Abstract is missing.
- A survey of students ethical attitudes using computer-related scenariosCindy Hanchey, John Kingsbury. 2-6 [doi]
- The hacker ethicSarah Granger. 7-9 [doi]
- Abstraction, ethics and software: why don t the rules work?Shelly Warwick. 10-14 [doi]
- Virtue vs. utility: alternative foundations for computer ethicsJohn M. Artz. 16-21 [doi]
- Information technology and ethics: an exploratory factor analysisSue A. Conger, Karen D. Loch, B. Loerinc Helft. 22-27 [doi]
- Certification of computer professionals: a good idea?Gene Boggess. 28-29 [doi]
- Ethical issues involving the InternetThomas J. Scott, Ernest A. Kallman, Debra A. Lelewer. 31-32 [doi]
- Risks and threats from Internet access: protecting the institutionErnest A. Kallman. 33-38 [doi]
- Context for the cultural impact of the computer Paul C. Grabow. 40-45 [doi]
- The assumptions of computingJames K. Huggins. 46-50 [doi]
- Individual privacy in an information dependent societyBrian Patrick Clifford. 51-53 [doi]
- Genealogical approaches to ethical implications of informational assimilative integrated discovery systems (AIDS) in businessKamal Dean Pharhizgar, Stephen E. Lunce. 55-60 [doi]
- Ethics and the 7 P s of computer use policiesThomas J. Scott, Richard B. Voss. 61-67 [doi]
- Raising the awareness of ethics in IT students: further development of the teaching modelGeoffrey Dick. 69-73 [doi]
- Computer ethics: a capstone courseTheresia G. Fisher, Adel M. Abunawass. 74-79 [doi]
- A social implications of computing course which “teaches” computer ethicsSylvia Clark Pulliam. 80-84 [doi]
- Computers as toolsInger V. Eriksson. 86-95 [doi]
- Ethics is the driver, Mosaic is the vehicle, and network instruction is the precious cargoMarsha Woodbury, John Schmitz. 96-98 [doi]
- Progress towards a world-wide code of conductJohn A. N. Lee, Jacques Berleur. 100-104 [doi]
- EPER ethicsCarol J. Orwant. 105-108 [doi]
- Why electronic mail is inherently privateSarah Granger. 110-112 [doi]
- Ethics in electronic image manipulationJohn Weckert, Douglas Adeney. 113-114 [doi]
- Ethical accountability in the cyberspaceK. L. Nance, M. Strohmaier. 115-118 [doi]
- Integrating ethical topics in a traditional computer science courseLonny B. Winrich. 120-126 [doi]
- Computer ethics and tertiary level education in Hong KongEva Y. W. Wong, Robert M. Davison, Patricia W. Wade. 127-132 [doi]
- Plagiarism in computer science coursesJames K. Harris. 133-135 [doi]
- Information age organization: no new ethics need applyArthur Zucker. 137-138 [doi]
- Industrial age to information age organizations: changing business ethicJohn E. Stinson. 139-142 [doi]
- Ensuring ethical behavior in organizationsRichard G. Milter. 143-144 [doi]
- User assumptions about information retrieval systems: ethical concernsThomas J. Froehlich. 146-150 [doi]
- Moral distancing and the use of information technologies: the seven temptationsRichard Rubin. 151-155 [doi]
- Making decisions in real-time and hard timesMartha Montague Smith. 156-160 [doi]
- Electronic management: exploring its impact on small businessEdward D. Bewayo. 162-165 [doi]
- Combating computer crimes: a long term strategyJoseph M. Kizza. 166-169 [doi]
- Computer ethics education: impact from societal normsGregory B. White, Udo W. Pooch. 170-173 [doi]
- Responsibility for unreliable softwareNancy J. Wahl. 175-177 [doi]
- CyberEthicsJohn L. Fodor. 180-187 [doi]
- Do disk drives dream of buffer cache hits?Alan Holt. 188-195 [doi]
- A call for responsibility in ethical issues for IS professionalsC. William Palmiter. 197-203 [doi]
- Cultural perspectives of computer securityJacqueline E. C. Wyatt, Patricia H. Farrar. 204-207 [doi]