计算机应用 | 古代文学 | 市场营销 | 生命科学 | 交通物流 | 财务管理 | 历史学 | 毕业 | 哲学 | 政治 | 财税 | 经济 | 金融 | 审计 | 法学 | 护理学 | 国际经济与贸易
计算机软件 | 新闻传播 | 电子商务 | 土木工程 | 临床医学 | 旅游管理 | 建筑学 | 文学 | 化学 | 数学 | 物理 | 地理 | 理工 | 生命 | 文化 | 企业管理 | 电子信息工程
计算机网络 | 语言文学 | 信息安全 | 工程力学 | 工商管理 | 经济管理 | 计算机 | 机电 | 材料 | 医学 | 药学 | 会计 | 硕士 | 法律 | MBA
现当代文学 | 英美文学 | 通讯工程 | 网络工程 | 行政管理 | 公共管理 | 自动化 | 艺术 | 音乐 | 舞蹈 | 美术 | 本科 | 教育 | 英语 |

资讯伦理守则现况:以社会层级(7)

2015-07-15 01:31
导读:1 表格中之伦理守则的编号经过本文重编,与各组织所颁定的守则之原始编号不同。 参考资料 Communications of the ACM. 1992 ACM Codes of Ethics and professional Conduct

1 表格中之伦理守则的编号经过本文重编,与各组织所颁定的守则之原始编号不同。

参考资料
Communications of the ACM. 1992 ACM Codes of Ethics and professional Conduct. 30, 5, May, 94-99.
Anderson, R.E., Johnson, D.G.,Gotterbarn, D. and Perrole Judith.
1993 Using the New ACM code of ethics in Decision Making. Commu. of ACM, 36, 2. Feb. 98-107. Bayles, M.D. 1981 Professional Ethics. Wadsworth, Belmont, Calif.
Bommer, M., Grato, C., Gravander, J., and Tuttle, M.
1987 A Behavioral Model of Ethical and Unethical Decision Making. J. of Business Ethics 6, 265-280.
Brooks, L.J.
1989 Corporate ethical performance: trend, forecasts and outlooks. Journal of business ethics 8,, 31-38.
Bynum, T.W., Maner, W. and Fodor, J., Eds.
1992 Software Ownership and intellectual Property Rights. Research Center on Computing and Society, Southern Connecticut State University, New Haven, Conn. 06515.
Clark, D.
1990 Computers at Risk.: Safe Computing in the Information Age. National Research Council, National Academy Press, Washington, D.C.
Collins, W.R., Miller, K.W., Spielman, B.J., and Wherry, P.
1994 How Good is Good Enough, Comm. ACM 37, 1, 81-91.
Conger, S., Loch, K.D., and Helft, B.L.
1995 Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use, Info. Sys. Journal, 5, 161-184.
Conger, S. and Loch, K.D.
1995 Ethics and Computer Use, CACM 38, 12, 31-39.
Denning, P.J., Ed.
1990 Computers under Attack: Intruders, Worms and Viruses, Addison-Wesley, Inc., Reading Mass.
Deipie, R., Flower, G., and Paradice, D.
1991 Ethical Issues in Information System. Boyd & Fraster Publishing Company, Boston, MA 02116.
Guynes, C.S.
1989 Protecting statistical databases: A matter of privacy, Comput. Soc. 19, 1, 15-23.
Effy,Oz.
1992 Ethical standards for information system professionals:a case for a unified code, MIS Quarterly, 423-433. Effy, Oz.
(科教范文网http://fw.nseac.com)

1993 Ethical Standards for Computer professionals:A Comparative Analysis of Four Major Codes, Journal of Business Ethics, 12, 709-726.
Elmer-Dewitt, P.
1994 Nabbing the pirates of cyberspace, Time, 143, 24, 62-63.
Frankena, W.K.
1963 Ethics, Englewood Cliffs, N.J., Prentice Hall.
Frankel,Mark.S.
1989 Professional codes: why, how and with what impacts?, Journal of business ethics 8, 31-38.
Forester, T.
1990 Software theft and the problem of the intellectual property rights, Comput. Soc.. 20, 1, 2-11.
Frenkel, K.A.
1990 Woman and Computing, Commun. of the ACM 33, 11, 34-46.
Gotterbarn, D.
1991 Computer ethics: Responsibility regained, National Forum.
Hoffman, W.M. and Moore, J.M.
1981 Ethics and the Management of Computer Technology, Proceeding of the Fourth National Conference on Business Ethics, Bentley College, Waltham, Massachusetts, 02254, USA.
Huff,C. and Martin,C.D.
1995 Computing consequences: a framework for teaching ethical computing, Commu. of the ACM 38, 12, 75-84.
Johnson, D.G.
1984 Computer Ethics, Englewood Cliffs, New Jersey, USA: Prentice Hall.
Johnson, D.G.
1985 Equal Access to Computing, Computer Expertise, and Decision Making About Computer, Business and Professional Ethics Journal 4, 3&4, 95-103.
Johnson, D.W.
1985 Computer Ethics: A Guide for the New Age, Elgin, Illions, USA: Brethren Press.
Khazanchi, D.
1995 Unethical Behavior in Information Systems: the Gender Factor, Journal of Business Ethics 14, 741-649.
Laudon, K.C.
1986 Dossier Society: Value Choice in the design of National Information Systems, Columbia University Press. New York, N.Y.
Lee, G.M., Eining, M.M., and Long, C.P.
上一篇:入侵检测系统研究毕业论 下一篇:没有了