-
1
-
-
84976776710
-
Using the ACM code of ethics in decision making
-
Anderson, R. E., D. G. Johnson, D. Gotterbarn and J. Perrolle: 1993, 'Using the ACM Code of Ethics in Decision Making', Communications of the ACM 36(2), 98-107.
-
(1993)
Communications of the ACM
, vol.36
, Issue.2
, pp. 98-107
-
-
Anderson, R.E.1
Johnson, D.G.2
Gotterbarn, D.3
Perrolle, J.4
-
2
-
-
0010127456
-
Campaign address computer ethics "void"
-
Betts, M.: 1994, 'Campaign Address Computer Ethics "Void",' Computerworld 28(24), 33.
-
(1994)
Computerworld
, vol.28
, Issue.24
, pp. 33
-
-
Betts, M.1
-
3
-
-
0010211734
-
In-depth: Companies own e-mail and can monitor it
-
Brown, B.: 1994, 'In-Depth: Companies Own E-mail and Can Monitor It', Computerworld 28(26), 135, 137.
-
(1994)
Computerworld
, vol.28
, Issue.26
, pp. 135
-
-
Brown, B.1
-
4
-
-
0001847769
-
Database marketing: New rules for policy and practice
-
Cespedes, F. V. and H. J. Smith: 1993, 'Database Marketing: New Rules for Policy and Practice', Sloan Management Review 34(4), 7-22.
-
(1993)
Sloan Management Review
, vol.34
, Issue.4
, pp. 7-22
-
-
Cespedes, F.V.1
Smith, H.J.2
-
5
-
-
0029506317
-
Ethics and information technology use: A factor analysis of attitudes to computer use
-
Conger, S., K. D. Loch and B. L. Helft: 1995, 'Ethics and Information Technology Use: A Factor Analysis of Attitudes to Computer Use', Information Systems Journal 5, 161-184.
-
(1995)
Information Systems Journal
, vol.5
, pp. 161-184
-
-
Conger, S.1
Loch, K.D.2
Helft, B.L.3
-
6
-
-
0001501223
-
"How did they get my name?": An exploratory investigation of consumer attitudes toward secondary information use
-
Culnan, M.: 1993, "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use', MIS Quarterly 17(3), 341-361.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-361
-
-
Culnan, M.1
-
7
-
-
0004208582
-
-
University of Chicago Press, Chicago
-
Donagan, A.: 1977, The Theory of Morality (University of Chicago Press, Chicago).
-
(1977)
The Theory of Morality
-
-
Donagan, A.1
-
8
-
-
0005917143
-
Toward a unified conception of business ethics: Integrative social contracts theory
-
Donaldson, T. and T. W. Dunfee: 1994, 'Toward a Unified Conception of Business Ethics: Integrative Social Contracts Theory', Academy of Management Review 19(2), 252-284.
-
(1994)
Academy of Management Review
, vol.19
, Issue.2
, pp. 252-284
-
-
Donaldson, T.1
Dunfee, T.W.2
-
9
-
-
0010088103
-
The trouble with cyberspace
-
Dyson, E.: 1994, 'The Trouble with Cyberspace', Computerworld 28(29), 37.
-
(1994)
Computerworld
, vol.28
, Issue.29
, pp. 37
-
-
Dyson, E.1
-
10
-
-
0010184137
-
-
Prentice-Hall, Inc., Englewood Cliffs, NJ
-
Facione, P. A., D. Scherer and T. Attig: 1991, Ethics and Society, 2nd edition (Prentice-Hall, Inc., Englewood Cliffs, NJ).
-
(1991)
Ethics and Society, 2nd Edition
-
-
Facione, P.A.1
Scherer, D.2
Attig, T.3
-
11
-
-
0002489229
-
A contingency framework for understanding ethical decision making in marketing
-
Ferrell, O. C. and L. G. Gresham: 1985, 'A Contingency Framework for Understanding Ethical Decision Making in Marketing', Journal of Marketing 49, 87-96.
-
(1985)
Journal of Marketing
, vol.49
, pp. 87-96
-
-
Ferrell, O.C.1
Gresham, L.G.2
-
14
-
-
0026638497
-
The use and abuse of computer ethics
-
Gotterbarn, D.: 1992, 'The Use and Abuse of Computer Ethics', Journal of Systems and Software 17(1), 75-80.
-
(1992)
Journal of Systems and Software
, vol.17
, Issue.1
, pp. 75-80
-
-
Gotterbarn, D.1
-
15
-
-
0010211735
-
Not on my internet
-
Horwitt, E.: 1994, 'Not On My Internet', Computerworld 28(28), 57-60.
-
(1994)
Computerworld
, vol.28
, Issue.28
, pp. 57-60
-
-
Horwitt, E.1
-
16
-
-
0001601093
-
Toward an agenda for business ethics research
-
Kahn, W. A.: 1990, 'Toward an Agenda for Business Ethics Research', Academy of Management Review 15(2), 311-328.
-
(1990)
Academy of Management Review
, vol.15
, Issue.2
, pp. 311-328
-
-
Kahn, W.A.1
-
19
-
-
85031734122
-
-
Loch, K. D., S. Conger and B. Helft: 1994, 'An Exploration of Ethics and Information Technology Use: Issues, Perspectives, Consensus and Consistency', (Under review).
-
(1994)
'An Exploration of Ethics and Information Technology Use: Issues, Perspectives, Consensus and Consistency', (under Review)
-
-
Loch, K.D.1
Conger, S.2
Helft, B.3
-
20
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K. D., H. H. Carr and M. E. Warkentin: 1992, 'Threats to Information Systems: Today's Reality, Yesterday's Understanding', MIS Quarterly 16(2), 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
21
-
-
55249097295
-
Four ethical issues of the information age
-
Mason, R. O.: 1986, 'Four Ethical Issues of the Information Age', MIS Quarterly 10(1), 4-12.
-
(1986)
MIS Quarterly
, vol.10
, Issue.1
, pp. 4-12
-
-
Mason, R.O.1
-
22
-
-
0010198928
-
Warning: Here comes the software police
-
Mason, J.: 1990, 'Warning: Here Comes the Software Police', Datamation (October), 40-45.
-
(1990)
Datamation
, Issue.OCTOBER
, pp. 40-45
-
-
Mason, J.1
-
23
-
-
0010192558
-
In-depth: Employers have no right to snoop through mail
-
Nelson, C.: 1994, 'In-Depth: Employers Have No Right to Snoop through Mail', Computerworld 28(26), 135, 137.
-
(1994)
Computerworld
, vol.28
, Issue.26
, pp. 135
-
-
Nelson, C.1
-
24
-
-
84976777990
-
Technology, laws, and society
-
Neumann, P. G.: 1994, 'Technology, Laws, and Society', Communications of the ACM 37(3), 138.
-
(1994)
Communications of the ACM
, vol.37
, Issue.3
, pp. 138
-
-
Neumann, P.G.1
-
25
-
-
33748811786
-
Ethical standards for information systems professionals: A case for a unified code
-
Oz, E.: 1992, 'Ethical Standards for Information Systems Professionals: A Case for a Unified Code', MIS Quarterly 16(4), 423-433.
-
(1992)
MIS Quarterly
, vol.16
, Issue.4
, pp. 423-433
-
-
Oz, E.1
-
26
-
-
0004089837
-
-
Wm. C. Brown Communications, Inc., Dubuque, IA
-
Oz., E.: 1994, Ethics for the Information age (Wm. C. Brown Communications, Inc., Dubuque, IA).
-
(1994)
Ethics for the Information Age
-
-
Oz, E.1
-
28
-
-
0010087271
-
Special report on electronic privacy: Bosses with x-ray eyes
-
Pillar, C.: 1993, 'Special Report on Electronic Privacy: Bosses with X-Ray Eyes', MacWorld (July), 118-120.
-
(1993)
MacWorld
, Issue.JULY
, pp. 118-120
-
-
Pillar, C.1
-
29
-
-
84976693761
-
The ethical and legal quandary of e-mail privacy
-
Sipior, J. and B. Ward: 1995, 'The Ethical and Legal Quandary of E-mail Privacy', Communications of the ACM 38(12), 40-47.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 40-47
-
-
Sipior, J.1
Ward, B.2
-
31
-
-
0002819295
-
When is play productive?
-
Starbuck, W. H. and J. Webster: 1991, 'When Is Play Productive?', Accounting, Management, and Information Technology 1(1), 71-90.
-
(1991)
Accounting, Management, and Information Technology
, vol.1
, Issue.1
, pp. 71-90
-
-
Starbuck, W.H.1
Webster, J.2
-
32
-
-
53349102510
-
Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
-
Straub, D. W. Jr. and R. Collins: 1990, 'Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy', MIS Quarterly 14(2), 143-158.
-
(1990)
MIS Quarterly
, vol.14
, Issue.2
, pp. 143-158
-
-
Straub D.W., Jr.1
Collins, R.2
-
33
-
-
0000720688
-
Microcomputer playfulness: Development of a measure with workplace implications
-
Webster, J. and J. J. Martocchio: 1992, 'Microcomputer Playfulness: Development of a Measure with Workplace Implications', MIS Quarterly 16(2), 201-226.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 201-226
-
-
Webster, J.1
Martocchio, J.J.2
|