参考文献
|
-
吳明隆、簡妙如(2009)。青少年網路霸凌行為探究。中等教育,60(3),90-109。
連結:
-
周倩、吳歡鵲、陳茵嵐、王美鴻(2009)。『資訊素養與倫理』大學通識教育課程─理念、主題、教學策略與執行成效。大學圖書館,13(2),24-44。
連結:
-
柯雲娥(2006)。傳播學門大學生資訊素養能力的研究。圖書與資訊學刊,56,96-116。
連結:
-
莊雅茹、郭俊宏(2008)。台灣企業資訊倫理政策現況調查。輔仁管理評論,15(1),155-176。
連結:
-
許孟祥、郭峰淵、孫思源(2000)。自我效能在資訊倫理的應用:軟體盜版倫理效能量表的建構與驗證。資訊管理學報,7(1),85-102。
連結:
-
黃營杉、呂姿瑩(2008)。資訊倫理行為與官僚層級結構組織關係之研究。醫護科技學刊,10(4),221-233。
連結:
-
謝建成、洪范文、陳建傑(2009)。台灣圖書館網頁標記語言正確性之探討。教育資料與圖書館學,46(4),469-496。
連結:
-
NASW, National Association of Social Workers, Code of Ethics, Washington DC, 1996.
-
Chen, G. C., “The Students of National Cheng Kung University download MP3. Did They Violated the Copyright?” URL: http://www.dyjh.tyc.edu.tw/copyrit/right.htm (Retrieved 2001/04/23), 2001.
-
Association for Computing Machinery (ACM), URL: http://www.acm.org/about/code-of-ethics, 2011.
-
Adams, J. S.,Tashchian, A.,Shore, T.(2001).Codes of Ethics as Signals for Ethical Behavior.Journal of Business Ethics,29(3),199-211.
-
Alston, J. P.(1989).Wa, Guanxi, and Inwha: Managerial Principles in Japan, China, and Korea.Business Horizon,32(1),26-31.
-
Appelbaum, R.(Ed.),Felstiner, W.(Ed.),Gessner, V.(Ed.)(2001).Rules and Networks: The Legal Culture of Global Business Transactions.Oxford, England:Hart Publishing.
-
Bloombecker, B.(1990).Spectacular Computer Crime.Homewood, IL:Dow Johns-Irwin.
-
Bontis, N.,Choo, C. W.(2002).Strategic Management of Intellectural Capital and Organizational Knowledge.Oxford University Press.
-
Canary, H. E.,Jennings, M. M.(2008).Principles and Influence in Codes of Ethics: A Centering Resonance Analysis Comparing Pre- and Post-Sarbanes-Oxley Code of Ethics.Journal of Business Ethics,80(2),263-278.
-
Chang, C. L. H.(2009).Ethical Value of IT Professionals in Chinese Cultural Societies.Journal of Information Ethics,18(1),25-53.
-
Chiou, J. S.,Pan, L. Y.(2008).The Impact of Social Darwinism Perception, Status Anxiety, Perceived Trust of People, and Cultural Orientation on Consumer Ethical Beliefs.Journal of Business Ethics,78(4),487-502.
-
Chiu, H. C.,Hsieh, Y. C.,Wang, M. C.(2008).How to Encourage Customers to Use Legal Software.Journal of Business Ethics,80(3),583-595.
-
Choi, C. U.,Kim, S. W.(2008).Women and Globalization: Ethical Dimensions of Knowledge Transfer in Global Organizations.Journal of Business Ethics,81(1),53-61.
-
Chung, K. Y.,Eichenseher, J. W.,Taniguchi, T.(2008).Ethical Perceptions of Business Students: Differences Between East Asia and the USA and Among 'Confucian' Cultures.Journal of Business Ethics,79(1-2),121-132.
-
Davison, R. M.,Martinsons, M. G.,Lo, H. W. H.,Kam, C. S. P.(2006).Ethical Values of IT Professionals: Evidence From Hong Kong.IEEE Transactions on Engineering Management,53(1),48-58.
-
de Bary, W. T.(1970).Individualism and Humanitarianism in Late Ming Thought.Self and Society in Ming Thought,NY:
-
Donaldson, T.(1996).Values in Tension: Ethics Away from Home.Harvard Business Review,1996(September-October),48-62.
-
Einings, M. M.,Lee, G. M.(1997).Information Ethics: An Exploratory Study from an International Perspective.Journal of Information Systems,11(1),1-17.
-
Falkenberg, L.,Woiceshyn, J.(2008).Enhancing Business Ethics: Using Cases to Teach Moral Reasoning.Journal of Business Ethics,79(3),213-217.
-
Farh, J. L.,Tsui, A.S.,Xin, K.,Cheng, B.S.(1998).The Influence of Relational Demography and Guanxi: The Chinese Case.Organization Science,9(4),471-488.
-
Farrell, H.,Farrell, B.(1998).The Language of Business Codes of Ethics, Implications of Knowledge and Power.Journal of Business Ethics,17(6),587-601.
-
Fei, X.,Hamilton, Gary G.(Trans.),Zheng, Wang(Trans.)(1992).From the Soil, the Foundations of Chinese Society.Berkely, Cal.:University of California Press.
-
Fimbel, N.,Burstein, J. S.(1990).Defining the ethical standards of the high-technology industry.Journal of Business Ethics,9(11),929-948.
-
Glass, R. S,Wood, W. A.(1996).Situational Determinants of Software Piracy: An Equity Theory Perspective.Journal of Business Ethics,15(12),1189-1198.
-
Golden-Biddle, K.,Locke, K.(1993).Appealing Work: An Investigation of How Ethnographic Texts Convince.Organization Science,4(4),595-616.
-
Gotterbarn, D.(1998).Raising the Bar: A Software Engineering Code of Ethics and Professional Practice.ACM SIGCAS Computers and Society,28(2),26-28.
-
Guillen, M.,Mele, D.,Murphy, P.(2002).European vs. American Approaches to Institutionalisation of Business Ethics: The Spanish case.Business Ethics: An European Review,11(2),167-178.
-
Hafner, K.,Markoff, J.(1991).Cyberpunk: Outlaws and Hackers on the Computer Frontier.New York:Simon & Schuster.
-
Haines, R.,Leonard, L. N. K.(2007).Situational Influences on Ethical Decision-making in an IT Context.Information & Management,44(3),313-320.
-
Harrington, S.(1994).The Impact of Codes of Ethics on Information Systems Personnel.Special Interest Group on Computer Personnel Research Annual Conference Proceedings of the 1994 Computer Personnel Research Conference on Reinventing I.S.: Managing Information Technology in Changing Organizations,New York:
-
Ho, D. Y. F.(1998).Interpersonal Relationships and Relationship Dominance: An Analysis Based on Methodological Relationalism.Asian Journal of Social Psychology,1(1),1-16.
-
Ho, D. Y. F.,Chiu, C. Y.(1998).Collective Representations as a Metaconstruct: An Analysis Based on Methodological Relationalism.Culture and Psychology,4(3),349-369.
-
Hofstede, G.(1997).Cultures and Organizations: Software of the Mind.New York:McGraw Hill.
-
Hui, K. L.,Teo, H. H.,Lee, S. Y. T.(2007).The Value of Privacy Assurance: An Exploratory Field Experiment.MIS Quarterly,31(1),19-33.
-
Hung, H.(2008).Normalized Collective Corruption in a Transitional Economy: Small Treasuries in Large Chinese Enterprises.Journal of Business Ethics,79(1-2),69-83.
-
Hunt, S. D.,Wood, V.,Chonko, L.(1989).Corporate Ethical Values and Organizational Commitment in Marketing.Journal of Marketing,53(1),79-90.
-
Hused, B. W.(2000).The Impact of National Culture on Software Piracy.Journal of Business Ethics,26(3),197-211.
-
Hwang, K. K(1995).Knowledge and Action: A Social-Psychological interpretation of Chinese Cultural Tradition.Taipei:Sin-Li.
-
Hwang, K. K.(2000).Chinese Relationlism: Theoretical Construction and Methodological Considerations.Journal for the Theory of Social Behaviour,30(2),155-178.
-
Hwang, K. K.(1998).Two Moralities: Reinterpreting the Findings of Empirical Research on Moral Reasoning in Taiwan.Asian Journal of Social Psychology,1(3),211-238.
-
Hwang, K. K.(1987).Face and Favor: The Chinese Power Game.American Journal of Sociology,92(4),944-974.
-
IFIP Panel(1992).Towards an IFIP Frame Code of Ethics.Information Processing 92: Proceedings of the 12th World Computer Congress, Madrid Spain,North Holland:
-
Jacobs, B. J.(1979).A Preliminary Model of Particularistic Ties in Chinese Political Alliances: 'Renqing' and 'Guanxi' in a Rural Taiwanese Township.China Quarterly,78,237-273.
-
Jing, R.,Graham, J. L.(2008).Values versus Regulations: How Culture Plays Its Role.Journal of Business Ethics,80(4),791-806.
-
Jose, A.,Thibodeaux, M. S.(1999).Institutionalization of Ethics: The Perspective of Mangers.Journal of Business Ethics,22(2),133-143.
-
Kaptein, M.,Wempe, J.(1998).Twelve Gordian Knots When Developing an Organizational Code of Ethics.Journal of Business Ethics,17(8),853-869.
-
Keith-Spiegel, P.,Koocher, G. P.(1985).Ethics in Psychology: Professional Standards and Cases.New York:Random House.
-
Kim, U.(Ed.),Berry, J. W.(Ed.)(1993).Indigenous Psychologies: Research and Experience in Cultural Context.Newbury Park CA:Sage.
-
King, A. Y.(1991).Kuan-his and Network Building: A Socialogical Interpretation.Deadalus,120,63-84.
-
Klein, H. K.,Myers, M. D.(1999).A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems.MIS Quarterly,23(1),67-94.
-
Lam, K. C.,Shi, G.(2008).Factors Affecting Ethical Attitudes in Mainland China and Hong Kong.Journal of Business Ethics,77(4),463-479.
-
Lou, Y.(1997).Guanxi and Performance of Foreign-invested Enterprises in China: An Empirical Inquiry.Management International Review,37(1),51-70.
-
Manley, W. J.(1991).Executive's Handbook of Model Business Conduct Codes.Englewood Cliffs NJ:Prentice-Hall.
-
Martin, D. C.(1998).Deconstructing the ACM Code of Ethics and Professional Conduct.ACM SIGCSE Bulletin,30(4),8-9.
-
Martin, D. C.(2001).Ethics @ .Coms: Why Internet Start-Ups Need Ethics Codes.ACM SIGCSE Bulletin,33(2),7-8.
-
Mason, R. O.(1986).Four Ethical Issues of the Information Age.MIS Quarterly,10(1),5-12.
-
McCabe, D. L.,Trevino, L. K.,Butterfield, K. D.(1996).The Influence of Collegiate and Corporate Codes of Conduct on Ethics-Related Behavior in the Workplace.Business Ethics Quarterly,6(4),461-476.
-
McKinney, J. A.,Moore, C. W.(2008).Internaitonal Bribery: Does a Written Code of Ethics Make a Difference in Perceptions of Business Professionals.Journal of Business Ethics,79(1),103-111.
-
Mele, D.,Debeljuh, P.,Arruda, M. C.(2006).Corporate Ethical Policies in Large Corporations in Argentina, Brazil and Spain.Journal of Business Ethics,63(1),21-38.
-
Milberg, S. J.,Burke, S. J.,Smith, J. H.,Kallman, E. A.(1995).Rethinking Copyright Issues and Ethics on the Net: Values, Personal Information Privacy, and Regulatory Approaches.Communication of the ACM,38(12),65-73.
-
Moores, T. T.(2008).An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates.Journal of Business Ethics,81(1),39-51.
-
Moores, T. T.,Chang, J. C. J.(2006).Ethical Decision Making in Software Piracy: Initial Development and Test of A Four-Component Model.MIS Quarterly,30(1),167-180.
-
Pearson, F. S.,Weiner, N. A.(1985).Criminology: Toward an Integration of Criminological Theories.The Journal of Criminal Law & Criminology,76(1),116-150.
-
Provis, C.(2008).Guanxi and Conflicts of Interest.Journal of Business Ethics,79(1),57-68.
-
Reichert, A. K.,Webb, M.,Thomas, E.(2000).Corporate Support for Ethical and Environmental Policies: A Financial Management Perspective.Journal of Business Ethics,25(1),53-64.
-
Rhodes, M. L.(1986).Ethical Dilemmas in Social Work Practice.Milwaukee, WI:Family Service America.
-
Robertson, C. J.,Gilley, K. M.,Bao, Y.(2008).A Cross-Cultural Comparison of Ethical Orientations and Willingness to Sacrifice Ethical Standards: China Versus Peru.Journal of Business Ethics,81(2),413-425.
-
Robin, D.,Giallourakis, M.,David, F. R.,Moritz, T. E.(1989).A different look at codes of ethics.Business Horizons,32(1),66-73.
-
Rosenberg, R. S.(1998).Beyond the Code of Ethics: The Responsibility of Professional Societies.ACM SIGCAS Computers and Society,28(2),18-25.
-
Seligman, S. D.(1999).Guanxi: Grease for the Wheels of China.China Business Review,1999(Sep.-Oct.),34-38.
-
Shapiro, S.(1994).Boundaries and Quandaries: Establishing a Professional Context for IT.Information Technology of People,7(1),48-68.
-
Shin, S. K.,Ishman, M.,Sanders, G. L.(2007).An Empirical Investigation of Socio-Cultural Factors of Information Sharing in China.Information & Management,44(2),165-174.
-
Shore, B.,Venkatachalam, A. R.,Solorzano, E.,Burn, J. M.,Hassan, S. Z.,Janczewski, L. J.(2001).Softlifting and Piracy: Behavior Across Cultures.Technology in Society,23(4),563-581.
-
Sims, R. L.,Keon, T. L.(1999).Determinants of Ethical Decision Making: The Relationship of the Perceived Organizational Environment.Journal of Business Ethics,19(4),393-401.
-
Singhapakdi, A.,Vitell, S. J.(1991).Analyzing the Ethical Decision Making of Sales Professionals.Journal of Personal Selling and Sales Management,11(1),1-12.
-
Singhapakdi, A.,Vitell, S. J.(1990).Marketing Ethics: Factors Influencing Perceptions of Ethical Problems and Alternatives.Journal of Macromarketing,10(1),4-18.
-
Siponen, M.,Vartiainen, T.(2004).Unauthorized Copying of Software and Levels of Moral Development: A Literature Analysis and Its Implications for Research and Practice.Information Systems Journal,14(4),387-407.
-
Steidlmeier, P.(1993).The Moral Legitimacy of Intellectual Property Claims: American Business and Developing Country Perspectives.Journal of Business Ethics,12(12),157-164.
-
Stevens, B.(2008).Corporate Ethical Codes: Effective Instruments for Influencing Behavior.Journal of Business Ethics,78(4),601-609.
-
Strauss, A.,Corbin, J.(1990).Basics of Qualitative Research: Grounded Theory, Procedures, and Techniques.Newbury Park CA:Sage Publications.
-
Su, C.,Littlefield, J. E.(2001).Entering Guanxi: A Business Ethical Dilemma in Mainland China.Journal of Business Ethics,33(3),199-210.
-
Suen, H.,Cheung, S. O.,Mondejar, R.(2007).Managing Ethical Behaviour in Construction Organizations in Asia: How do the Teachings of Confucianism, Taoism and Buddhism and Globalization Influence Ethics Management?.International Journal of Project Management,25(3),257-265.
-
Swinyard, W. R.,Rinne, H.,Kau, A. K.(1990).The Morality of Software Piracy: A Cross-Cultural Analysis.Journal of Business Ethics,9(11),655-664.
-
Tian, Q.(2008).Perception of Business Bribery in China: the Impact of Moral Philosophy.Journal of Business Ethics,80(3),437-445.
-
Tian, Z.,Gao, H.,Cone, M.(2008).A Study of the Ethical Issues of Private Entrepreneurs Participating in Politics in China.Journal of Business Ethics,80(3),627-642.
-
Triandis, H. C.(1994).Culture and Social Behavior.New York:McGraw-Hill.
-
Triands, H. C.(Ed.),Dunnette, M. D.(Ed.),Hough, L. M.(Ed.)(1994).Handbook of Industrial and Organizational Psychology.Palo Alto CA:Consulting Psychologists Press.
-
Vitell, S. J.,Davis D. L.(1990).Ethical beliefs of MIS professionals: The frequency and opportunity for unethical behavior.Journal of Business Ethics,9(11),63-70.
-
Vitell, S. J.,Nwachhukwu, S. L.,Barnes, J. H.(1993).The Effects of Culture on Ethical Decision-making: An Application of Hofstede's Typology.Journal of Business Ethics,12(12),753-760.
-
Weiss, R. A.(1990).Self-Assessment.Communications of the ACM,33(11),110-132.
-
Whitman, M. E.,Townsend, A. M.,Hendrickson, A. R.,Rensvold, R. B.(1998).Computer Aversion and Computer-use Ethics in U. S and Asian Cultures.The Journal of Computer Information Systems,4(1),19-24.
-
Wiley, C.(2000).Ethical Standards for Human Resource Management Professionals: A Comparative Analysis of Five Major Codes.Journal of Business Ethics,25(2),93-114.
-
Wood, G.,Svensson, G.,Singh, J.,Carasco, E.,Callaghan, M.(2004).Implementing the Ethos of Corporate Codes of Ethics: Australlia, Canada, and Sweden.Business Ethics: An European Review,13(4),15-26.
-
Yang, K. S.Ed.、Wen, C. I.Ed.(1982)。The Sincization of Social and Behavioral Science Research in China。Taipei, R. O. C.:Academia Sinica。
-
Yang, M. M. H.(1994).Gifts, Favors, and Banquets: The Art of Social relations in Chinese society.Ithaca NY:Cornell University.
-
Zhuang, G.,Tsang, A. S. L.(2008).A Study on Ethically Problematic Selling Methods in China with a Broaden Concept of Gray-marketing.Journal of Business Ethics,79(1-2),85-101.
-
Zhuang, G.,Xi, Y.,Tsang, A. S. L.(2010).Power, Conflict, and Cooperation: The Impact of Guanxi in Chinese Marketing Channels.Industrial Marketing Management,39(1),137-149.
-
呂伯雲(2010)。建構『電腦稽核人員專業倫理規範』之雙循環行動研究。電腦稽核期刊,22,136-147。
-
莊道明(1998)。我國學術資訊網路使用及資訊倫理教育之研究。圖書館學刊,13,169-197。
-
郭鴻志、宋鎧、李志宏(1994)。兩岸檔案交流在隱私權及取用權上之探討。海峽兩岸檔案暨微縮學術交流會論文集,台北:
-
楊中芳(1991)。回顧港、台「自我」研究:反省與展望。中國人‧中國心〔人格與社會篇〕,台北:
-
楊中芳(1990)。試論中國人道德思慮的發展:一個自我發展的觀點。道德教育論文集,香港:
-
楊中芳(1991)。試論中國人的「自己」:理論與研究方向。中國人‧中國心〔人格與社會篇〕,台北:
-
雷霆(1991)。「中國人的「自我」與「自己」:形上與形下」,新理與心理。中國人‧中國心〔人格與社會篇〕,台北:
-
賴苑玲(1998)。資訊網路時代國小圖書館利用教育發展的新方向。社會科教育研究,3,121-140。
-
鍾斌賢、張思恩、王晃三(1996)。溶入資訊工程之倫理教學經驗。通識教育季刊,3(2),69-81。
|