Giannis Stamatellos: Computer ethics—A global perspective

Ethics and Information Technology - Tập 12 - Trang 371-373 - 2010
Mark H. Rosenbaum1
1Graduate School of Computer and Information Sciences, Nova Southeastern University, Davie, USA

Tài liệu tham khảo

Barger, R. N. (2008). Computer ethics: A case-based approach. New York, NY: Cambridge University Press. Bratus, S. (2007). What hackers learn that the rest of us don’t: Note on hacker curriculum. Security and Privacy, 5(4), 72–75. Johnson, D. G., & Miller, K. W. (2009). Computer ethics: Analyzing information technology (4th ed.). Upper Saddle River, NJ: Prentice Hall–Pearson Education, Inc. Kaminsky, D. (2006). Explorations in namespace: White-hat hacking across the domain name system. Communications of the ACM, 49(6), 62–68. Kimppa, K. K. (2008). Review of computer ethics: A global perspective. Journal of Information Communication and Ethics in Society, 6(1), 90–92. Moore, A. D. (Ed.). (2005). Information ethics: Privacy, property, and power. Seattle, WA: University of Washington Press. Rosco, R. D., Rogers, M. K., & Liles, S. (2007). Breaking down stereotypes: A call for an ontological model. Proceedings of the 40th Hawaii international conference on system sciences, Hawaii, pp. 271–279. Russell, D., & Gangemi, G. T. (1991). Computer security basics. Sebastopol, CA: O’Reilly Media Inc. Spinello, R. A. (2003). Case studies in information technology ethics (2nd ed.). Upper Saddle River, NJ: Prentice Hall-Pearson Education, Inc. Tavani, H. T. (2007). Ethics & technology: Ethical issues in an age of information and communication technology (2nd ed.). Hoboken, NJ: Wiley. Wong, M. W. S. (2007). Cyber-trespass and ‘unauthorized access’ as legal mechanisms of access control: Lessons from the US experience. International Journal of Law and Information Technology, 15(1), 90–128.