Reference Material on Ethics
Books and Book Chapters
Baase, S. (1997) A Gift of Fire: Social, Legal and Ethical Issues in Computing, Prentice Hall.
Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London.
Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London.
Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria
Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany.
Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163.
Floridi, L. (1999) Philosophy and Computing, London: Routledge.
Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall.
Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill.
Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’ Reactions to an Intelligent Interactive Telephone Health Behavior Advisor System, in: Ngwenyama, O., Introna, L.D., Myers, M.D. and DeGross, J.I. (Eds) New Information Technologies in Organizational Processes: Field Studies and Theoretical Reflections on the Future of Work, Boston: Kluwer Academic Publishers, 67-77.
Langford, D. (1995) Practical Computer Ethics, London: McGraw Hill.
Langford, D. (1999) Business Computer Ethics, London: Addison Wesley Longmans.
Langford, D. (2000) Internet Ethics, London: Macmillan.
Makau, J and Arnett, R. (Eds) (1997) Communication Ethics in an Age of Diversity, University of Illinois Press.
Mason, R.O., Mason F.M. & Culnan M.J., (1995) Ethics of the Information Age, SAGE Publications.
Spinello, R.A. (1995) Ethical Aspects of Information Technology, Prentice Hall.
Trauth, E.M. (1997) Achieving the Research Goal with Qualitative Methods: Lessons Learned Along the Way, in: Lee, A.S., Liebenau, J. and deGross, J.I. (eds.) Information Systems and Qualitative Research, London: Chapman and Hall.
Walsham, G. (1993) Ethical Issues in Information Systems Development: The Analyst as Moral Agent, in: Avison, D.E., Kendall, J.E. and DeGross, J.I. (Eds.) Human, Organizational and Social Dimensions of Information Systems Development, North Holland, Amsterdam, pp.281-294.
Journal Articles
Data Privacy
Cappel, J.J. (1993) Closing the Email Privacy Gap, Journal of Systems Management, December, 6-11.
Cappel, J.J. (1995) A Study of Individuals’ Ethical Beliefs and Perceptions of Electronic Mail Privacy, Journal of Business Ethics, 14, 10, 819-827.
Rainone, S.M., Sipior, J.C. and Ward, B.T. (1998) Ethical Management of Employee E-mail Privacy, Information Strategy: The Executive’s Journal, 1, 7, 629-640.
Tavani, H.T. and Moor, J.H. (2001) Privacy Protection, Control of Information, and Privacy-Enhancing Technologies,Computers and Society, 31, 1, 6-11.
Walters, G.J. (2001) Privacy and Security: An Ethical Analysis, Computers and Society, 31, 2, 8-23.
Wong, E.Y.W. (1994) Data Protection Legislation in Hong Kong - A Practical Perspective, Journal of Information Technology Management, 5, 3, 59-63.
General
Adam, A. (2001) Computer Ethics in a Different Voice. Information and Organization,11, 4, 235-261.
Banerjee, D. (1998) Modeling IT Ethics: A Study of Situational Ethics, Management Information Systems Quarterly, 22, 1, 31-60.
Berleur, J. (1996) IFIP Framework for Ethics, Science and Engineering Ethics (Special Issue on Global Information Ethics), 2, 2, 155-165.
Introna, L. Johnson, D. Nissenbaum, H. and Tavani, H. (2000) Look to the Future of the Information Society, Ethics and Information Technology,2, 2, 89-144.
Kappelman, L. (1999) Saving our Sacred Honor, Communications of the ACM, 42, 5, 23-25.
Myers, M.D. and Miller, L. (1996) Ethical Dilemmas in the Use of Information Technology: An Aristotelian Perspective, Ethics and Behavior, 6, 2, Special Issue on “Ethics in Cyberspace”, 153-160.
Pearson, J.M., Crosby, L. and Shim, J.P. (1997) Measuring the Importance of Ethical Criteria Behavior, Communications of the ACM, 40, 9, 94-100.
Smith, H.J. (2002) Ethics and Information Systems: Resolving the Quandaries, The Database for Advances in Information Systems,33, 3, 8-20.
Tavani, H.T. (2001) Information and Communication Technology (ICT) ethics: A Bibliography of Recent Books,Ethics and Information Technology, 3, 77-81.
Tavani, H.T. (2001) The State of Computer Ethics as a Philosophical Field of Inquiry: Some Contemporary Perspectives, Future Projections, and Current Resources, Ethics and Information Technology, 3, 2, 97-108.
Walsham, G. (1996) Ethical Theory, Codes of Ethics and IS Practice, Information Systems Journal, 6, 69-81.
Research
Allen, C. (1996) What's Wrong with the 'Golden Rule'? Conundrums of Conducting Ethical Research in Cyberspace, The Information Society, 12, 2, 175-187.
Boehlefeld, S.P. (1996) Doing the Right Thing: Ethical Cyberspace Research, The Information Society,12, 2, 141-152.
Kock, N.F. (1999) A Case of Academic Plagiarism, Communications of the ACM, 42, 7, 96-104.
Martin, B. (1994) Plagiarism: A Misplaced Emphasis, Journal of Information Ethics, 3, 2, 36-47.
Martin, B. (1999) Suppressing Research Data: Methods, Context, Accountability and Responses, Accountability in Research, 6, 333-372.
Onken, M., Garrison, S., Dotterweich, S. (1999) Research Ethics Among AACSB Faculty and Deans: Why Isn't There More Whistleblowing?, Journal of Information Ethics, 8, 1, 10-19.
Thomas, J. (1996) Introduction: A Debate about the Ethics of Fair Practices for Collecting Social Science Data in Cyberspace, The Information Society, 12, 2, 107-117.
Thomas, J. (1996) When Cyberresearch Goes Awry: The Ethics of the Rimm 'Cyberporn' Study, The Information Society, 12, 2, 189-198.
Waskul, D. and Douglass, M. (1996) Considering the Electronic Participant: Some Polemical Observations on the Ethics of On-Line Research, The Information Society, 12, 2, 129-139.
Internet
Bashinski, J., Balke, B., Williams, J.M., Holmes, N., Bosley, J.J., Rosenwald, J., Prince, C.G. Choi, B. and Denton, T. (2000) The Ethics of Personalization,Communications of the ACM, 43, 11, 11-15.
Clarke, R. (1999) Ethics and the Internet: The Cyberspace Behaviour of People, Communities and Organisations, Business & Professional Ethics Journal, 18, 3-4, 153-167.
Kelly, E.P. and Rowland, H.C. (2000) Ethical and Online Privacy Issues in Electronic Commerce,Business Horizons, 43, 3, 3.
King, S.A. (1996) Researching Internet Communities: Proposed Ethical Guidelines for the Reporting of Results, The Information Society, 12, 2, 119-127.
Kronenberg, V. (1999) Beware of Geeks Bearing Gifts: Ethical Implications of Current Market Models of the Internet, Business & Professional Ethics Journal, 18, 3-4, 125-152.
Langford, D. (1996) Ethics and the Internet: Appropriate Behaviour in Electronic Communication, Ethics and Behavior, 6, 2, 91-106.
Reid, E. (1996) Informed Consent in the Study of On-Line Communities: A Reflection on the Effects of Computer-Mediated Social Research, The Information Society, 12, 2, 169-174.
Scheibal, W.J. and Gladstone, J.A. (2000) Privacy on the Net: Europe Changes the Rules,Business Horizons, 43, 3, 13.
Spinello, R.A. and Tavani, H.T. (2001) The Internet, Ethical Values, and Conceptual Frameworks: An Introduction to CyberEthics,Computer and Society, 31, 2, 5-7.
Professional Accountability and Responsibility
Davison, R.M. (2000) Professional Ethics in Information Systems: A Personal Perspective, Communications of the AIS, 3, 8, 1-34..
Johnson, D.G. and Mulvey, J.M. (1995) Accountability and Computer Decision Systems, Communications of the ACM, 38, 12, 58-64.
Oz, E. (1992) Ethical Standards for Information Systems Professionals: A Case for a Unified Code, Management Information Systems Quarterly, 16, 4, 423-433.
Oz, E. (1993) Ethical Standards for Computer Professionals: A Comparative Analysis of Four Major Codes, Journal of Business Ethics, 12, 9, 709-726.
Educational
Couger, J.D. (1989) Preparing IS Students to Deal with Ethical Issues, Management Information Systems Quarterly, 13, 2, 211-218.
Grupe, F.H., Garcia-Jay, T. and Kuechler, W. (2002) Is It Time for an IT Ethics Program? Information Systems Management, 19, 3, 51-57.
Kini, R.B., Rominger, A. and Vijayaraman, B.S. (2000) An Empirical Study of Software Privacy and Moral Intensity among University Students,The Journal of Computer Information Systems,40, 3, 62-72.
Mason, R.O. (1986) Four Ethical Issues of the Information Age, Management Information Systems Quarterly, 10, 1, 5-12.
Intellectual Property Rights
Fowler, T.B. (2002) Technology’s Changing Role in Intellectual Property Rights, IT Pro, 4, 2, 39-44.
Shim, J.P. and Taylor, G.S. (1988) Business Faculty Members' Perceptions of Unauthorized Software Copying, OR/MS Today, 15, 5, 30-31.
Shim, J.P. and Taylor, G.S. (1989) Practising Managers' Perceptions/Attitudes towards Illegal Software Copying, OR/MS Today, 16, 4, 30-33.
Steidlmeier, P. (1993) The Moral Legitimacy of Intellectual Property Claims: American Business and Developing Country Perspectives, Journal of Business Ethics, 12, 2, 157-164.
Swinyard, W.R., Rinne, H. and Kau, A.K. (1990) The Morality of Software Piracy: A Cross-Cultural Analysis, Journal of Business Ethics, 9, 655-664.
Taylor, G.S. and Shim, J.P. (1993) A Comparative Examination of Attitudes Towards Software Piracy Among Business Professors and Executives, Human Relations, 46, 4, 419-433.
Wingrove, N. (1995) China Traditions Oppose War on IP Piracy, Research-Technology Management, 38, 3, 6-7.
Business Related Articles
Hoffer, J.A. and Straub, D.W. (1989) The 9 to 5 Underground: Are You Policing Computer Crimes, Sloan Management Review, 30, 4, 35-43.
McDonald, G. (2000) Business Ethics: Practical Proposals for Organizations,Journal of Business Ethics,25, 2, 169-184.
Straub, D.W. and Nance, W.D. (1988) Uncovering and Disciplining Computer Abuse: Organizational Responses and Options, The Information Age, 10, 3, 151-156.
Udas, K., Fuerst, W.L., and Paradice, D.B. (1996) An Investigation of Ethical Perceptions of Public Sector MIS Professionals, Journal of Business Ethics, 15, 7, 721-734.
Web Pages
ISWORLD Pages on Professional Ethics:
ISWORLD Pages on Computer Ethics:
Donald Gotterbarn’s “Ethics Articles” Page:
Security, Viruses and Hoaxes:
Association for Practical and Professional Ethics:
Australian Institute for Computer Ethics:
Centre for Computing and Social Responsibility:
Electronic Privacy Information Centre:
Roger Clarke’s Resources on Dataveillance & Information Privacy: