Developing ethical practices to minimise computer misuse
暂无分享,去创建一个
[1] Adrian R. Warman. Computer Security within Organizations , 1993 .
[2] D. Parker,et al. Ethical conflicts in information and computer science, technology, and business , 1990 .
[3] David Davies. The Nature of computer crime - a risk management perspective , 1986, Comput. Law Secur. Rev..
[4] James Backhouse,et al. Managing computer crime: a research outlook , 1995, Comput. Secur..
[5] Walter Maner. Unique ethical problems in information technology , 1996 .
[6] Ronald E. Anderson,et al. The ACM code of ethics: history, process, and implications , 1994 .
[7] D. Parker. Computer Security Management , 1981 .
[8] James Backhouse,et al. Understanding Information: An Introduction , 1990 .
[9] Michael Clarke,et al. Business Crime: Its Nature and Control , 1990 .
[10] R. Kling. Computerization and Controversy , 1997 .
[11] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[12] Keith W. Miller,et al. How good is good enough?: an ethical analysis of software construction and use , 1994, CACM.
[13] Donald Gotterbarn,et al. The use and abuse of computer ethics , 1992, J. Syst. Softw..
[14] Terrell Ward Bynum,et al. Teaching computer ethics , 1992 .
[15] David Icove,et al. Computer crime - a crimefighter's handbook , 1995, Computer security.
[16] Enid Mumford,et al. Systems Design Ethical Tools for Ethical Change , 1996 .
[17] R. Kling,et al. Book Review: Computerization and Controversy: Value Conflicts and Social Choices , 1991 .
[18] Karen D. Loch,et al. Ethics and information technology use: a factor analysis of attitudes to computer use , 1995, Inf. Syst. J..
[19] Deborah G. Johnson. Computer Ethics , 1985 .
[20] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[21] Karen D. Loch,et al. Evaluating ethical decision making and computer use , 1996, CACM.
[22] James Backhouse,et al. Risks in the use of information technology within organizations , 1996 .
[23] D. Parker. Crime by computer , 1976 .
[24] Phillip W. Balsmeier,et al. The ethics of sentencing white-collar criminals , 1996 .
[25] Thomas W. Dunfee,et al. Toward A Unified Conception Of Business Ethics: Integrative Social Contracts Theory , 1994 .
[26] J. T. Delaney,et al. Do company ethics training programs make a difference? An empirical analysis , 1992 .
[27] J. R. G. Wood,et al. How we profess: the ethical systems analyst , 1996, CACM.
[28] Terrell Ward Bynum,et al. Computer ethics in the computer science curriculum , 1992 .
[29] J. Lozano,et al. Ethics and management: A controversial issue , 1996 .
[30] Richard A. Spinello. Ethical Aspects of Information Technology , 1994 .
[31] Leslie Regan Shade. Book Review: Social Issues in Computing: Putting Computing In Its Place Edited by Chuck Huff and Thomas Finholt (McGraw-Hill, Inc., 1994) , 1994, CSOC.