{"doi":"https://doi.org/10.1007/s00146-013-0525-4","extern":"1","citation":{"bibtex":"@article{Matzner_2013, title={The model gap: cognitive systems in security applications and their ethical implications}, volume={31}, DOI={https://doi.org/10.1007/s00146-013-0525-4}, number={1}, journal={AI & SOCIETY}, author={Matzner, Tobias}, year={2013}, pages={95–102} }","mla":"Matzner, Tobias. “The Model Gap: Cognitive Systems in Security Applications and Their Ethical Implications.” AI & SOCIETY, vol. 31, no. 1, 2013, pp. 95–102, doi:https://doi.org/10.1007/s00146-013-0525-4.","ieee":"T. Matzner, “The model gap: cognitive systems in security applications and their ethical implications,” AI & SOCIETY, vol. 31, no. 1, pp. 95–102, 2013, doi: https://doi.org/10.1007/s00146-013-0525-4.","chicago":"Matzner, Tobias. “The Model Gap: Cognitive Systems in Security Applications and Their Ethical Implications.” AI & SOCIETY 31, no. 1 (2013): 95–102. https://doi.org/10.1007/s00146-013-0525-4.","apa":"Matzner, T. (2013). The model gap: cognitive systems in security applications and their ethical implications. AI & SOCIETY, 31(1), 95–102. https://doi.org/10.1007/s00146-013-0525-4","short":"T. Matzner, AI & SOCIETY 31 (2013) 95–102.","ama":"Matzner T. The model gap: cognitive systems in security applications and their ethical implications. AI & SOCIETY. 2013;31(1):95-102. doi:https://doi.org/10.1007/s00146-013-0525-4"},"publication":"AI & SOCIETY","author":[{"first_name":"Tobias","id":"65695","last_name":"Matzner","full_name":"Matzner, Tobias"}],"department":[{"_id":"757"}],"oa":"1","publication_identifier":{"issn":["0951-5666","1435-5655"]},"main_file_link":[{"url":"https://doi.org/10.1007/s00146-013-0525-4","open_access":"1"}],"issue":"1","volume":31,"date_updated":"2023-03-17T10:20:17Z","status":"public","date_created":"2021-11-30T16:24:04Z","intvolume":" 31","_id":"28146","page":"95-102","publication_status":"published","type":"journal_article","language":[{"iso":"eng"}],"user_id":"49063","title":"The model gap: cognitive systems in security applications and their ethical implications","year":"2013"}