-
1
-
-
4243136729
-
Cryptography and competition policy - Issues with 'trusted computing'
-
L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer
-
R. Anderson, "Cryptography and competition policy - Issues with 'trusted computing'," in Economics of Information Security, L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, 2004, pp. 35-52.
-
(2004)
Economics of Information Security
, pp. 35-52
-
-
Anderson, R.1
-
2
-
-
84976776710
-
Using the new ACM Code of Ethics in decision making
-
R.E. Anderson, D.G. Johnson, D. Gotterbarn, and J. Perrolle, "Using the new ACM Code of Ethics in decision making," Commun. ACM, vol 36, no. 2, pp. 98-106, 1993.
-
(1993)
Commun. ACM
, vol.36
, Issue.2
, pp. 98-106
-
-
Anderson, R.E.1
Johnson, D.G.2
Gotterbarn, D.3
Perrolle, J.4
-
4
-
-
16444368611
-
Privacy in e-commerce: Stated preferences vs. actual behavior
-
B. Berendt, O. Gunther, and S. Spiekerman, "Privacy in e-commerce: Stated preferences vs. actual behavior," in Commun. ACM., vol. 48, no. 4, pp. 101-106, 2005.
-
(2005)
Commun. ACM
, vol.48
, Issue.4
, pp. 101-106
-
-
Berendt, B.1
Gunther, O.2
Spiekerman, S.3
-
5
-
-
10644240512
-
Ethical guidelines for meeting the challenges of the information age
-
L.J. Pourciau, Ed. West Lafayette, IN: Purdue Univ. Press
-
J.J. Britz "Ethical guidelines for meeting the challenges of the information age," in Ethics and Electronic Information in the 21st Century, L.J. Pourciau, Ed. West Lafayette, IN: Purdue Univ. Press, 1999, pp. 9-28.
-
(1999)
Ethics and Electronic Information in the 21st Century
, pp. 9-28
-
-
Britz, J.J.1
-
6
-
-
0035982980
-
What does it mean to be 'critical' in IS research?
-
C. Brooke, "What does it mean to be 'critical' in IS research?," J. Information Technology, vol. 17, pp. 49-57, 2002.
-
(2002)
J. Information Technology
, vol.17
, pp. 49-57
-
-
Brooke, C.1
-
7
-
-
0033628857
-
Ontological security, existential anxiety and workplace privacy
-
W.S. Brown, "Ontological security, existential anxiety and workplace privacy," J. Business Ethics, vol. 23, pp. 61-65, 2000.
-
(2000)
J. Business Ethics
, vol.23
, pp. 61-65
-
-
Brown, W.S.1
-
8
-
-
34147156504
-
Web security and privacy: An American perspective
-
R.A. Spinello and H.T. Tavani, Eds. Sudbury, MA, Jones and Bartlett
-
L.J. Camp, "Web security and privacy: An American perspective," in Readings in Cyberethics, R.A. Spinello and H.T. Tavani, Eds. Sudbury, MA.: Jones and Bartlett, 2001, pp. 474-486.
-
(2001)
Readings in Cyberethics
, pp. 474-486
-
-
Camp, L.J.1
-
9
-
-
25444455106
-
-
L.J. Camp and S. Lewis, Eds, Dordrecht, Germany: Kluwer
-
L.J. Camp and S. Lewis, Eds. Economics of Information Security. Dordrecht, Germany: Kluwer, 2004.
-
(2004)
Economics of Information Security
-
-
-
10
-
-
32644462017
-
Pricing security - A market in vulnerabilities
-
L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, pp
-
L.J. Camp and C. Wolfram, "Pricing security - A market in vulnerabilities," in Economics of Information Security, L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, pp. 17-34, 2004.
-
(2004)
Economics of Information Security
, pp. 17-34
-
-
Camp, L.J.1
Wolfram, C.2
-
11
-
-
0036600633
-
Law enforcement surveillance in the network society
-
S. Chan and L.J. Camp, "Law enforcement surveillance in the network society," IEEE Technology and Society Mag., vol. 21, no. 2, pp. 22-30, 2002.
-
(2002)
IEEE Technology and Society Mag
, vol.21
, Issue.2
, pp. 22-30
-
-
Chan, S.1
Camp, L.J.2
-
12
-
-
34147189365
-
Economics of IT security management
-
L.J. Camp and S. Lewis, Eds, Dordrecht, Germany: Kluwer, pp
-
H Cavusoglu, "Economics of IT security management," in Economics of Information Security, L.J. Camp and S. Lewis, Eds., Dordrecht, Germany: Kluwer, pp. 71-83, 2004.
-
(2004)
Economics of Information Security
, pp. 71-83
-
-
Cavusoglu, H.1
-
13
-
-
0001501223
-
How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use
-
M.J. Culnan, "How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use," MIS Quarterly, vol. 17, no. 3, pp. 341-363, 1993.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.J.1
-
14
-
-
84904323681
-
The discourse of learning technology in Canada: Understanding communication distortions and the implications for decision making
-
E. Wynn, E. Whitley, M. Myers, and J. DeGross, Eds. Dordrecht, Germany: Kluwer
-
W. Cukier, C. Middleton, and R. Bauer, "The discourse of learning technology in Canada: Understanding communication distortions and the implications for decision making," in Global and Organizational Discourse About Information Technology, E. Wynn, E. Whitley, M. Myers, and J. DeGross, Eds. Dordrecht, Germany: Kluwer, 2003, pp. 197-221.
-
(2003)
Global and Organizational Discourse About Information Technology
, pp. 197-221
-
-
Cukier, W.1
Middleton, C.2
Bauer, R.3
-
15
-
-
74549207774
-
Applying Habermas' validity claims as a standard for critical discourse analysis
-
B. Kaplan, D Truex, T. Wood-Harper, and J. DeGross, Eds. Dordrecht, Germany: Kluwar
-
W. Cukier, C. Middleton, and R. Bauer, "Applying Habermas' validity claims as a standard for critical discourse analysis," in Information Systems Research - Relevant Theory and Informed Practice, B. Kaplan, D Truex, T. Wood-Harper, and J. DeGross, Eds. Dordrecht, Germany: Kluwar, 2004, pp. 233-258.
-
(2004)
Information Systems Research - Relevant Theory and Informed Practice
, pp. 233-258
-
-
Cukier, W.1
Middleton, C.2
Bauer, R.3
-
16
-
-
0005199016
-
Privacy, respect for persons, and risk
-
C. Ess, Ed. Albany NY:: State Univ. of New York Press
-
D. Elgesiem, "Privacy, respect for persons, and risk," in Philosophical Perspectives on Computer-Mediated Communication, C. Ess, Ed. Albany NY:: State Univ. of New York Press, 1996, pp. 45-66.
-
(1996)
Philosophical Perspectives on Computer-Mediated Communication
, pp. 45-66
-
-
Elgesiem, D.1
-
20
-
-
0003618645
-
-
2nd ed. Cambridge, MA/London, U.K, M.I.T. Press
-
T. Forester and P. Morrison, Computer Ethics - Cautionary Tales and Ethical Dilemmas in Computing, 2nd ed. Cambridge, MA/London, U.K.: M.I.T. Press, 1994.
-
(1994)
Computer Ethics - Cautionary Tales and Ethical Dilemmas in Computing
-
-
Forester, T.1
Morrison, P.2
-
22
-
-
0040863368
-
Privacy and limits of law
-
D.G. Johnson and H. Nissenbaum, Eds. Upper Saddle River, NJ: Prentice Hall, pp
-
R. Gavison, "Privacy and limits of law," in Computers, Ethics and Social Values, D.G. Johnson and H. Nissenbaum, Eds. Upper Saddle River, NJ: Prentice Hall, pp. 332-351, 1995.
-
(1995)
Computers, Ethics and Social Values
, pp. 332-351
-
-
Gavison, R.1
-
27
-
-
53349119070
-
Realizing emancipatory principles in information systems development: The case for ETHICS
-
R. Hirschheim and H.K. Klein, "Realizing emancipatory principles in information systems development: The case for ETHICS," MIS Quarterly vol. 18, no. 1, pp. 83-109, 1994.
-
(1994)
MIS Quarterly
, vol.18
, Issue.1
, pp. 83-109
-
-
Hirschheim, R.1
Klein, H.K.2
-
28
-
-
0041540817
-
Building consumer trust online
-
D.L. Hoffman, T.P. Novak, and M. Peralta, "Building consumer trust online," Commun. ACM, vol. 42, no. 4, pp. 80-87, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.4
, pp. 80-87
-
-
Hoffman, D.L.1
Novak, T.P.2
Peralta, M.3
-
29
-
-
34147109570
-
Privacy and the computer - Why we need privacy in the information society
-
R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus
-
L. Introna, "Privacy and the computer - Why we need privacy in the information society," in Cyberethics - Social and Moral Issues in the Computer Age, R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus, 2000, pp. 188-199.
-
(2000)
Cyberethics - Social and Moral Issues in the Computer Age
, pp. 188-199
-
-
Introna, L.1
-
30
-
-
27844444674
-
Making sense of e-commerce as social action
-
M. Janson and D. Cecez-Kecmanovic, "Making sense of e-commerce as social action," Information Technology and People, vol. 18, no. 4, pp. 311-342, 2005.
-
(2005)
Information Technology and People
, vol.18
, Issue.4
, pp. 311-342
-
-
Janson, M.1
Cecez-Kecmanovic, D.2
-
31
-
-
0004197846
-
-
3rd ed. Upper Saddle River, NJ: Prentice Hall
-
D.G. Johnson, Computer Ethics, 3rd ed. Upper Saddle River, NJ: Prentice Hall, 2001.
-
(2001)
Computer Ethics
-
-
Johnson, D.G.1
-
32
-
-
54649084295
-
Trust management on the World Wide Web
-
R. Khare and A. Rifkin "Trust management on the World Wide Web," First Monday, vol. 3, no. 6, 1998; www.firstmonday.dk.
-
(1998)
First Monday
, vol.3
, Issue.6
-
-
Khare, R.1
Rifkin, A.2
-
33
-
-
34147102602
-
A critical look at the regulation of computer viruses
-
M. Klang "A critical look at the regulation of computer viruses," Int. J. Law and Information Technology, vol. 11, pp. 162-183, 2003.
-
(2003)
Int. J. Law and Information Technology
, vol.11
, pp. 162-183
-
-
Klang, M.1
-
34
-
-
2442435192
-
The critical social theory of Jürgen Habermas and its implications for IS research
-
J. Mingers and L. Willcocks, Eds. Chichester, U.K, Wiley
-
H.K. Klein and M.Q. Huynh "The critical social theory of Jürgen Habermas and its implications for IS research," in Social Theory and Philosophy for Information Systems, J. Mingers and L. Willcocks, Eds. Chichester, U.K.: Wiley, 2004, pp. 157-237.
-
(2004)
Social Theory and Philosophy for Information Systems
, pp. 157-237
-
-
Klein, H.K.1
Huynh, M.Q.2
-
35
-
-
34147161491
-
A Survey of Formal Models for Computer Security
-
8489. Washington D.C, Naval Research Laboratory
-
C.E. Landwehr, A Survey of Formal Models for Computer Security, NRL Rep. 8489. Washington D.C.: Naval Research Laboratory, 1981.
-
(1981)
NRL Rep
-
-
Landwehr, C.E.1
-
36
-
-
33846261602
-
-
Naval Research Laboratory, Washington, DC, accessed Apr. 1
-
C.E. Landwehr, C.L. Heitmeyer, and J.D. McLean, "A security model for military message systems: Retrospective," Naval Research Laboratory, Washington, DC, 2001; http://chacs.nrl.navy.mil/publications/CHACS/2001/ 2001landwehr-ACSAC.pdf, accessed Apr. 1, 2006.
-
(2001)
A security model for military message systems: Retrospective
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
McLean, J.D.3
-
38
-
-
55249097295
-
Four ethical issues of the information age
-
R.O. Mason, "Four ethical issues of the information age," MIS Quarterly, vol. 10, pp. 5-12, 1986.
-
(1986)
MIS Quarterly
, vol.10
, pp. 5-12
-
-
Mason, R.O.1
-
39
-
-
0036950728
-
The stakeholder dimension in information systems evaluation
-
L. McAulay, N. Doherty, and N. Keval, "The stakeholder dimension in information systems evaluation," J. Information Technol., vol. 17, pp. 241-255, 2002.
-
(2002)
J. Information Technol
, vol.17
, pp. 241-255
-
-
McAulay, L.1
Doherty, N.2
Keval, N.3
-
40
-
-
34147168462
-
Reason, relativity, and responsibility in computer ethics
-
T.W. Bynum and S. Rogerson, Eds. Oxford, U.K, Blackwell
-
J.H. Moor, "Reason, relativity, and responsibility in computer ethics," in Computer Ethics and Professional Responsibility, T.W. Bynum and S. Rogerson, Eds. Oxford, U.K.: Blackwell, 2004, pp. 21-38.
-
(2004)
Computer Ethics and Professional Responsibility
, pp. 21-38
-
-
Moor, J.H.1
-
41
-
-
7744239012
-
If Aristotle were a computing professional
-
R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus
-
J.H. Moor, "If Aristotle were a computing professional," in Cyberethics - Social and Moral Issues in the Computer Age, R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus, 2000, pp. 34-40.
-
(2000)
Cyberethics - Social and Moral Issues in the Computer Age
, pp. 34-40
-
-
Moor, J.H.1
-
42
-
-
0942281483
-
Toward a theory of privacy in the information age
-
R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus
-
J.H. Moor, "Toward a theory of privacy in the information age," in Cyberethics - Social and Moral Issues in the Computer Age, R.M. Baird, R. Ramsower, and S.E. Rosenbaum, Eds. New York, NY: Prometheus, 2000, pp. 200-212.
-
(2000)
Cyberethics - Social and Moral Issues in the Computer Age
, pp. 200-212
-
-
Moor, J.H.1
-
43
-
-
84981430537
-
What is computer ethics?
-
J.H. Moor, "What is computer ethics?," Metaphilosophy, vol. 16, no. 4, pp. 266-275, 1985.
-
(1985)
Metaphilosophy
, vol.16
, Issue.4
, pp. 266-275
-
-
Moor, J.H.1
-
45
-
-
31144461818
-
Where computer security meets National security
-
H. Nissenbaum, "Where computer security meets National security," Ethics and Information Technology, vol. 7, no. 2, pp. 61-73, 2005.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.2
, pp. 61-73
-
-
Nissenbaum, H.1
-
46
-
-
0142121793
-
Can trust be secured online? A theoretical perspective
-
etica/, accessed May 26
-
H. Nissenbaum, "Can trust be secured online? A theoretical perspective," etica and politica, vol. 1, no. 2, 1999; http://www.units.it/~etica/, accessed May 26, 2006.
-
(1999)
etica and politica
, vol.1
, Issue.2
-
-
Nissenbaum, H.1
-
47
-
-
71549126429
-
Studying information technology in organizations: Research approaches and assumptions
-
W.J. Orlikowski and J.J. Baroudi, "Studying information technology in organizations: Research approaches and assumptions," Information Systems Research, vol. 2, no. 1, pp. 1-28, 1991.
-
(1991)
Information Systems Research
, vol.2
, Issue.1
, pp. 1-28
-
-
Orlikowski, W.J.1
Baroudi, J.J.2
-
49
-
-
7744229341
-
Why privacy is important
-
J.G. Johnson and H. Nissenbaum, Eds. Upper Saddle River, NJ: Prentice Hall
-
J. Rachels, "Why privacy is important," in Computers, Ethics and Social Values, J.G. Johnson and H. Nissenbaum, Eds. Upper Saddle River, NJ: Prentice Hall, 1995, pp. 351-357.
-
(1995)
Computers, Ethics and Social Values
, pp. 351-357
-
-
Rachels, J.1
-
50
-
-
34147096224
-
Privacy and appropriation of identity
-
G. Collste, Ed. Linköping, Sweden: Centre for Applied Ethics
-
W.L. Robison, "Privacy and appropriation of identity," in Ethics in the Age of Information Technology, G. Collste, Ed. Linköping, Sweden: Centre for Applied Ethics, 2000, pp. 70-86.
-
(2000)
Ethics in the Age of Information Technology
, pp. 70-86
-
-
Robison, W.L.1
-
52
-
-
34147114106
-
Communications Privacy: Implications for Network Design
-
R. Stichler and R. Hauptman, Eds. Jefferson, NC: MacFarland
-
M. Rotenberg, "Communications Privacy: Implications for Network Design," in: Ethics, Information and Technology: Readings, R. Stichler and R. Hauptman, Eds. Jefferson, NC: MacFarland, 1998, pp. 152-168.
-
(1998)
Ethics, Information and Technology: Readings
, pp. 152-168
-
-
Rotenberg, M.1
-
53
-
-
22044441059
-
From the sociology of trust towards a sociology of 'e-trust,' Int
-
J. Rutter, "From the sociology of trust towards a sociology of 'e-trust,'" Int. J. New Product Development and Innovation Management, vol. 2, no. 4, pp. 371-385, 1999.
-
(1999)
J. New Product Development and Innovation Management
, vol.2
, Issue.4
, pp. 371-385
-
-
Rutter, J.1
-
54
-
-
34147169760
-
Beyond utopian and nostalgic views of information technology and education: Implications for research and practice
-
S. Sahay, "Beyond utopian and nostalgic views of information technology and education: Implications for research and practice," J. Association for Information Systems, vol. 5, no. 7, pp. 282-313, 2004.
-
(2004)
J. Association for Information Systems
, vol.5
, Issue.7
, pp. 282-313
-
-
Sahay, S.1
-
55
-
-
0035982982
-
Information technology and ideology
-
K. Saravanamuthu, "Information technology and ideology," J. Information Technology, vol. 17, pp. 79-87, 2002.
-
(2002)
J. Information Technology
, vol.17
, pp. 79-87
-
-
Saravanamuthu, K.1
-
56
-
-
0002112928
-
Science and ideology
-
2nd ed, D.M. Hausman, Ed. Cambridge, U.K, Cambridge Univ. Press
-
J. Schumpeter, "Science and ideology," in The Philosophy of Economics: An Anthology, 2nd ed., D.M. Hausman, Ed. Cambridge, U.K.: Cambridge Univ. Press, 1994, pp. 224-238.
-
(1994)
The Philosophy of Economics: An Anthology
, pp. 224-238
-
-
Schumpeter, J.1
-
58
-
-
34147122389
-
What price privacy? (and why identity theft is about neither identity nor theft)
-
L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, pp
-
A. Shostack and P. Syverson, "What price privacy? (and why identity theft is about neither identity nor theft)," in Economics of Information Security, L.J. Camp and S. Lewis, Eds. Dordrecht, Germany: Kluwer, pp. 129-142, 2004.
-
(2004)
Economics of Information Security
, pp. 129-142
-
-
Shostack, A.1
Syverson, P.2
-
59
-
-
84976693761
-
The ethical and legal quandary of email privacy
-
J.C. Sipior and B.T. Ward, "The ethical and legal quandary of email privacy" Commun. ACM, vol. 38, no. 12, pp. 48-54, 1995.
-
(1995)
Commun. ACM
, vol.38
, Issue.12
, pp. 48-54
-
-
Sipior, J.C.1
Ward, B.T.2
-
61
-
-
33845522161
-
Electronic monitoring in the work-place: If people don't care, then what is the relevance?
-
J. Weckert, Ed. Hershey, PA: Idea-Group
-
B.S. Stahl, M. Prior, S. Wilford, and D. Collins, "Electronic monitoring in the work-place: If people don't care, then what is the relevance?," in Electronic Monitoring in the Workplace: Controversies and Solutions, J. Weckert, Ed. Hershey, PA: Idea-Group, 2005, pp. 50-78, 2005.
-
(2005)
Electronic Monitoring in the Workplace: Controversies and Solutions
, pp. 50-78
-
-
Stahl, B.S.1
Prior, M.2
Wilford, S.3
Collins, D.4
-
62
-
-
2642578963
-
-
B.C. Stahl, Responsibility for information assurance and privacy: A problem of individual ethics?, J. Organizational and End User Computing (Special Issue on Information Assurance and Security), C.D. Schou and K.J. Trimmer, Eds., 16, no. 3, pp. 59-77, 2004.
-
B.C. Stahl, "Responsibility for information assurance and privacy: A problem of individual ethics?," J. Organizational and End User Computing (Special Issue on Information Assurance and Security), C.D. Schou and K.J. Trimmer, Eds., vol. 16, no. 3, pp. 59-77, 2004.
-
-
-
-
64
-
-
53349102510
-
Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
-
D.W. Straub and R.W. Collins, "Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy," MIS Quarterly, vol. 14, pp. 143-156, 1990.
-
(1990)
MIS Quarterly
, vol.14
, pp. 143-156
-
-
Straub, D.W.1
Collins, R.W.2
-
65
-
-
0002363511
-
Privacy and security
-
D Langford, Ed. London, U.K, McMillan
-
H. Tavani, "Privacy and security," in Internet Ethics, D Langford, Ed. London, U.K.: McMillan, 2000, pp. 65-89.
-
(2000)
Internet Ethics
, pp. 65-89
-
-
Tavani, H.1
-
66
-
-
34147134135
-
Privacy protection, control of information, and privacy-enhancing technologies
-
R.A. Spinello and H.T. Tavani, Eds. Sudbury, MA: Jones and Bartlett
-
H.T. Tavani and J.T. Moor, "Privacy protection, control of information, and privacy-enhancing technologies," in Readings in Cyberethics, R.A. Spinello and H.T. Tavani, Eds. Sudbury, MA: Jones and Bartlett, 2001, pp. 378-391.
-
(2001)
Readings in Cyberethics
, pp. 378-391
-
-
Tavani, H.T.1
Moor, J.T.2
-
68
-
-
0002686025
-
Trust (and mistrust) in secure applications
-
J. Viega, T. Kohno and B. Potter, "Trust (and mistrust) in secure applications," Commun. ACM, vol. 44, no. 2, pp. 31-36, 2001.
-
(2001)
Commun. ACM
, vol.44
, Issue.2
, pp. 31-36
-
-
Viega, J.1
Kohno, T.2
Potter, B.3
-
69
-
-
34147141708
-
Cracking the computer forensics mystery
-
C. Wall and J. Paroff, "Cracking the computer forensics mystery," Computer and Internet Lawyer, vol. 22, no. 4, pp. 1-6, 2005.
-
(2005)
Computer and Internet Lawyer
, vol.22
, Issue.4
, pp. 1-6
-
-
Wall, C.1
Paroff, J.2
|