Wo sind die Grenzen des verantwortbaren Computereinsatzes? -- Die Stellungnahme. Floyd, C. Informatik Spektrum, 8(1):3--6, 2, 1985. bibtex @article{Floyd1985a,
author = {Christiane Floyd},
title = {{Wo sind die Grenzen des verantwortbaren
Computereinsatzes? -- Die Stellungnahme}},
journal = {Informatik Spektrum},
pages = {3--6},
year = 1985,
month = 2,
volume = 8,
number = 1,
issn = {0170-6012},
}
Downloads: 0
{"_id":"kfA3szD9EZRQeXCCk","bibbaseid":"floyd-wosinddiegrenzendesverantwortbarencomputereinsatzesdiestellungnahme-1985","downloads":0,"creationDate":"2017-12-10T11:20:55.676Z","title":"Wo sind die Grenzen des verantwortbaren Computereinsatzes? -- Die Stellungnahme","author_short":["Floyd, C."],"year":1985,"bibtype":"article","biburl":"http://ddi.uni-wuppertal.de/forschung/Komplett.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Christiane"],"propositions":[],"lastnames":["Floyd"],"suffixes":[]}],"title":"Wo sind die Grenzen des verantwortbaren Computereinsatzes? -- Die Stellungnahme","journal":"Informatik Spektrum","pages":"3--6","year":"1985","month":"2","volume":"8","number":"1","issn":"0170-6012","bibtex":"@article{Floyd1985a,\n author = {Christiane Floyd},\n title = {{Wo sind die Grenzen des verantwortbaren\n Computereinsatzes? -- Die Stellungnahme}},\n journal = {Informatik Spektrum},\n pages = {3--6},\n year = 1985,\n month = 2,\n volume = 8,\n number = 1,\n issn = {0170-6012},\n}\n\n","author_short":["Floyd, C."],"key":"Floyd1985a","id":"Floyd1985a","bibbaseid":"floyd-wosinddiegrenzendesverantwortbarencomputereinsatzesdiestellungnahme-1985","role":"author","urls":{},"downloads":0,"html":""},"search_terms":["sind","die","grenzen","des","verantwortbaren","computereinsatzes","die","stellungnahme","floyd"],"keywords":[],"authorIDs":[],"dataSources":["6BepyHGwnjChmJuia"]}