[1] Belohlav, Jim, Drehmer, David, Raho, Louis ,(1997),”Ethical Issues of Expert Systems”, Online
[2] Journal of Ethics, vol. 1, no. 1
Bynum , Terrell ,(2001), “Computer Ethics: Basic Concepts and Historical Overview”, Stanford Encyclopedia of Philosophy , http://plato.stanford.edu/entries/ethics-computer/
Crnkovic ,Gordana D., (2006), “Professional Ethics in Computing and Intelligent Systems”, M/Cyclopedia of New Media, http://www.stes.fi/scai2006/proceedings/011-016.pdf.
DeRoos, J.Barry, (2003),“Ethics in computer science”, http://hom e.messiah.edu /~deroos /personal /copy .htm
Khalil, Omar E. M., (1993), “Artificial Decision-Making and Artificial Ethics: A Management Concern”, Journal of business ethics, vol. 12, no. 4 , 313-321.
Lawler, James, Molluzzo, John C., (2005), “A study of data mining and information ethics in the development of information systems professionals”, proceedings of student/faculty research day, CSIS, PaceUniversity.
[3] McCarthy, John, (2007), “Applications of AI”, http://www-formal. stanford. Edu /jmc/ whatisai/ node2 .html
McCarthy, R. L. and Perrolle, j. A. , )1990(, “Ethics and the Computerization of Pharmacy”, Proceedings of the Conference on Computers and the Quality of Life (The GeorgeWashingtonUniversity, Washington, DC), 157-163.
Mereditha , Rob & Arnottb, David,(2003), “On Ethics and Decision Support Systems Development”, 7th Pacific Asia Conference on Information Systems, Adelaide, South Australia.
Moor, James, (1997), ‘‘Towards a Theory of Privacy in the Information Age.’’, Computers and Society 27, no. 3 (September): 27–32.
Phan, Trang Ann, (2003), “The ethics in artificial intelligence system”, ethics in technology, http://www.123helpme.com/view.asp?id=37012.
[4] Russell, S. J. , & Norving, P., Artificial Intelligence, Prentice-Hall, 1999.
Stallman, Richard (1992) "Why Software Should Be Free", Software Ownership and Intellectual Property Rights, ResearchCenter on Computing & Society, 35-52.
Tavani, Herman T.,(1999), ” KDD, data mining, and the challenge for normative privacy”, Ethics and Information Technology, 265–273.
Tavani, Herman T.(2007), “Philosophical theories of privacy: implications for an adequate online privacy policy”, Journal compilation, metaphilosophy LLC and Blackwell Publishing Ltd, Vol. 38, No. 1
Tavani, Herman T., and James H. Moor. (2001). ‘‘Privacy Protection,Control of Information, and Privacy-Enhancing Technologies.’’ Computers and Society 31, no. 1:6–11.
Trang Ann Phan,( 2003 ), “the ethics in artificial intelligence system”, http: //cseserv .engr .scu .edu / StudentWebPages /TPhan/index.html
Vedder , Anton,(2001), ” Misinformation through the Internet: Epistemology and Ethics”, Ethics and the Internet, Oxford, 125-132.
Vedder , Anton,(1999), “KDD:the challenge to individualism:”, Ethics and information technology, vol. 1,275-281.
Weizenbaum, J., (1976) , Computer Power and Human Reason, MIT Press, Cambridge.
Wel, L.V., Royakkers, L., (2004), “Ethical issues in web data mining”, Ethics and information technology,vol. 6,129-149.
[5] فهیمی، مهرداد، (1375)، هوشمصنوعی، انتشارات جلوه.
غضنفری، مهدی، کاظمی، زهره، (1382)،سیستمهای خبره، انتشارات دانشگاه علم وصنعت
Send comment about this article