

IS 201 References
Module 1 - What is Ethics?
Feiser, J (ed.), 2003, “Ethics,” The Internet Encyclopedia of Philosophy, http://www.utm.edu/research/iep/e/ethics.htm.
Module 2 - Ethics and the Law
Pascual, Crisolito. (1983). Introduction to Legal Philosophy.
Module 4 - Finalist Theories
Irwin, Terence, trans. (1985). Aristotle: Nicomachean Ethics. Hackett Publishing Co.
White, Stephen A. (1992) Sovereign Virtue: Aristotle on the Relation Between Happiness and Prosperity. California: Stanford University Press.
Module 6 - Computer Ethics
Bynum, T, 2001, “Computer Ethics, Basic Concepts and Historical Overview,” The Stanford Encyclopedia of Philosophy, Edward N. Zalta (ed.), http://plato.stanford.edu/entries/ethics-computer/
Module 7 - Computer Abuses
“”Hoaxbusters” - Computer Incident Advisory Capability of the US Department of Energy, http://hoaxbusters.ciac.org
Module 8 - Privacy Issues
Quittner, J. (August 25, 1997). “Invasion of Privacy,” TIME Magazine, http://www.time.com/time/reports/privacy/cover1.html
Module 9 - Social Justice Issues
World Summit on the Information Society, http://www.itu.int/wsis
World Forum on Communication Rights, http://www.communicationrights.org
Module 10 - Free Speech Issues
Supreme Court of the United States, 27 June 1997, “Supreme Court Opinion on the Communications Decency Act of 1996,” Citizens Internet Empowerment Coalition, http://www.ciec.org/SC_appeal/opinion.shtml
Haselton, B., 12 December 2000, “Amnesty Intercepted: Global human rights groups blocked by Web censoring software,” Peacefire, http://www.peacefire.org/amnesty-intercepted/
McClellan, J., 20 Feb 2003, “War on the web,” Guardian Unlimited Online, http://www.guardian.co.uk/online/story/0,3605,898661,00.html
Module 11 - Intellectual Property Rights
Lumantao, GE, 2003, “Free Software and/or Open Source: Creative Responses to Intellectual Property Rights,” http://www.batasayti.freeservers.com/about.html
Module 12 - Computer Crimes
McConnell International LLC, December 2000, “”Cyber Crime and Punishment? Archaic Laws Threaten GlobalInformation,” http://www.witsa.org/papers/McConnell-cybercrime.pdf
No comments:
Post a Comment