Ethics and Information Systems: The Corporate Domain
暂无分享,去创建一个
[1] T. Jones,et al. An Agent Morality View of Business Policy , 1995 .
[2] H. J. Smith,et al. Managing Privacy: Information Technology and Corporate America , 1994 .
[3] Dan Farrell. Exit, Voice, Loyalty, and Neglect as Responses to Job Dissatisfaction: A Multidimensional Scaling Study , 1983 .
[4] R. Mason. Four ethical issues of the information age , 1986 .
[5] Debra L. Shapiro,et al. Voice and justification: Their influence on procedural fairness judgments. , 1988 .
[6] John Kultgen,et al. Donaldson’s Social Contract for Business , 1986 .
[7] Thomas Donaldson,et al. The ethics of international business , 1989 .
[8] F. McFarlan,et al. Corporate Information Systems Management: Issues Facing Senior Executives , 1995 .
[9] E. Kallman,et al. Ethical Decision Making and Information Technology: An Introduction with Cases , 1996 .
[10] Thomas M. Jones,et al. Corporate Social Responsibility Revisited, Redefined , 1980 .
[11] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[12] Keith W. Miller,et al. How good is good enough?: an ethical analysis of software construction and use , 1994, CACM.
[13] Thomas W. Dunfee,et al. Toward A Unified Conception Of Business Ethics: Integrative Social Contracts Theory , 1994 .
[14] Effy Oz,et al. When professional standards are lax: the CONFIRM failure and its lessons , 1994, CACM.
[15] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[16] Jeff Smith,et al. Privacy policies and practices: inside the organizational maze , 1993, CACM.
[17] Effy Oz,et al. Ethical Standards for Information Systems Professionals: A Case for a Unified Code , 1992, MIS Q..
[18] Marcia P. Miceli,et al. Blowing the whistle : the organizational and legal implications for companies and employees , 1993 .
[19] L. Preston,et al. The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications , 1995 .
[20] Karen D. Loch,et al. Evaluating ethical decision making and computer use , 1996, CACM.
[21] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[22] J Hagel,et al. The coming battle for customer information. , 1997, Harvard business review.
[23] I. Kant,et al. Grounding for the metaphysics of morals , 1981 .
[24] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[25] Kenneth C. Laudon,et al. Ethical concepts and information technology , 1995, CACM.
[26] R. Edward Freeman,et al. Ethics and Agency Theory: An Introduction , 1992 .
[27] Florence M. Mason,et al. Ethics of information management , 1995 .
[28] Karen D. Loch,et al. Ethics and computer use , 1995, CACM.
[29] Deborah G. Johnson,et al. Computer ethics (2nd ed.) , 1994 .
[30] Bruce A. Reinig,et al. Managing user perceptions of email privacy , 1995, CACM.
[31] D. Parker,et al. Ethical conflicts in information and computer science, technology, and business , 1990 .
[32] John Hasnas. The Normative Theories of Business Ethics: A Guide for the Perplexed , 1998, Business Ethics Quarterly.
[33] A Stark,et al. What's the matter with business ethics? , 1993, Harvard business review.
[34] A. Branscomb. Who Owns Information?: From Privacy To Public Access , 1994 .
[35] Milton Friedman,et al. Capitalism and Freedom , 1963 .
[36] Effy Oz. Ethics for the Information Age , 1993 .
[37] H. J. Smith,et al. Database Marketing: New Rules for Policy and Practice , 1993 .
[38] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..