PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2014 | nr 11-12 | 27--31
Tytuł artykułu

Ongoing and Emerging Issues in IT Ethics

Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This article will present some ongoing issues in IT ethics with which society has been struggling for decades. Then, several emerging issues in IT ethics are discussed. Finally, the paper is brought to a close with a conclusion and observations about continuing and emerging ethical issues. (fragment of text)
Rocznik
Numer
Strony
27--31
Opis fizyczny
Twórcy
  • Walker College of Business, Appalachian State University, U.S.A.
Bibliografia
  • Auer, N. J., & Krupar, E. M. (2001). Mouse click plagiarism: The role of technology in plagiarism and the librarian's role in combating it. "Library Trends", 49(3), 415-432.
  • Basu, E. (2013). Hacking Insulin Pumps And Other Medical Devices From Black Hat. "Forbes". Retrieved from http://www.forbes.com/sites/ericbasu/201 3/08/03/hacking-insulin-pumps-and-other-medical-devices-reality-not-fiction/.
  • Ciocchetti, C. A. (2011). The Eavesdropping Employer: A Twenty First Century Framework for Employee Monitoring. "American Business Law Journal", 48(2), 285-369.
  • Etter, S., Cramer, J. J., & Finn, S. (2006). Origins of academic dishonesty: Ethical orientations and personality factors associated with attitudes about cheating with information technology. "Journal of Research on Technology in Education", 39(2), 1 33-155.
  • Flanigan, K. (2013). Cause of Death: A Fatal 'Hack Attack'. Bit9.com. Retrieved from https://blog.bit9.com/201 3/06/1 9/cause-of-death-a-fatal-hack-attack/.
  • Furnell, S. (2010). Hackers, viruses and malicious software. Handbook of Internet crime, 173-193.
  • Gabriel, T. (2010). Plagiarism Lines Blur for Students in Digital Age. "The New York Times". Retrieved from http://www.nytimes.com/201 0/08/02/education/02cheat.html?pagewanted=all&_r=0.
  • Holt, Thomas J., and Robert G. Morris. An exploration of the relationship between MP3 player ownership and digital piracy. "Criminal Justice Studies", 22.4 (2009): 381 -392.
  • Howard, B. (2013). Conspiracy of the week: Can your car be hacked while you're driving?, ExtremeTech. Retrieved from http://www.extremetech.com/extreme/160779-conspiracy-of-the-week-can-your-car-be-hacked-while-youre-driving.
  • International Blackshades Malware Takedown. (2014). Federal Bureau of Investigation. Retrieved from http://www.fbi.gov/news/stories/201 4/may/international-blackshades-malware-takedown/international-blackshades-malware-takedown.
  • Knapp, A. (2013). Study Finds That Streaming And Spyware Are Killing Music Piracy. "Forbes". Retrieved from http://www.forbes.com/sites/alexknapp/201 3/02/26/study-finds-that-streaming-and-spyware-are-killing-music-piracy/.
  • Laudon, K. & Laudon, J. (2010). Ethical and Social Issues in Information Systems, In K. Laudon and J. Laudon (Eds.), Management Information Systems: Managing the Digital Firm (pp. 120-158). "Upper Saddle River", NJ: Pearson Prentice Hall.
  • Mason, R. O. (1986). Four ethical issues of the information age. "MIS Quarterly", 5-12.
  • Microsoft. (2013). Microsoft security intelligence report. Retrieved from http://www.microsoft.com/security/sir/default.aspx.
  • Milne, G. R. (2000). Privacy and ethical issues in database/interactive marketing and public policy: a research framework and overview of the special issue. "Journal of Public Policy & Marketing", 19(1), 1-6.
  • Neubauer, B. J., & Harris, J. D. (2002). Protection of computer systems from computer viruses: ethical and practical issues. "Journal of Computing Sciences in Colleges", 18(1), 270-279.
  • Palmer, D. E. (2005). Pop-ups, cookies, and spam: toward a deeper analysis of the ethical significance of internet marketing practices. "Journal of business ethics", 58 (1-3), 271 -280.
  • Posey, C., Bennett, R. J., Roberts, T. L., & Lowry, P. B. (2011). When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse. "Journal of Information Systems Security", 7(1 ), 24-47.
  • Price, D. (2013). Sizing the piracy universe. NetNames, September. Retrieved from http://blog.copyrightal-liance.org/sites/default/files/201 3-netnames-piracy.pdf
  • Sandoval, R. (2014). Information Technology Security (ITSec): The Effects of SIEM Technology in Monitoring Employee Computer Use. Twentieth Americas Conference on Information Systems, Savannah, GA. August 7 - 9.
  • Silverman, D. (2013). Your iPhone knows where you've been, puts it on a map. Chron. Retrieved from http://blog.chron.com/techblog/2013/10/your-iphone-knows-where-youve-been-puts-it-on-a-map/.
  • Who Music Theft Hurts, n.d. Retrieved from http://www.riaa.com/physicalpiracy.php?content_selector=piracy_details_online.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171683280

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.