832 Part E Automation Management
47.17 J. Sullins: When is a robot a moral agent?, Int. J.
Inf. Ethics 6, 12 (2006)
47.18 K. Himma: Artificial agency, consciousness, and the
criteria for moral agency: what properties must an
artificial agent have to be a moral agent?, 7th Int.
Comput. Ethics Conf. (San Diego 2007)
47.19 R. Lucas: Moral theories for autonomous software
agents, ACM SIGCAS Comput. Soc. Arch. 34,4(2004)
47.20 R.C. Arkin: Governing lethal behavior: embedding
ethics in a hybrid deliberative/reactive robot archi-
tecture, Proc. 3rd ACM/IEEE Int. Conf. Human–Robot
Interact. (Amsterdam 2008) pp. 121–128
47.21 Online Ethics Center, National Academy of Engi-
neering, Washington (2009)
http://www.onlineethics.org/
47.22 T.W. Bynum, S. Rogerson (Eds.): Computer Ethics
and Professional Responsibility (Blackwell, New
York 2004)
47.23 G. Stamatellos: Computer Ethics: A Global Perspec-
tive (Jones Bartlett, Sudbury 2007)
47.24 P. Lucas: Why bother? Ethical computers - that’s
why!, ACM Int. Conf. Proc. Ser. 7, 33–38 (2000)
47.25 J. Berge: Software for Automation: Architecture,
Integration, and Security (ISA, New York 2005)
47.26 T. Macaulay: Industrial Automation and Process
Control Security: SCADA, DCS, PLC, HMI (Auerbach,
London 2009)
47.27 E. Cayirci, A. Levi, C. Rong: Security in Wireless Ad
Hoc and Sensor Networks (Wiley, New York 2009)
47.28 J. Dubin: The Little Black Book of Computer Security,
2nd edn. (Penton Media, New York 2008)
47.29 C. Easttom: Computer Security Fundamentals
(Prentice Hall, Englewood Cliffs 2005)
47.30 D. Gollmann: Computer Security (Wiley, New York
2006)
47.31 M. Dark: Learning and Teaching with Case Studies,
Center for Education and Research in Information
Assurance and Security (Purdue University, Purdue
2008) http://www.cerias.purdue.edu/education/
post_secondary_education/undergrad _and_grad/
curriculum_development/ethical_social _prof _
issues/learning_and_teaching.php
47.32 T. Brignall, S. Ramaswamy: A Framework for In-
tegrating Ethical and Values-Based Instruction
into the ACM Computing Curricula 2001, Work-
shop Prot. Inf. Comput. Beyond (CERIAS, Purdue
2001)
47.33 I. Asimov: I, Robot (Gnome Press, New York 1950)
47.34 S.Y. Nof (Ed.): Handbook of Industrial Robotics (Wi-
ley, New York 1985)
47.35 M.J.Dark,A.Ghafarian,M.A.Saheb,J.Yu:Infor-
mation ethics and social issues in the undergradu-
ate computer science curriculum: a curriculum de-
velopment and implementation report, (Redmond
2002)
http://www.cerias.purdue.edu/education/
post_secondary_education/undergrad _and_grad/
curriculum_development/ethical_social _
prof_issues/framework.php
47.36 P. James: Transformative learning: promoting
change across cultural worlds, J. Vocat. Educ. Train.
49, 197–219 (1997)
47.37 M. Dark, N. Harter, L. Morales, M.A. Garcia: An
information security ethics education model, J.
Comput. Sci. Coll. 23, 82–88 (2008)
47.38 T.L. Beauchamp: Case Studies in Business, Society
and Ethics (Prentice Hall, Englewood Cliffs 1998)
47.39 R. Spinello: Case Studies in Information Technology
Ethics, 2nd edn. (Prentice Hall, New York 2003)
47.40 B.B. Levin: Using the case method in teacher edu-
cation: the role of discussion and experience in
teachers’ thinking about cases, J. Teach. Teach.
Educ. 10, 2 (1996)
47.41 J. Kleinfeld: Changes in problem solving abilities of
students taught through case methods, 1991 Annu.
Meet. Am. Educ. Res. Assoc. (Chicago 1991)
47.42 J. Cossom: Teaching from cases: Education for crit-
ical thinking, J. Teach. Soc. Work 5, 139–155 (1991)
47.43 D.W. Ewing: Inside the Harvard Business School
(Random House, New York 1990)
47.44 M.J. Julian, M.B. Kinzie, V.A. Larsen: Compelling
case experiences: performance, practice, and ap-
plication for emerging instructional designers,
Perform. Improv. Q. 13, 164–201 (2000)
47.45 L. Wilkerson, W.H. Gijselaers: Bringing Problem-
Based Learning to Higher Education: Theory and
Practice (Jossey-Bass, New York 1996)
47.46 J. Lave: The culture of acquisition and the prac-
tice of understanding. In: Cultural Psychology:
Essays on Comparative Human Development,ed.
by J.W. Stigler, R.A. Schweder, G. Herdt (Cambridge
Univ. Press, Boston 1990) pp. 309–327
47.47 J.M. Cohoon: Recruiting and retaining women
in undergraduate computing majors, ACME SIGCSE
Bulletin 34, 48–52 (2002)
47.48 K. Treu, A. Skinner: Ten Suggestions for a gender-
equitable CS classroom, ACME SIGCSE Bulletin 34,
165–167 (2002)
47.49 S. Ramaswamy: Societal-consciousness in the
computing curricula: a time for serious introspec-
tion, Int. Symp. Technol. Soc.: Risk, Vulnerability,
Uncertainty, Technology and Society (Las Vegas
2007)
47.50 Privacy Rights Clearinghouse: San Diego, CA 92103,
USA, http://privacyrights.org (last accessed January
2009)
47.51 ComputingCases.org:
http://computingcases.org/index.html (last ac-
cessed January 2009)
47.52 P. Lyman, H.R. Varian, P. Charles, N. Good,
L.L. Jordan, J. Pal: How much Informa-
tion? (SIMS Lab, University of Berkeley 2003),
http://www.sims.berkeley.edu/research/
projects/how-much-info-2003/ (last accessed Jan-
uary 2009)
47.53 E. Gay: Judge restricts online reporting of
case, The New Zealand Herald, Aug 25 (2008)
Part E 47