| 期刊論文1. | Vitell, Scott J.、Davis, David L.(1990)。Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior。Journal of Business Ethics,9(1),63-70。 | 2. | Conger, S.、Loch, K. D.、Helft, B. L.(1995)。Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use。Information Systems Journal,5,161-184。 | 3. | Oz, E.(1993)。Ethical standards for computer professionals: a comparative analysis of four major codes。Journal of Business Ethics,12,709-726。 | 4. | Association for Computing Machinery(1992)。ACM codes of ethics and professional conduct。Communications of the ACM,30(5),94-99。 | 5. | Frankel, M. S.(1989)。Professional codes: why, how and with what impacts?。Journal of Business Ethics,8,31-38。 | 6. | Khazanchi, D.(1995)。Unethical Behavior in Information Systems: the Gender Factor。Journal of Business Ethics,14(9),741-749。 | 7. | Huff, C.、Martin, C. D.(1995)。Computing consequences: A framework for teaching ethical computing。Communications of the ACM,38(12),75-84。 | 8. | Bommer, M.、Grato, C.、Gravander, J.、Tuttle, M.(1987)。A behavioral model of ethical and unethical decision making。Journal of Business Ethics,6(4),265-281。 | 9. | Lewis, P. V.(1985)。Defining Business Ethics: Like Nailing Jello to a Wall。Journal of Business Ethics,4(5),377-383。 | 10. | Anderson, R. E.、Johnson, D. G.、GotterbarN, D.、Perrole Judith(1993)。Using the new ACM code of etnics in decision making。Commu. of the ACM,36(2),98-107。 | 11. | Abbott, Andrew(1983)。Professional ethics。American Journal of Sociology,88,855-885。 | 12. | Collins, W. R.、Miller, K. W.、Spielman, B. J.、Wherry, P.(1994)。How good is good enough。Comm. of the ACM,37(1),37-81。 | 13. | Brooks, L. J.(1989)。Corporate ethical performance: Trend, forecasts and outlooks。Journal of Business Ethic,8,31-38。 | 14. | Elmer-Dewitt, P.(1994)。Nabbing the Pirates of Cyberspace。Time,143(24),62-63。 | 15. | Conger, S.、Loch, K. D.(1995)。Ethics and computer use。Commun. of the ACM,38(12),31-39。 | 16. | Mason, R. O.(1986)。Four Ethical Issues of the Information Age。MIS Quarterly,10(4),5-12。 | 17. | Forester, T.(1990)。Software theft and the problem of the intellectual property rights。Comput Soc.,20(1),2-11。 | 18. | Frenkel, K. A.(1990)。Woman and computing。Commun. of the ACM,33(11),34-46。 | 19. | Gotterbam, D.(1991)。Computer ethics: Responsibility regained。National Forum, Summer。 | 20. | Johnson, D. G.(1985)。Equal access to computing, computer expertise, and decision making about computer。Business and professional ethics journal,4,95-103。 | 21. | Lee, G. M.、Eining, M. M.、Long, C. P.(1994)。Information ethics: A comparison among college students from Mainland China, Hong Kong and Taiwan。Hong Kong Journal of Business Management,7,17-35。 | 22. | Mason, R. O.(1995)。Ethics to iformation technology issues。Comma, of the ACM,38(12),55-57。 | 23. | Paradice, D. B.、Dejoie, R. M.(1991)。The ethical decision-making process of information systems workers。Journal of Business Ethics,10,57-77。 | 24. | Smith, H. J.、Milberg, S. J.、Burke, S. J.(1996)。Information privacy: Measuring individuals' concerns about organizational pratices.。MIS Quarterly,1996(Jun.),167-195。 | 25. | Stevens, B.(1994)。An analysis of corporate ethical code studies: Where do we go from here?。Journal of Business Ethics,13(1),63-69。 | 26. | Taylor, G. S.、Davis, J. S.(1989)。Individual privacy and computer-based human resource resource information system。Journal of Business Ethics,8,569-576。 | 27. | Susan, A.(1993)。A comparison of expert's and high tech students' ethical beliefs in compter-related situations。Journal of Business Ethics,12,359-370。 | 28. | Oz, Effy(1992)。Ethical Standards for Information System Professionals: A Case for a Unified Code。MIS Quarterly,16(4),423-433。 | 會議論文1. | Parker, D. B.(1981)。Ethical Dilemmas in Computer Technology: Ethics and Management of computer Technology。The Fourth National Conference on Business Ethics。Waltham, MA:Bentley College。 | 2. | Hoffman, W. M.、Moore, J. M.(1981)。Ethics and the management of computer technology。the fourth national conference on business ethics。Waltham, Massachusetts:Bentley College。 | 3. | Kao, R. H. F.、Oh, M. D.(1991)。A comparative analysis of the influence of confucianism on management practices: The cases of China, Japan, and Korea。The 4th international conference on comparative management,164-170。 | 4. | Lee, G. M.、Lee, T. S.、Tuan, C.、Qi, Y. A.(1991)。Cross-cultural study of information ethics。The 4th international conference on comparative management。 | 圖書1. | Weinberg, G. M.(1971)。The psychology of computer programming。New York, NY:Van Nostrand Reinhold Company。 | 2. | Bayles, M. D.(1981)。Professional ethics。Wadsworth, Belmont, Calif。 | 3. | Clark, D.(1990)。Computers at risk: Safe computing in the information age。Washington, D.C.:National Research Council, National Academy Press。 | 4. | Bynum, T. W.、Maner, W.、Fodor, J.(1992)。Software ownership and intellectual property rights。New Haven, Conn:Research Center on Computing and Society, Southern Connecticut State University。 | 5. | Deipie, R.、Flower, G.、Paradice, D.(1992)。Ethical isues in information system。Boston, MA:Boyd & Fraster Publishing Company。 | 6. | Frankena, W. K.(1963)。Ethics。Englewood Cliffs, NJ:Prentice Hall。 | 7. | Parker, D. B.(1990)。Ethical Conflicts in Computer Science and Technology。AFIP Press。 | 8. | Johnson, D. G.(1984)。Computer ethics。Englewood Cliffs, New Jersey:Prentice Hall。 | 9. | Johnson, D. W.(1985)。Computer ethics: A guide for the new age。Elgin, Illions:The Brethren Press。 | 10. | Laudon, K. C.(1986)。Dossier society: Value choice in the design of national information system。New York:Columbia University Press。 | 11. | Perrolle, J. A.(1987)。Computers and social change: Information, property and power。Belmont, Calif.:Wadsworth。 | 12. | Smith, G. V.、Parr, R. L.(1993)。Intellectual property。New York:John Wiley & Sons。 | 13. | Stevenson, J. T.(1987)。Engineering ethics: Pratices and principles。Toronto:Canadian Scholars Press。 | 圖書論文1. | Miller, A.(1991)。Computers and privacy。Ethical issues in information system。Bostom:Boyd&Fraser。 | 2. | Perrolle, J.(1991)。Conversations and trust in computer interfaces。Computerization and controversy。 | |
| |