{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:18:09Z","timestamp":1725520689514},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540898528"},{"type":"electronic","value":"9783540898535"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89853-5_39","type":"book-chapter","created":{"date-parts":[[2008,11,12]],"date-time":"2008-11-12T12:07:17Z","timestamp":1226491637000},"page":"357-365","source":"Crossref","is-referenced-by-count":0,"title":["Keynote Address: Is It Right and Is It Legal?"],"prefix":"10.1007","author":[{"given":"Quintin","family":"Gee","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Bott, F.: Professional issues in Information Technology, BCS (2005)"},{"issue":"7","key":"39_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MC.1993.274940","volume":"26","author":"N.G. Leveson","year":"1993","unstructured":"Leveson, N.G., Turner, C.S.: An Investigation of the Therac-25 Accidents. IEEE Computer\u00a026(7), 18\u201341 (1993)","journal-title":"IEEE Computer"},{"key":"39_CR3","volume-title":"Ethics and Technology","author":"H.T. Tavani","year":"2003","unstructured":"Tavani, H.T.: Ethics and Technology. John Wiley & Sons, Chichester (2003)"},{"key":"39_CR4","unstructured":"The Risks Digest, Forum On Risks To The Public In Computers And Related Systems, is a source for computer-related disasters compiled by the ACM, and hosted by the University of Newcastle, \n                  \n                    http:\/\/catless.ncl.ac.uk\/Risks"}],"container-title":["Communications in Computer and Information Science","Wireless Networks, Information Processing and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89853-5_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T01:12:46Z","timestamp":1551661966000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89853-5_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540898528","9783540898535"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89853-5_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2008]]}}}