资讯伦理守则现况:以社会层级及伦理议题分析
Paradice, D.B. and Dejoie R.M.
1991 The Ethical Decision-Making Process of Information Systems Workers, J. of Business Ethics 10, 57-77.
Parnas, D.L.
1987 SDI: A violation of professional responsibilit, .Abacus 4, 2, 46-52.
Perrolle, J.A.
1987 Computers and Social Change: Information, Property and Power, Wadsworth, Belmont, Calif.
Perrolle, J.
1991 Conversations and trust in computer interfaces. In Computers and Controversy, Dunlop and Kling, Eds., 8
Pierce, M.A. and Henry, J.W.
1996 Computer Ethics: the Role of Personal, Informal, and Formal Codes, J. of Business Ethics, 15, 425-437.
Pressman, R.S. and Herron, R.
1991 Software Shock: The Danger and the Opportunity, Dorsett House.
Shim, J.P. and Taylor, G.S.
1988 Business Faculty Members' Perceptions of Unauthorized Software Coping, OR/MS Today 15, 30-31.
Sipior, J. and Ward, B.
1994 E-mail: employee privacy vs. Orginizational monitoring, Working paper, Villanova University.
Smith, G.V. and Parr, R.L.
1993 Intellectual Property, John Wiley & Sons, New York.
Smith, H.J., Milberg, S.J. and Burke, S.J.
1996 Information Privacy: Measuring Individuals' Concerns About Organizational Pratices, MIS Quarterly, 167-195.
Spafford, G.
1992 Are computer hacker berak-ins ethical? J. Syst. Softw. 17
Taylor, G.S. and Davis,, J.S.
1989 Individual Privacy and Computer-Based Human Resource Resource Information System, J. of Business Ethics 8, 569-576.
Stevenson, J.T.
1987 Engineering Ethics: Pratices and Principles, Canadian Scholars Press. Toronto.
Susan, A.
1993 A comparison of expert's and high tech stduents' ethical beliefs in compter-related situations, Journal of business ethics 12, 359-370.
Vitell,S. and Davis,D.L.
1990 Ethical beliefs of MIS professionals: the frequency and opportunity for unethical behavior, Journal of business ethics 9, 63-70.
Weinberg, G.M.
1971 The psychology of Computer Programming, New York, USA: Van Nostrand Reinhold Company.
Tags:
作者:佚名评论内容只代表网友观点,与本站立场无关!
评论摘要(共 0 条,得分 0 分,平均 0 分)
查看完整评论