skip to main content
article
Free Access

Using the new ACM code of ethics in decision making

Published:01 February 1993Publication History
First page image

References

  1. 1 Bayles, M.D. Professional Ethics. Wadsworth, Belmont, Calif., 1981.Google ScholarGoogle Scholar
  2. 2 Bynum, T.W., Maner, W. and Fodor, j., Eds. Software Ownership and Intellectual Property Rights. Research Center on Computing and Society, Southern Connecticut State University, New Haven, Conn. 06515, 1992.Google ScholarGoogle Scholar
  3. 3 Clark, D. Computers at Risk: Safe Computing in the Information Age. National Research Council, National Academy Press, Washington, D.C., 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Denning, P.j., Ed. Computers under Attack: Intruders, Worms and Viruses. Addison-Wesley, Inc., Reading, Mass., 1990. Google ScholarGoogle Scholar
  5. 5 Dunlop, C. and Kling, R., Eds. Computerization and Controversy: Value Conflicts and Social Choices. Academic Press, New York, N.Y., 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Flaherty, D. Protecting Privacy in Surveillance Societies. University of North Carolina Press, Chapel Hill, N.C., 1989.Google ScholarGoogle Scholar
  7. 7 Forester, T. Software theft and the problem of intellectual property rights. Comput. Soc. 20, 1 (Mar. 1990), 2-11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Frankel, M.S. Professional Codes: Why, How, and with What Impact? J. Bus. Ethics 8 (2 and 3) (1989), 109-116.Google ScholarGoogle Scholar
  9. 9 Frenkel, K.A. Women and computing. Commun. ACM 33, 11 (Nov. 1990), 34-46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Gotterbarn, D. Computer ethics: Responsibility regained. National Forum (Summer 1991).Google ScholarGoogle Scholar
  11. 11 Gotterbarn, D. Editor's corner.J. Syst. Soft. 17 (Jan. 1992), 5-6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 Guynes, C.S. Protecting statistical databases: A matter of privacy. Comput. Soc. 19, 1 (Mar. 1989), 15-23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 IEEE Computer Society Press. Proceedings of the Second Conference on Computers, Freedom and Privacy. (Los Alamitos, Calif.), IEEE Computer Society Pres, 1992.Google ScholarGoogle Scholar
  14. 14 Johnson, D.G. Computer Ethics, Second Ed. Prentice Hall, Englewood Cliffs, N.J., 1993.Google ScholarGoogle Scholar
  15. 15 Laudon, K.C. Dossier Society: Value Choices in the Design of National Information Systems. Columbia University Press, New York, N.Y., 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16 Martin, C.D. and Murche-Beyma, E., Eds. In Search of Gender Free Paradigms for Computer Science Education. International Society for Technology in Education, Eugene, Ore., 1992.Google ScholarGoogle Scholar
  17. 17 National Research Council. Intellectual Property Issues in Software. National Academy of Sciences, Washington, D.C., 1991.Google ScholarGoogle Scholar
  18. 18 Parker, D., Swope, S. and Baker, B. Ethical conflicts in information and computer science. Techology and Business. Wellesley, Mass. QED Information Sciences, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19 Parnas, D.L. SDI: A violation of professional responsibility. Abacus 4, 2 (Winter 1987), 46-52.Google ScholarGoogle Scholar
  20. 20 Perrolle, J.A. Computers and Social Change: Information, Property, and Power. Wadsworth, Belmont, Calif., 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21 Perrolle, J. Conversations and trust in computer interfaces. In Computers and Controversy. Dunlop and Kling, Eds., 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22 Pressman, R.S. and Herron, R. Software Shock: The Danger and the Opportunity. Dorsett House, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23 Salpeter, J. Are you obeying copyright law? Technol. Learning 12, 8 (1992), 12-23.Google ScholarGoogle Scholar
  24. 24 Spafford, G. Are computer hacker break-ins ethical? J. Syst. Softw. 17 (Jan. 1992). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25 Stevenson, J.T. Engineering Ethics: Practices and Principles. Canadian Scholars Press, Toronto, 1987.Google ScholarGoogle Scholar

Index Terms

  1. Using the new ACM code of ethics in decision making

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 36, Issue 2
      Feb. 1993
      90 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/151220
      Issue’s Table of Contents

      Copyright © 1993 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 February 1993

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader