{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T08:06:48Z","timestamp":1753862808675,"version":"3.41.2"},"reference-count":45,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T00:00:00Z","timestamp":1704153600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Comp Applic In Engineering"],"published-print":{"date-parts":[[2024,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The rapid development and widespread use of computer technology in today's society have brought significant benefits and convenience to individuals and organizations. The study presents a concept for constructing a research framework in the realm of computer ethics impact. This involves the introduction of an information fusion model and the utilization of a Dempster\u2013Shafer (D\u2013S) evidence theory algorithm. The information fusion model aims to integrate multiple sources of evidence related to computer ethics, including expert opinions, public attitudes, and legal regulations. Furthermore, the experimental results show that the platform's impact perception was effective in reducing the number of individuals who consider computer ethics unnecessary from 40% to 3%. This finding highlights the potential of this platform for enhancing public awareness and understanding of computer ethics. In conclusion, the proposed information fusion model and D\u2013S evidence theory algorithm offer a valuable tool for conducting early research on the construction of computer ethics. It is of utmost importance to delve into the uncontrollable facets of building computer ethics and to navigate the subject\u2013object dilemma from the standpoint of computer users. This approach is essential in addressing the ethical dilemmas that have arisen due to the rapid advancement of computer technology in today's world. The novelty lies in the research methodology used in this study, substantial public perception change, ethical risk reduction, and subject\u2013object issue in computer ethics resolution all substantially contribute to the field's influence on people, organizations, and societies.<\/jats:p>","DOI":"10.1002\/cae.22705","type":"journal-article","created":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T08:14:30Z","timestamp":1704183270000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From data inference to evidence fusion: A methodology for studying computer ethics at different levels"],"prefix":"10.1002","volume":"32","author":[{"given":"MinCheng","family":"Piao","sequence":"first","affiliation":[{"name":"School of Computer Science of South\u2010Central Minzu University Wuhan Hubei People's Republic of China"}]},{"given":"Junjie","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer Science of South\u2010Central Minzu University Wuhan Hubei People's Republic of China"}]},{"given":"Meng","family":"Song","sequence":"additional","affiliation":[{"name":"School of Textile Science and Engineering of Wuhan Textile University Wuhan Hubei People's Republic of China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4926-8082","authenticated-orcid":false,"given":"ChenChen","family":"Rui","sequence":"additional","affiliation":[{"name":"School of Law Peking University  Beijing People's Republic of China"}]}],"member":"311","published-online":{"date-parts":[[2024,1,2]]},"reference":[{"key":"e_1_2_12_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12910-016-0154-9"},{"key":"e_1_2_12_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975643"},{"key":"e_1_2_12_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2023.107745"},{"key":"e_1_2_12_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.04.002"},{"key":"e_1_2_12_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi12020035"},{"key":"e_1_2_12_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010022"},{"key":"e_1_2_12_8_1","doi-asserted-by":"crossref","unstructured":"H. F.Atlam andG. B.Wills IoT security privacy safety and ethics Digital Twin Technologies and Smart Cities Springer Nature Switzerland AG Switzerland 2020 pp.123\u2013149.","DOI":"10.1007\/978-3-030-18732-3_8"},{"key":"e_1_2_12_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12083890"},{"key":"e_1_2_12_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2020.120559"},{"key":"e_1_2_12_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-3006-9"},{"key":"e_1_2_12_12_1","doi-asserted-by":"publisher","DOI":"10.17993\/3ctecno.2022.v11n2e42.25-36"},{"key":"e_1_2_12_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.03.017"},{"key":"e_1_2_12_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173016"},{"key":"e_1_2_12_15_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0262883"},{"key":"e_1_2_12_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-021-00817-4"},{"key":"e_1_2_12_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.019"},{"key":"e_1_2_12_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23115141"},{"key":"e_1_2_12_19_1","doi-asserted-by":"publisher","DOI":"10.1086\/688346"},{"issue":"1","key":"e_1_2_12_20_1","first-page":"1956","article-title":"Research on reliability of computer networks based on analytic hierarchy process","volume":"69","author":"Jiang N.","year":"2016","journal-title":"J. Adv. Oxid. Technol"},{"key":"e_1_2_12_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40314-023-02344-4"},{"key":"e_1_2_12_22_1","doi-asserted-by":"publisher","DOI":"10.1142\/S2301385020500168"},{"key":"e_1_2_12_23_1","doi-asserted-by":"crossref","unstructured":"P.Lin W.Xie andJ.Yu DS evidence theory information fusion methods and applications 2023 International Wireless Communications and Mobile Computing (IWCMC) IEEE Marrakesh Morocco 2023 pp.433\u2013437.","DOI":"10.1109\/IWCMC58020.2023.10182761"},{"key":"e_1_2_12_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3059674"},{"key":"e_1_2_12_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19173707"},{"key":"e_1_2_12_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.001"},{"key":"e_1_2_12_27_1","doi-asserted-by":"publisher","DOI":"10.18421\/TEM103-31"},{"key":"e_1_2_12_28_1","unstructured":"R.Nagahawatta andM.Warren \u00a0Code of ethical practice and cyber security of cloud context: a study perspective of IT authorities in SMEs Conference of the Australasian Institute of Computer Ethics University of South Australia 2020 pp.18\u201327."},{"key":"e_1_2_12_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116184"},{"key":"e_1_2_12_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/jmse11061142"},{"key":"e_1_2_12_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21051605"},{"key":"e_1_2_12_32_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjs\/znab134.009"},{"key":"e_1_2_12_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00080-1"},{"key":"e_1_2_12_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-34577-y"},{"key":"e_1_2_12_35_1","doi-asserted-by":"crossref","unstructured":"N.Tsagourias Electoral cyber interference self\u2010determination and the principle of non\u2010intervention in cyberspace Governing Cyberspace: Behavior Power and Diplomacy 2020 pp.45\u201364.","DOI":"10.2139\/ssrn.3438567"},{"key":"e_1_2_12_36_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0217979218503095"},{"key":"e_1_2_12_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11050715"},{"key":"e_1_2_12_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11069-022-05792-z"},{"key":"e_1_2_12_39_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21062140"},{"key":"e_1_2_12_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/rs14143489"},{"key":"e_1_2_12_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17030641"},{"key":"e_1_2_12_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2023.113303"},{"key":"e_1_2_12_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-09271-w"},{"key":"e_1_2_12_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2023.112926"},{"key":"e_1_2_12_45_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010138"},{"key":"e_1_2_12_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109075"}],"container-title":["Computer Applications in Engineering Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cae.22705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T03:46:51Z","timestamp":1710215211000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cae.22705"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,2]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["10.1002\/cae.22705"],"URL":"https:\/\/doi.org\/10.1002\/cae.22705","archive":["Portico"],"relation":{},"ISSN":["1061-3773","1099-0542"],"issn-type":[{"type":"print","value":"1061-3773"},{"type":"electronic","value":"1099-0542"}],"subject":[],"published":{"date-parts":[[2024,1,2]]},"assertion":[{"value":"2023-05-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e22705"}}