The ethics of information technology and business R. T. De George, The ethics of information technology and business. Malden, MA: Blackwell Pub., 2003. Read more about The ethics of information technology and businessLog in or register to post commentsGoogle ScholarBibTexTaggedMARCXMLRIS
Corporate Excellence, Ethics, and the Role of IT D. G. Johnson, Corporate Excellence, Ethics, and the Role of IT, vol. 111, no. 4. 2006, pp. 457-475. Read more about Corporate Excellence, Ethics, and the Role of ITLog in or register to post commentsGoogle ScholarBibTexTaggedMARCXMLRIS
Bringing Your Own Software to Work (TI) C. M. Skooglund and Coleman, G., “Bringing Your Own Software to Work (TI)”. National Academy of Engineering, Online Ethics Center , 2006. Read more about Bringing Your Own Software to Work (TI)Google ScholarBibTexTaggedMARCXMLRIS
Writing and Analyzing Ethics Cases in Business and Research Ethics W. J. Frey, “Writing and Analyzing Ethics Cases in Business and Research Ethics”. University of Puerto Rico at Mayaguez, 2010. Read more about Writing and Analyzing Ethics Cases in Business and Research EthicsLog in or register to post commentsGoogle ScholarBibTexTaggedMARCXMLRIS
Biomatrix Case Exercises - Student Module W. J. Frey and Cruz-Cruz, J. A., “Biomatrix Case Exercises - Student Module”. University of Puerto Rico at Mayaguez, 2011. Read more about Biomatrix Case Exercises - Student ModuleLog in or register to post commentsGoogle ScholarBibTexTaggedMARCXMLRIS
Google in China: “The Great Firewall” K. Wilson, Ramos, Y., Harvey, D., Norman, W., and MacDonald, C., “Google in China: “The Great Firewall” ”. Kenan Institute for Ethics , 2007. Read more about Google in China: “The Great Firewall” Log in or register to post commentsGoogle ScholarBibTexTaggedMARCXMLRIS
Information Security (TI) C. M. Skooglund and Coleman, G., “Information Security (TI)”. National Academy of Engineering, Online Ethics Center , 2006. Read more about Information Security (TI)Google ScholarBibTexTaggedMARCXMLRIS
Software Piracy vs. Legal Copying (TI) C. M. Skooglund, Coleman, G., and National Academy of Engineering, O. E. C., “Software Piracy vs. Legal Copying (TI)”. National Academy of Engineering, Online Ethics Center , 2006. Read more about Software Piracy vs. Legal Copying (TI)Google ScholarBibTexTaggedMARCXMLRIS
Measuring the Importance of Ethical Behavior Criteria M. J. Pearson, Crosby, L., and Shim, J. P., “Measuring the Importance of Ethical Behavior Criteria”, Communications of the ACM, vol. 40, no. 9, pp. 94-100, 1997. Read more about Measuring the Importance of Ethical Behavior CriteriaGoogle ScholarDOIBibTexTaggedMARCXMLRIS
Biomatrix Case Exercises - Student Module W. J. Frey and Cruz-Cruz, J. A., “Biomatrix Case Exercises - Student Module”. University of Puerto Rico at Mayaguez, 2007. Read more about Biomatrix Case Exercises - Student ModuleGoogle ScholarBibTexTaggedMARCXMLRIS
Evaluating Ethical Decision Making and Computer Use K. D. Loch and Conger, S., “Evaluating Ethical Decision Making and Computer Use”, Communications of the ACM, vol. 39, no. 7, pp. 74-83, 1996. Read more about Evaluating Ethical Decision Making and Computer UseGoogle ScholarDOIBibTexTaggedMARCXMLRIS
JuicyCampus A. Born, Closter, G., Esecson, A., and Norman, W., “JuicyCampus”. Kenan Instutite for Ethics at Duke University , 2008. Read more about JuicyCampusLog in or register to post commentsGoogle ScholarBibTexTaggedMARCXMLRIS
Sample Scenarios from the CSTB - A client opts for a less secure system “Sample Scenarios from the CSTB - A client opts for a less secure system”. National Academy of Engineering, Online Ethics Center , 2006. Read more about Sample Scenarios from the CSTB - A client opts for a less secure systemGoogle ScholarBibTexTaggedMARCXMLRIS
Sample Scenarios from the CSTB - Encryption Issues “Sample Scenarios from the CSTB - Encryption Issues ”. National Academy of Engineering, Online Ethics Center , 2006. Read more about Sample Scenarios from the CSTB - Encryption Issues Google ScholarBibTexTaggedMARCXMLRIS
Software Piracy: A View from Hong Kong T. Moores and Dhillon, G., “Software Piracy: A View from Hong Kong”, Communications of the ACM, vol. 43, no. 12, pp. 88-93, 2000. Read more about Software Piracy: A View from Hong KongGoogle ScholarDOIBibTexTaggedMARCXMLRIS