|
10. Guay, T. "Web Publishing Paradigms", April 1995, <http://hoshi.cic.sfu.ca/~guay/Paradigm/Paradigm.html> ( cited November 25th, 2000.)
11. Hafner, K. and Markoff, J.. Cyberpunk: Outlaws and Hackers on the Computer Frontier. NY; Simon and Schuster, 1995.
12. Hallgarth M. W. "Consequentialism and Deontology" in the Encyclopedia of Applied Ethics ed. Ruth Chadwick, Vol. 1, 609. Toronto, ON; Academic Press, 1997.
13. Icove, D., Seger, K. and Von Storch, W. "Computer Crime." Sebastopol, CA; O'Reilly & Associates, Inc.; 1995.
14. Johnson, D. G. "What is Computer Ethics?" In Computer Ethics. 2nd ed. 1-15. Upper Saddle River, NJ: Prentice Hall. In Computer Ethics ed. D. Dubrule. Paper 1, Ottawa, ON; The Coursepack Division-Carleton University, 2000.
15. Johnson, D. G. "Hacker Ethics," in Computer Ethics, 112-118. 2nd ed. Englewood Cliffs, NJ; Prentice Hall, 1995.
16. Levy, S. "Hackers: Heros of the Computer Revolution" 1st ed. unkown publisher, 1994.
17. Moor, J. "What is Computer Ethics?" Metaphil. 16.4: 266-275; 1985. In Computer Ethics ed. D. Dubrule. Paper 2, Ottawa, ON; The Coursepack Division-Carleton University, 2000.
18. Mungo P. and Clough B. "Approaching Zero", New York, NY; Random House, 1992.
19. Rogerson, S. "Computer and Information Ethics", in the Encyclopedia of Applied Ethics ed. Ruth Chadwick, Vol 1, 563. Toronto, ON; Academic Press, 1997.
20. Spafford, E. "Is a Computer Break-In Ever Ethical?," Information Technology Quarterly, 9, 9-4. 1990. in D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values,120-125. Englewood Cliffs, NJ; Prentice Hall, 1995.
|
|