researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
1994
Filter by Tag
OR
AND
NOT
1
C++
Meta-Environment
abstraction
analysis
caching
certification
context-aware
discovery
e-science
information retrieval
meta-model
model-driven development
rule-based
rules
security
social
survey
systematic-approach
teaching
Filter by Author
[+]
OR
AND
NOT
1
Adel M. Abunawass
Alan Holt
Arthur Zucker
B. Loerinc Helft
Brian Patrick Clifford
C. William Palmiter
Carol J. Orwant
Cindy Hanchey
Debra A. Lelewer
Douglas Adeney
Edward D. Bewayo
Ernest A. Kallman
Eva Y. W. Wong
Gene Boggess
Geoffrey Dick
Gregory B. White
Inger V. Eriksson
Jacqueline E. C. Wyatt
Sarah Granger
Thomas J. Scott
Filter by Top terms
[+]
OR
AND
NOT
1
age
assumptions
business
computer
computing
course
cultural
education
electronic
ethic
ethical
ethics
impact
implications
information
internet
issues
organizations
professionals
responsibility
Ethics in Computer Age (eca)
Editions
Publications
Viewing Publication 1 - 41 from 41
1994
Virtue vs. utility: alternative foundations for computer ethics
John M. Artz
.
eca 1994
:
16-21
[doi]
Electronic management: exploring its impact on small business
Edward D. Bewayo
.
eca 1994
:
162-165
[doi]
Certification of computer professionals: a good idea?
Gene Boggess
.
eca 1994
:
28-29
[doi]
Individual privacy in an information dependent society
Brian Patrick Clifford
.
eca 1994
:
51-53
[doi]
Information technology and ethics: an exploratory factor analysis
Sue A. Conger
,
Karen D. Loch
,
B. Loerinc Helft
.
eca 1994
:
22-27
[doi]
Raising the awareness of ethics in IT students: further development of the teaching model
Geoffrey Dick
.
eca 1994
:
69-73
[doi]
Computers as tools
Inger V. Eriksson
.
eca 1994
:
86-95
[doi]
Computer ethics: a capstone course
Theresia G. Fisher
,
Adel M. Abunawass
.
eca 1994
:
74-79
[doi]
CyberEthics
John L. Fodor
.
eca 1994
:
180-187
[doi]
User assumptions about information retrieval systems: ethical concerns
Thomas J. Froehlich
.
eca 1994
:
146-150
[doi]
Context for the cultural impact of the computer
Paul C. Grabow
.
eca 1994
:
40-45
[doi]
Why electronic mail is inherently private
Sarah Granger
.
eca 1994
:
110-112
[doi]
The hacker ethic
Sarah Granger
.
eca 1994
:
7-9
[doi]
A survey of students ethical attitudes using computer-related scenarios
Cindy Hanchey
,
John Kingsbury
.
eca 1994
:
2-6
[doi]
Plagiarism in computer science courses
James K. Harris
.
eca 1994
:
133-135
[doi]
Do disk drives dream of buffer cache hits?
Alan Holt
.
eca 1994
:
188-195
[doi]
The assumptions of computing
James K. Huggins
.
eca 1994
:
46-50
[doi]
Risks and threats from Internet access: protecting the institution
Ernest A. Kallman
.
eca 1994
:
33-38
[doi]
Proceedings of the Conference on Ethics in Computer Age, Galtinburg, Tennessee, USA, November 11-13, 1994
Joseph M. Kizza
, editor,
ACM,
1994.
Combating computer crimes: a long term strategy
Joseph M. Kizza
.
eca 1994
:
166-169
[doi]
Progress towards a world-wide code of conduct
John A. N. Lee
,
Jacques Berleur
.
eca 1994
:
100-104
[doi]
Ensuring ethical behavior in organizations
Richard G. Milter
.
eca 1994
:
143-144
[doi]
Ethical accountability in the cyberspace
K. L. Nance
,
M. Strohmaier
.
eca 1994
:
115-118
[doi]
EPER ethics
Carol J. Orwant
.
eca 1994
:
105-108
[doi]
A call for responsibility in ethical issues for IS professionals
C. William Palmiter
.
eca 1994
:
197-203
[doi]
Genealogical approaches to ethical implications of informational assimilative integrated discovery systems (AIDS) in business
Kamal Dean Pharhizgar
,
Stephen E. Lunce
.
eca 1994
:
55-60
[doi]
A social implications of computing course which “teaches” computer ethics
Sylvia Clark Pulliam
.
eca 1994
:
80-84
[doi]
Moral distancing and the use of information technologies: the seven temptations
Richard Rubin
.
eca 1994
:
151-155
[doi]
Ethical issues involving the Internet
Thomas J. Scott
,
Ernest A. Kallman
,
Debra A. Lelewer
.
eca 1994
:
31-32
[doi]
Ethics and the 7 P s of computer use policies
Thomas J. Scott
,
Richard B. Voss
.
eca 1994
:
61-67
[doi]
Making decisions in real-time and hard times
Martha Montague Smith
.
eca 1994
:
156-160
[doi]
Industrial age to information age organizations: changing business ethic
John E. Stinson
.
eca 1994
:
139-142
[doi]
Responsibility for unreliable software
Nancy J. Wahl
.
eca 1994
:
175-177
[doi]
Abstraction, ethics and software: why don t the rules work?
Shelly Warwick
.
eca 1994
:
10-14
[doi]
Ethics in electronic image manipulation
John Weckert
,
Douglas Adeney
.
eca 1994
:
113-114
[doi]
Computer ethics education: impact from societal norms
Gregory B. White
,
Udo W. Pooch
.
eca 1994
:
170-173
[doi]
Integrating ethical topics in a traditional computer science course
Lonny B. Winrich
.
eca 1994
:
120-126
[doi]
Computer ethics and tertiary level education in Hong Kong
Eva Y. W. Wong
,
Robert M. Davison
,
Patricia W. Wade
.
eca 1994
:
127-132
[doi]
Ethics is the driver, Mosaic is the vehicle, and network instruction is the precious cargo
Marsha Woodbury
,
John Schmitz
.
eca 1994
:
96-98
[doi]
Cultural perspectives of computer security
Jacqueline E. C. Wyatt
,
Patricia H. Farrar
.
eca 1994
:
204-207
[doi]
Information age organization: no new ethics need apply
Arthur Zucker
.
eca 1994
:
137-138
[doi]
Sign in
or
sign up
to see more results.