Asian Journal of Information Technology
Year:
2014
Volume:
13
Issue:
8
Page No.
438 - 441
Attitudes of Undergraduate Management Information Systems Students Towards
Computer Ethics at Al-Balqa Applied University
Authors :
Talib A.Almseidein
References
Bowyer, K.K., 2001. Ethics and Computing: Living Responsibly in a Computerized World. 2nd Edn., IEEE Press, California, ISBN: 9780780360198, Pages: 431.
Bynum, T.W. and J. Moor, 1998. The Digital Phoenix: How Computers are Changing Philosophy. Wiley, New York, ISBN: 9780631203520, pp: 67-71.
Gattiker, U.E. and H. Kelley, 1999. Morality and computers: Attitudes and differences in moral judgments. Inform. Syst. Res., 10: 233-254.
Direct Link | Gerhardt, J., 2001. Put ethics and fun into your computer course. J. Comput. Sci. Colleges, 16: 247-251.
Direct Link | Hay, D., P.M. Larres, P. Oyelere and A. Fisher, 2001. The ethical perception of undergraduate students in computer-related situations: An analysis of the effects of culture, gender and prior education. Teach. Bus. Ethics, 5: 331-356.
CrossRef | Maner, W., 1980. Starter Kit in Computer Ethics. Helvetica Press, Zurich.
Masrom, M., Z. Ismail and R. Hussein, 2009. Ethical awareness of computer use among undergraduate students. ACM SIGCAS Comput. Soc., 39: 27-40.
CrossRef | McCarthy, R.V., L. Halawi and J.E. Aronson, 2005. Information technology ethics: A research framework. Issues Inform. Syst., 4: 64-69.
Direct Link | Moor, J.H., 1985. What is Computer Ethics. In: Computers and Ethics, Bynum, T.W. (Ed.). Blackwell, Oxford, pp: 266-275.
Namlu, A.G. and H.F. Odabasi, 2007. Unethical computer using behavior scale: A study of reliability and validity on Turkish university students. Comput. Educ., 48: 205-215.
CrossRef | North, M.N., R. George and S.M. North, 2006. Computer Security and Ethics Awareness in University Environments: A Challenge for Management of Information Systems. Proceedings of the 44th Annual Southeast Regional Conference, March 10-12, 2006, Melbourne, FL., USA., pp: 434-439.
Siponen, M.T. and T. Vartiainen, 2007. Unauthorized copying of software: An empirical study of reasons for and against. ACM SIGCAS Comput. Soc., 37: 30-43.
CrossRef |