The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
1995, volume: 38, number: 12

  1. John Perry Barlow
    Property and Speech: Who Owns What You Say in Cyberspace? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:19-22 [Journal]
  2. Ann K. Danowitz, Y. Nassef, Seymour E. Goodman
    Cyberspace Across the Sahara: Computing in North Africa. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:23-28 [Journal]
  3. Peter J. Denning
    Plagiarism in the Web. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:29- [Journal]
  4. Sue A. Conger, Karen D. Loch
    Ethics and Computer Use - Introduction to the Special Section. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:30-32 [Journal]
  5. Kenneth C. Laudon
    Ethical Concepts and Information Technology. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:33-39 [Journal]
  6. Suzanne P. Weisband, Bruce A. Reinig
    Managing User Perceptions of Email Privacy. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:40-47 [Journal]
  7. Janice C. Sipior, Burke T. Ward
    The Ethical and Legal Quandary of Email Privacy. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:48-54 [Journal]
  8. Richard O. Mason
    Applying Ethics to Information Technology Issues. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:55-57 [Journal]
  9. Deborah G. Johnson, John M. Mulvey
    Accountability and Computer Decision Systems. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:58-64 [Journal]
  10. Sandra J. Milberg, Sandra J. Burke, H. Jeff Smith, Ernest A. Kallman
    Values, Personal Information Privacy, and Regulatory Approaches. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:65-74 [Journal]
  11. Chuck Huff, C. Dianne Martin
    Computing Consequences: A Framework for Teaching Ethical Computing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:75-84 [Journal]
  12. Peter G. Neumann
    Reviewing the Risks Archives. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1995, v:38, n:12, pp:138- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002