Data Mining: Proprietary Rights, People and Proposals
暂无分享,去创建一个
Cherie Courseault Trumbach | Dinah Payne | D. Payne | C. C. Trumbach | C. Trumbach | Cherie Courseault Trumbach
[1] J. R. G. Wood,et al. How we profess: the ethical systems analyst , 1996, CACM.
[2] G. Brenkert. Trust, Morality and International Business , 1998, Business Ethics Quarterly.
[3] H. Joseph Wen,et al. Data mining: Consumer privacy, ethical policy, and systems development practices , 2003 .
[4] A. Danna,et al. All That Glitters is Not Gold: Digging Beneath the Surface of Data Mining , 2002 .
[5] Barry Berman,et al. Data mining: On the trail to marketing gold , 2004 .
[6] Larry Alexander,et al. Decision support systems in the 21st century , 2002, SOEN.
[7] Deborah G. Johnson,et al. Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness , 2002, Inf. Soc..
[8] Peter Levine,et al. Information technology and the social construction of information privacy: Comment , 2003 .
[9] P. Dasgupta. Trust as a commodity , 1988 .
[10] G. Brenkert. Trust, Business and Business Ethics: An Introduction , 1998, Business Ethics Quarterly.
[11] D. George,et al. Competing with integrity in international business , 1993 .
[12] John F. Roddick,et al. On the impact of knowledge discovery and data mining , 2000 .
[13] Cecily Raiborn,et al. Corporate codes of conduct: A collective conscience and continuum , 1990 .
[14] Suzanne W. Morse,et al. Teaching Temperance to the 'Cookie Monster': Ethical Challenges to Data Mining and Direct Marketing , 2002 .
[15] Brett J. L. Landry,et al. Similarities in Business and IT Professional Ethics: The Need for and Development of A Comprehensive Code of Ethics , 2005 .
[16] L. Paine. Managing for Organizational Integrity. , 1994 .
[17] Marketing, Consumers and Technology: Perspectives for Enhancing Ethical Transactions , 2006, Business Ethics Quarterly.
[18] Amir M. Hormozi,et al. Data Mining: A Competitive Weapon for Banking and Retail Industries , 2004, Inf. Syst. Manag..
[19] Geert Wets,et al. Why promotion strategies based on market basket analysis do not work , 2005, Expert Syst. Appl..
[20] J Quittner,et al. Invasion of privacy. , 1997, Time.
[21] Ian Witten,et al. Data Mining , 2000 .
[22] C. R. Baker,et al. Information Technology and the Social Construction of Information Privacy , 2001 .