|
Journals in DBLP
Commun. ACM 1995, volume: 38, number: 12
- John Perry Barlow
Property and Speech: Who Owns What You Say in Cyberspace? [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:19-22 [Journal]
- Ann K. Danowitz, Y. Nassef, Seymour E. Goodman
Cyberspace Across the Sahara: Computing in North Africa. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:23-28 [Journal]
- Peter J. Denning
Plagiarism in the Web. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:29- [Journal]
- Sue A. Conger, Karen D. Loch
Ethics and Computer Use - Introduction to the Special Section. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:30-32 [Journal]
- Kenneth C. Laudon
Ethical Concepts and Information Technology. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:33-39 [Journal]
- Suzanne P. Weisband, Bruce A. Reinig
Managing User Perceptions of Email Privacy. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:40-47 [Journal]
- Janice C. Sipior, Burke T. Ward
The Ethical and Legal Quandary of Email Privacy. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:48-54 [Journal]
- Richard O. Mason
Applying Ethics to Information Technology Issues. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:55-57 [Journal]
- Deborah G. Johnson, John M. Mulvey
Accountability and Computer Decision Systems. [Citation Graph (1, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:58-64 [Journal]
- Sandra J. Milberg, Sandra J. Burke, H. Jeff Smith, Ernest A. Kallman
Values, Personal Information Privacy, and Regulatory Approaches. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:65-74 [Journal]
- Chuck Huff, C. Dianne Martin
Computing Consequences: A Framework for Teaching Ethical Computing. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:75-84 [Journal]
- Peter G. Neumann
Reviewing the Risks Archives. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1995, v:38, n:12, pp:138- [Journal]
|