Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/199544.199561acmconferencesArticle/Chapter ViewAbstractPublication PagesecaConference Proceedingsconference-collections
Article
Free access

Risks and threats from Internet access: protecting the institution

Published: 15 November 1994 Publication History
First page of PDF

References

[1]
ACM Code of Ethics and Professional Conduct. Communications of the ACM, May 1992, 94-99.
[2]
Alpert, S. B. Federal sentencing, Internal Auditor, October 1992, 46-49.
[3]
Alstott, J. D. The ethics officer: roles, responsibilities and qualifications, Proceedinqs of the Third Annual National Conference on Ethics in America. Long Beach, CA, February 19-21, 1992, 2-5.
[4]
Anderson, R. E., D. G. Johnson, D. Gotterbarn and J. Perrolte. Using the new ACM code of ethics in decision making, Communications of the ACM February 1993, 98- 107.
[5]
Creatinq and Maintaininq an Ethical Corporate Climate. Woodstock Theological Center, Georgetown University, Washington, DC 20057, 1990.
[6]
Drake, B, H. and E, Drake, Ethical and legal aspect# of managing corporate cultures, California Manaqement review, Winter 1988, 107-123.
[7]
Federal sentencing guidelines 1991, Ethics in Action, November-December 1991, 8.
[8]
Hoffman, W. M. A blueprint for corporate ethical development, address, Center for Business Ethics, Bentley College, 1993.
[9]
Johnson, D. G. Computer Ethics. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1993.
[10]
Johnson, D. R. and J. Podesta. Access to and Use and Disclosure of Electronic Mail on Company Computer Systems: A Tool Kit for Formulatina Your Coml:#any's Pol#. Arlington, VA: Electronic Messaging (Mail) Association, 1991.
[11]
Kallman, E.A. Developing a code for ethical computer use, Journal of Systems and S0_.ftware, January 1992, 69- 74.
[12]
Kallman, E. A. and J. P. Grillo. Ethical Decision Makinq and Information Technoloqy: An Introduction with Cases. New York: McGraw Hill, 1993.
[13]
Kallman, E. and S. Shertzen. Private Matters. Compute rw_orld, (In Depth), November 23, 1992, 85-7.
[14]
Mazur, T. Practical steps you can take to make an ethical difference where you work. Proceedinqs of the Third National Conference on Ethics in America, Long Beach, CA, February 20, 1992, 217-222.
[15]
Ofeldt, R. and E. Kallman. Electronic monitoring of employees: issues and guidelines, Journal of Systems Manaqement, june 1993, 17-21 .
[16]
Petry, E. S. and F. Tietz. Can ethics officers improve office ethics? Business and Society Review, Summer 1992, 21-25.
[17]
Sherizen, S. Federal sentencing guidelines: new information security management considerations (1993). Available upon request: Sanford Sherizen, Pres. Data Security Systems, 5 Keane Terrace, Natick, MA 01760, (508) 653-7101.
[18]
Smith, H. J.Manaqin_q Pr.!vacy" Information Technoloqy and Corporate America, Chapel Hill: University of North Carolina Press, 1994.
[19]
Smith, H. and E. Kallman Toward a global IT ethics. Beyond Computing, September 1994, 24-5.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ECA '94: Proceedings of the conference on Ethics in the computer age
November 1994
210 pages
ISBN:0897916441
DOI:10.1145/199544
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 November 1994

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

ECA94
Sponsor:
  • Midsoutheastern ACM Chapter
  • SIGCAS
ECA94: Ethics in the Computer Age
November 11 - 13, 1994
Tennessee, Galtinburg, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)1
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media