“Online Privacy and the Digital Millennium Copyright Act”, Emerging Technology , 2006. [Online]. Available: http://www.onlineethics.org/Topics/EmergingTech/TechEssays/dmca.aspx.
Displaying 76 - 100 of 128 results.
“ComputingCases.org”. University of Washington , 2001.,
“Writing and Analyzing Ethics Cases in Business and Research Ethics”. University of Puerto Rico at Mayaguez, 2010.,
“Applying Ethics to Information Technology Issues”, Communications of the ACM, vol. 38, no. 12, pp. 55-57, 1995.,
“To Test or Not to Test”. National Center for Case Study Teaching in Science, University at Buffalo , 2002.,
“The Role of Databank Managers As Guardians of Public Interests: Commentary on 'Strategies for Consulting with the Community: The Cases of Four Large-Scale Databanks'”, Science and Engineering Ethics, vol. 10, pp. 479-480, 2004.,
Computer Ethics. Upper Saddle River, NJ: Prentice-Hall Inc., 2001.,
“The David LaMacchia Case”. National Academy of Engineering, 2006.,
Encyclopedia of information ethics and security. Hershey, Pa.: Information Science Reference, 2008.
“CS355 Computer Ethics”. University of Illinois at Chicago, Department of Computer Science , Chicago , 2010.
“Computers, Information and Ethics: A Review of Issues and Literature”, Science and Engineering Ethics, vol. 1, no. 2, pp. 113-132, 1995.,
“CS W4400 : Computers and Society”. Columbia University, 1996.,
Contemporary issues in ethics and information technology. Hershey, PA: IRM Press, 2006, p. 208 p.
“Sample Scenarios from the CSTB - A client opts for a less secure system”. National Academy of Engineering, Online Ethics Center , 2006.
“Sample Scenarios from the CSTB - Electronic Vandalism ”. National Academy of Engineering, Online Ethics Center , 2006.