-
1
-
-
75949114887
-
A Comparison of the Fortune 500 and AACSB-Accredited Universities’ Software Copying Policies
-
Athey, S., “A Comparison of the Fortune 500 and AACSB-Accredited Universities’ Software Copying Policies,” CIS Educator Forum, 2: 4, 1990, 2–11.
-
(1990)
CIS Educator Forum
, vol.2
, Issue.4
, pp. 2-11
-
-
Athey, S.1
-
2
-
-
0002990239
-
Managing Across Borders: New Organizational Responses
-
Bartlett, C. A., & S. Ghosal, “Managing Across Borders: New Organizational Responses," Sloan Management Review, 29: 1, 1987, 43–53.
-
(1987)
Sloan Management Review
, vol.29
, Issue.1
, pp. 43-53
-
-
Bartlett, C.A.1
Ghosal, S.2
-
3
-
-
85074900642
-
Computer Ethics: An Antidote to Despair
-
Bloombecker, J. J. B., “Computer Ethics: An Antidote to Despair,” The Mid-Atlantic Journal of Business, 27: 1, 1991, 33–42.
-
(1991)
The Mid-Atlantic Journal of Business
, vol.27
, Issue.1
, pp. 33-42
-
-
Bloombecker, J.J.B.1
-
4
-
-
85164506630
-
-
(September 24,,). Testimony before Congress on Computer and Communications Security and Privacy
-
Campbell, R. (September 24, 1984). Testimony before Congress on Computer and Communications Security and Privacy. Committee on Science and Technology, Subcommittee on Transportation, Aviation and Materials, US House of Representatives, 98th Congress, 2nd Session.
-
(1984)
Committee on Science and Technology, Subcommittee on Transportation, Aviation and Materials, US House of Representatives, 98th Congress, 2nd Session.
-
-
Campbell, R.1
-
5
-
-
0003939464
-
-
&, Homewood, IL, Irwin
-
Cash, J. I., F. W. McFarlan, J. L. McKenney & L. M. Applegate, Corporate Information Systems Management, Third Edition, Homewood, IL: Irwin, 1992, 88–569.
-
(1992)
Corporate Information Systems Management, Third Edition
, pp. 88-569
-
-
Cash, J.I.1
McFarlan, F.W.2
McKenney, J.L.3
Applegate, L.M.4
-
6
-
-
85164516086
-
-
“Teaching Information Systems Ethics A Study,”, Washington, DC International Association for Computer Information Systems
-
Cohen, E. B., & L. Cornwell, “Teaching Information Systems Ethics: A Study,” Proceedings of the 1994 IACIS Annual Conference, 26–31. Washington, DC: International Association for Computer Information Systems.
-
Proceedings of the 1994 IACIS Annual Conference
, pp. 26-31
-
-
Cohen, E.B.1
Cornwell, L.2
-
7
-
-
0001003693
-
A Question of Ethics: Developing Information Systems Ethics
-
Cohen, E., & L. Cornwell, “A Question of Ethics: Developing Information Systems Ethics,” Journal of Business Ethics, 8: 6, 1989, 431–437.
-
(1989)
Journal of Business Ethics
, vol.8
, Issue.6
, pp. 431-437
-
-
Cohen, E.1
Cornwell, L.2
-
8
-
-
0011597674
-
-
CIS Educator Forum, March 1989
-
Cohen, E., & L. Cornwell, “College Students Believe Piracy is Acceptable,” CIS Educator Forum, March 1989, 2–5.
-
College Students Believe Piracy is Acceptable
, pp. 2-5
-
-
Cohen, E.1
Cornwell, L.2
-
9
-
-
55249107453
-
Preparing IS Students to Deal with Ethical Issues
-
Couger, J. D., “Preparing IS Students to Deal with Ethical Issues,” MIS Quarterly, 13: 2, 1989, 211–218.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 211-218
-
-
Couger, J.D.1
-
10
-
-
84887471720
-
The Ethical Problems, Conflicts and Beliefs of Small Business Information Personnel
-
Davis, D. L., & S. J. Vitell, “The Ethical Problems, Conflicts and Beliefs of Small Business Information Personnel,” The Journal of Computer Information Systems, 22: 4, 1992, 53–57.
-
(1992)
The Journal of Computer Information Systems
, vol.22
, Issue.4
, pp. 53-57
-
-
Davis, D.L.1
Vitell, S.J.2
-
11
-
-
84976687143
-
The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking
-
and others, “
-
Denning, D. E. and others, “The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking,” Communications of the ACM, 34: 3, 1992, 23–43.
-
(1992)
Communications of the ACM
, vol.34
, Issue.3
, pp. 23-43
-
-
Denning, D.E.1
-
12
-
-
0001903311
-
The Coming of the New Organization
-
January-February
-
Drucker, P. F., “The Coming of the New Organization,” Harvard Business Review, 66: 1, January-February 1988, 45–53.
-
(1988)
Harvard Business Review
, vol.66
, Issue.1
, pp. 45-53
-
-
Drucker, P.F.1
-
13
-
-
85132284289
-
Information Processing Theory and the Multinational Enterprise
-
Fall
-
Egelhoff, W. G., “Information Processing Theory and the Multinational Enterprise,” Journal of International Business Studies, 22: 3, Fall 1991, 341–368.
-
(1991)
Journal of International Business Studies
, vol.22
, Issue.3
, pp. 341-368
-
-
Egelhoff, W.G.1
-
14
-
-
0002481588
-
Global Software Piracy: You can't get Blood out of a Turnip
-
Gopal, R. D., & G. L. Sanders, “Global Software Piracy: You can't get Blood out of a Turnip,” Communications of the ACM, 43: 9, 2000, 83–89.
-
(2000)
Communications of the ACM
, vol.43
, Issue.9
, pp. 83-89
-
-
Gopal, R.D.1
Sanders, G.L.2
-
15
-
-
85164521703
-
-
“Software Piracy and Software Security in Business Schools An Ethical Perspective,”, Summer 1991
-
Im, J. H., & P. D. van Epps, “Software Piracy and Software Security in Business Schools: An Ethical Perspective,” Data Base, Summer 1991, 15–21.
-
Data Base
, pp. 15-21
-
-
Im, J.H.1
van Epps, P.D.2
-
16
-
-
53349107945
-
Applications of Global Information Technology: Key Issues for Management
-
March
-
Ives, B., & S. L. Jarvenpaa, “Applications of Global Information Technology: Key Issues for Management,” MIS Quarterly, 15: 1, March 1991, 33–49.
-
(1991)
MIS Quarterly
, vol.15
, Issue.1
, pp. 33-49
-
-
Ives, B.1
Jarvenpaa, S.L.2
-
17
-
-
77953584689
-
Globalization and Information Management
-
Spring
-
Karimi, J., & B. R. Konsynski, “Globalization and Information Management,” Journal of Management Information Systems, 7: 4, Spring 1991, 7–26.
-
(1991)
Journal of Management Information Systems
, vol.7
, Issue.4
, pp. 7-26
-
-
Karimi, J.1
Konsynski, B.R.2
-
18
-
-
0042724485
-
Making Ethical Decisions
-
December
-
Kreie, J., & T. P. Cronan, “Making Ethical Decisions,” Communications of the ACM, 43: 12, December 2000, 66–71.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 66-71
-
-
Kreie, J.1
Cronan, T.P.2
-
19
-
-
85164497555
-
Teaching Business Ethics in an Academic Environment of Mistrust
-
Machan, T. R., “Teaching Business Ethics in an Academic Environment of Mistrust,” The Mid-Atlantic Journal of Business, 27: 1, 1991, 59–65.
-
(1991)
The Mid-Atlantic Journal of Business
, vol.27
, Issue.1
, pp. 59-65
-
-
Machan, T.R.1
-
21
-
-
0042223455
-
Software Piracy: A View from Hong Kong
-
Moores, T., & G. Dhillon, “Software Piracy: A View from Hong Kong,” Communications of the ACM, 43: 12, 2000, 88–93.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 88-93
-
-
Moores, T.1
Dhillon, G.2
-
22
-
-
84976844839
-
Inside RISKS: Computers, Ethics and Values
-
Neumann, P. G., “Inside RISKS: Computers, Ethics and Values,” Communications of the ACM, 34: 7, 1991, 106.
-
(1991)
Communications of the ACM
, vol.34
, Issue.7
, pp. 106
-
-
Neumann, P.G.1
-
23
-
-
0347574410
-
Issues and Opportunities in International Information Systems
-
October
-
Neumann, S., “Issues and Opportunities in International Information Systems,” International Information Systems, 1: 4, October 1992, 1–13.
-
(1992)
International Information Systems
, vol.1
, Issue.4
, pp. 1-13
-
-
Neumann, S.1
-
24
-
-
84870557823
-
-
“Managing in a Borderless World,”, May-June 1989
-
Ohmae, K., “Managing in a Borderless World,” Harvard Business Review, May-June 1989.
-
Harvard Business Review
-
-
Ohmae, K.1
-
25
-
-
0003899211
-
-
&, Wellesley, MA, QED Information Sciences
-
Parker, D. B., S. Swope & B. N. Baker, Ethical Conflicts in Information and Computer Science, Technology and Business, Wellesley, MA: QED Information Sciences, 1990.
-
(1990)
Ethical Conflicts in Information and Computer Science, Technology and Business
-
-
Parker, D.B.1
Swope, S.2
Baker, B.N.3
-
27
-
-
26444504533
-
-
Harvard Business Review, March-April 1979
-
Porter, M. E., & V. E. Millar, “How Information Gives You Competitive Advantage,” Harvard Business Review, March-April 1979, 137–145.
-
How Information Gives You Competitive Advantage
, pp. 137-145
-
-
Porter, M.E.1
Millar, V.E.2
-
28
-
-
21144460295
-
Knowledge and Attitudes of Management Students Toward Software Piracy
-
Reid, R. A., J. K. Thompson, & J. L. Logsdon, “Knowledge and Attitudes of Management Students Toward Software Piracy,” Journal of Computer Information Systems, 23: 1, 1992, 46–51.
-
(1992)
Journal of Computer Information Systems
, vol.23
, Issue.1
, pp. 46-51
-
-
Reid, R.A.1
Thompson, J.K.2
Logsdon, J.L.3
-
30
-
-
0002961010
-
The Effect of Demographic Factors on Attitudes Toward Software Piracy
-
Solomon, S. L., & J. A. O’Brien, “The Effect of Demographic Factors on Attitudes Toward Software Piracy,” The Journal of Computer Information Systems, 20: 3, 1990, 40–45.
-
(1990)
The Journal of Computer Information Systems
, vol.20
, Issue.3
, pp. 40-45
-
-
Solomon, S.L.1
O’Brien, J.A.2
-
32
-
-
3042915322
-
A Survey of Faculty Attitudes Towards Personal Computer Software Copying
-
Wickham, M., J. Plotnicki, & S. Athey, “A Survey of Faculty Attitudes Towards Personal Computer Software Copying,” The Journal of Computer Information Systems, 22: 4, 1992, 47–52.
-
(1992)
The Journal of Computer Information Systems
, vol.22
, Issue.4
, pp. 47-52
-
-
Wickham, M.1
Plotnicki, J.2
Athey, S.3
-
33
-
-
21144460247
-
Computer Ethics and Years of Computer Use
-
Wood, W. A., “Computer Ethics and Years of Computer Use,” The Journal of Computer Information Systems, 23: 4, 1993, 23–27.
-
(1993)
The Journal of Computer Information Systems
, vol.23
, Issue.4
, pp. 23-27
-
-
Wood, W.A.1
-
34
-
-
3042881080
-
A View of Computer Ethics by Managers and Students
-
Wood, W. A., “A View of Computer Ethics by Managers and Students,” The Journal of Computer Information Systems, 22: 2, 1991, 7–10.
-
(1991)
The Journal of Computer Information Systems
, vol.22
, Issue.2
, pp. 7-10
-
-
Wood, W.A.1
|