[ Pobierz całość w formacie PDF ]
.Fr i edman Batya (red.) (1997).Human Values and the Design of Computer Technology.Cambridge UniversityPress.Gent i l e Mary, Svi okl a John (1991).Information Technology in Organizations: Emerging Issues in Ethics andPolicy.Cambridge, Massachusetts, Harvard Business School Publications.Gór ni ak- Koci kowska Krystyna (1996).The Computer Revolution and the Problem of Global Ethics.W:T.W.Bynum, S.Rogerson, s.177  190.Got t er bar n Donald (1991).Computer Ethics: Responsibility Regained.W:  National Forum: The Phi BetaKappa Journal , vol.71, s.26  31. 132 Pod red.A.Kocikowskiego, K.Górniak-Kocikowskiej, T.W.BynumaGot t er bar n Donald, Mi l l er Keith, Roger son Simon (1997).Software Engineering Code of Ethics.W:  Information Society , vol.40, nr 11, s.110  118.Got t er bar n Donald (2001).Informatics and Professional Responsibility.W:  Science and Engineering Ethics ,vol.7, nr 2.Gr i l l o John P., Kal l man Ernest (1993).Ethical Decision Making and Information Technology, Watsonville,Mitchell McGraw-Hill.H u f f Chuck, Fi nhol t Thomas (1994).Social Issues in Computing: Putting Computing in its Place.New York,McGraw-Hill.I nt r ona Lucas D.(1997).Privacy and the Computer: Why We Need Privacy in the Information Society.W:  Metaphilosophy , vol.28, nr 3, s.259  275.I nt r ona Lucas D., N i ssenbaum Helen (2000).Shaping the Web: Why the Politics of Search Engines Matters.W:  The Information Society , vol.16, nr 3, s.1  17.Johnson Deborah G.(1992).Proprietary Rights in Computer Software: Individual and Policy Issues.W:T.W.Bynum, W.Maner, J.L.Fodor (red.), Software Ownership and Intellectual Property Rights.ResearchCenter on Computing & Society.Johnson Deborah G.(1994).Computer Ethics.Wyd.II.Englewood Cliffs, New Jersey, Prentice-Hall.Johnson Deborah G., N i ssenbaum Helen (red.) (1995).Computers, Ethics and Social Values.EnglewoodCliffs, New Jersey, Prentice-Hall.Johnson Deborah G.(1999).Computer Ethics in the 21st Century.Referat plenarny na konferencji ETHICOMP`99, Rzym, pazdziernik 1999.W: R.A.Spinello, H.T.Tavani (red.), Readings in CyberEthics.Jones andBartlett 2001.Koci kowski Andrzej (1999).Technologia informatyczna a stary problem totalitaryzmu.W:  Nauka , nr 1,s.120  126.Koci kowski Andrzej (1996).Geography and Computer Ethics: An Eastern European Perspective.W: T.W.By-num, S.Rogerson, s.201  210.Laudon Kenneth (1995).Ethical Concepts and Information Technology.W:  Communications of the ACM ,grudzień 1995, s.33  39.M a n e r Walter (1980).Starter Kit in Computer Ethics.Helvetia Press (opublikowano we współpracy z NationalInformation and Resource Center for Teaching Philosophy).Oryginalna publikacja w nakładzie własnymManera pojawiła się w roku 1978.M a r x Gary T.(2001).Identity and Anonymity: Some Conceptual Distinctions and Issues for Research.W: J.Ca-plani, J.Topey, Documenting Individual Identity.Princeton University Press.M a s o n Richard (1986).Four Ethical Issues of the Information Age. MIS Quarterly , marzec 1986, s.46  55.Mi l l er A.R.(1971).The Assault on Privacy: Computers, Data Banks, and Dossiers.University of Michigan Press.M o o r James H.(1999).Just Consequentialism and Computing.W:  Ethics and Information Technology , vol.1,nr 2, s.65  69.M o o r James H.(1998).Reason, Relativity and Responsibility in Computer Ethics.W:  Computers and Society ,vol.27, nr 3, s.14  21.M o o r James H.(1997).Towards a Theory of Privacy in the Information Age.W:  Computers and Society , vol.28,nr 1, s.27  32.M o o r James H.(1985).What Is Computer Ethics?.W: T.W.Bynum (red.), Computers and Ethics.Oxford, Blac-kwell, s.266  275 (specjalny numer  Metaphilosophy z pazdziernika 1985).Ni ssenbaum Helen (1999).The Meaning of Anonymity in an Information Age.W:  The Information Society ,vol.15, s.141  144.Ni ssenbaum Helen (1998).Protecting Privacy in an Information Age: The Problem of Privacy in Public.W: Law and Philosophy , vol.17, s 559  596.Ni ssenbaum Helen (1995).Should I Copy My Neighbor`s Software? W: D.Johnson, H.Nissenbaum (red.),Computers, Ethics, and Social Responsibility.Prentice Hall.O z Effy (1994).Ethics for the Information Age.Los Angeles, Kalifornia, USA: Wm.C.Brown.P a r k e r Donn (1968).Rules of Ethics in Information Processing.W:  Communications of the ACM , vol.11. Wykaz podstawowej literatury z obszaru etyki informatycznej 133P a r k e r Donn (1979).Ethical Conflicts in Computer Science and Technology.AFIPS Press, s.198  201.P a r k e r Donn, S w o p e Susan, B a k e r Bruce N.(1990).Ethical Conflicts in Information and ComputerScience, Technology and Business.Wellesley, Massachusetts, USA: QED Information Sciences.Per r ol l e Judith A.(1987).Computers and Social Change: Information, Property, and Power.Wadsworth.Roger son Simon (1996).The Ethics of Computing: The First and Second Generations.W:  The UK BusinessEthics Network News , wiosna 1996, s.1  4.Roger son Simon, Bynum Terrell W.(1995).Cyberspace: The Ethical Frontier.W:  Times Higher EducationSupplement , The London Times, 9 czerwca 1995.Rosenber g Richard (1992).The Social Impact of Computers.Nowy Jork, USA: Harcourt Brace Jovanovich.Samuel son Pamela (1991).Is Information Property? W:  Communications of the ACM , marzec 1991, s.15  18.Sój ka Jacek (1996).Business Ethics and Computer Ethics: The View from Poland.W: T.Bynum, S.Rogerson,s.191  200.Spaf f or d Eugene H.(1992).Are Computer Hacker Break-Ins Ethical? W:  Journal of Systems Software , sty-czeń 1992, s.41  47.Spaf f or d Eugene H., Heaphy Kathleen A., Fer br ache David J.(1989).Computer Viruses: Dealing withElectronic Vandalism and Programmed Threats.Arlington, Wirginia, USA: ADAPSO Press.Spi nel l o Richard A.(1997).Case Studies in Information and Computer Ethics.Upper Saddle River, New Jersey,USA: Prentice-Hall.Spi nel l o Richard A.(1995).Ethical Aspects of Information Technology.Englewood Cliffs, New Jersey, USA:Prentice-Hall.Spi nel l o Richard A., T avani Herman T.(red.) (2001).Readings in CyberEthics.Jones and Bartlett.St al l man Richard (1992) [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • katek.htw.pl






  • Formularz

    POst

    Post*

    **Add some explanations if needed