| 期刊論文1. | Vitell, Scott J.、Davis, David L.(1990)。Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior。Journal of Business Ethics,9(1),63-70。 | 2. | Heide, D.、Hightower, J. K.(198311)。Organizations, Ethics, and the Computing professional。Journal of Systems Management,34(11),37-42。 | 3. | Robin, D.、Giallourakis, M.、David, F. R.、Moritz, T. E.(1989)。A Different Look at Codes of Ethics。Business Horizons,32(1),66-73。 | 4. | Siau, K.、Nah, F.、Teng, L.(2002)。Acceptable Internet Use Policy。Communications of the ACM,45(1),75-79。 | 5. | Conger, S.、Loch, K. D.、Helft, B. L.(1995)。Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use。Information Systems Journal,5,161-184。 | 6. | Straub, Detmar Jr.、Nance, William D.(1990)。Discovering and Disciplining Computer Abuse in organizations: A Field Study。MIS Quarterly: Management Information Systems,14(1),45-60。 | 7. | Healy, M.(2001)。Ethical Aspects of e-Business: The Use of Codes of Conduct。Business Ethics: A European Review,10(3),206-212。 | 8. | Harrington, S. J.(1996)。The Effects of Codes of Ethics and Personal Denials of Responsibility on Computer Abuse Judgments and Intentions。MIS Quarterly,20(3),257-278。 | 9. | Ellis, T. S.、Griffith, D.(2001)。The Evaluation of IT Ethical Scenarios Using a Multidimensional Scale。Database for Advances in Information Systems,32(1),75-85。 | 10. | Bynum, T. W.(2001)。Computer Ethics: Its Birth and Its Future。Ethics and Information Technology,3(2),109-112。 | 11. | Huff, C.、Martin, C. D.(1995)。Computing Consequences: A Framework for Teaching Ethical Computing。Communications of the ACM,38(12),75-84。 | 12. | Kreie, J.、Cronan, P.(2000)。Making ethical decisions。Communications of the ACM,43(12),66-72。 | 13. | Pearson, J. M.、Crosby, L.、Shim, J. P.(1997)。Measuring the Importance of Ethical Behavior Criteria。Communications of the ACM,40(9),94-100。 | 14. | Weckert, J.(2001)。Computer ethics: Future directions。Ethics and Information Technology,3(2),93-96。 | 15. | Pearson, F. S.、Weiner, N. A.(1985)。Criminology: toward an integration of criminological theories。The Journal of Criminal Law & Criminology,76(1),116-150。 | 16. | Mason, R. O.(1986)。Four ethical issues of the information age。Management Information Systems Quarterly,10(1),5-12。 | 17. | Straub, D. W. Jr.(1990)。Effective IS Security: An Empirical Study。Information Systems Research,1(3),255-276。 | 會議論文1. | Parker, D. B.(1981)。Ethical Dilemmas in Computer Technology: Ethics and Management of computer Technology。The Fourth National Conference on Business Ethics。Waltham, MA:Bentley College。 | 圖書1. | Laudon, K. C.、Laudon, J. P.(1998)。Management Information Systems: New Approach to Organization and Technology。Englewood Cliffs, New Jersey:Prentice Hall。 | 2. | Manley, W. J.(1991)。Executive's Handbook of Model Business Conduct Code。Englewood Cliffs, NJ:Prentice-Hall。 | 3. | Parker, Doon B.(1989)。Computer Crime: Criminal Justice Resource Manual。National Institute of Justice, U.S. Department of Justice。 | 4. | Bequai, August(1983)。How to Prevent Computer Crime: A Guide for Managers。NY:John Wiley & Sons。 | 5. | 林杏子、何瑞峰、陳政德、黃立文、顏郁人(2001)。資訊倫理。台北市:華泰文化。 延伸查詢 | 其他1. | Harrington, S. J.(1994)。The Impact of Codes of Ethics on Information Systems Personnel,http://portal.acm.org/citation.cfm?id=186323&coll=portal&dl=ACM&CFID=52993699&CFTOKEN=72527507, 2005/08/05。 | |