{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T21:56:34Z","timestamp":1778104594498,"version":"3.51.4"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI Ethics"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s43681-021-00079-8","type":"journal-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T14:23:52Z","timestamp":1625840632000},"page":"129-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Converged AI, IoT, and blockchain technologies: a conceptual ethics framework"],"prefix":"10.1007","volume":"2","author":[{"given":"Esther","family":"Nehme","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9948-3601","authenticated-orcid":false,"given":"Rayane","family":"El Sibai","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Bou Abdo","sequence":"additional","affiliation":[]},{"given":"A. Ross","family":"Taylor","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Demerjian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"79_CR1","doi-asserted-by":"crossref","unstructured":"Abbott, R.: The reasonable robot: artificial intelligence and the law. Cambridge University Press (2020)","DOI":"10.1017\/9781108631761"},{"key":"79_CR2","doi-asserted-by":"crossref","unstructured":"AboBakr, A., Azer, M.A.: Iot ethics challenges and legal issues. In: 2017 12th International Conference on Computer Engineering and Systems (ICCES), IEEE, pp. 233\u2013237 (2017)","DOI":"10.1109\/ICCES.2017.8275309"},{"issue":"5","key":"79_CR3","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","volume":"15","author":"NZ Aitzhan","year":"2016","unstructured":"Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous mes saging streams. IEEE Trans. Dependable Secure Comput. 15(5), 840\u2013852 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"7","key":"79_CR4","doi-asserted-by":"publisher","first-page":"100","DOI":"10.5539\/ies.v6n7p100","volume":"6","author":"AA Al-Omari","year":"2013","unstructured":"Al-Omari, A.A.: The relationship between decision making styles and leadership styles among public schools principals. Int. Educ. Stud. 6(7), 100\u2013110 (2013)","journal-title":"Int. Educ. Stud."},{"issue":"3","key":"79_CR5","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/s10551-014-2354-x","volume":"132","author":"JJ Angel","year":"2015","unstructured":"Angel, J.J., McCabe, D.: The ethics of payments: Paper, plastic, or bitcoin? J. Bus. Ethics 132(3), 603\u2013611 (2015)","journal-title":"J. Bus. Ethics"},{"key":"79_CR6","doi-asserted-by":"crossref","unstructured":"Asveld, L., Roeser, S.: The ethics of technological risk. Routledge (2012)","DOI":"10.4324\/9781849772990"},{"issue":"3","key":"79_CR7","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1007\/s11948-016-9754-5","volume":"24","author":"G Baldini","year":"2018","unstructured":"Baldini, G., Botterman, M., Neisse, R., Tallacchini, M.: Ethical design in the internet of things. Sci. Eng. Ethics 24(3), 905\u2013925 (2018)","journal-title":"Sci. Eng. Ethics"},{"key":"79_CR8","unstructured":"Bentzon, A.W., Hellum, A., Stewart, J.: Pursuing grounded theory in law: South-north experiences in developing women\u2019s law. (1998)"},{"issue":"6293","key":"79_CR9","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1126\/science.aaf2654","volume":"352","author":"JF Bonnefon","year":"2016","unstructured":"Bonnefon, J.F., Shariff, A., Rahwan, I.: The social dilemma of autonomous vehicles. Science 352(6293), 1573\u20131576 (2016)","journal-title":"Science"},{"key":"79_CR10","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1017\/CBO9781139046855.020","volume":"1","author":"N Bostrom","year":"2014","unstructured":"Bostrom, N., Yudkowsky, E.: The ethics of artificial intelligence. Camb. Handb. Artif. Intell. 1, 316\u2013334 (2014)","journal-title":"Camb. Handb. Artif. Intell."},{"key":"79_CR11","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.pmcj.2016.12.003","volume":"39","author":"J Bou Abdo","year":"2017","unstructured":"Bou Abdo, J., Demerjian, J.: Evaluation of mobile cloud architectures. Pervasive Mob. Comput. 39, 284\u2013303 (2017)","journal-title":"Pervasive Mob. Comput."},{"key":"79_CR12","doi-asserted-by":"publisher","DOI":"10.1108\/IJPCC-06-2020-0059","author":"J Bou Abdo","year":"2020","unstructured":"Bou Abdo, J., Zeadally, S.: Multi-utility framework: blockchain exchange platform for sustainable development. Int. J Pervasive Comput. Commun. (2020). https:\/\/doi.org\/10.1108\/IJPCC-06-2020-0059","journal-title":"Int. J Pervasive Comput. Commun."},{"issue":"3","key":"79_CR13","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1080\/19393555.2020.1831658","volume":"30","author":"J Bou Abdo","year":"2021","unstructured":"Bou Abdo, J., Zeadally, S.: Neural network-based blockchain decision scheme. Inf. Secur. J. Global Perspect. 30(3), 173\u2013187 (2021)","journal-title":"Inf. Secur. J. Global Perspect."},{"key":"79_CR14","doi-asserted-by":"crossref","unstructured":"Bou Abdo, J., Demerjian, J., Chaouchi, H., Barbar, K., Pujolle, G.: Broker-based cross-cloud federation manager. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), IEEE, pp. 244\u2013251 (2013)","DOI":"10.1109\/ICITST.2013.6750199"},{"key":"79_CR15","doi-asserted-by":"crossref","unstructured":"Bou Abdo, J., Demerjian, J., Chaouchi, H., Barbar, K., Pujolle, G.: Operator centric mobile cloud architecture. In: 2014 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, pp. 2982\u20132987 (2014)","DOI":"10.1109\/WCNC.2014.6952953"},{"issue":"1","key":"79_CR16","volume":"32","author":"J Bou Abdo","year":"2021","unstructured":"Bou Abdo, J., El Sibai, R., Demerjian, J.: Permissionless proof-of-reputation-x: A hybrid reputation-based consensus algorithm for permissionless blockchains. Trans. Emerg. Telecommun. Technol. 32(1), e4148 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"79_CR17","unstructured":"Brey, P.: Ethics of emerging technology. The ethics of technology: Methods and approaches. pp. 175\u2013191 (2017)"},{"issue":"1","key":"79_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11569-012-0141-7","volume":"6","author":"PA Brey","year":"2012","unstructured":"Brey, P.A.: Anticipatory ethics for emerging technologies. NanoEthics 6(1), 1\u201313 (2012)","journal-title":"NanoEthics"},{"issue":"4","key":"79_CR19","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10676-012-9293-y","volume":"14","author":"PA Brey","year":"2012","unstructured":"Brey, P.A.: Anticipating ethical issues in emerging it. Ethics Inf. Technol. 14(4), 305\u2013317 (2012)","journal-title":"Ethics Inf. Technol."},{"issue":"3","key":"79_CR20","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1136\/bmjqs-2018-008370","volume":"28","author":"R Challen","year":"2019","unstructured":"Challen, R., Denny, J., Pitt, M., Gompels, L., Edwards, T., Tsaneva-Atanasova, K.: Artificial intelligence, bias and clinical safety. BMJ Qual. Saf. 28(3), 231\u2013237 (2019)","journal-title":"BMJ Qual. Saf."},{"issue":"1","key":"79_CR21","first-page":"147","volume":"14","author":"K Challita","year":"2017","unstructured":"Challita, K.: Infinite rcc8 networks. Int. J. Artif. Intell. 14(1), 147\u2013162 (2017)","journal-title":"Int. J. Artif. Intell."},{"issue":"1","key":"79_CR22","first-page":"83","volume":"17","author":"K Challita","year":"2019","unstructured":"Challita, K., Farhat, H.: Monitoring the relative positions of cars in a two-dimensional space. J. Artif. Intell. 17(1), 83\u2013101 (2019)","journal-title":"J. Artif. Intell."},{"key":"79_CR23","doi-asserted-by":"publisher","first-page":"120166","DOI":"10.1016\/j.techfore.2020.120166","volume":"158","author":"V Chang","year":"2020","unstructured":"Chang, V., Baudier, P., Zhang, H., Xu, Q., Zhang, J., Arami, M.: How blockchain can impact financial services\u2013 the overview, challenges and recommendations from expert interviewees. Technol Forecast. Soc. Change 158, 120166 (2020)","journal-title":"Technol Forecast. Soc. Change"},{"issue":"5","key":"79_CR24","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1002\/cb.223","volume":"6","author":"A Chatzidakis","year":"2007","unstructured":"Chatzidakis, A., Mitussis, D.: Computer ethics and consumer ethics: the impact of the internet on consumers\u2019 ethical decision-making process. J. Consum. Behav. 6(5), 305\u2013320 (2007)","journal-title":"J. Consum. Behav."},{"key":"79_CR25","unstructured":"Clubb, K., Kirch, L., Patwa, N.: The ethics, privacy, and legal issues around the internet of things. Berkely School of Information (2015)"},{"key":"79_CR26","doi-asserted-by":"crossref","unstructured":"Cotton, M.: Ethics and Technology Assessment: A participatory approach, vol. 13. Springer (2014)","DOI":"10.1007\/978-3-642-45088-4"},{"issue":"W2908A","key":"79_CR27","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","volume":"39","author":"GG Dagher","year":"2018","unstructured":"Dagher, G.G., MohlerMilojkovic, J.M., Marella, P.B.: Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 39(W2908A), 283\u2013297 (2018)","journal-title":"Sustain. Cities Soc."},{"key":"79_CR28","doi-asserted-by":"crossref","unstructured":"Dawaliby, S., Aberkane, A., Bradai, A.: Blockchain-based iot platform for autonomous drone operations management. In: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, pp. 31\u201336 (2020)","DOI":"10.1145\/3414045.3415939"},{"issue":"3","key":"79_CR29","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/TETCI.2018.2883450","volume":"3","author":"S Dawaliby","year":"2018","unstructured":"Dawaliby, S., Bradai, A., Pousset, Y., Chatellier, C.: Joint energy and QoS-aware memetic-based scheduling for M2M communications in LTE-M. IEEE Trans. Emerg. Topics Comput. Intell. 3(3), 217\u2013229 (2018)","journal-title":"IEEE Trans. Emerg. Topics Comput. Intell."},{"issue":"1","key":"79_CR30","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11948-016-9759-0","volume":"23","author":"B de Bruin","year":"2017","unstructured":"de Bruin, B., Floridi, L.: The ethics of cloud computing. Sci. Eng. Ethics 23(1), 21\u201339 (2017)","journal-title":"Sci. Eng. Ethics"},{"key":"79_CR31","unstructured":"De Filippi, P., Hassan, S.: Blockchain technology as a regulatory technology: From code is law to law is code. Preprint at arXiv preprint arXiv:180102507 (2018)"},{"key":"79_CR32","unstructured":"den Hoven JV (2012) Fact sheet-ethics subgroup IoT-version 4. 0 1"},{"issue":"1","key":"79_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10551-016-3298-0","volume":"152","author":"C Dierksmeier","year":"2018","unstructured":"Dierksmeier, C., Seele, P.: Cryptocurrencies and business ethics. J. Bus. Ethics 152(1), 1\u201314 (2018)","journal-title":"J. Bus. Ethics"},{"issue":"2","key":"79_CR34","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1111\/beer.12259","volume":"29","author":"C Dierksmeier","year":"2020","unstructured":"Dierksmeier, C., Seele, P.: Blockchain and business ethics. Bus. Ethics Eur. Rev. 29(2), 348\u2013359 (2020)","journal-title":"Bus. Ethics Eur. Rev."},{"issue":"10","key":"79_CR35","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1038\/ejhg.2014.196","volume":"23","author":"ES Dove","year":"2015","unstructured":"Dove, E.S., Joly, Y., Tass\u00b4e, A.M., Knoppers, B.M.: Genomic cloud computing: legal and ethical points to consider. Eur. J. Hum. Genet. 23(10), 1271\u20131278 (2015)","journal-title":"Eur. J. Hum. Genet."},{"issue":"2","key":"79_CR36","volume":"31","author":"R El Sibai","year":"2020","unstructured":"El Sibai, R., Gemayel, N., Bou Abdo, J., Demerjian, J.: A survey on access control mechanisms for cloud computing. Trans. Emerg. Telecommun. Technol. 31(2), e3720 (2020)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"4","key":"79_CR37","doi-asserted-by":"publisher","first-page":"532","DOI":"10.2105\/AJPH.2016.303628","volume":"107","author":"J Fleetwood","year":"2017","unstructured":"Fleetwood, J.: Public health, ethics, and autonomous vehicles. Am. J. Public Health 107(4), 532\u2013537 (2017)","journal-title":"Am. J. Public Health"},{"issue":"3","key":"79_CR38","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1195716.1195719","volume":"36","author":"L Floridi","year":"2006","unstructured":"Floridi, L.: Information ethics, its nature and scope. ACM SIGCAS Comput. Soc. 36(3), 21\u201336 (2006)","journal-title":"ACM SIGCAS Comput. Soc."},{"issue":"4","key":"79_CR39","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/s11023-018-9482-5","volume":"28","author":"L Floridi","year":"2018","unstructured":"Floridi, L., Cowls, J., Beltrametti, M., Chatila, R., Chazerand, P., Dignum, V., Luetge, C., Madelin, R., Pagallo, U., Rossi, F., et al.: Ai4people\u2014an ethical framework for a good AI society: opportunities, risks, principles, and recommendations. Mind. Mach. 28(4), 689\u2013707 (2018)","journal-title":"Mind. Mach."},{"issue":"14","key":"79_CR40","doi-asserted-by":"publisher","first-page":"6531","DOI":"10.1073\/pnas.1900949116","volume":"116","author":"MR Frank","year":"2019","unstructured":"Frank, M.R., Autor, D., Bessen, J.E., Brynjolfsson, E., Cebrian, M., Deming, D.J., Feldman, M., Groh, M., Lobo, J., Moro, E., et al.: Toward understanding the impact of artificial intelligence on labor. Proc. Natl. Acad. Sci. 116(14), 6531\u20136539 (2019)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"79_CR41","unstructured":"Frey, R.G., Wellman, C.H.: A companion to applied ethics. Wiley (2008)"},{"issue":"1","key":"79_CR42","doi-asserted-by":"publisher","first-page":"58","DOI":"10.3141\/2424-07","volume":"2424","author":"NJ Goodall","year":"2014","unstructured":"Goodall, N.J.: Ethical decision making during automated vehicle crashes. Transp. Res. Rec. 2424(1), 58\u201365 (2014)","journal-title":"Transp. Res. Rec."},{"key":"79_CR43","unstructured":"Grech, A., Camilleri, A.F.: Blockchain in education (2017)"},{"key":"79_CR44","doi-asserted-by":"crossref","unstructured":"Hagendorff, T. The ethics of AI ethics: An evaluation of guidelines. Minds and Machines, pp 1\u201322 (2020)","DOI":"10.1007\/s11023-020-09517-8"},{"key":"79_CR45","doi-asserted-by":"crossref","unstructured":"Himma, K.E., Tavani, H.T.: The handbook of information and computer ethics. Wiley (2008)","DOI":"10.1002\/9780470281819"},{"key":"79_CR46","doi-asserted-by":"crossref","unstructured":"Kizza, J.M.: Ethics in computing. Springer (2016)","DOI":"10.1007\/978-3-319-29106-2"},{"issue":"3\u20134","key":"79_CR47","first-page":"50","volume":"12","author":"C Lapointe","year":"2019","unstructured":"Lapointe, C., Fishbane, L.: The blockchain ethical design framework. Innov. Technol. Gov. Glob. 12(3\u20134), 50\u201371 (2019)","journal-title":"Innov. Technol. Gov. Glob."},{"issue":"1","key":"79_CR48","doi-asserted-by":"publisher","first-page":"271","DOI":"10.3390\/ijerph18010271","volume":"18","author":"D Lee","year":"2021","unstructured":"Lee, D., Yoon, S.N.: Application of artificial intelligence-based technologies in the healthcare industry: Opportunities and challenges. Int. J. Environ. Res. Public Health 18(1), 271 (2021)","journal-title":"Int. J. Environ. Res. Public Health"},{"issue":"4","key":"79_CR49","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10506-005-4157-y","volume":"12","author":"J Lehmann","year":"2004","unstructured":"Lehmann, J., Breuker, J., Brouwer, B.: Causation in AI and law. Artif. Intell. Law 12(4), 279\u2013315 (2004)","journal-title":"Artif. Intell. Law"},{"issue":"6","key":"79_CR50","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.1109\/JIOT.2017.2740569","volume":"4","author":"A Lei","year":"2017","unstructured":"Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C.P.A., Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832\u20131843 (2017)","journal-title":"IEEE Internet Things J."},{"key":"79_CR51","doi-asserted-by":"crossref","unstructured":"Light, A., Rolston, H.: Environmental ethics: An anthology (2002)","DOI":"10.5840\/enviroethics200224226"},{"key":"79_CR52","unstructured":"Loewy, E.E., Loewy, R.S.: Textbook of healthcare ethics. Springer (2004)"},{"key":"79_CR53","first-page":"40","volume":"20","author":"R Mansell","year":"2017","unstructured":"Mansell, R.: Imaginaries of the digital: ambiguity, power and the question of agency. Commun. Rev. Commun Soc. Publique 20, 40\u201348 (2017)","journal-title":"Commun. Rev. Commun Soc. Publique"},{"key":"79_CR54","doi-asserted-by":"publisher","first-page":"5","DOI":"10.2307\/248873","volume":"10","author":"RO Mason","year":"1986","unstructured":"Mason, R.O.: Four ethical issues of the information age. MIS Q 10, 5\u201312 (1986)","journal-title":"MIS Q"},{"issue":"1","key":"79_CR55","doi-asserted-by":"publisher","first-page":"205395171665021","DOI":"10.1177\/2053951716650211","volume":"3","author":"J Metcalf","year":"2016","unstructured":"Metcalf, J., Crawford, K.: Where are human subjects in big data research? The emerging ethics divide. Big Data Soc. 3(1), 2053951716650211 (2016)","journal-title":"Big Data Soc."},{"issue":"1","key":"79_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33166\/AETiC.2018.01.001","volume":"2","author":"MH Miraz","year":"2018","unstructured":"Miraz, M.H., Ali, M.: Applications of blockchain technology beyond cryptocurrency. Ann. Emerg. Technol. Comput. (AETiC) 2(1), 1\u20136 (2018)","journal-title":"Ann. Emerg. Technol. Comput. (AETiC)"},{"key":"79_CR57","doi-asserted-by":"crossref","unstructured":"Mittelstadt, B.D., Floridi, L.: The ethics of biomedical big data, vol. 29. Springer (2016)","DOI":"10.1007\/978-3-319-33525-4"},{"issue":"3","key":"79_CR58","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10676-006-0008-0","volume":"7","author":"JH Moor","year":"2005","unstructured":"Moor, J.H.: Why we need better ethics for emerging technologies. Ethics Inf. Technol. 7(3), 111\u2013119 (2005)","journal-title":"Ethics Inf. Technol."},{"issue":"4","key":"79_CR59","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MIS.2006.80","volume":"21","author":"JH Moor","year":"2006","unstructured":"Moor, J.H.: The nature, importance, and difficulty of machine ethics. IEEE Intell. Syst. 21(4), 18\u201321 (2006)","journal-title":"IEEE Intell. Syst."},{"issue":"5","key":"79_CR60","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1007\/s10677-016-9745-2","volume":"19","author":"S Nyholm","year":"2016","unstructured":"Nyholm, S., Smids, J.: The ethics of accident-algorithms for self-driving cars: An applied trolley problem? Ethic. Theory Moral Pract. 19(5), 1275\u20131289 (2016)","journal-title":"Ethic. Theory Moral Pract."},{"issue":"5","key":"79_CR61","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/j.techfore.2005.06.002","volume":"73","author":"E Palm","year":"2006","unstructured":"Palm, E., Hansson, S.O.: The case for ethical technology assessment (eta). Technol. Forecast. Soc. Change 73(5), 543\u2013558 (2006)","journal-title":"Technol. Forecast. Soc. Change"},{"issue":"2(18)","key":"79_CR62","first-page":"208","volume":"13","author":"D Popescul","year":"2014","unstructured":"Popescul, D., Georgescu, M.: Internet of things\u2013some ethical issues. USV Ann. Econ. Public Adm. 13(2(18)), 208\u2013214 (2014)","journal-title":"USV Ann. Econ. Public Adm."},{"key":"79_CR63","unstructured":"Quinn, M.J.: Ethics for the information age. Pearson (2017)"},{"issue":"1","key":"79_CR64","first-page":"1","volume":"1","author":"K Rabah","year":"2018","unstructured":"Rabah, K.: Convergence of AI, IoT, big data and blockchain: a review. Lake Inst. J. 1(1), 1\u201318 (2018)","journal-title":"Lake Inst. J."},{"issue":"2","key":"79_CR65","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1001\/amajethics.2019.121","volume":"21","author":"MJ Rigby","year":"2019","unstructured":"Rigby, M.J.: Ethical dimensions of using artificial intelligence in health care. AMA J. Ethics 21(2), 121\u2013124 (2019)","journal-title":"AMA J. Ethics"},{"key":"79_CR66","unstructured":"Rowe, A.J., Mason, R.O.: Managing with style: A guide to understanding, assessing, and improving decision making. Jossey-Bass (1987)"},{"key":"79_CR67","volume-title":"Managerial decision making","author":"A Rowe","year":"1984","unstructured":"Rowe, A., Boulgarides, J., McGrath, M.: Managerial decision making. Science Research Associates, Chicago (1984)"},{"key":"79_CR68","doi-asserted-by":"publisher","unstructured":"Sandner, P., Gross, J., Richter, R.: Convergence of blockchain, IoT, and AI. Frontiers in Blockchain 3:42 (2020). https:\/\/doi.org\/10.3389\/fbloc.2020.522600, https:\/\/www.frontiersin.org\/article\/10.3389\/fbloc.2020.522600","DOI":"10.3389\/fbloc.2020.522600"},{"key":"79_CR69","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.techfore.2017.09.033","volume":"129","author":"BA Schuelke-Leech","year":"2018","unstructured":"Schuelke-Leech, B.A.: A model for understanding the orders of magnitude of disruptive technologies. Technol. Forecast. Soc. Chang. 129, 261\u2013274 (2018)","journal-title":"Technol. Forecast. Soc. Chang."},{"issue":"7","key":"79_CR70","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2018.3011052","volume":"51","author":"J Singh","year":"2018","unstructured":"Singh, J., Millard, C., Reed, C., Cobbe, J., Crowcroft, J.: Accountability in the IoT: Systems, law, and ways forward. Computer 51(7), 54\u201365 (2018)","journal-title":"Computer"},{"issue":"4","key":"79_CR71","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/jte.2010100102","volume":"1","author":"BC Stahl","year":"2010","unstructured":"Stahl, B.C., Heersmink, R., Goujon, P., Flick, C., Van Den Hoven, J., Wakunuma, K., Ikonen, V., Rader, M.: Identifying the ethics of emerging information and communication technologies: An essay on issues, concepts and method. Int. J. Technoethics (IJT) 1(4), 20\u201338 (2010)","journal-title":"Int. J. Technoethics (IJT)"},{"issue":"4","key":"79_CR72","doi-asserted-by":"publisher","first-page":"1604","DOI":"10.3390\/su13041604","volume":"13","author":"A Sulich","year":"2021","unstructured":"Sulich, A., So-loducho-Pelc, L., Ferasso, M.: Management styles and decision-making: Pro-ecological strategy approach. Sustainability 13(4), 1604 (2021)","journal-title":"Sustainability"},{"key":"79_CR73","unstructured":"Taekema, S.: Theoretical and normative frameworks for legal research: Putting theory into practice. Law Method (2018)"},{"key":"79_CR74","doi-asserted-by":"crossref","unstructured":"Tang, Y., Xiong, J., Becerril-Arreola, R., Iyer L.: Ethics of blockchain. Inf. Technol. People (2019)","DOI":"10.1108\/ITP-10-2018-0491"},{"key":"79_CR75","doi-asserted-by":"crossref","unstructured":"Teubner G (1990) How the law thinks: toward a constructivist epistemology of law. Selforganization. pp. 87\u2013113","DOI":"10.1007\/978-94-017-2975-8_6"},{"issue":"1","key":"79_CR76","doi-asserted-by":"publisher","first-page":"98","DOI":"10.3390\/smartcities1010006","volume":"1","author":"SG Tzafestas","year":"2018","unstructured":"Tzafestas, S.G.: Ethics and law in the internet of things world. Smart Cities 1(1), 98\u2013120 (2018)","journal-title":"Smart Cities"},{"key":"79_CR77","doi-asserted-by":"crossref","unstructured":"Usman, M.A., Philip, N.Y., Politis, C.: 5g enabled mobile healthcare for ambulances. In: 2019 IEEE Globecom Workshops (GC Wkshps), IEEE, pp. 1\u20136 (2019)","DOI":"10.1109\/GCWkshps45667.2019.9024584"},{"key":"79_CR78","unstructured":"Ustek-Spilda, F.: A conceptual framework for studying internet of things: Virtue ethics, capability approach and care ethics. (2018) https:\/\/blogit.itu.dk\/virteuproject\/2018\/11\/05\/a-conceptual-framework-for-studying-internet-of-things-virtue-ethics-capability-approach-and-care-ethics\/"},{"key":"79_CR79","unstructured":"Ustek Spilda, F., Powell, A., Shklovski, I., Lehuede Bravo, S.A.: Peril v. promise: Iot and the ethical imaginaries (2019)"},{"issue":"2","key":"79_CR80","doi-asserted-by":"publisher","first-page":"205395171987946","DOI":"10.1177\/2053951719879468","volume":"6","author":"F Ustek-Spilda","year":"2019","unstructured":"Ustek-Spilda, F., Powell, A., Nemorin, S.: Engaging with ethics in internet of things: Imaginaries in the social milieu of technology developers. Big Data Soc. 6(2), 2053951719879468 (2019)","journal-title":"Big Data Soc."},{"key":"79_CR81","unstructured":"Valacich, J., Schneider, C.: Information Systems Today: Managing the Digital World. Prentice Hall Press (2009)"},{"issue":"3","key":"79_CR82","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s11948-015-9724-3","volume":"22","author":"I Van de Poel","year":"2016","unstructured":"Van de Poel, I.: An ethical framework for evaluating experimental technology. Sci. Eng. Ethics 22(3), 667\u2013686 (2016)","journal-title":"Sci. Eng. Ethics"},{"key":"79_CR83","unstructured":"Wahlgren, P.: Perspectives on jurisprudence: essays in honor of Jes Bjarup. Stockholm Institute for Scandinavian Law (2005)"},{"issue":"3","key":"79_CR84","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s10676-010-9242-6","volume":"13","author":"D Wright","year":"2011","unstructured":"Wright, D.: A framework for the ethical impact assessment of information technology. Ethics Inf. Technol. 13(3), 199\u2013226 (2011)","journal-title":"Ethics Inf. Technol."},{"key":"79_CR85","doi-asserted-by":"crossref","unstructured":"Wu, Y.H., Lin, S.D.: A low-cost ethics shaping approach for designing reinforcement learning agents. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol 32 (2018)","DOI":"10.1609\/aaai.v32i1.11498"},{"key":"79_CR86","first-page":"17","volume":"2","author":"JA Young","year":"2020","unstructured":"Young, J.A., Smith, T.J.: Zheng SH (2020) Call me big papa: An extension of mason\u2019s information ethics framework to big data. J. Midwest Assoc. Inf. Syst. 2, 17 (2020)","journal-title":"J. Midwest Assoc. Inf. Syst."},{"issue":"6","key":"79_CR87","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.130","volume":"2","author":"S Zeadally","year":"2019","unstructured":"Zeadally, S., Bou Abdo, J.: Blockchain: Trends and future opportunities. Int. Technol. Lett. 2(6), e130 (2019)","journal-title":"Int. Technol. Lett."}],"container-title":["AI and Ethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43681-021-00079-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43681-021-00079-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43681-021-00079-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,5]],"date-time":"2023-02-05T00:05:54Z","timestamp":1675555554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43681-021-00079-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,9]]},"references-count":87,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["79"],"URL":"https:\/\/doi.org\/10.1007\/s43681-021-00079-8","relation":{},"ISSN":["2730-5953","2730-5961"],"issn-type":[{"value":"2730-5953","type":"print"},{"value":"2730-5961","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,9]]},"assertion":[{"value":"11 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}