Information Security and Ethics: Concepts, Methodologies, Tools and Applications
暂无分享,去创建一个
[1] Emmanuel Lévinas,et al. Le temps et l'autre , 1983 .
[2] Dan Schiller,et al. Digital Capitalism: Networking the Global Market System , 1999 .
[3] John Martin Fischer,et al. Recent Work on Moral Responsibility* , 1999, Ethics.
[4] Lucas D. Introna. Privacy and the computer: why we need privacy in the information society , 1997 .
[5] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[6] Janusz R. Getta,et al. Hybrid Concurrency Control in Multilevel Secure Database Systems , 2003, Applied Informatics.
[7] Bryan W. Husted,et al. Is it ethical to use ethics as strategy , 2000 .
[8] A. Goldman. Why Citizens Should Vote: A Causal Responsibility Approach , 1999 .
[9] Patricia H. Werhane,et al. Persons, rights, and corporations , 1985 .
[10] H. Kreikebaum,et al. Grundlagen der Unternehmensethik , 1996 .
[11] Pekka Nikander,et al. Users and Trust in Cyberspace (Transcript of Discussion) , 2000, Security Protocols Workshop.
[12] Richard J. Severson,et al. The Principles of Information Ethics , 1997 .
[13] M. Healy,et al. The impact of information and communications technology on managerial practices: the use of codes of conduct , 2003 .
[14] Benjamin Kuipers,et al. Computer power and human reason , 1976, SGAR.
[15] Bernd Carsten Stahl. Das kollektive Subjekt der Verantwortung , 2000 .
[16] Simon Rogerson. Ethical Aspects of Information Technology: Issues for Senior Executives , 1998 .
[17] J. Rutter. From the Sociology of Trust Towards a Sociology of 'E-trust , 2001 .
[18] Sirkka L. Jarvenpaa,et al. The Use of Information Technology to Enhance Management School Education: A Theoretical View , 1995, MIS Q..
[19] Bernd Carsten Stahl,et al. Responsible Management of Information Systems , 2003 .
[20] Hans Lenk,et al. Verantwortung und soziale Fallen , 1990 .
[21] Edward Skoudis. Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses , 2001 .
[22] M. Ronald Buckley,et al. The Hypothesized Relationship Between Accountability and Ethical Behavior , 2001 .
[23] H. Jonas. Das Prinzip Verantwortung , 1979 .
[24] Sushil Jajodia,et al. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[25] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[26] William Perrizo. Request order linked list (ROLL): a concurrency control object for centralized and distributed database systems , 1991, [1991] Proceedings. Seventh International Conference on Data Engineering.
[27] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[28] Thomas W. Dunfee,et al. How Binding the Ties? Business Ethics as Integrative Social ContractsTies That Bind: A Social Contracts Approach to Business Ethics , 1999 .
[29] William Bechtel,et al. ATTRIBUTING RESPONSIBILITY TO COMPUTER SYSTEMS , 1985 .
[30] Immanuel Kant,et al. Kritik der praktischen Vernunft ; Grundlegung zur Metaphysik der Sitten , 1974 .
[31] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[32] Duncan Langford. Business Computer Ethics , 1999 .
[33] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[34] Paul Ricoeur. Soi même comme un autre , 1990 .
[35] Adam Rifkin,et al. Trust Management on the World Wide Web , 1998, Comput. Networks.
[36] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[37] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[38] H. L. A. Hart,et al. Punishment and Responsibility: Essays in the Philosophy of Law , 1968 .
[39] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[40] Jayant R. Haritsa,et al. Secure transaction processing in firm real-time database systems , 1997, SIGMOD '97.
[41] Robert Boncella. Internet Privacy: At Home and At Work , 2001, Commun. Assoc. Inf. Syst..
[42] Andrew B. Whinston,et al. Defeating distributed denial of service attacks , 2000 .
[43] John E. R. Staddon,et al. On Responsibility in Science and Law , 1999, Social Philosophy and Policy.
[44] Donald Gotterbarn,et al. Using the new ACM code of ethics in decision making , 1993, CACM.
[45] L. Jean Camp. Web Security and Privacy: An American Perspective , 1999, Inf. Soc..
[46] Bev Littlewood,et al. THE RISKS OF SOFTWARE , 1992 .
[47] Bernd Carsten Stahl,et al. Ethical issues in e-teaching-A theoretical framework , 2002 .
[48] Sven Dietrich,et al. Analyzing Distributed Denial of Service Tools: The Shaft Case , 2000, LISA.
[49] Paul J Criscuolo,et al. Distributed Denial of Service: Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319 , 2000 .
[50] Jaideep Srivastava,et al. Multilevel secure database concurrency control , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.
[51] M. Velasquez. Business Ethics: Concepts and Cases , 1982 .
[52] John Weckert,et al. Computer and Information Ethics , 1997 .
[53] Kurt Bayertz,et al. Verantwortung : Prinzip oder Problem? , 1995 .
[54] Laura P. Hartman,et al. Technology and Ethics: Privacy in the Workplace , 2001 .
[55] Irma van der Ploeg. Written on the body: biometrics and identity , 1999, CSOC.
[56] Marc Neuberg. La responsabilité : questions philosophiques , 1997 .
[57] Janice C. Sipior,et al. The ethical and legal quandary of email privacy , 1995, CACM.
[58] M. Castells,et al. The Hacker Ethic and the Spirit of the Information Age , 2001 .
[59] Norman E. Bowie,et al. Book Review , 2001, Business Ethics Quarterly.
[60] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[61] Ruby B. Lee,et al. Remote Denial of Service Attacks and Countermeasures , 2001 .
[62] Blake Ives,et al. Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effectiveness in Basic It Skills Training Author(s): Piccoli Et Al./web-based Virtual Learning Environments Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effe , 2022 .
[63] Otfried Höffe,et al. Moral als Preis der Moderne : ein Versuch über Wissenschaft, Technik und Umwelt , 1993 .
[64] Harry G. Frankfurt. Alternate Possibilities and Moral Responsibility , 1969 .
[65] Hans Lenk,et al. Konkrete Humanität : Vorlesungen über Verantwortung und Menschlichkeit , 1998 .
[66] R. Posner. Philosophical Dimensions of Privacy: An economic theory of privacy , 1984 .
[67] Sonja Grabner-Kraeuter. The Role of Consumers' Trust in Online-Shopping , 2002 .
[68] D. Norris,et al. Electronic Government at the Local Level , 2003 .
[69] Reagan M. Ramsower,et al. Cyberethics: Social and Moral Issues in the Computer Age , 2000 .
[70] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[71] Michael Stocker,et al. Responsibility and the Abuse Excuse , 1999, Social Philosophy and Policy.
[72] R. Mason. Four ethical issues of the information age , 1986 .
[73] Bhavani M. Thuraisingham,et al. Improving timeliness in real-time secure database systems , 1996, SGMD.
[74] J. Habermas. Theorie des kommunikativen Handelns , 1981 .
[75] R. Jay Wallace,et al. Responsibility and the moral sentiments , 1997 .
[76] J. Rachels. Why privacy is important , 1985 .
[77] Sungyoung Lee,et al. A secure dynamic copy protocol in real-time secure database systems , 1999, LCTES '99.
[78] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[79] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[80] R. Spinello. Case studies in information and computer ethics , 1996 .
[81] William S. Brown. Ontological Security, Existential Anxiety and Workplace Privacy , 2000 .
[82] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[83] Marc Rotenberg,et al. Communications privacy: implications for network design , 1993, CACM.