next up previous
Next: About this document ... Up: Entropy as Evil in Previous: Conclusion

Bibliography

 
1
S. Baase. A Gift of Fire: Social, Legal and Ethical Issues in Computing. Prentice-Hall, 1997.
2
T. W. Bynum and J. H. Moor, editors. The Digital Phoenix: How Computers are Changing Philosophy. Blackwell, 1998.
3
B. A. Davey and H. A. Priestley. Introduction to Lattices and Order. Cambridge University Press, 1990.
4
E. W. Dijkstra. How do we tell truths that might hurt? EWD498, 1975. In Selected Writings on Computing: A Personal Perspective. Springer Verlag, 1982, 129-131.
5
L. Floridi. Information Ethics: On the philosophical foundation of computer ethics. Ethics and Information Technology, 1:37-56, 1999.
6
L. Floridi. Does information have a moral worth in itself? In Computer Ethics: Philosophical Enquiry (CEPE 98), edited by Lucas D. Introna, University of London Press, London, forthcoming.
7
L. Floridi and J. W. Sanders. Artificial evil. In preparation.
8
C. A. R. Hoare. An axiomatic basis for computer programming. Communications of the ACM, 576-583, October 1969.
9
D. R. Hofstadter and D. C. Dennett. The Mind's I. Penguin Books Ltd., Marmondsworth Middlesex, 1981.
10
Cliff B. Jones. Systematic Software Development Using VDM. Prentice-Hall International, 1986.
11
T. M. Mitchell. Machine Learning. McGraw Hill, 1997.
12
R. Motwani and P. Raghavan. Randomized Algorithms. Cambridge University Press, 1995.
13
The Risks Digest, http://catless.ncl.ac.uk/Risks, the forum on risks to the public in computers and related systems organised by the ACM Committee on Computers and Public Policy.
14
J. R. Searle. Minds, brains and programs. Behavioural and Brain Sciences, 3:417-424, 1980. (Also chapter 22 in [9].)
15
E. Steinhart. Digital metaphysics. In [2], 117-134.
16
J. C. P. Woodcock and J. Davies. Using Z: Specification, refinement and proof. Prentice-Hall International, 1996.

L. L. Floridi and J. W. Sanders
1999-12-09