|
1. Association of Computing Machinery. "Article 2.8 ACM Code of Ethics and Professional Conduct." Adopted by ACM Council 10/16/92. <http://www.acm.org/constitution/code.html>. (cited 22 November 2000).
2. Barry, V. E. "Theories." In Applying Ethics. 30-57. Belmont CA: Wadsworth; 1982. In Computer Ethics ed. D. Dubrule. Paper 3, Ottawa, ON; The Coursepack Division-Carleton University, 2000.
3. Cavazos, E. A. and Gavino M. "Cyberspace and the Law: Your Rights and Duties in the On-Line World." Cambridge, Mass.; MIT Press, 1994.
4. Denning, D. and Drake, F.. "A Dialog on Hacking and Security," in D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values,120-125. Englewood Cliffs, NJ; Prentice Hall, 1995.
5. Denning, D. "Concerning Hackers Who Break Into Computer Systems", 13th National Computer Security Conference speech, <http://www-swiss.ai.mit.edu/6095/articles/denning_defense_hackers.txt> (cited November 24th, 2000.)
6. Elbra, T. "A Practical Guide to the Computer Misuse Act 1990." United Kingdom; Department of Trade and Industry-NCC Blackwell; 1991.
7. Gathercole, R. J. " Legal Services and the Poor", In Lawyers and the Consumer Interest ed. Evans, R. G. and Trebilcock, M. J.. 407-419, 423, 425-429, Toronto, ON: Butterworth & Co. (Canada) Ltd., 1982, in Introduction to Legal Studies, 2nd Ed, ed. The Department of Law Casebook Group, 282-289. North York, ON: Captus Press Inc., 1995.
8. Godwin M., "When Copying Isn't Theft: How Government Stumbled in a Hacker Case." (Originally published in _Internet_World_, Jan./Feb. 1994.) <http://www.eff.org/pub/Publications/Mike_Godwin/phrack_riggs_neidorf_godwin.article> (cited 20 October 2000.)
9. Gotterbarn, D. "Computer Ethics: Responsibility Regained", <http://www-cs.etsu.edu/gotterbarn/artpp1.htm> (cited November 24th, 2000.)
|
|