Till Winkler (Author)
Sarah Spiekermann (Author)
Information systems (IS) play an increasing role for individual well-being, for the environment, and for society at large. Considering sustainability in IS development is therefore becoming paramount. However, companies today associate sustainability with extra cost and burden on their operations. As a result, many view sustainability more as a demand and a challenge rather than an opportunity. In this article, we argue that companies should rethink this attitude, as both sustainability and a business model can be understood as deeply rooted in human values. [Peer reviewed]
...MoreArticle Jeremy Pitt; Katina Michael; Terri Bookman (September 2019) ISTAS 2018: Technology, Ethics, and Policy [Special Issue Introduction]. IEEE Technology and Society Magazine (pp. 21-23).
Article
Kira Lussier;
(March 2018)
From the Intuitive Human to the Intuitive Computer
(/isis/citation/CBB266223107/)
Article
Ilse Verdiesen;
Filippo Santoni de Sio;
Virginia Dignum;
(2019)
Moral Values Related to Autonomous Weapon Systems: An Empirical Survey that Reveals Common Ground for the Ethical Debate
(/isis/citation/CBB025394666/)
Book
Ana Muñiz;
(2022)
Borderland Circuitry: Immigration Surveillance in the United States and Beyond
(/isis/citation/CBB304288480/)
Article
Ibo van de Poel;
Behnam Taebi;
(May 2022)
Value Change in Energy Systems
(/isis/citation/CBB234591523/)
Article
Katie Shilton;
(March 2018)
Engaging Values Despite Neutrality: Challenges and Approaches to Values Reflection during the Design of Internet Infrastructure
(/isis/citation/CBB184768397/)
Article
Irene A. Niet;
Romy Dekker;
Rinie van Est;
(May 2022)
Seeking Public Values of Digital Energy Platforms
(/isis/citation/CBB740629226/)
Article
Yoshiyasu Takefuji;
(March 2018)
Connected Vehicle Security Vulnerabilities
(/isis/citation/CBB280716653/)
Book
Geoff White;
(2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
(/isis/citation/CBB227937681/)
Article
O. M. Bonastre;
A. Veà;
(2019)
Origins of the Domain Name System
(/isis/citation/CBB653105189/)
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
(/isis/citation/CBB503279988/)
Article
Siddique Latif;
Adnan Qayyum;
Muhammad Usama;
Junaid Qadir;
Andrej Zwitter;
Muhammad Shahzad;
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development
(/isis/citation/CBB326485886/)
Article
Kjetil Rommetveit;
Niels van Dijk;
Kristrún Gunnarsdóttir;
(2020)
Make Way for the Robots! Human- and Machine-Centricity in Constituting a European Public–Private Partnership
(/isis/citation/CBB767588766/)
Article
Eugene H. Spafford;
(Summer 2007)
Voter Assurance
(/isis/citation/CBB265646858/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Book
Tom Wheeler;
(2019)
From Gutenberg to Google: the history of our future
(/isis/citation/CBB532085374/)
Article
Jones, Anita K.;
Wulff, William A;
(Spring 2002)
Cybersecurity
(/isis/citation/CBB367643580/)
Article
Roesner, Franziska;
(Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering
(/isis/citation/CBB605988846/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB486585682/)
Article
Martin, C. Dianne;
(Fall 2019)
EES Perspective -- When White Hats Wear Black Hats: The Ethics of Cybersecurity
(/isis/citation/CBB621975262/)
Article
Rebecca Slayton;
Brian Clarke;
(January 2020)
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005
(/isis/citation/CBB421929386/)
Be the first to comment!