计算机应用 | 古代文学 | 市场营销 | 生命科学 | 交通物流 | 财务管理 | 历史学 | 毕业 | 哲学 | 政治 | 财税 | 经济 | 金融 | 审计 | 法学 | 护理学 | 国际经济与贸易
计算机软件 | 新闻传播 | 电子商务 | 土木工程 | 临床医学 | 旅游管理 | 建筑学 | 文学 | 化学 | 数学 | 物理 | 地理 | 理工 | 生命 | 文化 | 企业管理 | 电子信息工程
计算机网络 | 语言文学 | 信息安全 | 工程力学 | 工商管理 | 经济管理 | 计算机 | 机电 | 材料 | 医学 | 药学 | 会计 | 硕士 | 法律 | MBA
现当代文学 | 英美文学 | 通讯工程 | 网络工程 | 行政管理 | 公共管理 | 自动化 | 艺术 | 音乐 | 舞蹈 | 美术 | 本科 | 教育 | 英语 |

资讯伦理守则现况:以社会层级(8)

2015-07-15 01:31
导读:1994 Information Ethics: A Comparision Among College Students from Mainland China, Hong Kong and Taiwan. Hong Kong Journal of Business Management 7, 17-35. Lowis,P.V. 1985 Defining business ethics lik

1994 Information Ethics: A Comparision Among College Students from Mainland China, Hong Kong and Taiwan. Hong Kong Journal of Business Management 7, 17-35.
Lowis,P.V.
1985 Defining business ethics like nailing jello to a wall, Journal of business ethics 4, 377-383.
Mason, R.O.
1986 Four ethical issues of the information age, MISQ, 5-12.
Masson, R.O.
1995 Ethics to Information Technology Issues, Commu. ACM 38, 12, 55-57.
Messick, D.M. and Bazerman, M.H.
1996 Ethical Leadership and the Psychology of Decision Making. Sloan Management Review, 9-22.
Miller, A.
1991 Computers and Privacy. In: Ethical Issues in Information System, De Joie, R. Flower, G. and Paradice, D. (eds), Boyd&Fraser, Bostom, 118-123.
Parker, D.B.
1990 Ethical Conflicts in Computer Science and Technology, AFIP Press.
Parker, D.B.
1981 Ethical Dilemmas in Computer Technology. Ethics and Management of Computer Technology, Proceedings of the Fourth National Conference on Business Ethics, Bentley College, Waltham, Massachusetts, 02254, USA.
Paradice, D.B. and Dejoie R.M.
1991 The Ethical Decision-Making Process of Information Systems Workers, J. of Business Ethics 10, 57-77.
Parnas, D.L.
1987 SDI: A violation of professional responsibilit, .Abacus 4, 2, 46-52.
Perrolle, J.A.
1987 Computers and Social Change: Information, Property and Power, Wadsworth, Belmont, Calif.
Perrolle, J.
1991 Conversations and trust in computer interfaces. In Computers and Controversy, Dunlop and Kling, Eds., 8
Pierce, M.A. and Henry, J.W.
1996 Computer Ethics: the Role of Personal, Informal, and Formal Codes, J. of Business Ethics, 15, 425-437.
Pressman, R.S. and Herron, R.
1991 Software Shock: The Danger and the Opportunity, Dorsett House.
Shim, J.P. and Taylor, G.S.
1988 Business Faculty Members' Perceptions of Unauthorized Software Coping, OR/MS Today 15, 30-31.
您可以访问中国科教评价网(www.NsEac.com)查看更多相关的文章。

Sipior, J. and Ward, B.
1994 E-mail: employee privacy vs. Orginizational monitoring, Working paper, Villanova University.
Smith, G.V. and Parr, R.L.
1993 Intellectual Property, John Wiley & Sons, New York.
Smith, H.J., Milberg, S.J. and Burke, S.J.
1996 Information Privacy: Measuring Individuals' Concerns About Organizational Pratices, MIS Quarterly, 167-195.
Spafford, G.
1992 Are computer hacker berak-ins ethical? J. Syst. Softw. 17
Taylor, G.S. and Davis,, J.S.
1989 Individual Privacy and Computer-Based Human Resource Resource Information System, J. of Business Ethics 8, 569-576.
Stevenson, J.T.
1987 Engineering Ethics: Pratices and Principles, Canadian Scholars Press. Toronto.
Susan, A.
1993 A comparison of expert's and high tech stduents' ethical beliefs in compter-related situations, Journal of business ethics 12, 359-370.
Vitell,S. and Davis,D.L.
1990 Ethical beliefs of MIS professionals: the frequency and opportunity for unethical behavior, Journal of business ethics 9, 63-70.
Weinberg, G.M.
1971 The psychology of Computer Programming, New York, USA: Van Nostrand Reinhold Company.

上一篇:入侵检测系统研究毕业论 下一篇:没有了