Giannis Stamatellos: Computer ethics—A global perspective
Tài liệu tham khảo
Barger, R. N. (2008). Computer ethics: A case-based approach. New York, NY: Cambridge University Press.
Bratus, S. (2007). What hackers learn that the rest of us don’t: Note on hacker curriculum. Security and Privacy, 5(4), 72–75.
Johnson, D. G., & Miller, K. W. (2009). Computer ethics: Analyzing information technology (4th ed.). Upper Saddle River, NJ: Prentice Hall–Pearson Education, Inc.
Kaminsky, D. (2006). Explorations in namespace: White-hat hacking across the domain name system. Communications of the ACM, 49(6), 62–68.
Kimppa, K. K. (2008). Review of computer ethics: A global perspective. Journal of Information Communication and Ethics in Society, 6(1), 90–92.
Moore, A. D. (Ed.). (2005). Information ethics: Privacy, property, and power. Seattle, WA: University of Washington Press.
Rosco, R. D., Rogers, M. K., & Liles, S. (2007). Breaking down stereotypes: A call for an ontological model. Proceedings of the 40th Hawaii international conference on system sciences, Hawaii, pp. 271–279.
Russell, D., & Gangemi, G. T. (1991). Computer security basics. Sebastopol, CA: O’Reilly Media Inc.
Spinello, R. A. (2003). Case studies in information technology ethics (2nd ed.). Upper Saddle River, NJ: Prentice Hall-Pearson Education, Inc.
Tavani, H. T. (2007). Ethics & technology: Ethical issues in an age of information and communication technology (2nd ed.). Hoboken, NJ: Wiley.
Wong, M. W. S. (2007). Cyber-trespass and ‘unauthorized access’ as legal mechanisms of access control: Lessons from the US experience. International Journal of Law and Information Technology, 15(1), 90–128.