default search action
Ethics in Computer Age 1994: Galtinburg, Tennessee, USA
- Joseph M. Kizza:
Proceedings of the Conference on Ethics in Computer Age, Galtinburg, Tennessee, USA, November 11-13, 1994. ACM 1994, ISBN 0-89791-644-1 - Cindy Hanchey, John Kingsbury:
A survey of students' ethical attitudes using computer-related scenarios. 2-6 - Sarah Granger:
The hacker ethic. 7-9 - Shelly Warwick:
Abstraction, ethics and software: why don't the rules work? 10-14 - John M. Artz:
Virtue vs. utility: alternative foundations for computer ethics. 16-21 - Sue A. Conger, Karen D. Loch, B. Loerinc Helft:
Information technology and ethics: an exploratory factor analysis. 22-27 - Gene Boggess:
Certification of computer professionals: a good idea? 28-29 - Thomas J. Scott, Ernest A. Kallman, Debra A. Lelewer:
Ethical issues involving the Internet. 31-32 - Ernest A. Kallman:
Risks and threats from Internet access: protecting the institution. 33-38 - Paul C. Grabow:
Context for "the cultural impact of the computer". 40-45 - James K. Huggins:
The assumptions of computing. 46-50 - Brian Patrick Clifford:
Individual privacy in an information dependent society. 51-53 - Kamal Dean Pharhizgar, Stephen E. Lunce:
Genealogical approaches to ethical implications of informational assimilative integrated discovery systems (AIDS) in business. 55-60 - Thomas J. Scott, Richard B. Voss:
Ethics and the 7 "P's" of computer use policies. 61-67 - Geoffrey Dick:
Raising the awareness of ethics in IT students: further development of the teaching model. 69-73 - Theresia G. Fisher, Adel M. Abunawass:
Computer ethics: a capstone course. 74-79 - Sylvia Clark Pulliam:
A social implications of computing course which "teaches" computer ethics. 80-84 - Inger V. Eriksson:
Computers as tools. 86-95 - Marsha Woodbury, John Schmitz:
Ethics is the driver, Mosaic is the vehicle, and network instruction is the precious cargo. 96-98 - John A. N. Lee, Jacques Berleur:
Progress towards a world-wide code of conduct. 100-104 - Carol J. Orwant:
EPER ethics. 105-108 - Sarah Granger:
Why electronic mail is inherently private. 110-112 - John Weckert, Douglas Adeney:
Ethics in electronic image manipulation. 113-114 - Kara L. Nance, Mahla Strohmaier:
Ethical accountability in the cyberspace. 115-118 - Lonny B. Winrich:
Integrating ethical topics in a traditional computer science course. 120-126 - Eva Y. W. Wong, Robert M. Davison, Patricia W. Wade:
Computer ethics and tertiary level education in Hong Kong. 127-132 - James K. Harris:
Plagiarism in computer science courses. 133-135 - Arthur Zucker:
Information age organization: no new ethics need apply. 137-138 - John E. Stinson:
Industrial age to information age organizations: changing business ethic. 139-142 - Richard G. Milter:
Ensuring ethical behavior in organizations. 143-144 - Thomas J. Froehlich:
User assumptions about information retrieval systems: ethical concerns. 146-150 - Richard Rubin:
Moral distancing and the use of information technologies: the seven temptations. 151-155 - Martha Montague Smith:
Making decisions in real-time and hard times. 156-160 - Edward D. Bewayo:
Electronic management: exploring its impact on small business. 162-165 - Joseph M. Kizza:
Combating computer crimes: a long term strategy. 166-169 - Gregory B. White, Udo W. Pooch:
Computer ethics education: impact from societal norms. 170-173 - Nancy J. Wahl:
Responsibility for unreliable software. 175-177 - John L. Fodor:
CyberEthics. 180-187 - Alan Holt:
Do disk drives dream of buffer cache hits? 188-195 - C. William Palmiter:
A call for responsibility in ethical issues for IS professionals. 197-203 - Jacqueline E. C. Wyatt, Patricia H. Farrar:
Cultural perspectives of computer security. 204-207
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.