-
1
-
-
0036758891
-
Raising a red flag on global WWW privacy policies
-
Arnett, K.P. and Liu, C. (2002), 'Raising a red flag on global WWW privacy policies", Journal of Computer Information Systems, Vol. 43 No. 1, pp. 117-28.
-
(2002)
Journal of Computer Information Systems
, vol.43
, Issue.1
, pp. 117-128
-
-
Arnett, K.P.1
Liu, C.2
-
2
-
-
0042827786
-
The malleability of undiscounted utilitarianism as a criterion of intergenerational justice
-
Ashein, G.B. and Buchholz, W. (2003), "The malleability of undiscounted utilitarianism as a criterion of intergenerational justice", Economica, Vol. 70 No. 279, pp. 405-23.
-
(2003)
Economica
, vol.70
, Issue.279
, pp. 405-423
-
-
Ashein, G.B.1
Buchholz, W.2
-
4
-
-
0004245958
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Beauchamp, T.L. and Bowie, N.E. (1983), Ethical Theory and Business, 2nd ed., Prentice-Hall, Englewood Cliffs, NJ.
-
(1983)
Ethical Theory and Business, 2nd Ed.
-
-
Beauchamp, T.L.1
Bowie, N.E.2
-
5
-
-
0032160264
-
The right mindset for managing information technology
-
Bensaou, M. and Earl, M. (1998), "The right mindset for managing information technology", Harvard Business Review, Vol. 76 No. 5, pp. 119-28.
-
(1998)
Harvard Business Review
, vol.76
, Issue.5
, pp. 119-128
-
-
Bensaou, M.1
Earl, M.2
-
6
-
-
0036780020
-
Selecting high-performing information technology professionals
-
Burke, L.A. and Witt, L.A. (2000), "Selecting high-performing information technology professionals", Journal of End User Computing, Vol. 14 No. 4, p. 37.
-
(2000)
Journal of End User Computing
, vol.14
, Issue.4
, pp. 37
-
-
Burke, L.A.1
Witt, L.A.2
-
7
-
-
9144240746
-
-
McGraw-Hill/lrwin, Boston, MA
-
Campbell, S. and McCarthy, M.P. (2001), Security Transformation, McGraw-Hill/lrwin, Boston, MA.
-
(2001)
Security Transformation
-
-
Campbell, S.1
McCarthy, M.P.2
-
8
-
-
0032620196
-
Cyberspace security management
-
Cheng, H., Chou, D.C., Lin, B. and Yen, D.C. (1999), "Cyberspace security management". Industrial Management & Data Systems, Vol. 99 No. 8, pp. 353-64.
-
(1999)
Industrial Management & Data Systems
, vol.99
, Issue.8
, pp. 353-364
-
-
Cheng, H.1
Chou, D.C.2
Lin, B.3
Yen, D.C.4
-
9
-
-
1342298718
-
Security in a Web-based environment
-
Hopwood, W.S., Sinason, D. and Tucker, R. (2000), "Security in a Web-based environment". Managerial Finance, Vol. 26 No. 11, pp. 42-57.
-
(2000)
Managerial Finance
, vol.26
, Issue.11
, pp. 42-57
-
-
Hopwood, W.S.1
Sinason, D.2
Tucker, R.3
-
10
-
-
0036781732
-
An analysis of IS professional and end user causal attributions for user-system outcomes
-
Karsten, R. (2002), "An analysis of IS professional and end user causal attributions for user-system outcomes", Journal of End User Computing, Vol. 14 No. 4, pp. 51-73.
-
(2002)
Journal of End User Computing
, vol.14
, Issue.4
, pp. 51-73
-
-
Karsten, R.1
-
11
-
-
0007762907
-
The impact of information technology on the ethics of public sector management in the third millennium
-
Knyght, P.R., Korac-Kakabadse, A., Korac-Kakabadse, N. and Kouzmin, A. (2000), "The impact of information technology on the ethics of public sector management in the third millennium", Global Virtue Ethics Review, Vol. 2 No. 1, pp. 77-84.
-
(2000)
Global Virtue Ethics Review
, vol.2
, Issue.1
, pp. 77-84
-
-
Knyght, P.R.1
Korac-Kakabadse, A.2
Korac-Kakabadse, N.3
Kouzmin, A.4
-
12
-
-
3142521857
-
A critical look at the impact of cybercrime on consumer Internet behaviour
-
McGivern, E., Saban, K. and Saykiewiez, J.N. (2002), "A critical look at the impact of cybercrime on consumer Internet behaviour", Journal of Marketing Theory and Practice, Vol. 10 No. 2, pp. 29-37.
-
(2002)
Journal of Marketing Theory and Practice
, vol.10
, Issue.2
, pp. 29-37
-
-
McGivern, E.1
Saban, K.2
Saykiewiez, J.N.3
-
13
-
-
9144234440
-
Adoption of convention on cybercrime
-
Murphy, S.D. (2001), "Adoption of convention on cybercrime", The American Journal of International Law, Vol. 95 No. 4, pp. 889-91.
-
(2001)
The American Journal of International Law
, vol.95
, Issue.4
, pp. 889-891
-
-
Murphy, S.D.1
-
14
-
-
9144230355
-
How to profit by safeguarding privacy
-
Parker, R. (2003), "How to profit by safeguarding privacy", Journal of Accountancy, Vol. 195 No. 5, pp. 47-52.
-
(2003)
Journal of Accountancy
, vol.195
, Issue.5
, pp. 47-52
-
-
Parker, R.1
-
15
-
-
0000805916
-
Toward the development of a multidimensional scale for improving evaluations of business ethics
-
Reidenbach, R. and Robin, D. (1990), "Toward the development of a multidimensional scale for improving evaluations of business ethics", Journal of Business Ethics, Vol. 9 No. 8, pp. 639-53.
-
(1990)
Journal of Business Ethics
, vol.9
, Issue.8
, pp. 639-653
-
-
Reidenbach, R.1
Robin, D.2
-
16
-
-
9144273527
-
Guarding the electronic gates
-
Roberts, M. (2002), "Guarding the electronic gates", Chemical Week, Vol. 20 No. 27, pp. 41-2.
-
(2002)
Chemical Week
, vol.20
, Issue.27
, pp. 41-42
-
-
Roberts, M.1
-
17
-
-
0348089527
-
Loyalty and e-marketing issues: Customer retention on the Web
-
Smith, A.D. (2002), "Loyalty and e-marketing issues: customer retention on the Web", Quarterly Journal of E-commerce, Vol. 3 No. 2, pp. 149-61.
-
(2002)
Quarterly Journal of E-commerce
, vol.3
, Issue.2
, pp. 149-161
-
-
Smith, A.D.1
-
18
-
-
9144242009
-
Surveying practicing project managers on curricular aspects of project management programs: A resource-based approach
-
Smith, A.D. (2003), "Surveying practicing project managers on curricular aspects of project management programs: a resource-based approach", Project Management Journal, Vol. 34 No. 2, pp. 26-33.
-
(2003)
Project Management Journal
, vol.34
, Issue.2
, pp. 26-33
-
-
Smith, A.D.1
-
19
-
-
2442488437
-
E-mail workplace privacy issues in an information- And knowledge-based environment
-
Smith, A.D. and Faley, R.A. (2001), "E-mail workplace privacy issues in an information- and knowledge-based environment", Southern Business Review, Vol. 27 No. 1, pp. 8-19.
-
(2001)
Southern Business Review
, vol.27
, Issue.1
, pp. 8-19
-
-
Smith, A.D.1
Faley, R.A.2
-
20
-
-
0036063961
-
Information management of automated data capture: An overview of technical developments
-
Smith, A.D. and Offodile, F. (2002), "Information management of automated data capture: an overview of technical developments", Information Management & Computer Security, Vol. 10 No. 3, pp. 109-18.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.3
, pp. 109-118
-
-
Smith, A.D.1
Offodile, F.2
-
21
-
-
0036063532
-
Application service providers (ASP): Moving downstream to enhance competitive advantage
-
Smith, A.D. and Rupp, W.T. (2002a), "Application service providers (ASP): moving downstream to enhance competitive advantage", Information Management & Computer Security, Vol. 10 No. 2, pp. 64-72.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 64-72
-
-
Smith, A.D.1
Rupp, W.T.2
-
22
-
-
0036036094
-
Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers
-
Smith, A.D. and Rupp, W.T. (2002b), "Issues in cybersecurity: understanding the potential risks associated with hackers/crackers", Information Management & Computer Security, Vol. 10 No. 4, pp. 178-83.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.4
, pp. 178-183
-
-
Smith, A.D.1
Rupp, W.T.2
-
23
-
-
9144245866
-
Examination of the interrelationships between the Internet and religious organisations: An application of diffusion theory
-
Smith, A.D. and Rupp, W.T. (2002c), "Examination of the interrelationships between the Internet and religious organisations: an application of diffusion theory", Services Marketing Quarterly, Vol. 24 No. 2, pp. 29-41.
-
(2002)
Services Marketing Quarterly
, vol.24
, Issue.2
, pp. 29-41
-
-
Smith, A.D.1
Rupp, W.T.2
-
24
-
-
0028494782
-
Information systems innovation among organizations
-
Swanson, E.B. (1994), "Information systems innovation among organizations", Management Science, Vol. 40 No. 9, pp. 1069-92.
-
(1994)
Management Science
, vol.40
, Issue.9
, pp. 1069-1092
-
-
Swanson, E.B.1
-
25
-
-
9144247281
-
E-risk is a manageable beast
-
Tuthill, M. (2001), "E-risk is a manageable beast", AFP Exchange, Vol. 21 No. 3, pp. 52-6.
-
(2001)
AFP Exchange
, vol.21
, Issue.3
, pp. 52-56
-
-
Tuthill, M.1
-
26
-
-
0000865987
-
An applied ethical analysis system in business
-
Wong, A. and Beckman, E. (1992), "An applied ethical analysis system in business". Journal of Business Ethics, Vol. 11 No. 3, pp. 173-9.
-
(1992)
Journal of Business Ethics
, vol.11
, Issue.3
, pp. 173-179
-
-
Wong, A.1
Beckman, E.2
-
27
-
-
0036758891
-
Raising a red flag on global WWW privacy policies
-
Arnett, K.P. and Liu, C. (2002), "Raising a red flag on global WWW privacy policies", Journal of Computer Information Systems, Vol. 43 No. 1, pp. 117-28.
-
(2002)
Journal of Computer Information Systems
, vol.43
, Issue.1
, pp. 117-128
-
-
Arnett, K.P.1
Liu, C.2
-
28
-
-
0042827786
-
The malleability of undiscounted utilitarianism as a criterion of intergenerational justice
-
Ashein, G.B. and Buchholz, W. (2003), "The malleability of undiscounted utilitarianism as a criterion of intergenerational justice", Economica, Vol. 70 No. 279, pp. 405-23.
-
(2003)
Economica
, vol.70
, Issue.279
, pp. 405-423
-
-
Ashein, G.B.1
Buchholz, W.2
-
30
-
-
0004245958
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Beauchamp, T.L. and Bowie, N.E. (1983), Ethical Theory and Business, 2nd ed., Prentice-Hall, Englewood Cliffs, NJ.
-
(1983)
Ethical Theory and Business, 2nd Ed.
-
-
Beauchamp, T.L.1
Bowie, N.E.2
-
31
-
-
0032160264
-
The right mindset for managing information technology
-
Bensaou, M. and Earl, M. (1998), "The right mindset for managing information technology", Harvard Business Review, Vol. 76 No. 5, pp. 119-28.
-
(1998)
Harvard Business Review
, vol.76
, Issue.5
, pp. 119-128
-
-
Bensaou, M.1
Earl, M.2
-
32
-
-
0036780020
-
Selecting high-performing information technology professionals
-
Burke, L.A. and Witt, L.A. (2000), "Selecting high-performing information technology professionals", Journal of End User Computing, Vol. 14 No. 4, p. 37.
-
(2000)
Journal of End User Computing
, vol.14
, Issue.4
, pp. 37
-
-
Burke, L.A.1
Witt, L.A.2
-
33
-
-
9144240746
-
-
McGraw-Hill/Irwin, Boston, MA
-
Campbell, S. and McCarthy, M.P. (2001), Security Transformation, McGraw-Hill/Irwin, Boston, MA.
-
(2001)
Security Transformation
-
-
Campbell, S.1
McCarthy, M.P.2
-
34
-
-
0032620196
-
Cyberspace security management
-
Cheng, H., Chou, D.C., Lin, B. and Yen, D.C. (1999), "Cyberspace security management", Industrial Management & Data Systems, Vol. 99 No. 8, pp. 353-64.
-
(1999)
Industrial Management & Data Systems
, vol.99
, Issue.8
, pp. 353-364
-
-
Cheng, H.1
Chou, D.C.2
Lin, B.3
Yen, D.C.4
-
35
-
-
1342298718
-
Security in a Web-based environment
-
Hopwood, W.S., Sinason, D. and Tucker, R. (2000), "Security in a Web-based environment", Managerial Finance, Vol. 26 No. 11, pp. 42-57.
-
(2000)
Managerial Finance
, vol.26
, Issue.11
, pp. 42-57
-
-
Hopwood, W.S.1
Sinason, D.2
Tucker, R.3
-
36
-
-
0036781732
-
An analysis of IS professional and end user causal attributions for user-system outcomes
-
Karsten, R. (2002), "An analysis of IS professional and end user causal attributions for user-system outcomes", Journal of End User Computing, Vol. 14 No. 4, pp. 51-73.
-
(2002)
Journal of End User Computing
, vol.14
, Issue.4
, pp. 51-73
-
-
Karsten, R.1
-
37
-
-
0007762907
-
The impact of information technology on the ethics of public sector management in the third millennium
-
Knyght, P.R., Korac-Kakabadse, A., Korac-Kakabadse, N. and Kouzmin, A. (2000), "The impact of information technology on the ethics of public sector management in the third millennium", Global Virtue Ethics Review, Vol. 2 No. 1, pp. 77-84.
-
(2000)
Global Virtue Ethics Review
, vol.2
, Issue.1
, pp. 77-84
-
-
Knyght, P.R.1
Korac-Kakabadse, A.2
Korac-Kakabadse, N.3
Kouzmin, A.4
-
38
-
-
3142521857
-
A critical look at the impact of cybercrime on consumer Internet behaviour
-
McGivern, E., Saban, K. and Saykiewiez, J.N. (2002), "A critical look at the impact of cybercrime on consumer Internet behaviour", Journal of Marketing Theory and Practice, Vol. 10 No. 2, pp. 29-37.
-
(2002)
Journal of Marketing Theory and Practice
, vol.10
, Issue.2
, pp. 29-37
-
-
McGivern, E.1
Saban, K.2
Saykiewiez, J.N.3
-
39
-
-
9144234440
-
Adoption of convention on cybercrime
-
Murphy, S.D. (2001), "Adoption of convention on cybercrime", The American Journal of International Law, Vol. 95 No. 4, pp. 889-91.
-
(2001)
The American Journal of International Law
, vol.95
, Issue.4
, pp. 889-891
-
-
Murphy, S.D.1
-
40
-
-
9144230355
-
How to profit by safeguarding privacy
-
Parker, R. (2003), "How to profit by safeguarding privacy", Journal of Accountancy, Vol. 195 No. 5, pp. 47-52.
-
(2003)
Journal of Accountancy
, vol.195
, Issue.5
, pp. 47-52
-
-
Parker, R.1
-
41
-
-
0000805916
-
Toward the development of a multidimensional scale for improving evaluations of business ethics
-
Reidenbach, R. and Robin, D. (1990), "Toward the development of a multidimensional scale for improving evaluations of business ethics", Journal of Business Ethics, Vol. 9 No. 8, pp. 639-53.
-
(1990)
Journal of Business Ethics
, vol.9
, Issue.8
, pp. 639-653
-
-
Reidenbach, R.1
Robin, D.2
-
42
-
-
9144273527
-
Guarding the electronic gates
-
Roberts, M. (2002), "Guarding the electronic gates", Chemical Week, Vol. 20 No. 27, pp. 41-2.
-
(2002)
Chemical Week
, vol.20
, Issue.27
, pp. 41-42
-
-
Roberts, M.1
-
43
-
-
0348089527
-
Loyalty and e-marketing issues: Customer retention on the Web
-
Smith, A.D. (2002), "Loyalty and e-marketing issues: customer retention on the Web", Quarterly Journal of E-commerce, Vol. 3 No. 2, pp. 149-61.
-
(2002)
Quarterly Journal of E-commerce
, vol.3
, Issue.2
, pp. 149-161
-
-
Smith, A.D.1
-
44
-
-
9144242009
-
Surveying practicing project managers on curricular aspects of project management programs: A resource-based approach
-
Smith, A.D. (2003), "Surveying practicing project managers on curricular aspects of project management programs: a resource-based approach", Project Management Journal, Vol. 34 No. 2, pp. 26-33.
-
(2003)
Project Management Journal
, vol.34
, Issue.2
, pp. 26-33
-
-
Smith, A.D.1
-
45
-
-
2442488437
-
E-mail workplace privacy issues in an information- And knowledge-based environment
-
Smith, A.D. and Faley, R.A. (2001), "E-mail workplace privacy issues in an information- and knowledge-based environment", Southern Business Review, Vol. 27 No. 1, pp. 8-19.
-
(2001)
Southern Business Review
, vol.27
, Issue.1
, pp. 8-19
-
-
Smith, A.D.1
Faley, R.A.2
-
46
-
-
0036063961
-
Information management of automated data capture: An overview of technical developments
-
Smith, A.D. and Offodile, F. (2002), "Information management of automated data capture: an overview of technical developments", Information Management & Computer Security, Vol. 10 No. 3, pp. 109-18.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.3
, pp. 109-118
-
-
Smith, A.D.1
Offodile, F.2
-
47
-
-
0036063532
-
Application service providers (ASP): Moving downstream to enhance competitive advantage
-
Smith, A.D. and Rupp, W.T. (2002a), "Application service providers (ASP): moving downstream to enhance competitive advantage", Information Management & Computer Security, Vol. 10 No. 2, pp. 64-72.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 64-72
-
-
Smith, A.D.1
Rupp, W.T.2
-
48
-
-
0036036094
-
Issues in cybersecurity: Understanding the potential risks associated with hackers/ crackers
-
Smith, A.D. and Rupp, W.T. (2002b), "Issues in cybersecurity: understanding the potential risks associated with hackers/ crackers", Information Management & Computer Security, Vol. 10 No. 4, pp. 178-83.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.4
, pp. 178-183
-
-
Smith, A.D.1
Rupp, W.T.2
-
49
-
-
9144245866
-
Examination of the interrelationships between the Internet and religious organisations: An application of diffusion theory
-
Smith, A.D. and Rupp, W.T. (2002c), "Examination of the interrelationships between the Internet and religious organisations: an application of diffusion theory", Services Marketing Quarterly, Vol. 24 No. 2, pp. 29-41.
-
(2002)
Services Marketing Quarterly
, vol.24
, Issue.2
, pp. 29-41
-
-
Smith, A.D.1
Rupp, W.T.2
-
50
-
-
0028494782
-
Information systems innovation among organizations
-
Swanson, E.B. (1994), "Information systems innovation among organizations", Management Science, Vol. 40 No. 9, pp. 1069-92.
-
(1994)
Management Science
, vol.40
, Issue.9
, pp. 1069-1092
-
-
Swanson, E.B.1
-
51
-
-
9144247281
-
E-risk is a manageable beast
-
Tuthill, M. (2001), "E-risk is a manageable beast", AFP Exchange, Vol. 21 No. 3, pp. 52-6.
-
(2001)
AFP Exchange
, vol.21
, Issue.3
, pp. 52-56
-
-
Tuthill, M.1
-
52
-
-
0000865987
-
An applied ethical analysis system in business
-
Wong, A. and Beckman, E. (1992), "An applied ethical analysis system in business", Journal of Business Ethics, Vol. 11 No. 3, pp. 173-9.
-
(1992)
Journal of Business Ethics
, vol.11
, Issue.3
, pp. 173-179
-
-
Wong, A.1
Beckman, E.2
|