-
1
-
-
84897776115
-
The Second-Order Security Dilemma
-
W. Orlikowski, G. Walsham, M. Jones and J. DeGross (Eds.), London: Chapman & Hall
-
Baskerville, R., (1995), The Second-Order Security Dilemma. in W. Orlikowski, G. Walsham, M. Jones and J. DeGross (Eds.) Information Technology and Changes in Organizational Work. London: Chapman & Hall, pp. 239-249.
-
(1995)
Information Technology and Changes in Organizational Work
, pp. 239-249
-
-
Baskerville, R.1
-
2
-
-
0038356776
-
-
Loompanics Unlimited, Port Townsend, Washington, USA
-
Fiery, D., (1994), Secrets of a Super Hacker. Loompanics Unlimited, Port Townsend, Washington, USA.
-
(1994)
Secrets of a Super Hacker
-
-
Fiery, D.1
-
3
-
-
84921413114
-
The 'Is/Ought' Problem resolved
-
Gewirth, A., (1974), The 'Is/Ought' Problem resolved. Proceedings and Addresses of the APA 47 (1973-74): 34-61.
-
(1974)
Proceedings and Addresses of the APA
, vol.47
, Issue.1973-74
, pp. 34-61
-
-
Gewirth, A.1
-
4
-
-
0003763221
-
-
The University of Chicago Press, USA
-
Gewirth, A., (1978), Reason and Morality. The University of Chicago Press, USA.
-
(1978)
Reason and Morality
-
-
Gewirth, A.1
-
8
-
-
52549104964
-
Some Confusions about Subjectivity
-
(eds.): J. Bricke. Kansas University Press
-
Hare, R.M., (1976), Some Confusions about Subjectivity. In Freedom and Morality (eds.): J. Bricke. Kansas University Press.
-
(1976)
Freedom and Morality
-
-
Hare, R.M.1
-
10
-
-
84935279966
-
A Reductio ad Absurdum ofDescriptivism
-
edited by S. Shanker. Croom Helm, London, UK
-
Hare, R.M., (1986), A Reductio ad Absurdum ofDescriptivism. Philosophy in Britan Today. edited by S. Shanker. Croom Helm, London, UK.
-
(1986)
Philosophy in Britan Today
-
-
Hare, R.M.1
-
11
-
-
84872863791
-
Principles
-
R. M. Hare (eds.), Oxford University Press, UK
-
Hare, R.M., (1989), Principles. In R. M. Hare (eds.): Essays in Ethical Theory, pp. 48-65. Oxford University Press, UK.
-
(1989)
Essays in Ethical Theory
, pp. 48-65
-
-
Hare, R.M.1
-
12
-
-
85001596305
-
A Taxonomy of Ethical Theories
-
R.M. Hare, Oxford University Press, UK
-
Hare, (1997), A Taxonomy of Ethical Theories. In R.M. Hare (eds): Sorting out Ethics. Oxford University Press, UK.
-
(1997)
Sorting out Ethics
-
-
Hare1
-
13
-
-
0000917858
-
The effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions
-
September
-
Harrington, S. J., (1996), The effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions. MIS Quartely, Vol. 20, No.3, September.
-
(1996)
MIS Quartely
, vol.20
, Issue.3
-
-
Harrington, S.J.1
-
15
-
-
0003517608
-
-
Stanford University Press, California, USA
-
Kukathas, C. & Pettit, P., (1990), Rawls-A Theory of Justice and its Critics. Stanford University Press, California, USA.
-
(1990)
Rawls-A Theory of Justice and Its Critics
-
-
Kukathas, C.1
Pettit, P.2
-
20
-
-
70349727944
-
What's wrong with relativism
-
Vol., No., pp
-
Niiniluoto, I., (1991), What's wrong with relativism. Science Studies, Vol. 4, No.2, pp. 17-24.
-
(1991)
Science Studies
, vol.4
, Issue.2
, pp. 17-24
-
-
Niiniluoto, I.1
-
22
-
-
85066125960
-
Management Strategies for Computer Security
-
Boston, USA
-
Perry, W.E., (1985), Management Strategies for Computer Security. Butterworth Publisher, Boston, USA.
-
(1985)
Butterworth Publisher
-
-
Perry, W.E.1
-
27
-
-
0001886189
-
How to Derive "ought" from "Is
-
Searle, J., (1964), How to Derive "ought" from "Is". Ph. Rev., 73.
-
(1964)
Ph. Rev.
, pp. 73
-
-
Searle, J.1
-
29
-
-
0033683516
-
A Conceptual Foundation for Organizational Information Security Awareness
-
Volume, Issue, pp
-
Siponen, M.T., (2000a), A Conceptual Foundation for Organizational Information Security Awareness. Information Management & Computer Security. Volume 8, Issue 1, pp. 31-4 I.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-34
-
-
Siponen, M.T.1
-
31
-
-
1242331240
-
Deviancy by Bits and Bytes
-
J.H. Finch and E.G. Dougall (eds.): Proceedings of the Second IFIP International Conference on Computer Security (IFIP/Sec'84)
-
Straub, D. W., & Widom, C. P., (1984), Deviancy by Bits and Bytes. In Computer Security: A global challenge, J.H. Finch and E.G. Dougall (eds.): Proceedings of the Second IFIP International Conference on Computer Security (IFIP/Sec'84).
-
(1984)
Computer Security: A Global Challenge
-
-
Straub, D.W.1
Widom, C.P.2
-
32
-
-
0000280419
-
Effective IS Security: An empirical Study
-
June
-
Straub, D. W., (1990), Effective IS Security: An empirical Study. Information System Research. Vol. 1, Number 2, June, p. 255-277.
-
(1990)
Information System Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
33
-
-
0002699431
-
Discovering and Disciplining Computer Abuse in Organization: A Field Study
-
March
-
Straub, D. W. & Nance, W. D., (1990), Discovering and Disciplining Computer Abuse in Organization: A Field Study. MIS Quartely. Vol. 14, No. 1, March.
-
(1990)
MIS Quartely
, vol.14
, Issue.1
-
-
Straub, D.W.1
Nance, W.D.2
-
35
-
-
0003785118
-
-
Second Edition. T J Press Ltd Padstow, Cornwall. UK
-
Warburton, N., (1996), Philosophy: the Basics. Second Edition. T J Press Ltd Padstow, Cornwall. UK.
-
(1996)
Philosophy: The Basics
-
-
Warburton, N.1
|