{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:18:43Z","timestamp":1740133123372,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IT Prof."],"published-print":{"date-parts":[[2021,5,1]]},"DOI":"10.1109\/mitp.2021.3070986","type":"journal-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T20:06:06Z","timestamp":1624565166000},"page":"46-52","source":"Crossref","is-referenced-by-count":1,"title":["Demanding Fair and Ethically Aligned IT for the Future"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2920-2904","authenticated-orcid":false,"given":"Robert N.","family":"Charette","sequence":"first","affiliation":[{"name":"ITABHI Corporation, Spotsylvania, VA, USA"}]}],"member":"263","reference":[{"year":"2018","key":"ref39","article-title":"The Equifax data breach"},{"journal-title":"Computer Related Risks","year":"1994","author":"neumann","key":"ref38"},{"article-title":"IT ethics took a thumping in 2015","year":"2016","author":"charette","key":"ref33"},{"article-title":"U.S. lawmakers detail Big Tech's market abuses and press for strict reform","year":"2020","author":"bose","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.6"},{"article-title":"Google CEO Sundar Pichai: Fears about artificial intelligence are &#x2018;very legitimate,&#x2019; he says in post interview","year":"2018","author":"romm","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2019.8784108"},{"article-title":"The cost of poor quality software in the US: A 2018 report","year":"2018","author":"krasner","key":"ref36"},{"article-title":"Face recognition vendor test (FRVT) part 3: Demographic effects","year":"2019","author":"grother","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2018.8302369"},{"journal-title":"Software Engineering Risk Analysis and Management","year":"1989","author":"charette","key":"ref10"},{"article-title":"Deepfakes and cheap fakes: The manipulation of audio and visual evidence","year":"2019","author":"paris","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1126\/science.195.4283.1186"},{"article-title":"Half a century later, Economist's &#x2018;creative destruction&#x2019; theory is apt for the internet age: Schumpeter: The prophet of bust and boom","year":"2000","author":"reier","key":"ref12"},{"article-title":"The internet as a human right","year":"2016","author":"howell","key":"ref13"},{"journal-title":"Information Technologies and Social Transformation","year":"1985","author":"guile","key":"ref14"},{"article-title":"Which countries are making the most progress in digital competitiveness?","year":"2020","author":"meissner","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3971361"},{"article-title":"Experts optimistic about the next 50 years of digital life","year":"2019","author":"stansberry","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/3105385"},{"journal-title":"Normal Accidents Living with High Risk Technologies","year":"1984","author":"perrow","key":"ref19"},{"article-title":"The malicious use of artificial intelligence: Forecasting, prevention, and mitigation","year":"2018","author":"brundage","key":"ref28"},{"article-title":"Newsreel reveals that even 1946 debut of ENIAC was greeted with &#x2018;1984&#x2019;-ish suspicion","year":"2015","author":"mcnamara","key":"ref4"},{"article-title":"ACM code of ethics and professional conduct","year":"2018","author":"gotterbarn","key":"ref27"},{"journal-title":"Visions of Technology","year":"1999","author":"rhodes","key":"ref3"},{"journal-title":"The Human Use of Human Beings","year":"1950","author":"weiner","key":"ref6"},{"article-title":"Elon Musk's nightmarish warning: AI could become &#x2018;an immortal dictator from which we would never escape&#x2019;","year":"2018","author":"holley","key":"ref29"},{"key":"ref5","first-page":"357","article-title":"Science notes and news","volume":"16","year":"1947","journal-title":"Current Sci"},{"journal-title":"Progress and the Quest for Meaning","year":"1999","author":"bernstein","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/44.476631"},{"journal-title":"The Axemaker s Gift","year":"1995","author":"burke","key":"ref9"},{"journal-title":"The Computer from Pascal to von Neumann","year":"1972","author":"goldstein","key":"ref1"},{"year":"1975","key":"ref20","article-title":"Report of the special committee on Equity Funding"},{"article-title":"No April fools: The top 10 IT fiascos of all time","year":"2015","author":"vaughan-nichols","key":"ref22"},{"key":"ref21","first-page":"219","article-title":"Flying the unfriendly skies: The legal fallout over the use of computerized reservation systems as a competitive weapon in the airline industry","volume":"2","author":"locke","year":"1989","journal-title":"Harvard J Law Technol"},{"year":"2020","key":"ref42","article-title":"New weapons, proven precedent: Elements of and models for a treaty on killer robots"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2899996"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2505990.2505993"},{"article-title":"Stock market crash of 1987","year":"2013","author":"bernhardt","key":"ref23"},{"article-title":"The information superhighway: Status and issues","year":"1994","author":"smith","key":"ref26"},{"article-title":"This logo is like an &#x2018;organic&#x2019; sticker for algorithms","year":"2018","author":"schwab","key":"ref43"},{"article-title":"U.S. Tech companies prop up China's vast surveillance network","year":"2019","author":"lin","key":"ref25"}],"container-title":["IT Professional"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6294\/9464090\/09464106.pdf?arnumber=9464106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:51:38Z","timestamp":1652194298000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9464106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,1]]},"references-count":43,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mitp.2021.3070986","relation":{},"ISSN":["1520-9202","1941-045X"],"issn-type":[{"type":"print","value":"1520-9202"},{"type":"electronic","value":"1941-045X"}],"subject":[],"published":{"date-parts":[[2021,5,1]]}}}