:::

詳目顯示

回上一頁
題名:臺灣企業資訊倫理政策現況調查
書刊名:輔仁管理評論
作者:莊雅茹郭俊宏
作者(外文):Chuang, Yea-ruKuo, J. H.
出版日期:2008
卷期:15:1
頁次:頁155-175
主題關鍵詞:資訊倫理企業資訊倫理政策資訊倫理守則資訊倫理規範Business ethicsInformation ethicsCorporate policy of information ethics
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:12
  • 點閱點閱:29
期刊論文
1.Vitell, Scott J.、Davis, David L.(1990)。Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior。Journal of Business Ethics,9(1),63-70。  new window
2.Heide, D.、Hightower, J. K.(198311)。Organizations, Ethics, and the Computing professional。Journal of Systems Management,34(11),37-42。  new window
3.Robin, D.、Giallourakis, M.、David, F. R.、Moritz, T. E.(1989)。A Different Look at Codes of Ethics。Business Horizons,32(1),66-73。  new window
4.Siau, K.、Nah, F.、Teng, L.(2002)。Acceptable Internet Use Policy。Communications of the ACM,45(1),75-79。  new window
5.Conger, S.、Loch, K. D.、Helft, B. L.(1995)。Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use。Information Systems Journal,5,161-184。  new window
6.Straub, Detmar Jr.、Nance, William D.(1990)。Discovering and Disciplining Computer Abuse in organizations: A Field Study。MIS Quarterly: Management Information Systems,14(1),45-60。  new window
7.Healy, M.(2001)。Ethical Aspects of e-Business: The Use of Codes of Conduct。Business Ethics: A European Review,10(3),206-212。  new window
8.Harrington, S. J.(1996)。The Effects of Codes of Ethics and Personal Denials of Responsibility on Computer Abuse Judgments and Intentions。MIS Quarterly,20(3),257-278。  new window
9.Ellis, T. S.、Griffith, D.(2001)。The Evaluation of IT Ethical Scenarios Using a Multidimensional Scale。Database for Advances in Information Systems,32(1),75-85。  new window
10.Bynum, T. W.(2001)。Computer Ethics: Its Birth and Its Future。Ethics and Information Technology,3(2),109-112。  new window
11.Huff, C.、Martin, C. D.(1995)。Computing Consequences: A Framework for Teaching Ethical Computing。Communications of the ACM,38(12),75-84。  new window
12.Kreie, J.、Cronan, P.(2000)。Making ethical decisions。Communications of the ACM,43(12),66-72。  new window
13.Pearson, J. M.、Crosby, L.、Shim, J. P.(1997)。Measuring the Importance of Ethical Behavior Criteria。Communications of the ACM,40(9),94-100。  new window
14.Weckert, J.(2001)。Computer ethics: Future directions。Ethics and Information Technology,3(2),93-96。  new window
15.Pearson, F. S.、Weiner, N. A.(1985)。Criminology: toward an integration of criminological theories。The Journal of Criminal Law & Criminology,76(1),116-150。  new window
16.Mason, R. O.(1986)。Four ethical issues of the information age。Management Information Systems Quarterly,10(1),5-12。  new window
17.Straub, D. W. Jr.(1990)。Effective IS Security: An Empirical Study。Information Systems Research,1(3),255-276。  new window
會議論文
1.Parker, D. B.(1981)。Ethical Dilemmas in Computer Technology: Ethics and Management of computer Technology。The Fourth National Conference on Business Ethics。Waltham, MA:Bentley College。  new window
圖書
1.Laudon, K. C.、Laudon, J. P.(1998)。Management Information Systems: New Approach to Organization and Technology。Englewood Cliffs, New Jersey:Prentice Hall。  new window
2.Manley, W. J.(1991)。Executive's Handbook of Model Business Conduct Code。Englewood Cliffs, NJ:Prentice-Hall。  new window
3.Parker, Doon B.(1989)。Computer Crime: Criminal Justice Resource Manual。National Institute of Justice, U.S. Department of Justice。  new window
4.Bequai, August(1983)。How to Prevent Computer Crime: A Guide for Managers。NY:John Wiley & Sons。  new window
5.林杏子、何瑞峰、陳政德、黃立文、顏郁人(2001)。資訊倫理。台北市:華泰文化。new window  延伸查詢new window
其他
1.Harrington, S. J.(1994)。The Impact of Codes of Ethics on Information Systems Personnel,http://portal.acm.org/citation.cfm?id=186323&coll=portal&dl=ACM&CFID=52993699&CFTOKEN=72527507, 2005/08/05。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top