-
1
-
-
84976776710
-
Using the new ACM code of ethics in decision making
-
Anderson, R.E., Johnson, D.G., Gotterbarn, D., & Perrolle, J. (1993). Using the new ACM code of ethics in decision making. Communications of the ACM, 36(2), 98-106.
-
(1993)
Communications of the ACM
, vol.36
, Issue.2
, pp. 98-106
-
-
Anderson, R.E.1
Johnson, D.G.2
Gotterbarn, D.3
Perrolle, J.4
-
2
-
-
10644254119
-
-
Darmstadt, Germany: Wissenschaftliche Buchgesellschaft
-
Bayertz, K. (Ed.) (1995). Verantwortung: Prinzip oder Problem? Darmstadt, Germany: Wissenschaftliche Buchgesellschaft.
-
(1995)
Verantwortung: Prinzip Oder Problem?
-
-
Bayertz, K.1
-
3
-
-
84981455498
-
Attributing responsibility to computer systems
-
October
-
Bechtel, W. (1985, October). Attributing responsibility to computer systems. Metaphilosophy, 16(4), 296-305.
-
(1985)
Metaphilosophy
, vol.16
, Issue.4
, pp. 296-305
-
-
Bechtel, W.1
-
4
-
-
0035511051
-
The hypothesized relationship between accountability and ethical behavior
-
Beu, D., & Buckley, M.R. (2001). The hypothesized relationship between accountability and ethical behavior. Journal of Business Ethics, 34, 57-73.
-
(2001)
Journal of Business Ethics
, vol.34
, pp. 57-73
-
-
Beu, D.1
Buckley, M.R.2
-
5
-
-
0346528881
-
Verantwortungsbereitschaft, Verantwortungsabwehr und Verantwortungszuschreibung-Sozialpsychologische Perspektiven
-
In K. Bayertz (Ed.), Darmstadt, Germany: Wissenschaftliche Buchgesellschaft
-
Bierhoff, H.W. (1995). Verantwortungsbereitschaft, Verantwortungsabwehr und Verantwortungszuschreibung-Sozialpsychologische Perspektiven. In K. Bayertz (Ed.), Verantwortung: Prinzip oder Problem? (pp. 217-240). Darmstadt, Germany: Wissenschaftliche Buchgesellschaft.
-
(1995)
Verantwortung: Prinzip Oder Problem?
, pp. 217-240
-
-
Bierhoff, H.W.1
-
6
-
-
10644250415
-
Grenzen der Verantwortung
-
In K. Bayertz (Ed.), Darmstadt, Germany: Wissenschaftliche Buchgesellschaft
-
Birnbacher, D. (1995). Grenzen der Verantwortung. In K. Bayertz (Ed.), Verantwortung: Prinzip oder Problem? (pp. 143-183). Darmstadt, Germany: Wissenschaftliche Buchgesellschaft.
-
(1995)
Verantwortung: Prinzip Oder Problem?
, pp. 143-183
-
-
Birnbacher, D.1
-
9
-
-
10644240512
-
Ethical guidelines for meeting the challenges of the information age
-
In L.J. Pourciau (Ed.), West Lafayette, IN: Purdue University Press
-
Britz, J.J. (1999). Ethical guidelines for meeting the challenges of the information age. In L.J. Pourciau (Ed.), Ethics and electronic information in the 21st century (pp. 9-28). West Lafayette, IN: Purdue University Press.
-
(1999)
Ethics and Electronic Information In the 21st Century
, pp. 9-28
-
-
Britz, J.J.1
-
10
-
-
0033628857
-
Ontological security, existential anxiety and workplace privacy
-
Brown, W.S. (2000). Ontological security, existential anxiety and workplace privacy. Journal of Business Ethics, 23, 61-65.
-
(2000)
Journal of Business Ethics
, vol.23
, pp. 61-65
-
-
Brown, W.S.1
-
11
-
-
34147156504
-
Web security and privacy: An American perspective
-
In R.A. Spinello, & H.T. Tavani (Eds.), Sudbury, MA: Jones and Bartlett
-
Camp, L.J. (2001). Web security and privacy: An American perspective. In R.A. Spinello, & H.T. Tavani (Eds.), Readings in cyberethics (pp. 474-486). Sudbury, MA: Jones and Bartlett.
-
(2001)
Readings In Cyberethics
, pp. 474-486
-
-
Camp, L.J.1
-
12
-
-
0001501223
-
How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use
-
Culnan, M.J. (1993). How did they get my name? An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17(3), 341-363.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.J.1
-
14
-
-
84900119210
-
The computer worm: A report to the provost of Cornell University on an investigation conducted by the Commission of Preliminary Enquiry
-
In D.G. Johnson, & H. Nissenbaum (Eds.), Upper Saddle River, NJ: Prentice Hall
-
Eisenberg, T. et al. (1995). The computer worm: A report to the provost of Cornell University on an investigation conducted by the Commission of Preliminary Enquiry. In D.G. Johnson, & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 60-89). Upper Saddle River, NJ: Prentice Hall.
-
(1995)
Computers, Ethics & Social Values
, pp. 60-89
-
-
Eisenberg, T.1
-
15
-
-
0005199016
-
Privacy, respect for persons, and risk
-
In C. Ess (Ed.), Albany, NY: State University of New York Press
-
Elgesiem, D. (1996). Privacy, respect for persons, and risk. In C. Ess (Ed.), Philosophical perspectives on computer-mediated communication (pp. 45-66). Albany, NY: State University of New York Press.
-
(1996)
Philosophical Perspectives On Computer-mediated Communication
, pp. 45-66
-
-
Elgesiem, D.1
-
17
-
-
84900066555
-
Charter of fundamental rights of the European Union (2000/C 364/01)
-
European Union, Retrieved January 13, 2004, from
-
European Union (2000). Charter of fundamental rights of the European Union (2000/C 364/01). Europarl. Retrieved January 13, 2004, from http://www.europarl.eu.int/charter/default_en.htm
-
(2000)
Europarl
-
-
-
18
-
-
0033211718
-
Recent work on moral responsibility
-
Fischer, J.M. (1999). Recent work on moral responsibility. Ethics, 110(1), 93-139.
-
(1999)
Ethics
, vol.110
, Issue.1
, pp. 93-139
-
-
Fischer, J.M.1
-
20
-
-
84900128348
-
Partis contraires et responsabilité morale
-
In M. Neuberg (Ed.), Paris: Presses Universitaires de France
-
Frankfurt, H.C. (1997). Partis contraires et responsabilité morale. In M. Neuberg (Ed.), La responsabilité-Questions philosophiques (pp. 55-64). Paris: Presses Universitaires de France.
-
(1997)
La Responsabilité-Questions Philosophiques
, pp. 55-64
-
-
Frankfurt, H.C.1
-
21
-
-
0009280816
-
Alternate possibilities and moral responsibility
-
Frankfurt, H.G. (1969). Alternate possibilities and moral responsibility. Journal of Philosophy, LXVI, 828-839.
-
(1969)
Journal of Philosophy
, vol.66
, pp. 828-839
-
-
Frankfurt, H.G.1
-
22
-
-
0004256817
-
-
Lawrence, Kansas: University Press of Kansas
-
French, P.A. (1992). Responsibility matters. Lawrence, Kansas: University Press of Kansas.
-
(1992)
Responsibility Matters
-
-
French, P.A.1
-
23
-
-
0040863368
-
Privacy and limits of law
-
In D.G. Johnson, & H. Nissenbaum (Eds.), Upper Saddle River, NJ: Prentice Hall
-
Gavison, R. (1995). Privacy and limits of law. In D.G. Johnson, & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 332-351). Upper Saddle River, NJ: Prentice Hall.
-
(1995)
Computers, Ethics & Social Values
, pp. 332-351
-
-
Gavison, R.1
-
24
-
-
0040190050
-
Why citizens should vote: A causal responsibility approach
-
In E.F. Paul, F.D. Miller, & J. Paul (Eds.), Cambridge, MA: Cambridge University Press
-
Goldman, A.I. (1999). Why citizens should vote: A causal responsibility approach. In E.F. Paul, F.D. Miller, & J. Paul (Eds.), Responsibility (pp. 201-217). Cambridge, MA: Cambridge University Press.
-
(1999)
Responsibility
, pp. 201-217
-
-
Goldman, A.I.1
-
25
-
-
0037997806
-
The role of consumers' trust in online-shopping
-
Grabner-Kräuter, S. (2002). The role of consumers' trust in online-shopping. Journal of Business Ethics, 39, 43-50.
-
(2002)
Journal of Business Ethics
, vol.39
, pp. 43-50
-
-
Grabner-Kräuter, S.1
-
27
-
-
0038823275
-
Technology and ethics: Privacy in the workplace
-
Hartman, L. (2001). Technology and ethics: Privacy in the workplace. Business and Society Review, 106(1), 1-27.
-
(2001)
Business and Society Review
, vol.106
, Issue.1
, pp. 1-27
-
-
Hartman, L.1
-
28
-
-
84900199301
-
The impact of information and communications technology on managerial practices: The use of codes of conduct
-
In I. Alvarez et al. (Eds.), November 13-15, 2002, Lisbon, Portugal
-
Healy, M., & Iles, J. (2002). The impact of information and communications technology on managerial practices: The use of codes of conduct. In I. Alvarez et al. (Eds.), The transformation of organisations in the information age: Social and ethical implications. Proceedings of the Sixth ETHICOMP Conference, November 13-15, 2002, Lisbon, Portugal.
-
(2002)
The Transformation of Organisations In the Information Age: Social and Ethical Implications. Proceedings of the Sixth ETHICOMP Conference
-
-
Healy, M.1
Iles, J.2
-
31
-
-
0041540817
-
Building consumer trust online
-
Hoffman, D.L., Novak, T.P., & Peralta, M. (1999). Building consumer trust online. Communications of the ACM, 42(4), 80-87.
-
(1999)
Communications of the ACM
, vol.42
, Issue.4
, pp. 80-87
-
-
Hoffman, D.L.1
Novak, T.P.2
Peralta, M.3
-
32
-
-
10644244889
-
Verantwortung und Hochtechnologie
-
In K. Bayertz (Ed.), Darmstadt, Germany: Wissenschaftliche Buchgesellschaft
-
Hubig, C. (1995a). Verantwortung und Hochtechnologie. In K. Bayertz (Ed.), Verantwortung: Prinzip oder Problem? (pp. 98-139). Darmstadt, Germany: Wissenschaftliche Buchgesellschaft.
-
(1995)
Verantwortung: Prinzip Oder Problem?
, pp. 98-139
-
-
Hubig, C.1
-
34
-
-
0039085043
-
Public image
-
In D.G. Johnson, & H. Nissenbaum (Eds.), Upper Saddle River, NJ: Prentice Hall
-
Hunter, L. (1995). Public image. In D.G. Johnson, & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 293-299). Upper Saddle River, NJ: Prentice Hall.
-
(1995)
Computers, Ethics & Social Values
, pp. 293-299
-
-
Hunter, L.1
-
35
-
-
84900093806
-
Information assurance support environment
-
IASE, Retrieved April 8, 2003, from
-
IASE (2003). Information assurance support environment. IASE. Retrieved April 8, 2003, from http://iase.disa.mil/
-
(2003)
IASE
-
-
-
36
-
-
34147109570
-
Privacy and the computer-Why we need privacy in the information society
-
In R.M. Baird, R. Ramsower, & S.E. Rosenbaum (Eds.), New York: Prometheus Books
-
Introna, L. (2000). Privacy and the computer-Why we need privacy in the information society. In R.M. Baird, R. Ramsower, & S.E. Rosenbaum (Eds.), Cyberethics- Social and moral issues in the computer age (pp. 188-199). New York: Prometheus Books.
-
(2000)
Cyberethics- Social and Moral Issues In the Computer Age
, pp. 188-199
-
-
Introna, L.1
-
37
-
-
0004197846
-
-
Upper Saddle River, NJ: Prentice Hall
-
Johnson, D.G. (2001). Computer ethics. Upper Saddle River, NJ: Prentice Hall.
-
(2001)
Computer Ethics
-
-
Johnson, D.G.1
-
41
-
-
54649084295
-
Trust management on the World Wide Web
-
Retrieved February 21, 2005 from
-
Khare, R., & Rifkin, A. (1998). Trust management on the World Wide Web. First Monday, 3(6). Retrieved February 21, 2005 from http://www.firstmonday.org/issues/issue3_6/khare/index.html
-
(1998)
First Monday
, vol.3
, Issue.6
-
-
Khare, R.1
Rifkin, A.2
-
46
-
-
3943080787
-
Battle of the clipper chip
-
In D.G. Johnson, & H. Nissenbaum (Eds.), Upper Saddle River, NJ: Prentice Hall
-
Levy, S. (1995). Battle of the clipper chip. In D.G. Johnson, & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 651-664). Upper Saddle River, NJ: Prentice Hall.
-
(1995)
Computers, Ethics & Social Values
, pp. 651-664
-
-
Levy, S.1
-
47
-
-
9644263671
-
The risks of software
-
In D.G. Johnson, & H. Nissenbaum (Eds.), Upper Saddle River, NJ: Prentice Hall
-
Littlewood, B., & Stringy, L. (1995). The risks of software. In D.G. Johnson, & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 432-437). Upper Saddle River, NJ: Prentice Hall.
-
(1995)
Computers, Ethics & Social Values
, pp. 432-437
-
-
Littlewood, B.1
Stringy, L.2
-
48
-
-
55249097295
-
Four ethical issues of the information age
-
Mason, R.O. (1986). Four ethical issues of the information age. MIS Quarterly, 10, 5-12.
-
(1986)
MIS Quarterly
, vol.10
, pp. 5-12
-
-
Mason, R.O.1
-
50
-
-
84976793562
-
Values, personal information, privacy, and regulatory approaches
-
Milberg, S., Burke, S., Smith, H.J., & Kallman, E. (1995). Values, personal information, privacy, and regulatory approaches. Communications of the ACM, 38(12), 65-74.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 65-74
-
-
Milberg, S.1
Burke, S.2
Smith, H.J.3
Kallman, E.4
-
51
-
-
0942281483
-
Toward a theory of privacy in the information age
-
In R.M. Baird, R. Ramsower, & S.E. Rosenbaum (Eds.), New York: Prometheus Books
-
Moor, J.H. (2000). Toward a theory of privacy in the information age. In R.M. Baird, R. Ramsower, & S.E. Rosenbaum (Eds.), Cyberethics-Social and moral issues in the computer age (pp. 200-212). New York: Prometheus Books.
-
(2000)
Cyberethics-Social and Moral Issues In the Computer Age
, pp. 200-212
-
-
Moor, J.H.1
-
53
-
-
84900209634
-
-
NIAP, Retrieved April 7, 2003, from
-
NIAP (2003). About NIAP. Retrieved April 7, 2003, from http://niap.nist.gov/
-
(2003)
About NIAP
-
-
-
54
-
-
84900182967
-
Über den Respekt vor der Eigenverantwortung des Anderen
-
In B. Neubauer (Ed.), Waake, Germany: Licet Verlag
-
Nida-Rümelin, J. (1998). Über den Respekt vor der Eigenverantwortung des Anderen. In B. Neubauer (Ed.), Eigenverantwortung: Positionen und Perspektiven. Waake, Germany: Licet Verlag.
-
(1998)
Eigenverantwortung: Positionen Und Perspektiven
-
-
Nida-Rümelin, J.1
-
56
-
-
10644272242
-
-
Cambridge, MA: Cambridge University Press
-
Paul, E.F., Miller, F.D., & Paul, J. (Eds.) (1999). Responsibility. Cambridge, MA: Cambridge University Press.
-
(1999)
Responsibility
-
-
Paul, E.F.1
Miller, F.D.2
Paul, J.3
-
57
-
-
84900146503
-
An economic theory of privacy
-
In D.G. Johnson, & H. Nissenbaum (Eds.), Upper Saddle River, NJ: Prentice Hall
-
Posner, R.A. (1995). An economic theory of privacy. In D.G. Johnson, & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 358-366). Upper Saddle River, NJ: Prentice Hall.
-
(1995)
Computers, Ethics & Social Values
, pp. 358-366
-
-
Posner, R.A.1
-
58
-
-
7744229341
-
Why privacy is important
-
In D.G. Johnson, & H. Nissenbaum (Eds.), Upper Saddle River, NJ: Prentice Hall
-
Rachels, J. (1995). Why privacy is important. In D.G. Johnson, & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 351-357). Upper Saddle River, NJ: Prentice Hall.
-
(1995)
Computers, Ethics & Social Values
, pp. 351-357
-
-
Rachels, J.1
-
59
-
-
34147096224
-
Privacy and appropriation of identity
-
In G. Collste (Ed.), Linköping, Sweden: Centre for Applied Ethics
-
Robison, W.L. (2000). Privacy and appropriation of identity. In G. Collste (Ed.), Ethics in the age of information technology (pp. 70-86). Linköping, Sweden: Centre for Applied Ethics.
-
(2000)
Ethics In the Age of Information Technology
, pp. 70-86
-
-
Robison, W.L.1
-
61
-
-
84900095787
-
Computer virus legislation
-
In D.G. Johnson, & H. Nissenbaum (Eds.), Upper Saddle River, NJ: Prentice Hall
-
Rotenberg, M. (1995). Computer virus legislation. In D.G. Johnson, & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 135-147). Upper Saddle River, NJ: Prentice Hall.
-
(1995)
Computers, Ethics & Social Values
, pp. 135-147
-
-
Rotenberg, M.1
-
62
-
-
34147114106
-
Communications privacy: Implications for network design
-
In R.N. Stichler, & R. Hauptman (Eds.), Jefferson, NC: MacFarland & Company
-
Rotenberg, M. (1998). Communications privacy: Implications for network design. In R.N. Stichler, & R. Hauptman (Eds.), Ethics, information and technology: Readings (pp. 152-168). Jefferson, NC: MacFarland & Company.
-
(1998)
Ethics, Information and Technology: Readings
, pp. 152-168
-
-
Rotenberg, M.1
-
63
-
-
10644248686
-
Eigenverantwortung in komplexen Systemen und als komplexes System
-
In B. Neubauer (Ed.), Waake, Germany: Licet Verlag
-
Rötzer, F. (1998). Eigenverantwortung in komplexen Systemen und als komplexes System. In B. Neubauer (Ed.), Eigenverantwortung: Positionen und Perspektiven. Waake, Germany: Licet Verlag.
-
(1998)
Eigenverantwortung: Positionen Und Perspektiven
-
-
Rötzer, F.1
-
66
-
-
84900218331
-
Littlebrother is watching you
-
In R.M. Baird, R. Ramsower, & S.E. Rosenbaum (Eds.), New York: Prometheus Books
-
Schulman, M. (2000). Littlebrother is watching you. In R.M. Baird, R. Ramsower, & S.E. Rosenbaum (Eds.), Cyberethics-Social and moral issues in the computer age (pp. 155-161). New York: Prometheus Books.
-
(2000)
Cyberethics-Social and Moral Issues In the Computer Age
, pp. 155-161
-
-
Schulman, M.1
-
68
-
-
84976693761
-
The ethical and legal quandary of email privacy
-
Sipior, J.C., & Ward, B.T. (1995). The ethical and legal quandary of email privacy. Communications of the ACM, 38(12), 48-54.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 48-54
-
-
Sipior, J.C.1
Ward, B.T.2
-
69
-
-
0345878051
-
Are computer hacker break-ins ethical?
-
In D.G. Johnson, & H. Nissenbaum (Eds.), Upper Saddle River, NJ: Prentice Hall
-
Spafford, E.H. (1995). Are computer hacker break-ins ethical? In D.G. Johnson, & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 125-134). Upper Saddle River, NJ: Prentice Hall.
-
(1995)
Computers, Ethics & Social Values
, pp. 125-134
-
-
Spafford, E.H.1
-
71
-
-
0039006145
-
On responsibility in science and law
-
In E.F. Paul, F.D. Miller, & J. Paul (Eds.), Cambridge, MA: Cambridge University Press
-
Staddon, J. (1999). On responsibility in science and law. In E.F. Paul, F.D. Miller, & J. Paul (Eds.), Responsibility (pp. 146-174). Cambridge, MA: Cambridge University Press.
-
(1999)
Responsibility
, pp. 146-174
-
-
Staddon, J.1
-
73
-
-
0039598781
-
Responsibility and the abuse excuse
-
In E.F. Paul, F.D. Miller, & J. Paul (Eds.), Cambridge, MA: Cambridge University Press
-
Stocker, M. (1999). Responsibility and the abuse excuse. In E.F. Paul, F.D. Miller, & J. Paul (Eds.), Responsibility (pp. 175-200). Cambridge, MA: Cambridge University Press.
-
(1999)
Responsibility
, pp. 175-200
-
-
Stocker, M.1
-
74
-
-
53349102510
-
Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
-
Straub, D.W., & Collins, R.W. (1990). Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly, 14.
-
(1990)
MIS Quarterly
, pp. 14
-
-
Straub, D.W.1
Collins, R.W.2
-
75
-
-
0002363511
-
Privacy and security
-
In D. Langford (Ed.), London: McMillan
-
Tavani, H. (2000). Privacy and security. In D. Langford (Ed.), Internet ethics (pp. 65-89). London: McMillan.
-
(2000)
Internet Ethics
, pp. 65-89
-
-
Tavani, H.1
-
76
-
-
34147134135
-
Privacy protection, control of information, and privacy-enhancing technologies
-
In R.A. Spinello, & H.T. Tavani (Eds.), Sudbury, MA: Jones and Bartlett
-
Tavani, H.T., & Moor, J.T. (2001). Privacy protection, control of information, and privacy-enhancing technologies. In R.A. Spinello, & H.T. Tavani (Eds.), Readings in cyberethics (pp. 378-391). Sudbury, MA: Jones and Bartlett.
-
(2001)
Readings In Cyberethics
, pp. 378-391
-
-
Tavani, H.T.1
Moor, J.T.2
-
77
-
-
34547278295
-
Privacy or informational injustice?
-
In L.J. Pourciau (Ed.), West Lafayette, IN: Purdue University Press
-
van den Hoven, M.J. (1999). Privacy or informational injustice? In L.J. Pourciau (Ed.), Ethics and electronic information in the 21st century (pp. 139-150). West Lafayette, IN: Purdue University Press.
-
(1999)
Ethics and Electronic Information In the 21st Century
, pp. 139-150
-
-
van den Hoven, M.J.1
-
78
-
-
84869768242
-
Written on the body: Biometrics and identity
-
In R.A. Spinello, & H.T. Tavani (Eds.), Sudbury, MA: Jones and Bartlett
-
van der Ploeg, I. (2001). Written on the body: Biometrics and identity. In R.A. Spinello, & H.T. Tavani (Eds.), Readings in cyberethics (pp. 501-514). Sudbury, MA: Jones and Bartlett.
-
(2001)
Readings In Cyberethics
, pp. 501-514
-
-
van der Ploeg, I.1
-
84
-
-
10644252386
-
-
Paris: Presses Universitaires de France, PUF
-
Wunenburger, J.-J. (1993). Questions d'éthique. Paris: Presses Universitaires de France, PUF.
-
(1993)
Questions D'éthique
-
-
Wunenburger, J.-J.1
-
85
-
-
5244346414
-
Wandelt sich die Verantwortung mit dem technischen Wandel?
-
In H. Lenk, & G. Ropohl (Eds.), Stuttgart: Philipp Reclam jun
-
Zimmerli, W.C. (1987). Wandelt sich die Verantwortung mit dem technischen Wandel? In H. Lenk, & G. Ropohl (Eds.), Technik und Ethik (pp. 92-111). Stuttgart: Philipp Reclam jun.
-
(1987)
Technik Und Ethik
, pp. 92-111
-
-
Zimmerli, W.C.1
|