用户登录  |  用户注册
首 页商业源码原创产品编程论坛
当前位置:PB创新网文章中心编程技巧计算机理论

资讯伦理守则现况:以社会层级及伦理议题分析

减小字体 增大字体 作者:佚名  来源:本站整理  发布时间:2009-01-10 12:06:16
alif.
Bommer, M., Grato, C., Gravander, J., and Tuttle, M.
1987 A Behavioral Model of Ethical and Unethical Decision Making. J. of Business Ethics 6, 265-280.
Brooks, L.J.
1989 Corporate ethical performance: trend, forecasts and outlooks. Journal of business ethics 8,, 31-38.
Bynum, T.W., Maner, W. and Fodor, J., Eds.
1992 Software Ownership and intellectual Property Rights. Research Center on Computing and Society, Southern Connecticut State University, New Haven, Conn. 06515.
Clark, D.
1990 Computers at Risk.: Safe Computing in the Information Age. National Research Council, National Academy Press, Washington, D.C.
Collins, W.R., Miller, K.W., Spielman, B.J., and Wherry, P.
1994 How Good is Good Enough, Comm. ACM 37, 1, 81-91.
Conger, S., Loch, K.D., and Helft, B.L.
1995 Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use, Info. Sys. Journal, 5, 161-184.
Conger, S. and Loch, K.D.
1995 Ethics and Computer Use, CACM 38, 12, 31-39.
Denning, P.J., Ed.
1990 Computers under Attack: Intruders, Worms and Viruses, Addison-Wesley, Inc., Reading Mass.
Deipie, R., Flower, G., and Paradice, D.
1991 Ethical Issues in Information System. Boyd & Fraster Publishing Company, Boston, MA 02116.
Guynes, C.S.
1989 Protecting statistical databases: A matter of privacy, Comput. Soc. 19, 1, 15-23.
Effy,Oz.
1992 Ethical standards for information system professionals:a case for a unified code, MIS Quarterly, 423-433. Effy, Oz.
1993 Ethical Standards for Computer professionals:A Comparative Analysis of Four Major Codes, Journal of Business Ethics, 12, 709-726.
Elmer-Dewitt, P.
1994 Nabbing the pirates of cyberspace, Time, 143, 24, 62-63.
Frankena, W.K.
1963 Ethics, Englewood Cliffs, N.J., Prentice Hall.
Frankel,Mark.S.
1989 Professional codes: why, how and with what impacts?, Journal of business ethics 8, 31-38.
Forester, T.
1990 Software theft and the problem of the intellectual property rights, Comput. Soc.. 20, 1, 2-11.
Frenkel, K.A.
1990 Woman and Computing, Commun. of the ACM 33, 11, 34-46.
Gotterbarn, D.
1991 Computer ethics: Responsibility regained, National Forum.
Hoffman, W.M. and Moore, J.M.
1981 Ethics and the Management of Computer Technology, Proceeding of the Fourth National Conference on Business Ethics, Bentley College, Waltham, Massachusetts, 02254, USA.
Huff,C. and Martin,C.D.
1995 Computing consequences: a framework for teaching ethical computing, Commu. of the ACM 38, 12, 75-84.
Johnson, D.G.
1984 Computer Ethics, Englewood Cliffs, New Jersey, USA: Prentice Hall.
Johnson, D.G.
1985 Equal Access to Computing, Computer Expertise, and Decision Making About Computer, Business and Professional Ethics Journal 4, 3&4, 95-103.
Johnson, D.W.
1985 Computer Ethics: A Guide for the New Age, Elgin, Illions, USA: The Brethren Press.
Khazanchi, D.
1995 Unethical Behavior in Information Systems: the Gender Factor, Journal of Business Ethics 14, 741-649.
Laudon, K.C.
1986 Dossier Society: Value Choice in the design of National Information Systems, Columbia University Press. New York, N.Y.
Lee, G.M., Eining, M.M., and Long, C.P.
1994 Information Ethics: A Comparision Among College Students from Mainland China, Hong Kong and Taiwan. Hong Kong Journal of Business Management 7, 17-35.
Lowis,P.V.
1985 Defining business ethics like nailing jello to a wall, Journal of business ethics 4, 377-383.
Mason, R.O.
1986 Four ethical issues of the information age, MISQ, 5-12.
Masson, R.O.
1995 Ethics to Information Technology Issues, Commu. ACM 38, 12, 55-57.
Messick, D.M. and Bazerman, M.H.
1996 Ethical Leadership and the Psychology of Decision Making. Sloan Management Review, 9-22.
Miller, A.
1991 Computers and Privacy. In: Ethical Issues in Information System, De Joie, R. Flower, G. and Paradice, D. (eds), Boyd&Fraser, Bostom, 118-123.
Parker, D.B.
1990 Ethical Conflicts in Computer Science and Technology, AFIP Press.
Parker, D.B.
1981 Ethical Dilemmas in Computer Technology. Ethics and Management of Computer Technology, Proce

上一页  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11]  下一页

Tags:

作者:佚名

文章评论评论内容只代表网友观点,与本站立场无关!

   评论摘要(共 0 条,得分 0 分,平均 0 分) 查看完整评论
PB创新网ourmis.com】Copyright © 2000-2009 . All Rights Reserved .
页面执行时间:5,640.62500 毫秒
Email:ourmis@126.com QQ:2322888 蜀ICP备05006790号