Ethical issues of information and business: a critical perspective.
暂无分享,去创建一个
[1] Benjamin J. Goold,et al. Public Area Surveillance and Police Work: the impact of CCTV on police behaviour and autonomy , 2002 .
[2] M. Velasquez. Business Ethics: Concepts and Cases , 1982 .
[3] L. Jean Camp,et al. First Principles of Copyright for DRM Design , 2003, IEEE Internet Comput..
[4] E. Gonzalez. Defining a Post-Conventional Corporate Moral Responsibility , 2002 .
[5] Richard T. DeGeorge,et al. The Ethics of Information Technology and Business , 2002 .
[6] D. Nye,et al. The 'Privacy in Employment' Critique: A Consideration of Some of the Arguments for 'Ethical' HRM Professional Practice , 2002 .
[7] When Good Companies Do Bad Things: Responsibility and Risk in an Age of Globalization , 1999 .
[8] A. Philips. The Clash of Civilisations , 2007 .
[9] Donald Gotterbarn,et al. Using the new ACM code of ethics in decision making , 1993, CACM.
[10] Daniel M. Hausman,et al. Economic analysis and moral philosophy , 1996 .
[11] P. Koslowski. The Limits of Shareholder Value , 2000 .
[12] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[13] Keng Siau,et al. Acceptable internet use policy , 2002, CACM.
[14] Benjamin Kuipers,et al. Computer power and human reason , 1976, SGAR.
[15] Patricia H. Werhane,et al. Persons, rights, and corporations , 1985 .
[16] J. Collier,et al. Thinking for the future: global corporate responsibility in the twenty-first century , 2005 .
[17] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[18] Leonard M. Jessup,et al. Does electronic monitoring of employee internet usage work? , 2002, CACM.
[19] John Hasnas. The Normative Theories of Business Ethics: A Guide for the Perplexed , 1998, Business Ethics Quarterly.
[20] J. Alfred French. The business knowledge investment: building architected information , 1990 .
[21] Lawrence Lessig,et al. The Laws of Cyberspace , 1998 .
[22] Amartya Sen,et al. On Ethics and Economics , 1988 .
[23] M. Foucault,et al. Surveiller et punir: Naissance de la prison , 1977 .
[24] Enid Mumford,et al. Redesigning Human Systems , 2003 .
[25] Reagan M. Ramsower,et al. Cyberethics: Social and Moral Issues in the Computer Age , 2000 .
[26] Robert Joseph Skovira,et al. The social contract revised: obligation and responsibility in the information society , 2003 .
[27] L. Preston,et al. The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications , 1995 .
[28] John Weckert,et al. Information Technology And Social Justice , 2006 .
[29] Duncan Langford. Business Computer Ethics , 1999 .
[30] Simon Rogerson,et al. RESPONSIBLE RISK ANALYSIS FOR SOFTWARE DEVELOPMENT: CREATING THE SOFTWARE DEVELOPMENT IMPACT STATEMENT , 2005 .
[31] U. Beck,et al. Was ist Globalisierung? : Irrtümer des Globalismus : Antworten auf Globalisierung , 1997 .
[32] Max Weber. Die protestantische Ethik und der Geist des Kapitalismus , 1993 .
[33] Norman E. Bowie,et al. Book Review , 2001, Business Ethics Quarterly.
[34] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[35] D. Doane. Beyond corporate social responsibility: minnows, mammoths and markets , 2005 .
[36] Herman T. Tavani,et al. Readings in Cyberethics , 2001 .
[37] Lucas D. Introna. Privacy and the computer: why we need privacy in the information society , 1997 .
[38] Florence M. Mason,et al. Ethics of information management , 1995 .
[39] R. Mason. Four ethical issues of the information age , 1986 .
[40] G. Dhillon,et al. Measuring Factors that Influence the Success of Internet Commerce , 2002, Inf. Syst. Res..
[41] H MoorJames. The future of computer ethics , 2001 .
[42] M. Albrow,et al. The impact of globalization on sociological concepts: Community, culture and milieu , 1994 .
[43] Andrea H. Tapia. Resistance or Deviance? A High-Tech Workplace During the Bursting of the Dot-Com Bubble , 2004, Relevant Theory and Informed Practice.
[44] Markku Wilenius. Towards the age of corporate responsibility? Emerging challenges for the business world , 2005 .
[45] Simon Rogerson,et al. Computer Ethics and Professional Responsibility , 2003 .
[46] Bernd Carsten Stahl,et al. Responsible Management of Information Systems , 2003 .
[47] James H. Moor,et al. Reason, relativity, and responsibility in computer ethics , 1998, CSOC.
[48] Robert Boncella. Internet Privacy: At Home and At Work , 2001, Commun. Assoc. Inf. Syst..
[49] Ram S. Sriram,et al. The Value Relevance of IT Investments on Firm Value in the Financial Services Sector , 2003, Inf. Resour. Manag. J..
[50] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[51] L. Jean Camp. Web Security and Privacy: An American Perspective , 1999, Inf. Soc..
[52] Patrick Grim,et al. Information and Meaning: Use-Based Models in Arrays of Neural Nets , 2004, Minds and Machines.
[53] Raymond R. Panko,et al. Monitoring for pornography and sexual harassment , 2002, CACM.
[54] Bruce A. Reinig,et al. Managing user perceptions of email privacy , 1995, CACM.
[55] D. Gauthier. Morals by Agreement , 1987 .
[56] Thomas W. Dunfee,et al. How Binding the Ties? Business Ethics as Integrative Social ContractsTies That Bind: A Social Contracts Approach to Business Ethics , 1999 .
[57] R. Nozick. Anarchy, State, and Utopia , 1975, Princeton Readings in Political Thought.
[58] Jacques N. Catudal. Censorship, the Internet, and the child pornography law of 1996: A critique , 2004, Ethics and Information Technology.
[59] Alison Adam,et al. Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine? , 2005, Ethics and Information Technology.
[60] Frances S. Grodzinsky,et al. The practitioner from within: revisiting the virtues , 1999, CSOC.
[61] M. Foucault,et al. Surveiller et punir: Naissance de la prison , 1993 .
[62] L. Floridi. © 1999 Kluwer Academic Publishers. Printed in the Netherlands. Information ethics: On the philosophical foundation of computer ethics ⋆ , 2022 .
[63] Philip Brey,et al. Disclosive computer ethics , 2000, CSOC.
[64] Kalle Lyytinen,et al. THE POVERTY OF SCIENTISM IN INFORMATION SYSTEMS , 2000 .
[65] Bernard Gert. Common morality and computing , 2004, Ethics and Information Technology.
[66] W. Block. Cyberslacking, Business Ethics and Managerial Economics , 2011 .
[67] Shoshana Zuboff,et al. In the Age of the Smart Machine: The Future of Work and Power , 1989 .
[68] Carlisle E. George. Copyright Management Systems - Accessing the power balance , 2005, The Information Society.
[69] Luciano Floridi,et al. Philosophy and Computing: An Introduction , 1999 .
[70] Geoff Walsham,et al. Ethical theory, codes of ethics and IS practice , 1996 .
[71] Rudy Hirschheim,et al. Analysing information systems evaluation: another look at an old problem , 1998 .
[72] Bill Doolin,et al. Power and resistance in the implementation of a medical management information system , 2004, Inf. Syst. J..
[73] J. Hendry. Economic contracts versus social relationships as a foundation for normative stakeholder theory , 2001 .
[74] Norbert Wiener,et al. The human use of human beings - cybernetics and society , 1988 .
[75] Richard J. Severson,et al. The Principles of Information Ethics , 1997 .
[76] Effy Oz,et al. Ethical Standards for Information Systems Professionals: A Case for a Unified Code , 1992, MIS Q..
[77] John Ladd. Ethics and the computer world: a new challenge for philosophers , 1997, CSOC.
[78] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .