-
1
-
-
77950067815
-
The liability of professional experts like risk managers
-
F. Galindo and G. Quirchmayr, editors, Zaragoza, Spain, February
-
A. del Amo Calvo. The Liability of Professional Experts Like Risk Managers. In F. Galindo and G. Quirchmayr, editors, Advances in Electronical Government, Pre-Proceedings of the Working Conference of the International Federation of Information Processing WG 8.5 and the Center for Computers and Law, Zaragoza, Spain, 10-11, February 2000.
-
(2000)
Advances in Electronical Government, Pre-proceedings of the Working Conference of the International Federation of Information Processing WG 8.5 and the Center for Computers and Law
, pp. 10-11
-
-
Del Amo Calvo, A.1
-
2
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
December
-
W.A. Arbaugh, W.L. Fithen and J. McHugh. Windows of Vulnerability: A Case Study Analysis. Computer, pp. 52-59, December 2000.
-
(2000)
Computer
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh., J.3
-
4
-
-
23044502843
-
Method in computer ethics: Towards a multilevel interdisciplinary approach
-
P. Brey. Method in Computer Ethics: Towards a Multilevel Interdisciplinary Approach. Ethics and Information Technology, 2(2): 125-129, 2000.
-
(2000)
Ethics and Information Technology
, vol.2
, Issue.2
, pp. 125-129
-
-
Brey, P.1
-
5
-
-
84976815927
-
How good is good enough?
-
W.R. Collins, K.W. Miller, B.J. Spielman and P. Wherry. How Good is Good Enough? Communications of the ACM, 37(1): 81-91, 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.1
, pp. 81-91
-
-
Collins, W.R.1
Miller, K.W.2
Spielman, B.J.3
Wherry, P.4
-
6
-
-
0004743417
-
Computer society and ACM approve software engineering code of ethics
-
D. Gotterbarn, K. Miller and S. Rogerson. Computer Society and ACM Approve Software Engineering Code of Ethics. Computer, 32(10): 84-88, 1999.
-
(1999)
Computer
, vol.32
, Issue.10
, pp. 84-88
-
-
Gotterbarn, D.1
Miller, K.2
Rogerson, S.3
-
7
-
-
7244228567
-
Ethical issues: In whose best interest
-
T. F. Johnson, editor, Greenwood Press, Westport, Connecticut London
-
T.F. Johnson. Ethical Issues: In Whose Best Interest. In T. F. Johnson, editor, Handbook on Ethical Issues in Aging, pp. 17-18, Greenwood Press, Westport, Connecticut London, 1999.
-
(1999)
Handbook on Ethical Issues in Aging
, pp. 17-18
-
-
Johnson, T.F.1
-
8
-
-
34250803315
-
Software engineering and UCITA
-
C. Kaner. Software Engineering and UCITA. Computer &Information Law, 18(2), 1999.
-
(1999)
Computer & Information Law
, vol.18
, Issue.2
-
-
Kaner, C.1
-
10
-
-
85078212189
-
Computers and moral responsibility: A framework for an ethical analysis
-
C. Gould, editor, Westview Press, Boulder, Colorado
-
J. Ladd. Computers and Moral Responsibility: A Framework for an Ethical Analysis. In C. Gould, editor, The Information Web: Ethical and Social Implications of Computer Networking, pp. 207-227, Westview Press, Boulder, Colorado, 1989.
-
(1989)
The Information Web: Ethical and Social Implications of Computer Networking
, pp. 207-227
-
-
Ladd, J.1
-
12
-
-
84981430537
-
What is computer ethics
-
J. Moor. What is Computer Ethics. Metaphilosophy, 16(4): 266-275, 1985.
-
(1985)
Metaphilosophy
, vol.16
, Issue.4
, pp. 266-275
-
-
Moor, J.1
-
13
-
-
0004131498
-
-
ACM Press/ Addison-Wesley Publishing Company
-
P.G. Neumann. Computer-Related Risks. ACM Press/ Addison-Wesley Publishing Company, 1995.
-
(1995)
Computer-related Risks
-
-
Neumann, P.G.1
-
14
-
-
77950075326
-
-
Brussels, Belgium, 4-7 March
-
A. Takanen, M. Laakso, J. Eronen and J. Röning. Running Malicious Code by Exploiting Buffer Overflows: A Survey of Publicly Available Exploits. In Proceedings of the 9th Annual EICAR Conference, Brussels, Belgium, 4-7 March, 2000.
-
(2000)
Running Malicious Code by Exploiting Buffer Overflows: A Survey of Publicly Available Exploits. in Proceedings of the 9th Annual EICAR Conference
-
-
Takanen, A.1
Laakso, M.2
Eronen, J.3
Röning, J.4
-
15
-
-
0005508420
-
Accountability of internet access and service providersstrict liability entering ethics?
-
A. Vedder. Accountability of Internet Access and Service ProvidersStrict Liability Entering Ethics? Ethics and Information Technology, 3(1): 67-74, 2001.
-
(2001)
Ethics and Information Technology
, vol.3
, Issue.1
, pp. 67-74
-
-
Vedder, A.1
|