Order:
  1.  62
    On the meaning of free software.M. J. Wolf, K. W. Miller & F. S. Grodzinsky - 2009 - Ethics and Information Technology 11 (4):279-286.
    To many who develop and use free software, the GNU General Public License represents an embodiment of the meaning of free software. In this paper we examine the definition and meaning of free software in the context of three events surrounding the GNU General Public License. We use a case involving the GPU software project to establish the importance of Freedom 0 in the meaning of free software. We analyze version 3 of the GNU General Public License and conclude that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  2.  24
    The ties that bind: connections, comet cursors, and consent.D. G. Johnson & K. W. Miller - 2001 - Acm Sigcas Computers and Society 31 (1):12-16.
    Electronic communication and commerce facilitate the collection of information about individual use of the Internet. Focusing on the case of Comet Systems Inc. and its data gathering practices, this paper explores the technical details of gathering personal information in databases in general and the special character of the privacy issue raised by 'anonymous' information about individual behavior on the Internet. The case analysis suggests new insights for our understanding of privacy and frames a discussion of policy alternatives with respect to (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  3.  88
    Developing artificial agents worthy of trust: “Would you buy a used car from this artificial agent?”. [REVIEW]F. S. Grodzinsky, K. W. Miller & M. J. Wolf - 2011 - Ethics and Information Technology 13 (1):17-27.
    There is a growing literature on the concept of e-trust and on the feasibility and advisability of “trusting” artificial agents. In this paper we present an object-oriented model for thinking about trust in both face-to-face and digitally mediated environments. We review important recent contributions to this literature regarding e-trust in conjunction with presenting our model. We identify three important types of trust interactions and examine trust from the perspective of a software developer. Too often, the primary focus of research in (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   17 citations