Journal: Communications of the ACM

Volume 38, Issue 12

19 -- 22John Perry Barlow. Property and Speech: Who Owns What You Say in Cyberspace?
23 -- 28Ann K. Danowitz, Y. Nassef, Seymour E. Goodman. Cyberspace Across the Sahara: Computing in North Africa
29 -- 0Peter J. Denning. Plagiarism in the Web
30 -- 32Sue A. Conger, Karen D. Loch. Ethics and Computer Use - Introduction to the Special Section
33 -- 39Kenneth C. Laudon. Ethical Concepts and Information Technology
40 -- 47Suzanne P. Weisband, Bruce A. Reinig. Managing User Perceptions of Email Privacy
48 -- 54Janice C. Sipior, Burke T. Ward. The Ethical and Legal Quandary of Email Privacy
55 -- 57Richard O. Mason. Applying Ethics to Information Technology Issues
58 -- 64Deborah G. Johnson, John M. Mulvey. Accountability and Computer Decision Systems
65 -- 74Sandra J. Milberg, Sandra J. Burke, H. Jeff Smith, Ernest A. Kallman. Values, Personal Information Privacy, and Regulatory Approaches
75 -- 84Chuck Huff, C. Dianne Martin. Computing Consequences: A Framework for Teaching Ethical Computing
138 -- 0Peter G. Neumann. Reviewing the Risks Archives