资讯伦理守则现况:以社会层级(7)
2015-07-15 01:31
导读:1 表格中之伦理守则的编号经过本文重编,与各组织所颁定的守则之原始编号不同。 参考资料 Communications of the ACM. 1992 ACM Codes of Ethics and professional Conduct
1 表格中之伦理守则的编号经过本文重编,与各组织所颁定的守则之原始编号不同。
参考资料
Communications of the ACM. 1992 ACM Codes of Ethics and professional Conduct. 30, 5, May, 94-99.
Anderson, R.E., Johnson, D.G.,Gotterbarn, D. and Perrole Judith.
1993 Using the New ACM code of ethics in Decision Making. Commu. of ACM, 36, 2. Feb. 98-107. Bayles, M.D. 1981 Professional Ethics. Wadsworth, Belmont, Calif.
Bommer, M., Grato, C., Gravander, J., and Tuttle, M.
1987 A Behavioral Model of Ethical and Unethical Decision Making. J. of Business Ethics 6, 265-280.
Brooks, L.J.
1989 Corporate ethical performance: trend, forecasts and outlooks. Journal of business ethics 8,, 31-38.
Bynum, T.W., Maner, W. and Fodor, J., Eds.
1992 Software Ownership and intellectual Property Rights. Research Center on Computing and Society, Southern Connecticut State University, New Haven, Conn. 06515.
Clark, D.
1990 Computers at Risk.: Safe Computing in the Information Age. National Research Council, National Academy Press, Washington, D.C.
Collins, W.R., Miller, K.W., Spielman, B.J., and Wherry, P.
1994 How Good is Good Enough, Comm. ACM 37, 1, 81-91.
Conger, S., Loch, K.D., and Helft, B.L.
1995 Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use, Info. Sys. Journal, 5, 161-184.
Conger, S. and Loch, K.D.
1995 Ethics and Computer Use, CACM 38, 12, 31-39.
Denning, P.J., Ed.
1990 Computers under Attack: Intruders, Worms and Viruses, Addison-Wesley, Inc., Reading Mass.
Deipie, R., Flower, G., and Paradice, D.
1991 Ethical Issues in Information System. Boyd & Fraster Publishing Company, Boston, MA 02116.
Guynes, C.S.
1989 Protecting statistical databases: A matter of privacy, Comput. Soc. 19, 1, 15-23.
Effy,Oz.
1992 Ethical standards for information system professionals:a case for a unified code, MIS Quarterly, 423-433. Effy, Oz.
(科教范文网http://fw.nseac.com)
1993 Ethical Standards for Computer professionals:A Comparative Analysis of Four Major Codes, Journal of Business Ethics, 12, 709-726.
Elmer-Dewitt, P.
1994 Nabbing the pirates of cyberspace, Time, 143, 24, 62-63.
Frankena, W.K.
1963 Ethics, Englewood Cliffs, N.J., Prentice Hall.
Frankel,Mark.S.
1989 Professional codes: why, how and with what impacts?, Journal of business ethics 8, 31-38.
Forester, T.
1990 Software theft and the problem of the intellectual property rights, Comput. Soc.. 20, 1, 2-11.
Frenkel, K.A.
1990 Woman and Computing, Commun. of the ACM 33, 11, 34-46.
Gotterbarn, D.
1991 Computer ethics: Responsibility regained, National Forum.
Hoffman, W.M. and Moore, J.M.
1981 Ethics and the Management of Computer Technology, Proceeding of the Fourth National Conference on Business Ethics, Bentley College, Waltham, Massachusetts, 02254, USA.
Huff,C. and Martin,C.D.
1995 Computing consequences: a framework for teaching ethical computing, Commu. of the ACM 38, 12, 75-84.
Johnson, D.G.
1984 Computer Ethics, Englewood Cliffs, New Jersey, USA: Prentice Hall.
Johnson, D.G.
1985 Equal Access to Computing, Computer Expertise, and Decision Making About Computer, Business and Professional Ethics Journal 4, 3&4, 95-103.
Johnson, D.W.
1985 Computer Ethics: A Guide for the New Age, Elgin, Illions, USA: Brethren Press.
Khazanchi, D.
1995 Unethical Behavior in Information Systems: the Gender Factor, Journal of Business Ethics 14, 741-649.
Laudon, K.C.
1986 Dossier Society: Value Choice in the design of National Information Systems, Columbia University Press. New York, N.Y.
Lee, G.M., Eining, M.M., and Long, C.P.