资讯伦理守则现况:以社会层级及伦理议题分析(7)
作者:佚名; 更新时间:2014-12-05
M., Grato, C., Gravander, J., and Tuttle, M.
1987 A Behavioral Model of Ethical and Unethical Decision Making. J. of Business Ethics 6, 265-280.
Brooks, L.J.
1989 Corporate ethical performance: trend, forecasts and outlooks. Journal of business ethics 8,, 31-38.
Bynum, T.W., Maner, W. and Fodor, J., Eds.
1992 Software Ownership and intellectual Property Rights. Research Center on Computing and Society, Southern Connecticut State University, New Haven, Conn. 06515.
Clark, D.
1990 Computers at Risk.: Safe Computing in the Information Age. National Research Council, National Academy Press, Washington, D.C.
Collins, W.R., Miller, K.W., Spielman, B.J., and Wherry, P.
1994 How Good is Good Enough, Comm. ACM 37, 1, 81-91.
Conger, S., Loch, K.D., and Helft, B.L.
1995 Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use, Info. Sys. Journal, 5, 161-184.
Conger, S. and Loch, K.D.
1995 Ethics and Computer Use, CACM 38, 12, 31-39.
Denning, P.J., Ed.
1990 Computers under Attack: Intruders, Worms and Viruses, Addison-Wesley, Inc., Reading Mass.
Deipie, R., Flower, G., and Paradice, D.
1991 Ethical Issues in Information System. Boyd & Fraster Publishing Company, Boston, MA 02116.
Guynes, C.S.
1989 Protecting statistical databases: A matter of privacy, Comput. Soc. 19, 1, 15-23.
Effy,Oz.
1992 Ethical standards for information system professionals:a case for a unified code, MIS Quarterly, 423-433. Effy, Oz.
1993 Ethical Standards for Computer professionals:A Comparative Analysis of Four Major Codes, Journal of Business Ethics, 12, 709-726.
Elmer-Dewitt, P.
1994 Nabbing the pirates of cyberspace, Time, 143, 24, 62-63.
Frankena, W.K.
1963 Ethics, Englewood Cliffs, N.J., Prentice Hall.
Frankel,Mark.S.
1989 Professional codes: why, how and with what impacts?, Journal of business ethics 8, 31-38.
Forester, T.
1990 Software theft and the problem of the intellectual property rights, Comput. Soc.. 20, 1, 2-11.
Frenkel, K.A.
1990 Woman and Computing, Commun. of the ACM 33, 11, 34-46.
Gotterbarn, D.
1991 Computer ethics: Responsibility regained, National Forum.
Hoffman, W.M. and Moore, J.M.
1981 Ethics and the Management of Computer Technology, Proceeding of the Fourth National Conference on Business Ethics, Bentley College, Waltham, Massachusetts, 02254, USA.
Huff,C. and Martin,C.D.
1995 Computing consequences: a framework for teaching ethical computing, Commu. of the ACM 38, 12, 75-84.
Johnson, D.G.
1984 Computer Ethics, Englewood Cliffs, New Jersey, USA: Prentice Hall.
Johnson, D.G.
1985 Equal Access to Computing, Computer Expertise, and Decision Making About Computer, Business and Professional Ethics Journal 4, 3&4, 95-103.
Johnson, D.W.
1985 Computer Ethics: A Guide for the New Age, Elgin, Illions, USA: The Brethren Press.
Khazanchi, D.
1995 Unethical Behavior in Information Systems: the Gender Factor, Journal of Business Ethics 14, 741-649.
Laudon, K.C.
1986 Dossier Society: Value Choice in the design of National Information Systems, Columbia University Press. New York, N.Y.
Lee, G.M., Eining, M.M., and Long, C.P.
1994 Information Ethics: A Comparision Among College Students from Mainland China, Hong Kong and Taiwan. Hong Kong Journal of Business Management 7, 17-35.
Lowis,P.V.
1985 Defining business ethics like nailing jello to a wall, Journal of business ethics 4, 377-383.
Mason, R.O.
1986 Four ethical issues of the information age, MISQ, 5-12.
Masson, R.O.
1995 Ethics to Information Technology Issues, Commu. ACM 38, 12, 55-57.
Messick, D.M. and Bazerman, M.H.
1996 Ethical Leadership and the Psychology of Decision Making. Sloan Management Review, 9-22.
Miller, A.
1991 Computers and Privacy. In: Ethical Issues in Information System, De Joie, R. Flower, G. and Paradice, D. (eds), Boyd&Fraser, Bostom, 118-123.
Parker, D.B.
1990 Ethical Conflicts in Computer Science and Technology, AFIP Press.
Parker, D.B.
1981 Ethical Dilemmas in Computer Technology. Ethics and Management of Computer Technology, Proceedings of the Fourth National Conference on Business Ethics, Bentley College, Waltham, Massachusetts, 02254, USA.
Paradice, D.B. and Dejoie R.M.
1991 The Ethical Decision-Making Process of Information Systems Workers, J. of Business Ethics 10, 57-77.
Parnas, D.L.
1987 SDI: A violation of professional responsibilit, .Abacus 4, 2, 46-52.
Perrolle, J.A.
1987 Computers and Social Change: Information, Property and Power, Wadsworth, Belmont, Calif.
Perrolle, J.
1991 Conversations and trust in computer interfaces. In Computers and Controversy, Dunlop and Kling, Eds., 8
Pierce, M.A. and Henry, J.W.
1996 Computer Ethics: the Role of Personal, Informal, and Formal Codes, J. of Business Ethics, 15, 425-437.
Pressman, R.S. and Herron, R.
1991 Software Shock: The Danger and the Opportunity, Dorsett House.
Shim, J.P. and Taylor, G.S.
1988 Business Faculty Members' Perceptions of Unauthorized Software Coping, OR/MS Today 15, 30-31.
Sipior, J. and Ward, B.
1994 E-mail: employee privacy vs. Orginizational monitoring, Working paper, Villanova University.
Smith, G.V. and Parr, R.L.
1993 Intellectual Property, John Wiley & Sons, New York.
Smith, H.J., Milberg, S.J. and Burke, S.J.
1996 Information Privacy: Measuring Individuals' Concerns About Organizational Pratices, MIS Quarterly, 167-195.
Spafford, G.
1992 Are computer hacker berak-ins ethical? J. Syst. Softw. 17
Taylor, G.S. and Davis,, J.S.
1989 Individual Privacy and Computer-Based Human Resource Resource Information System, J. of Business Ethics 8, 569-576.
Stevenson, J.T.
1987 Engineering Ethics: Pratices and Principles, Canadian Scholars Press. Toronto.
Susan, A.
1993 A comparison of expert's and high tech stduents' ethical beliefs in compter-related situations, Journal of business ethics 12, 359-370.
Vitell,S. and Davis,D.L.
1990 Ethical beliefs of MIS professionals: the frequency and opportunity for unethical behavior, Journal of business ethics 9, 63-70.
Weinberg, G.M.
1971 The psychology of Computer Programming, New York, USA: Van Nostrand Reinhold Company.
1987 A Behavioral Model of Ethical and Unethical Decision Making. J. of Business Ethics 6, 265-280.
Brooks, L.J.
1989 Corporate ethical performance: trend, forecasts and outlooks. Journal of business ethics 8,, 31-38.
Bynum, T.W., Maner, W. and Fodor, J., Eds.
1992 Software Ownership and intellectual Property Rights. Research Center on Computing and Society, Southern Connecticut State University, New Haven, Conn. 06515.
Clark, D.
1990 Computers at Risk.: Safe Computing in the Information Age. National Research Council, National Academy Press, Washington, D.C.
Collins, W.R., Miller, K.W., Spielman, B.J., and Wherry, P.
1994 How Good is Good Enough, Comm. ACM 37, 1, 81-91.
Conger, S., Loch, K.D., and Helft, B.L.
1995 Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use, Info. Sys. Journal, 5, 161-184.
Conger, S. and Loch, K.D.
1995 Ethics and Computer Use, CACM 38, 12, 31-39.
Denning, P.J., Ed.
1990 Computers under Attack: Intruders, Worms and Viruses, Addison-Wesley, Inc., Reading Mass.
Deipie, R., Flower, G., and Paradice, D.
1991 Ethical Issues in Information System. Boyd & Fraster Publishing Company, Boston, MA 02116.
Guynes, C.S.
1989 Protecting statistical databases: A matter of privacy, Comput. Soc. 19, 1, 15-23.
Effy,Oz.
1992 Ethical standards for information system professionals:a case for a unified code, MIS Quarterly, 423-433. Effy, Oz.
1993 Ethical Standards for Computer professionals:A Comparative Analysis of Four Major Codes, Journal of Business Ethics, 12, 709-726.
Elmer-Dewitt, P.
1994 Nabbing the pirates of cyberspace, Time, 143, 24, 62-63.
Frankena, W.K.
1963 Ethics, Englewood Cliffs, N.J., Prentice Hall.
Frankel,Mark.S.
1989 Professional codes: why, how and with what impacts?, Journal of business ethics 8, 31-38.
Forester, T.
1990 Software theft and the problem of the intellectual property rights, Comput. Soc.. 20, 1, 2-11.
Frenkel, K.A.
1990 Woman and Computing, Commun. of the ACM 33, 11, 34-46.
Gotterbarn, D.
1991 Computer ethics: Responsibility regained, National Forum.
Hoffman, W.M. and Moore, J.M.
1981 Ethics and the Management of Computer Technology, Proceeding of the Fourth National Conference on Business Ethics, Bentley College, Waltham, Massachusetts, 02254, USA.
Huff,C. and Martin,C.D.
1995 Computing consequences: a framework for teaching ethical computing, Commu. of the ACM 38, 12, 75-84.
Johnson, D.G.
1984 Computer Ethics, Englewood Cliffs, New Jersey, USA: Prentice Hall.
Johnson, D.G.
1985 Equal Access to Computing, Computer Expertise, and Decision Making About Computer, Business and Professional Ethics Journal 4, 3&4, 95-103.
Johnson, D.W.
1985 Computer Ethics: A Guide for the New Age, Elgin, Illions, USA: The Brethren Press.
Khazanchi, D.
1995 Unethical Behavior in Information Systems: the Gender Factor, Journal of Business Ethics 14, 741-649.
Laudon, K.C.
1986 Dossier Society: Value Choice in the design of National Information Systems, Columbia University Press. New York, N.Y.
Lee, G.M., Eining, M.M., and Long, C.P.
1994 Information Ethics: A Comparision Among College Students from Mainland China, Hong Kong and Taiwan. Hong Kong Journal of Business Management 7, 17-35.
Lowis,P.V.
1985 Defining business ethics like nailing jello to a wall, Journal of business ethics 4, 377-383.
Mason, R.O.
1986 Four ethical issues of the information age, MISQ, 5-12.
Masson, R.O.
1995 Ethics to Information Technology Issues, Commu. ACM 38, 12, 55-57.
Messick, D.M. and Bazerman, M.H.
1996 Ethical Leadership and the Psychology of Decision Making. Sloan Management Review, 9-22.
Miller, A.
1991 Computers and Privacy. In: Ethical Issues in Information System, De Joie, R. Flower, G. and Paradice, D. (eds), Boyd&Fraser, Bostom, 118-123.
Parker, D.B.
1990 Ethical Conflicts in Computer Science and Technology, AFIP Press.
Parker, D.B.
1981 Ethical Dilemmas in Computer Technology. Ethics and Management of Computer Technology, Proceedings of the Fourth National Conference on Business Ethics, Bentley College, Waltham, Massachusetts, 02254, USA.
Paradice, D.B. and Dejoie R.M.
1991 The Ethical Decision-Making Process of Information Systems Workers, J. of Business Ethics 10, 57-77.
Parnas, D.L.
1987 SDI: A violation of professional responsibilit, .Abacus 4, 2, 46-52.
Perrolle, J.A.
1987 Computers and Social Change: Information, Property and Power, Wadsworth, Belmont, Calif.
Perrolle, J.
1991 Conversations and trust in computer interfaces. In Computers and Controversy, Dunlop and Kling, Eds., 8
Pierce, M.A. and Henry, J.W.
1996 Computer Ethics: the Role of Personal, Informal, and Formal Codes, J. of Business Ethics, 15, 425-437.
Pressman, R.S. and Herron, R.
1991 Software Shock: The Danger and the Opportunity, Dorsett House.
Shim, J.P. and Taylor, G.S.
1988 Business Faculty Members' Perceptions of Unauthorized Software Coping, OR/MS Today 15, 30-31.
Sipior, J. and Ward, B.
1994 E-mail: employee privacy vs. Orginizational monitoring, Working paper, Villanova University.
Smith, G.V. and Parr, R.L.
1993 Intellectual Property, John Wiley & Sons, New York.
Smith, H.J., Milberg, S.J. and Burke, S.J.
1996 Information Privacy: Measuring Individuals' Concerns About Organizational Pratices, MIS Quarterly, 167-195.
Spafford, G.
1992 Are computer hacker berak-ins ethical? J. Syst. Softw. 17
Taylor, G.S. and Davis,, J.S.
1989 Individual Privacy and Computer-Based Human Resource Resource Information System, J. of Business Ethics 8, 569-576.
Stevenson, J.T.
1987 Engineering Ethics: Pratices and Principles, Canadian Scholars Press. Toronto.
Susan, A.
1993 A comparison of expert's and high tech stduents' ethical beliefs in compter-related situations, Journal of business ethics 12, 359-370.
Vitell,S. and Davis,D.L.
1990 Ethical beliefs of MIS professionals: the frequency and opportunity for unethical behavior, Journal of business ethics 9, 63-70.
Weinberg, G.M.
1971 The psychology of Computer Programming, New York, USA: Van Nostrand Reinhold Company.
下一篇:MFC中消息映射机制分析
热门论文