Author of the publication

AI4People---An Ethical Framework for a Good AI Society: Opportunities, Risks, Principles, and Recommendations

, , , , , , , , , , , , and . Minds and Machines, 28 (4): 689--707 (Dec 1, 2018)
DOI: 10.1007/s11023-018-9482-5

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graduated regulation of 'regulatable' content and the European Audiovisual Media Services Directive: One small step for the industry and one giant leap for the legislator?, and . Telematics Informatics, 24 (4): 285-302 (2007)Employing Robot Journalists: Legal Implications, Considerations and Recommendations., , and . WWW (Companion Volume), page 731-736. ACM, (2016)A comparison of system description models for data protection by design., , , , , , and . SAC, page 1512-1515. ACM, (2019)DPMF: A Modeling Framework for Data Protection by Design., , , , , and . Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., (2020)An Architectural View for Data Protection by Design., , , , , , and . ICSA, page 11-20. IEEE, (2019)Demonstration of the DPMF for Data Protection Analysis., , , , and . MoDELS (Companion), page 75-79. IEEE, (2023)Smart City Privacy: Enhancing Collaborative Transparency in the Regulatory Ecosystem., , , , , , , and . CTTE-FITCE, page 1-5. IEEE, (2019)AI4People---An Ethical Framework for a Good AI Society: Opportunities, Risks, Principles, and Recommendations, , , , , , , , , and 3 other author(s). Minds and Machines, 28 (4): 689--707 (Dec 1, 2018)Key Ethical Challenges in the European Medical Information Framework., , , , , , , , , and 2 other author(s). Minds Mach., 29 (3): 355-371 (2019)Children as social network actors: A European legal perspective on challenges concerning membership, rights, conduct and liability., , and . Comput. Law Secur. Rev., 31 (3): 351-364 (2015)