Author of the publication

Mind the gaps: Assuring the safety of autonomous systems from an engineering, ethical, and legal perspective.

, , , , , and . Artif. Intell., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mind the gaps: Assuring the safety of autonomous systems from an engineering, ethical, and legal perspective., , , , , and . Artif. Intell., (2020)Unravelling Responsibility for AI., , , , , and . CoRR, (2023)Distinguishing two features of accountability for AI technologies., , , , , and . Nat. Mac. Intell., 4 (9): 734-736 (September 2022)A Novel Approach to Cognitive Engineering: Manipulating Access Cost., , , and . HCI (28), volume 373 of Communications in Computer and Information Science, page 437-441. Springer, (2013)Harder to Access, Better Performance? The Effects of Information Access Cost on Strategy and Performance., , , and . HCI (8), volume 4557 of Lecture Notes in Computer Science, page 115-125. Springer, (2007)Press accept to update now: Individual differences in susceptibility to malevolent interruptions., , and . Decis. Support Syst., (2017)Human Individual Difference Predictors in Cyber-Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior., , , and . HCI (27), volume 12788 of Lecture Notes in Computer Science, page 226-240. Springer, (2021)Using Simulation-software-generated Animations to Investigate Attitudes Towards Autonomous Vehicles Accidents., , , and . KES, volume 207 of Procedia Computer Science, page 3516-3525. Elsevier, (2022)Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use., , , , , , , , and . STAST, page 5:1-5:6. ACM, (2018)Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups Using Malevolence Cue Identification Training., , , and . AHFE (9), volume 960 of Advances in Intelligent Systems and Computing, page 3-15. Springer, (2019)