19 | -- | 22 | John Perry Barlow. Property and Speech: Who Owns What You Say in Cyberspace? |
23 | -- | 28 | Ann K. Danowitz, Y. Nassef, Seymour E. Goodman. Cyberspace Across the Sahara: Computing in North Africa |
29 | -- | 0 | Peter J. Denning. Plagiarism in the Web |
30 | -- | 32 | Sue A. Conger, Karen D. Loch. Ethics and Computer Use - Introduction to the Special Section |
33 | -- | 39 | Kenneth C. Laudon. Ethical Concepts and Information Technology |
40 | -- | 47 | Suzanne P. Weisband, Bruce A. Reinig. Managing User Perceptions of Email Privacy |
48 | -- | 54 | Janice C. Sipior, Burke T. Ward. The Ethical and Legal Quandary of Email Privacy |
55 | -- | 57 | Richard O. Mason. Applying Ethics to Information Technology Issues |
58 | -- | 64 | Deborah G. Johnson, John M. Mulvey. Accountability and Computer Decision Systems |
65 | -- | 74 | Sandra J. Milberg, Sandra J. Burke, H. Jeff Smith, Ernest A. Kallman. Values, Personal Information Privacy, and Regulatory Approaches |
75 | -- | 84 | Chuck Huff, C. Dianne Martin. Computing Consequences: A Framework for Teaching Ethical Computing |
138 | -- | 0 | Peter G. Neumann. Reviewing the Risks Archives |