here.
- Adam, A., 2002, “Cyberstalking and Internet pornography: Gender and the gaze,” Ethics and Information Technology, 4(2): 133–142. (Scholar)
- –––, 2008, “Ethics for things,” Ethics and Information technology, 10(2–3): 149–154. (Scholar)
- American Academy of Pediatrics, 2018, “Tips from the
American Academy of Pediatrics to Help Families Manage the Ever
Changing Digital Landscape,” May 1,
available online. (Scholar)
- Anderson, M. and S. L. Anderson (eds.), 2011, Machine Ethics, Cambridge: Cambridge University Press. (Scholar)
- Arkin, R., 2009, Governing Lethal Behavior in Autonomous Robots, New York: Chapman and Hall/CRC. (Scholar)
- Arquilla, J., 2010, “Conflict, Security and Computer
Ethics,” in Floridi 2010a. (Scholar)
- Asaro, P., 2008. “How Just Could a Robot War Be?” in Philip Brey, Adam Briggle and Katinka Waelbers (eds.), Current Issues in Computing And Philosophy, Amsterdam, The Netherlands: IOS Press, pp. 50–64. (Scholar)
- –––, 2009. “Modeling the Moral User:
Designing Ethical Interfaces for Tele-Operation,” IEEE
Technology & Society, 28(1): 20–24. (Scholar)
- Au-Yeung A., 2018. “Why Investors Remain Bullish On Facebook
in Day Two Of Zuckerberg’s Congressional
Hearnings,”Forbes, April 11,
available online. (Scholar)
- Aycock, J. and J. Sullins, 2010, “Ethical Proactive Threat
Research,” Workshop on Ethics in Computer Security Research
(LNCS 6054), New York: Springer, pp. 231–239. (Scholar)
- Bartell, C., 2011, “Resolving the gamer’s dilemma,”
Ethics and Information Technology, 14(1):11–16. (Scholar)
- Baase, S., 2008, A Gift of Fire: Social, Legal, and Ethical
Issues for Computing and the Internet, Englewood Cliffs, NJ:
Prentice Hall. (Scholar)
- BBC, 2014, “Computer AI passes Turing test in ‘world
first’,” BBC Technology
[available online] (Scholar)
- Bedau, M., 2004, “Artificial Life,” in Floridi 2004. (Scholar)
- Bedau, M. and E. Parke (eds.), 2009, The Ethics of Protocells:
Moral and Social Implications of Creating Life in the Laboratory,
Cambridge: MIT Press. (Scholar)
- Bedau, M. and M. Traint, 2009, “Social and Ethical
Implications of Creating Artificial Cells,” in Bedau and Parke
2009. (Scholar)
- Bostrom, N., 2008, “Why I Want to be a Posthuman When I Grow Up,” in Medical Enhancement and Posthumanity, G. Gordijn and R. Chadwick (eds), Berlin: Springer, pp. 107–137. (Scholar)
- Brey, P., 2008, “Virtual Reality and Computer Simulation,” in Himma and Tavanni 2008 (Scholar)
- –––, 2010, “Values in Technology and
Disclosive Computer Ethics,” in Floridi 2010a. (Scholar)
- Bunge, M. 1977, “Towards a Technoethics,” The Monist, 60(1): 96–107. (Scholar)
- Bynum, T., 2000, “Ethics and the Information
Revolution,” Ethics in the Age of Information
Technology, pp. 32–55, Linköping, Sweden: Center for
Applied Ethics at Linköping University. (Scholar)
- –––, 2008, “Norbert Wiener and the Rise of Information Ethics,” in van den Hoven and Weckert 2008. (Scholar)
- Capurro, R., Nagenborg, M., 2009, Ethics and Robotics, [CITY]: IOS Press (Scholar)
- Christakis, D. A., 2009, “The effects of infant media usage:
what do we know and what should we learn?” Acta
Pædiatrica, 98 (1): 8–16. (Scholar)
- Cisco Systems, Inc., 2018, Cisco 2018 Annual Security Report:
Small and Mighty: How Small and Midmarket Businesses Can Fortify Their
Defenses Against Today’s Threats, San Jose, CA: Cisco Systems
Inc.
[available online] (Scholar)
- Coeckelbergh, M., 2007, “Violent Computer Games, Empathy, and Cosmopolitanism,” Ethics and Information Technology, 9(3): 219–231 (Scholar)
- Cohen, D. D., C. Voss, M. J. D. Taylor, A. Delextrat, A. A.
Ogunleye, and G. R. H. Sandercock, 2011, “Ten-year secular
changes in muscular fitness in English children,” Acta
Paediatrica, 100(10): e175–e177. (Scholar)
- Danielson, P., 1998, Modeling Rationality, Morality, and Evolution, Oxford: Oxford University Press. (Scholar)
- Dabringer, G., (ed.) 2010, Ethica Themen: Ethical and Legal
Aspects of Unmanned Systems, Interviews, Vienna, Austria:
Austrian Ministry of Defence and Sports.
[available online] (Scholar)
- Denning, D., 2008, “The Ethics of Cyber Conflict,” In
Himma and Tavanni 2008. (Scholar)
- Dodig-Crnkovic, G., Hofkirchner, W., 2011, “Floridi’s
‘Open Problems in Philosophy of Information’, Ten Years
Later,” Information, (2): 327–359.
[available online] (Scholar)
- Edgar, S.L., 2003, Morality and Machines, Sudbury
Massachusetts: Jones and Bartlett. (Scholar)
- Epstein, R., 2007, “The Impact of Computer Security Concerns
on Software Development,” in Himma 2007a, pp.
171–202. (Scholar)
- Epstein, L.S. 1980. “Decision-making and the temporal
resolution of uncertainty”. International Economic
Review 21 (2): 269–283. (Scholar)
- Ess, C., 2009, Digital Media Ethics, Massachusetts:
Polity Press. (Scholar)
- Facebook, Inc., 2012, Form S-1: Registration Statement,
filed with the United States Securities and Exchange Commission,
Washington, DC,
available online. (Scholar)
- Floridi, L., 1999, “Information Ethics: On the Theoretical Foundations of Computer Ethics”, Ethics and Information Technology, 1(1): 37–56. (Scholar)
- –––, 2002, “What is the Philosophy of Information?” in Metaphilosophy, 33(1/2): 123–145. (Scholar)
- –––, 2003, “On the Intrinsic Value of Information Objects and the Infosphere,” Ethics and Information Technology, 4(4): 287–304. (Scholar)
- –––, 2004, The Blackwell Guide to the Philosophy of Computing and Information, Blackwell Publishing. (Scholar)
- ––– (ed.), 2010a, The Cambridge Handbook of Information and Computer Ethics, Cambridge: Cambridge University Press. (Scholar)
- –––, 2010b, Information: A Very Short Introduction, Oxford: Oxford University Press. (Scholar)
- –––, 2011a, “Enveloping the World for AI,” The Philosopher’s Magazine, 54: 20–21 (Scholar)
- –––, 2011b, The Philosophy of Information, Oxford: Oxford University Press. (Scholar)
- –––, 2016, “Should We be Afraid of
AI?”, Neigel Warburton (ed.), Aeon,
09 May 2016,
available online. (Scholar)
- Floridi, L. and J. W. Sanders, 1999, “Entropy as Evil in
Information Ethics,” Etica & Politica, special
issue on Computer Ethics, I(2).
[available online] (Scholar)
- –––, 2001, “Artificial evil and the foundation of computer ethics,” in Ethics and Information Technology, 3(1): 55–66. doi:10.1023/a:1011440125207 (Scholar)
- –––, 2004, “On the Morality of Artificial Agents,” in Minds and Machines, 14(3): 349–379 [available online] (Scholar)
- Furguson, C. J., 2007, “The Good The Bad and the Ugly: A
Meta-analytic Review of Positive and Negative Effects of Violent Video
Games,” Psychiatric Quarterly, 78(4):
309–316. (Scholar)
- Gelernter, D., 2007, “Artificial Intelligence Is Lost in the
Woods,” Technology Review, July/August, pp.
62–70.
[available online] (Scholar)
- Gibba, G. D., J. R. Baileya, T. T. Lambirtha, and W. Wilsona,
1983, “Personality Differences Between High and Low Electronic
Video Game Users,” The Journal of Psychology, 114(2):
159–165. (Scholar)
- Grim, P., 2004, “Computational Modeling as a Philosophical Methodology,” In Floridi 2004. (Scholar)
- Grim, P., G. Mar, and P. St. Denis, 1998, The Philosophical Computer: Exploratory Essays in Philosophical Computer Modeling, MIT Press. (Scholar)
- Grodzinsky, F. S. and H. T. Tavani, 2002, “Ethical Reflections on Cyberstalking,” Computers and Society, 32(1): 22–32. (Scholar)
- Hansen, R. and J. Grossman, 2008, “Clickjacking,”
SecTheory: Internet Security.
[available online] (Scholar)
- Hickman, L. A. 1990, John Dewey’s Pragmatic Technology,
Bloomington, Indiana: Indiana University Press. (Scholar)
- Himma, K. E. (ed.), 2007a, Internet Security, Hacking,
Counterhacking, and Society, Sudbury Massachusetts: Jones and
Bartlett Publishers. (Scholar)
- Himma, K. E., 2007b, “Hacking as Politically Motivated
Digital Civil Disobedience: Is Hacktivisim Morally Justified?”
In Himma 2007a, pp. 73–98. (Scholar)
- Himma, K. E., and H. T. Tavanni (eds.), 2008, The Handbook of Information and Computer Ethics, Wiley-Interscience; 1st edition (Scholar)
- Hongladarom, S., 2008, “Privacy, Contingency, Identity and
the Group,”Handbook of Research on Technoethics. Vol.
II, R. Luppicini and Rebecca Adell Eds. Hershey, PA: IGI Global,
pp. 496–511. (Scholar)
- IEEE 2018, “Ethically Aligned Design: The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems”,
IEEE
[available online ] (Scholar)
- Ivory, J. D., 2006, “Still a Man’s Game: Gender
Representation in Online Reviews of Video Games,” Mass
Communication and Society, 9(1): 103–114. (Scholar)
- Johansson, M., 2009, “Why unreal punishments in response to unreal crimes might actually be a really good thing,” Ethics and Information Technology, 11(1): 71–79 (Scholar)
- Johnson, D.G., 1985, Computer Ethics, Englewood Cliffs, New Jersey: Prentice Hall. (2nd ed., 1994; 3rd ed., 2001; 4th ed., 2009). (Scholar)
- Johnson D. G., and T. Powers, 2008, “Computers and Surrogate Agents,” In van den Hoven and Weckert 2008. (Scholar)
- Jones, T., 2011, “Techno-toddlers: A is for Apple,”
The Guardian, Friday November 18.
[available online ] (Scholar)
- Kaspersky Lab, 2017, Kaspersky Security Bulletin: KASPERSKY LAB THREAT PREDICTIONS FOR 2018,Moscow, Russia: Kaspersky Lab ZAO.
[available online] (Scholar)
- Keen, A., 2011, “Your Life Torn Open, Essay 1: Sharing is a
trap,” Wired, 03 Feb 2011,
available online. (Scholar)
- Kurzweil, R., 2006, The Singularity is Near, New York: Penguin Press. (Scholar)
- Langton, C. G., (ed.), 1989, Artificial Life: the Proceedings
of an Interdisciplinary Workshop on the Synthesis and Simulation of
Living Systems, Redwood City: Addison-Wesley. (Scholar)
- Ledin G., 2005, “Not Teaching Viruses and Worms is
Harmful” Communications of the ACM , 48(1): 144. (Scholar)
- Lessig, L., 1999, Code and Other Values of Cyberspace,
New York: Basic Books. (Scholar)
- Levy, S., 1984, Hackers: Heroes of the Computer
Revolution, New York: Anchor Press. (Scholar)
- Lin P., 2010, “Ethical Blowback from Emerging Technologies”, Journal of Military Ethics, 9(4): 313–331. (Scholar)
- Lin, P., K. Abney, and R. Jenkins, 2017, Robot Ethics 2.0: From Autonomous Cars to Artificial Intelligence, Oxford: Oxford University Press. (Scholar)
- Lin, P., K. Abney, and G. Bekey, 2012, Robot Ethics: The Ethical and Social Implications of Robotics, Cambridge, MA: MIT Press. (Scholar)
- –––2013, “Ethics, War, and Robots”,
Ethics and Emerging Technologies,
London: Palgrave–Macmillan. (Scholar)
- Lin, P., G. Bekey, and K. Abney, 2008, Autonomous Military Robotics: Risk, Ethics, and Design, Washington, DC: U.S. Department of the Navy, Office of Naval Research. [available online] (Scholar)
- Lovely, E., 2010, “Cyberattacks explode in Congress,”
Politico, March 5, 2010.
[available online] (Scholar)
- Lü, Yao-Hui, 2005, “Privacy and Data Privacy Issues in
Contemporary China,” Ethics and Information Technology,
7(1): 7–15 (Scholar)
- Ludlow, P. and M. Wallace, 2007, The Second Life Herald: The
Virtual Tabloid that Witnessed the Dawn of the Metaverse,
Cambridge, MA: MIT Press. (Scholar)
- Luck, M., 2009, “The gamer’s dilemma: An analysis of the
arguments for the moral distinction between virtual murder and virtual
paedophilia,” Ethics and Information Technology, 11(1):
31–36. (Scholar)
- Luppicini, R. and R. Adell (eds.), 2009, Handbook of Research
on Technoethics, Idea Group Inc. (IGI). (Scholar)
- Magnani, L., 2007, Morality in a Technological World: Knowledge as Duty, Cambridge, Cambridge University Press. (Scholar)
- Mason, R. O., 1986, Four ethical issues of the information age. MIS Quarterly, 10(1): 5–12. (Scholar)
- Markoff, J., 2005, What the Dormouse Said: How the 60s
Counterculture Shaped the Personal Computer Industry, New York:
Penguin. (Scholar)
- Manion, M. and A. Goodrum, 2007, “Terrorism or Civil
Disobedience: Toward a Hacktivist Ethic,” in Himma 2007a, pp.
49–59. (Scholar)
- McAfee, 2018, Economic Impact of Cybercrime: No Slowing Down, Report [available online]
(Scholar)
- McMahon, J. M. and R. Cohen, 2009, “Lost in cyberspace: ethical decision making in the online environment,” Ethics and Information technology, 11(1): 1–17. (Scholar)
- Midgley, M., 1992, Science as Salvation: a modern myth and its meaning, London: Routledge. (Scholar)
- Moor, J. H., 1985, “What is Computer Ethics?” Metaphilosophy, 16(4): 266–275. (Scholar)
- –––, 2005, “Why We Need Better Ethics for Emerging Technologies,” Ethics and Information Technology, 7(3): 111–119. Reprinted in van den Hoven and Weckert 2008, pp. 26–39. (Scholar)
- Moore, Gordon E. 1965. “Cramming more components onto
integrated circuits”. Electronics, 38(8):
114–117.
[available online]
(Scholar)
- Neumann, P. G., 2004, “Computer security and human
values,” Computer Ethics and Professional
Responsibility, Malden, MA: Blackwell (Scholar)
- Nissenbaum, H., 1997. “Toward an Approach to Privacy in Public: Challenges of Information Technology,” Ethics and Behavior, 7(3): 207–219. [available online] (Scholar)
- –––, 1998. “Values in the Design of
Computer Systems,” Computers and Society, March: pp.
38–39.
[available online]
(Scholar)
- –––, 1999, “The Meaning of Anonymity in an
Information Age,” The Information Society, 15:
141–144. (Scholar)
- –––, 2009, Privacy in Context: Technology,
Policy, and the Integrity of Social Life, Stanford Law Books:
Stanford University Press. (Scholar)
- Northcutt, S. and C. Madden, 2004, IT Ethics Handbook: Right
and Wrong for IT Professionals, Syngress. (Scholar)
- O’Neil, O., 2002, “Trust is the first casualty of the cult
of transparency,” The Telegraph, 24 April,
available online. (Scholar)
- O’Reilly, T., 2007 [2005], “What is Web 2.0: Design Patterns
and Business Models for the Next Generation of Software,”
Communications & Strategies, 65(1): 17–37;
available online.
[The earlier, 2005 version, is linked into the Other Internet
Resources section below.] (Scholar)
- Parrish, J., 2010, “PAPA knows best: Principles for the ethical sharing of information on social networking sites,” Ethics and Information Technology, 12(2): 187–193. (Scholar)
- Pettit, P., 2009, “Trust, Reliance, and the Internet,” In van den Hoven and Weckert 2008. (Scholar)
- Plaw, A. 2013, “Counting the Dead: The Proportionality of Predation in Pakistan,” In Strawser 2013. (Scholar)
- Planned Parenthood, 2017, “New Study Shows Virtual Reality
Can Move People’s Views on Abortion and Clinic Harassment,”
[available online] (Scholar)
- Plato, “Phaederus,” in Plato: The Collected
Dialogues, E. Hamilton and H. Cairns (eds.), Princeton: Princeton
University Press, pp. 475–525. (Scholar)
- Poushter J., 2016, “Smartphone Ownership and Internet Usage Continues to Climb in Emerging Economies: But advanced economies still have higher rates of technology use,” Pew Research Center, 22 February 2018
[available online] (Scholar)
- Powers, T., 2011, “Prospects for a Kantian Machine,”
in Anderson and Anderson 2011. (Scholar)
- Purcell, M., 2008, “Pernicious virtual communities:
Identity, polarisation and the Web 2.0,” Ethics and
Information Technology, 10(1): 41–56. (Scholar)
- Reynolds, G., 2009, Ethics in Information Technology,
(3rd ed.), Course Technology. (Scholar)
- Russell, S. and P. Norvig, 2010, Artificial Intelligence: A
Modern Approach, (3rd ed.), Massachusetts: Prentice
Hall. (Scholar)
- Schmidt, C. T. A., 2007, “Children, Robots and… the Parental Role,” 17(3): 273–286. (Scholar)
- Schulzke, M., 2010, “Defending the Morality of Violent Video Games,” Ethics and Information Technology, 12(2): 127–138. (Scholar)
- Searle, J., 1980, “Minds, Brains, and Programs,” Behavioral and Brain Sciences, 3: 417–57. (Scholar)
- Shannon, C.E., 1948, “A Mathematical Theory of Communication”, Bell System Technical Journal, 27(July, October): 379–423, 623–656. [available online] (Scholar)
- Shannon, C. E. and W. Weaver, 1949, The Mathematical Theory of Communication, University of Illinois Press. (Scholar)
- Sharkey, N.E. 2011, “The automation and proliferation of
military drones and the protection of civilians,” Journal of
Law, Innovation and Technology, 3(2): 229–240. (Scholar)
- Singer, P. W., 2009, Wired for War:The Robotics Revolution and
Conflict in the 21st Century, Penguin (Non-Classics);
Reprint edition. (Scholar)
- Siraj-Blatchford, J., 2010, “Analysis: ‘Computers
Benefit Children’,” Nursery World, October 6.
[available online] (Scholar)
- Soukup, C., 2007, “Mastering the Game: Gender and the
Entelechial Motivational System of Video Games,” Women’s
Studies in Communication, 30(2): 157–178. (Scholar)
- Søraker, Johnny Hartz, 2012, “How Shall I Compare Thee? Comparing the Prudential Value of Actual Virtual Friendship,” Ethics and Information technology, 14(3): 209–219. doi:10.1007/s10676-012-9294-x [available online] (Scholar)
- Spafford, E.H., 1992, “Are computer hacker break-ins
ethical?” Journal of Systems and Software
17(1):41–47. (Scholar)
- –––, 2007, “Are Computer Hacker Break-ins
Ethical?” in Himma 2007a, pp. 49–59. (Scholar)
- Spinello, R. A., 2001, Cyberethics, Sudbury, MA: Jones
and Bartlett Publishers. (2nd ed., 2003; 3rd ed., 2006;
4th ed., 2010). (Scholar)
- –––, 2002, Case Studies in Information
Technology Ethics, Prentice Hall. (2nd ed.). (Scholar)
- Sprenger P., 1999, “Sun on Privacy: ‘Get Over It’,”
Wired, January 26, 1999.
[available online]
(Scholar)
- Statista, 2018, “Number of social media users worldwide from
2010 to 2021 (in billions)”,
[available online]. (Scholar)
- Strawser, B.J., 2013, Killing by Remorte Control: The Ethics of an Unmanned Military, Oxford: Oxford University Press. (Scholar)
- Sullins, J. P., 2000, “Transcending the meat: immersive
technologies and computer mediated bodies,” Journal of
Experimental and Theoretical Artificial Intelligence, 12(1):
13–22. (Scholar)
- –––, 2005, “Ethics and Artificial life: From Modeling to Moral Agents,” Ethics and Information technology, 7(3): 139–148. [available online] (Scholar)
- –––, 2006, “When Is a Robot a Moral Agent?” International Review of Information Ethics, 6(12): 23–30. [available online] (Scholar)
- –––, 2009a, “Artificial Moral Agency in
Technoethics,” in Luppicini and Adell 2009. (Scholar)
- –––, 2009b, “Telerobotic weapons systems
and the ethical conduct of war,” APA Newsletter on
Philosophy and Computers, P. Boltuc (ed.) 8(2): 21. (Scholar)
- –––, 2010, “Rights and Computer
Ethics,” in Floridi 2010a. (Scholar)
- –––, forthcoming, “Deception and Virtue in
Robotic and Cyber Warfare,” Presentation for the Workshop on The
Ethics of Informational Warfare, at University of Hertfordhire, UK,
July 1–2 2011 (Scholar)
- Symantec, 2018, Internet Security Threat Report (ISTR), Symantec Security Response, [available online]
- Tavani, H. T., 2007, “The Conceptual and Moral Landscape of
Computer Security,” in Himma 2007a, pp. 29–45. (Scholar)
- –––, 2010, Ethics and Technology:
Controversies, Questions, and Strategies for Ethical Computing,
(3rd ed.), Wiley. (Scholar)
- Tavani, H. and J. Moor, 2004, “Privacy Protection, Control
of Information, and Privacy-Enhancing Technologies,” in
Readings in Cyberethics, second edition, Spinello, R. and
Tavani, H. (eds.), Sudsbury: Jones and Bartlett. (Scholar)
- Taylor, N., J. Jensona, and S. de Castellb, 2009.
“Cheerleaders/booth babes/ Halo hoes: pro-gaming, gender and
jobs for the boys,” Digital Creativity, 20(4):
239–252. (Scholar)
- Turing, A. M., 1948, “Machine Intelligence”, in B.
Jack Copeland, The Essential Turing: The ideas that gave birth to
the computer age, Oxford: Oxford University Press. (Scholar)
- –––, 1950, “Computing Machinery and Intelligence”, Mind, 59(236): 433–460. doi:10.1093/mind/lix.236.433 (Scholar)
- Vallor, S., 2010, “Social Networking Technology and the Virtues,” Ethics and Information Technology, 12(2, Jan. 6): 157–170. (Scholar)
- –––, 2011, “Flourishing on Facebook: Virtue Friendship and New Social Media,” Ethics and Information technology, 1388–1957, pp. 1–15, Netherlands: Springer. (Scholar)
- –––, 2016, Technology and the Virtues: A Philosophical Guide to a Future worth Wanting, Oxford: Oxford University Press. (Scholar)
- Van den Hoven, J. and J. Weckert (eds), 2008, Information Technology and Moral Philosophy, Cambridge: Cambridge University Press. (Scholar)
- Von Neumann, J., 1966, Theory of Self Reproducing
Automata, edited and completed by A. Burks, Urbana-Champaign:
University of Illinois Press. (Scholar)
- Wallach, W., 2011. From Robots to Techno Sapiens: Ethics, Law and
Public Policy in the Development of Robotics and Neurotechnologies,
Law, Innovation and Technology, 3(2): 185–207. (Scholar)
- Wallach, W. and C. Allen, 2010, Moral Machines: Teaching Robots Right from Wrong, Oxford: Oxford University Press. (Scholar)
- Warschauer, M., 2003, Technology and Social Inclusion:
Rethinking the Digital Divide, Cambridge: MIT Press. (Scholar)
- Weckert, John, 2007, “Giving and Taking Offence in a Global
Context,” International Journal of Technology and Human
Interaction, 3(3): 25–35. (Scholar)
- Westin, A., 1967, Privacy and Freedom, New York:
Atheneum. (Scholar)
- Wiener, N., 1950,The Human Use of Human Beings, Cambridge, MA: The Riverside Press (Houghton Mifflin Co.). (Scholar)
- –––, 1961, Cybernetics: Or Control and Communication in the Animal and the Machine, 2nd revised ed., Cambridge: MIT Press. First edition, 1948. (Scholar)
- Woodbury, M. C., 2010, Computer and Information Ethics,
2nd edition; 1st edition, 2003, Champaign, IL:
Stipes Publishing LLC. (Scholar)