Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A computer ethics course

Published: 01 March 1985 Publication History
First page of PDF

References

[1]
Bosworh, Bruce. Codes, Ciphers, and Computers : An Introduction to Information Security. Rochelle Park, New Jersey: Hayden Book Company, Inc., 1982.
[2]
Bowers, William M. Practical Cryptanalysis.The American Cryptogram Association, 1960.
[3]
Bushkin, Arthur A., and Samuel I. Schaen. The Privacy Act of 1974: A Reference Manual for Compliance. McLean, Va. : System Development Corporation, 1976.
[4]
Central Intelligence Agency. Where' s What: Sources of Information for Federal Investigators. New York, New York: Quadrangle/New York Times Book Co., n.d.
[5]
Foster, Caxton C. Cryptanalysis for Microcomputers : with BASIC Proqrams to Make & Break Coded Messages & puzzels. Rochelle Park, New Jersey: Hayden Book Company, Inc., 1982.
[6]
Gaines, Helen Fouche. Cryptanalysis. New York, New York: Dover publications, Inc., 1956.
[7]
Hsiao, D. ; Kerr, D. S.; and Madnick, S. E. Computer Security. New York, New York: Academic Press, 1979.
[8]
Hoffman, Lance J. Modern Methods for Computer Secur and Privacy. Englewood Cliffs, New Jersey: Prentice-Hall, Inc., 1977.
[9]
Laffin, John. Codes and_ Ciphers. New York, New York : Abelard-Schuman, 1964.
[10]
Martin, James. Security, Accuracy, and Privacy in computer System. Englewood Cliffs, New Jersey: Prentice-Hall, Inc. 1976.
[11]
Miller, Arthur R. The Assault on Privacy. Ann Arbor, Michigan: University of Michigan Press, 1971.
[12]
National Commission on Consumer Finance. Consumer Credit in the United States. Washington, D.C. : U. S. Government Printing Office, 1972.
[13]
National Commission on Electronic Fund Transfers (sic) . EFT and the Public Interest. Washington, D.C. :U.S. Government Printing Office, 1972.
[14]
Ohauer, M. E. Cryptogram solving. Columbus, Ohio: The Etcetera Press, 1973.
[15]
Parker, Donn B. Computer Security Management. Reston, Virginia: Reston publishing Company, Inc., 1981.
[16]
Privacy Protection Study Commission. Personal Privacy in an Informative Society. Washington, D.C. : U.S. Government Printing Office, 1977.
[17]
Sinkov, Abraham. Elementary__Cryptanalysis : A Mathematical Approach. New York, New York: Random House, 1968.
[18]
Smith, Laurence D. Cryptography. New York, New York: Dover Publications, Inc., 1955.
[19]
Van Tassel, Dennis. Computer Security Management. Englewood Cliffs, New Jersey: Prentice-Hall, Inc., 1972.
[20]
Wessel, Milton R. Freedom's Edqe: The Computer Threat to Society. Reading, Mass.: Addison-Wesley, 1974.
[21]
Westin, Alan F. and Michael Baker. Databanks in a Free Society. New York,-New York: Quadrangle/New York Times Book Co., 1972.
[22]
Zim, Herbert S. Codes and Secret Writing. New York, New York: William Morrow and Co., 1948. Professional Ethics and Law as Related to Computer Security and Security:
[23]
Bigelow, Robert P. and Susan Nycum. Your Computer and the Law. Englewood Cliffs, New Jersey: Prentice-Hall, Inc., 1975.
[24]
"DPMA Code of Ethics and Standards of Conduct for Information Processing Professionals, " Data Management, December, 1981.
[25]
Johnson, Douglas W. Computer Ethics: A Guide for the New Age. Elgin, Illinois: The Brethren Press, 1984.
[26]
Mandell, Steven. Computer Data Processing and the Law. West Publishing Company, Inc., 1983.
[27]
Parker, Donn B. Ethical Conflicts in Computer Science and Technology AFIPS Press, 1981.
[28]
Parker, Donn B. ; edited by Eric A. Weiss. " Self-Assessment Procedure IX : A Self- Assessment Procedure Dealing With Ethics in Computing," Communications of the ACM, March, 1982.
[29]
Parker, Donn G. Crime by Computer. New York, New York: Charles Scribner's Sons, 1976.
[30]
Remer, Daniel. Legal Care for Your Software : A Step-by Step Guide for Computer Software Writers. Reading, Massachusetts: Addison-Wesley Publishing Company, 1982.
[31]
Rule, James ; Douglas McAdam ; Linda Stearns; and David Uglow. The Politics of Privacy. New York, New York: New American Library, 1980.
[32]
Bedell, Kenneth and Parker Rossman. Computers: New opportunities for Personalized Ministry. Valley Forge, PA: Judson Press, 1984.
[33]
Feigenbaum, Edward A. and Pamela McCorduck. The Fifth Generation: Artificial Intelligence and Japan's Computer Challenge to the Worid. Reading, Massachusetts: Addison-Wesley Publishing Company, 1983.
[34]
Fishman, Katharine Davis. The Computer Establishment. New York, New York: McGraw-Hill Book Company, 1981.
[35]
Forrester, Jay W. World Dynamics. Cambridge, Massachusetts: MIT Press, 1969.
[36]
Naisbitt, John. Megatrends: Ten New Directions Transforming Our Lives. U.S.A. : Warner Books, 1982.
[37]
Osborne, Adam. Running Wild: The Next Industrial Revolution. Berkeley, California: McGraw-Hill/Osborne, 1979.
[38]
Papert, Seymour. Mindstorms: Children, Computers, and Powerful Ideas. New York, New York: Basic Books, Inc., Publishers, 1980.
[39]
Pirsig, Robert M. Zen and the Art of Motorcycle Maintenance: An Inquiry into Values. New'York, New-York: Bantam Books, 1974.
[40]
Sagan, Carl The Dragons of Eden Speculations on the Evolution of Human Intelligence. New York, New -York: Ballantine Books, 1977.
[41]
The Third Wave and the Local Church. C4- Resource Company, 1984
[42]
The Third Wave and the Family. C4-Resource Company, 1985
[43]
Toffler, Alvin. Future Shock. New York, New York: Bantam Books, 1970.
[44]
Toffler, Alvin. The Third Wave. New York, New York: William Morrow and Company, Inc., 1980.
[45]
Weizenbaum, Joseph. computer Power and Human Reason : From Judgment to Calculation. San Francisco, California: W. H. Freeman and Company, 1976.

Cited By

View all
  • (2023)Teaching Ethics in Computing: A Systematic Literature Review of ACM Computer Science Education PublicationsACM Transactions on Computing Education10.1145/363468524:1(1-36)Online publication date: 27-Nov-2023
  • (1985)Computer science curriculumACM SIGCSE Bulletin10.1145/989369.98937817:4(59-64)Online publication date: 1-Dec-1985
  • (2006)Architecture for teaching computer ethics within an e-learning environmentProceedings of the 10th WSEAS international conference on Systems10.5555/1984211.1984347(714-718)Online publication date: 10-Jul-2006
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 1985
Published in SIGCSE Volume 17, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)55
  • Downloads (Last 6 weeks)10
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Teaching Ethics in Computing: A Systematic Literature Review of ACM Computer Science Education PublicationsACM Transactions on Computing Education10.1145/363468524:1(1-36)Online publication date: 27-Nov-2023
  • (1985)Computer science curriculumACM SIGCSE Bulletin10.1145/989369.98937817:4(59-64)Online publication date: 1-Dec-1985
  • (2006)Architecture for teaching computer ethics within an e-learning environmentProceedings of the 10th WSEAS international conference on Systems10.5555/1984211.1984347(714-718)Online publication date: 10-Jul-2006
  • (2006)Increasing ethical awareness of IT students through online learningProceedings of the 6th WSEAS International Conference on Applied Informatics and Communications10.5555/1366421.1366467(265-269)Online publication date: 18-Aug-2006

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media