参考文献
|
-
台灣商業軟體聯盟,,2005 年12 月,2007 年11 月4 日,取自:http://w3.bsa.org/taiwan//report/upload/2005-IDC-study_TWN.pdf。
-
李怡慧,網路流言殺傷力強~蘋果電腦6 分鐘損失台幣9 百億元,2007 年5 年19 日;2007 年8月26 日,取自:http://ettvasia.ettoday.com/2007/05/19/339-2099076.htm。
-
吳佩諭,優質網路社會與良善資訊倫理之建立,2007 年1 月1 日;2007 年8 月2 日,取自:http://www.ithome.com.tw/itadm/article.php?c=41521。
-
Adamski, A.(1998).Crime Related to the Computer Network, Threats and Opportunities: Criminological Perspective.Proceedings of the VI European Colloquium on Crime and Criminal Policy,Helesinki Finlan:
-
Anderson R.E.,Johnson D.G.,Gotterbarn, D.,Judith, Perrole(1993).Using the New ACM code of ethics in Decision Making.Communications of ACM,36(2),98-107.
-
Athey, S.(1993).A Comparison of Expert's and High Tech Students' Ethical Beliefs in Computer-related Situations.Journal of Business Ethics,12,359-370.
-
Bommer, M.,Gratto, C.,Gravander, J.,Tuttle, M.(1987).A behavioral model of ethical and unethical decision making.Journal of Business Ethics,6,265-280.
-
Bynum, T.W.(2001).Coumputer Ethics: Its Birth and Its Future.Ethics and Information Technology,3(2),109-112.
-
Charlesworth, M.,Sewry, D.(2002).Ethical Issues in Enabling Information Technologies.SAICSIT
-
Conger, S.,Loch, K.D.,Helft, B.L.(1995).Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use.Information Systems Journal,5,161-184.
-
Fimbel, N.,Burstein, J.S.(1990).Defining the Ethical Standards of the High-Technology Industry.Journal of Business Ethics,9,929-948.
-
Genfan, H.(1987).Formalizing business ethics.Traning and Development Journal,1987(Nov.),35-37.
-
Heide, D.,Hightower, J. K.(1983).Organizations, Ethics, and the Computing professional.Journal of Systems Management,34(11),37-42.
-
Hitt, W.D.(1990).Ethics and Leadership: Putting Theory into Practices.Battelle Memorial Institute.
-
Johnson, D.,Snapper, S.(1985).Ethical Issues in the Use of Computers.Belmont, CA:Wadsworth Publishing.
-
Keith-Spiegel, P.,Koocher, G. P.(1985).Ethics in psychology: Professional standards and cases.New York:Random House.
-
Kling, R.(1980).Computer Abuse and Computer Crime as Organizational Activities.Computer/Law Journal,2(2),186-196.
-
Laudon, K. C.,Laudon, J. P.(1998).Management Information Systems: New Approach to Organization and Technology.Englewood Cliffs, New Jersey, USA:Prentice Hall.
-
Mason, R.O.(1986).Four Ethical Issues of The Information Age.MIS Quarterly,4-12.
-
McDonald, G.M.,Zepp, R.A.(1990).What should be done? A Practice Approach to Business Ethics.Management Decision,28,9-14.
-
Murry, J.W.,Hammons, J. O.(1995).Delphi: A Versatile Methodology for Conducting Qualitative Research.The Review of Higher Education,18(4),423-436.
-
Parker, D.B.(1981).Ethical Dilemmas in Computer Technology: Ethics and Management of computer Technology.Proceedings of the Fourth National Conference on Business Ethics,Waltham, MA:
-
Robin, D.,Giallourakis, M.,David, F.R.,Moritz, T.E.(1989).A Different Look at Codes of Ethics.Business Horizons,32(1),66-73.
-
Saaty, T.L.(1994).Decision Making in Economic, Political, Social and Technological Environments: The Analytic Hierarchy Process.RWS Publications, University of Pittsburgh.
-
Sergiovanni, T.J.(1992).Moral Leadership: Getting to the heart of School Improvement.San Francisco:Jossey-Bass Publishers.
-
Siau, K.,Nah, F.,Teng, L.(2002).Acceptable Internet Use Policy.Communications of the ACM,45(1),75-79.
-
Straub, D.W.,Nance, W.D.(1990).Discovering and Disciplining Computer Abuse in organizations: A Field Study.MIS Quarterly,45-60.
-
Sturge, P.(2009).Information Ethics in 21st Century.Australian Academic & Research Libraries,40(4),241-251.
-
Trevino, L.K.(1986).Ethical Decision Making in Organizations: A Person-Situation Interactionist Model.Academy of Management Review,11(3),601-617.
-
Trevino, L.K.,Brown, M.,Hartman, L.P.(2003).A Qualitative Investigation of Perceived Executive Ethical Leadership: Perceptions From Inside and Outside the Executive Suite.Human Relations,56(1),5-37.
-
Vitell, S.J.,Davis, D.L.(1990).Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior.Journal of Business Ethics,9(1),63-70.
-
丁惠民(2002)。建構企業資訊安全防護網。電子化企業經理人報告,40,58-67。
-
王世中(1999)。碩士論文(碩士論文)。國立政治大學公共行政學系。
-
吳永猛、餘坤東、陳松柏(2004)。企業倫理。台北:國立空中大學。
-
吳成豐(2002)。企業倫理的實踐。台北:前程文化事業有限公司。
-
吳健平(2007)。碩士論文(碩士論文)。私立輔仁大學資訊管理所。
-
李順仁(2003)。資訊安全。台北:文魁資訊股份有限公司。
-
林杏子(2001)。資訊倫理。台北:華泰文化事業公司。
-
林杏子(2003)。博士論文(博士論文)。國立中山大學資訊管理所。
-
林宜隆(2007)。資訊倫理與資訊教育之新思維、新挑戰。2007 年第四屆「資訊科技與人文管理教育論壇」研討會論文集
-
林東清、許孟祥(1997)。資訊倫理守則現況:以社會層級及倫理議題分析。中山管理評論,5(2),383-412。
-
莊道明(1996)。資訊網路倫理初探。21 世紀資訊科學與技術的展望國際學術研討會
-
許明恥(2005)。碩士論文(碩士論文)。國立台灣科技大學企業管理系。
-
郭俊宏(2006)。碩士論文(碩士論文)。私立輔仁大學資訊管理所。
-
黃貞芬、許孟祥(1996)。資訊倫理守則現況:以社會層級及倫理議題分析。中央研究院「資訊科技與社會轉型」研討會論文集
-
楊政學(2006)。企業倫理。台北:揚智文化。
-
劉建人、柯菁菁、陳協志(2004)。資訊倫理與社會-重建網路社會新秩序。臺北:普林斯頓國際有限公司。
-
謝明昆(1994)。道德教學法。台北:心理出版社。
|