-
1
-
-
85041145235
-
-
UCL Press London
-
Adams, J. (1995), Risk, UCL Press, London.
-
(1995)
Risk
-
-
Adams, J.1
-
2
-
-
84925838576
-
Why information security is hard – an economic perspective
-
IEEE Computer Society Washington, DC
-
Anderson, R. (2001), “Why information security is hard – an economic perspective”, ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference, IEEE Computer Society, Washington, DC, p. 358.
-
(2001)
ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 358
-
-
Anderson, R.1
-
3
-
-
84974286205
-
Modern moral philosophy
-
Anscombe, G.E.M. (1958), “Modern moral philosophy”, Philosophy, Vol. 33, p. 124.
-
(1958)
Philosophy
, vol.33
, pp. 124
-
-
Anscombe, G.E.M.1
-
4
-
-
84993057121
-
2008 data breach investigation report
-
June.
-
Baker, W.H., Hylender, C.D. and Valentine, J.A. (2008), “2008 data breach investigation report”, Verizon Business, June.
-
(2008)
Verizon Business
-
-
Baker, W.H.1
Hylender, C.D.2
Valentine, J.A.3
-
5
-
-
0007049285
-
Some human dimensions of computer virus creation and infection
-
Bissett, A. (2000), “Some human dimensions of computer virus creation and infection”, International Journal of Human-computer Studies, Vol. 50 No. 5, pp. 899-913.
-
(2000)
International Journal of Human-computer Studies
, vol.50
, Issue.5
, pp. 899-913
-
-
Bissett, A.1
-
6
-
-
0001021434
-
The ethics of safety-critical systems
-
Bowen, J. (2000), “The ethics of safety-critical systems”, Communications of the ACM, Vol. 43 No. 4, pp. 91-97.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 91-97
-
-
Bowen, J.1
-
7
-
-
84965673680
-
The policy implications of differing concepts of risk
-
Bradbury, J. (1989), “The policy implications of differing concepts of risk”, Science, Technology, and Human Values, Vol. 14 No. 4, pp. 380-399.
-
(1989)
Science, Technology, and Human Values
, vol.14
, Issue.4
, pp. 380-399
-
-
Bradbury, J.1
-
8
-
-
18144411315
-
Ethical character and virtue of organizations: an empirical assessment and strategic implications
-
Chun, R. (2005), “Ethical character and virtue of organizations: an empirical assessment and strategic implications”, Journal of Business Ethics, Vol. 57 No. 3, pp. 269-284.
-
(2005)
Journal of Business Ethics
, vol.57
, Issue.3
, pp. 269-284
-
-
Chun, R.1
-
9
-
-
57049137849
-
The intertwining of ethics and methodology in science and engineering: a virtue-ethical approach
-
Consoli, L. (2008), “The intertwining of ethics and methodology in science and engineering: a virtue-ethical approach”, Interdisciplinary Science Reviews, Vol. 33 No. 3, pp. 233-242.
-
(2008)
Interdisciplinary Science Reviews
, vol.33
, Issue.3
, pp. 233-242
-
-
Consoli, L.1
-
10
-
-
0012310737
-
The risk of reliance on perceived risk
-
Cross, F.B. (1992), “The risk of reliance on perceived risk”, Risk, Vol. 3, pp. 59-70.
-
(1992)
Risk
, vol.3
, pp. 59-70
-
-
Cross, F.B.1
-
11
-
-
62449296566
-
On the grotesque in science fiction
-
Csicsery-Ronay, I. (2002), “On the grotesque in science fiction”, Science-fiction Studies, Vol. 29, pp. 71-99.
-
(2002)
Science-fiction Studies
, vol.29
, pp. 71-99
-
-
Csicsery-Ronay, I.1
-
13
-
-
2342559896
-
Election security: perception and reality
-
Evans, D. and Paul, N. (2004), “Election security: perception and reality”, IEEE Security & Privacy, Vol. 2 No. 1, pp. 24-31.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.1
, pp. 24-31
-
-
Evans, D.1
Paul, N.2
-
14
-
-
12344336018
-
Technical options report
-
available at: (accessed March 24, 2009).
-
Fairweather, B. and Rogerson, S. (2009), “Technical options report”, available at: www.communities.gov.uk/documents/localgovernment/pdf/155484.pdf (accessed March 24, 2009).
-
(2009)
-
-
Fairweather, B.1
Rogerson, S.2
-
15
-
-
0011101139
-
Information ethics: on the philosophical foundation of computer ethics
-
Floridi, L. (1999), “Information ethics: on the philosophical foundation of computer ethics”, Ethics and Information Technology, Vol. 1 No. 1, pp. 37-56.
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.1
, pp. 37-56
-
-
Floridi, L.1
-
16
-
-
0003622275
-
-
Clarendon Press Oxford
-
Foot, P. (2001), Natural Goodness, Clarendon Press, Oxford.
-
(2001)
Natural Goodness
-
-
Foot, P.1
-
17
-
-
84993034181
-
Why viruses will always be a problem
-
April
-
Ford, R. (1996), “Why viruses will always be a problem”, NCSA News, April, pp. 5-7.
-
(1996)
NCSA News
, pp. 5-7
-
-
Ford, R.1
-
18
-
-
33746329953
-
Cache based power analysis attack on AES
-
Lecture Notes in Computer Science Springer New York, NY
-
Fournier, J. and Turnstall, M. (2006), “Cache based power analysis attack on AES”, in Ed. Batten, L.M. and Ed. Safavi-Naini, R. (Eds), 11th Australasian Conference on Information Security and Privacy – ACISP 2006, Lecture Notes in Computer Science, Vol. 4058, Springer, New York, NY, pp. 17-28.
-
(2006)
11th Australasian Conference on Information Security and Privacy – ACISP 2006
, vol.4058
, pp. 17-28
-
-
Fournier, J.1
Turnstall, M.2
Batten, L.M.3
Safavi-Naini, R.4
-
19
-
-
85008010113
-
Melissa virus creates a new type of threat
-
Garber, L. (1999), “Melissa virus creates a new type of threat”, Computer, Vol. 32 No. 6, pp. 16-19.
-
(1999)
Computer
, vol.32
, Issue.6
, pp. 16-19
-
-
Garber, L.1
-
20
-
-
84992996583
-
Real-world anti-virus products reviews and evaluations
-
Gordon, S. and Ford, R. (1995), “Real-world anti-virus products reviews and evaluations”, Proceedings of Security on the I-WAY, Crystal City, VA.
-
(1995)
Proceedings of Security on the I-WAY, Crystal City, VA
-
-
Gordon, S.1
Ford, R.2
-
22
-
-
33749244928
-
Can we teach character? An Aristotelian answer
-
Hartman, E.M. (2006), “Can we teach character? An Aristotelian answer”, Academy of Management Learning and Education, Vol. 5 No. 1, pp. 68-81.
-
(2006)
Academy of Management Learning and Education
, vol.5
, Issue.1
, pp. 68-81
-
-
Hartman, E.M.1
-
23
-
-
33746589805
-
An AES smart card implementation resistant to power analysis attacks
-
Lecture Notes in Computer Science Springer New York, NY
-
Herbst, C., Oswald, C.E. and Mangard, S. (2006), “An AES smart card implementation resistant to power analysis attacks”, in Ed. Zhou, J., Ed. Yung, M. and Ed. Bao, F. (Eds), Applied Cryptography and Network Security, Lecture Notes in Computer Science, Vol. 3989, Springer, New York, NY, pp. 239-252.
-
(2006)
Applied Cryptography and Network Security
, vol.3989
, pp. 239-252
-
-
Herbst, C.1
Oswald, C.E.2
Mangard, S.3
Zhou, J.4
Yung, M.5
Bao, F.6
-
24
-
-
34547357863
-
Are virtues the proper starting point for ethical theory
-
Blackwell Oxford
-
Hursthouse, R. (2006), “Are virtues the proper starting point for ethical theory”, in Ed. Dreier, J. (Ed.), Contemporary Debates in Moral Theory, Blackwell, Oxford, pp. 99-112.
-
(2006)
Contemporary Debates in Moral Theory
, pp. 99-112
-
-
Hursthouse, R.1
Dreier, J.2
-
26
-
-
0004197846
-
-
Pearson Education Upper Saddle River, NJ
-
Johnson, D. (2003), Computer Ethics, Pearson Education, Upper Saddle River, NJ.
-
(2003)
Computer Ethics
-
-
Johnson, D.1
-
27
-
-
0009781571
-
-
Prentice-Hall Englewood Cliffs, NJ
-
Johnson, D. and Nissenbaum, H. (1994), Computers, Ethics, and Social Values, Prentice-Hall, Englewood Cliffs, NJ.
-
(1994)
Computers, Ethics, and Social Values
-
-
Johnson, D.1
Nissenbaum, H.2
-
28
-
-
2642540313
-
Courage as a virtue
-
Kateb, G. (2004), “Courage as a virtue”, Social Research, Vol. 71 No. 1, pp. 39-72.
-
(2004)
Social Research
, vol.71
, Issue.1
, pp. 39-72
-
-
Kateb, G.1
-
29
-
-
17644421307
-
Recent worms: a survey and trends
-
ACM Press New York, NY
-
Kienzle, D.M. and Elder, M.C. (2003), “Recent worms: a survey and trends”, WORM'03: Proceedings of the 2003 ACM Workshop on Rapid Malcode, ACM Press, New York, NY, pp. 1-10.
-
(2003)
WORM'03: Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 1-10
-
-
Kienzle, D.M.1
Elder, M.C.2
-
31
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Landwehr, C.E., Bull, A.R., Mc Dermott, J.P. and Choi, W.S. (1994), “A taxonomy of computer program security flaws”, ACM Computing Surveys, Vol. 26 No. 3, pp. 211-254.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
Mc Dermott, J.P.3
Choi, W.S.4
-
32
-
-
0003487794
-
-
Stanford University Press Stanford, CA
-
Luhmann, N. (1995), Social Systems, Stanford University Press, Stanford, CA.
-
(1995)
Social Systems
-
-
Luhmann, N.1
-
33
-
-
80054928784
-
-
University of Notre Dame Press Notre Dame, IN
-
Mac Intyre, A.C. (1981-2007), After Virtue, University of Notre Dame Press, Notre Dame, IN.
-
(1981)
After Virtue
-
-
Mac Intyre, A.C.1
-
34
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attack
-
Messerges, T.S., Dabbish, E.A. and Sloan, R.H. (2002), “Examining smart-card security under the threat of power analysis attack”, IEEE Transactions on Computers, Vol. 51 No. 5, pp. 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
35
-
-
62149084854
-
The voluntariness of virtue – and belief
-
Montmarquet, J. (2008), “The voluntariness of virtue – and belief”, Philosophy, Vol. 83, pp. 373-390.
-
(2008)
Philosophy
, vol.83
, pp. 373-390
-
-
Montmarquet, J.1
-
36
-
-
84871957390
-
Users and trust in cyberspace
-
Cambridge, UK, April 3-5, 2000 revised papers in Vol. 2133 Lecture Notes in Computer Science Springer New York, NY
-
Nikander, P. and Karvonen, K. (2001), “Users and trust in cyberspace”, in Ed. Christianson, B., Ed. Crispo, B., Ed. Malcolm, J.A. and Ed. Roe, M. (Eds), Security Protocols: 8th International Workshop, Cambridge, UK, April 3-5, 2000, revised papers in Vol. 2133 Lecture Notes in Computer Science, Springer, New York, NY, pp. 24-35.
-
(2001)
Security Protocols: 8th International Workshop
, pp. 24-35
-
-
Nikander, P.1
Karvonen, K.2
Christianson, B.3
Crispo, B.4
Malcolm, J.A.5
Roe, M.6
-
37
-
-
1842435111
-
Hackers and the contested ontology of cyberspace
-
Nissenbaum, H. (2004), “Hackers and the contested ontology of cyberspace”, New Media and Society, Vol. 6 No. 2, pp. 195-217.
-
(2004)
New Media and Society
, vol.6
, Issue.2
, pp. 195-217
-
-
Nissenbaum, H.1
-
38
-
-
84992992625
-
Computer security: competing concepts
-
paper presented at the 30th Research Conference on Communication, Information and Internet Policy, September 28-30, Washington, DC.
-
Nissenbaum, H. and Felton, E. (2002), “Computer security: competing concepts”, paper presented at the 30th Research Conference on Communication, Information and Internet Policy, September 28-30, Washington, DC.
-
(2002)
-
-
Nissenbaum, H.1
Felton, E.2
-
40
-
-
85134704265
-
Security as belief: user's perceptions on the security of electronic voting systems
-
P-47 Lecture Notes in Informatics Gesellschaft für Informatik Bonn
-
Oostveen, A.M. and van den Besselaar, P. (2004), “Security as belief: user's perceptions on the security of electronic voting systems”, in Ed. Prosser, A. and Ed. Krimmer, R. (Eds), Electronic voting in Europe: Technology, Law, Politics & Society, Lecture Notes in Informatics, Vol. P-47, Gesellschaft für Informatik, Bonn, pp. 73-82.
-
(2004)
Electronic voting in Europe: Technology, Law, Politics & Society
, pp. 73-82
-
-
Oostveen, A.M.1
van den Besselaar, P.2
Prosser, A.3
Krimmer, R.4
-
41
-
-
33745894129
-
Acceptance of voting technology: between confidence and trust
-
Lecture Notes in Computer Science Springer New York, NY
-
Pieters, W. (2006), “Acceptance of voting technology: between confidence and trust”, Trust Management: 4th International Conference, iTrust 2006, Lecture Notes in Computer Science, Vol. 3986, Springer, New York, NY, pp. 283-297.
-
(2006)
Trust Management: 4th International Conference, iTrust 2006
, vol.3986
, pp. 283-297
-
-
Pieters, W.1
-
42
-
-
84986078210
-
Temptations of turnout and modernization: e-voting discourses in the UK and the Netherlands
-
Pieters, W. and van Haren, R. (2007), “Temptations of turnout and modernization: e-voting discourses in the UK and the Netherlands”, Journal of Information, Communication and Ethics in Society, Vol. 5 No. 4, pp. 276-292.
-
(2007)
Journal of Information, Communication and Ethics in Society
, vol.5
, Issue.4
, pp. 276-292
-
-
Pieters, W.1
van Haren, R.2
-
43
-
-
84992972174
-
Belling the cat: a critique of technology assessment
-
Pursell, C. (1979), “Belling the cat: a critique of technology assessment”, Lex en Scientia, Vol. 10, pp. 130-142.
-
(1979)
Lex en Scientia
, vol.10
, pp. 130-142
-
-
Pursell, C.1
-
45
-
-
3142657210
-
‘Dreaded’ and ‘dared’: courage as a virtue
-
Schwartz, N.L. (2004), “‘Dreaded’ and ‘dared’: courage as a virtue”, Polity, Vol. 36 No. 3, pp. 341-365.
-
(2004)
Polity
, vol.36
, Issue.3
, pp. 341-365
-
-
Schwartz, N.L.1
-
46
-
-
0007434395
-
Perceived risks versus actual risks: managing hazards through negotiation
-
Shrader-Frechette, K.S. (1990), “Perceived risks versus actual risks: managing hazards through negotiation”, Risk, Vol. 1, pp. 341-363.
-
(1990)
Risk
, vol.1
, pp. 341-363
-
-
Shrader-Frechette, K.S.1
-
47
-
-
33749185903
-
Monster ethics: a pragmatist approach to risk controversies on new technology
-
paper presented at the Research in Ethics and Engineering Conference, Technical University of Delft, Delft, April 25-27.
-
Smits, M. (2002 a), “Monster ethics: a pragmatist approach to risk controversies on new technology”, paper presented at the Research in Ethics and Engineering Conference, Technical University of Delft, Delft, April 25-27.
-
(2002)
-
-
Smits, M.1
-
49
-
-
33750865685
-
Taming monsters: the cultural domestication of new technology
-
Smits, M. (2006), “Taming monsters: the cultural domestication of new technology”, Technology in Society, Vol. 28 No. 4, pp. 489-504.
-
(2006)
Technology in Society
, vol.28
, Issue.4
, pp. 489-504
-
-
Smits, M.1
-
50
-
-
84993060486
-
Meta-virus: breaking the hardware species barrier
-
Wallich, P. (1995), “Meta-virus: breaking the hardware species barrier”, Scientific American, Vol. 273 No. 5, p. 34.
-
(1995)
Scientific American
, vol.273
, Issue.5
, pp. 34
-
-
Wallich, P.1
|