skip to main content
10.1145/199544.199609acmconferencesArticle/Chapter ViewAbstractPublication PagesecaConference Proceedingsconference-collections
Article
Free Access

Combating computer crimes: a long term strategy

Authors Info & Claims
Published:15 November 1994Publication History
First page image

References

  1. Blancard, K. & Pearle N.V., (1988). The Power of Ethical Management. New York: Fawcett Crest.Google ScholarGoogle Scholar
  2. Montz L (1991). U.S. General Accounting Office Report Highlights the NeeA for Improved Internet Management. InGoogle ScholarGoogle Scholar
  3. Denning. (Ed.) Computers Under Attack: Intruders, Worms, an..#d Viruses. New York: ACM Press, pp 456-471. Google ScholarGoogle Scholar
  4. Carlitz, R, (1991). Common Knowledge: Networks for kindergarten through College, Educom Review, 26, No. 2, Summer 1991, pp 25-28.Google ScholarGoogle Scholar
  5. Gries, David & Marsh, Dorothy (1990). The 1989-90 Taulbee Survey. Computing Research News, October, 1990, p 6.Google ScholarGoogle Scholar
  6. Holmstrom, David. Ethics in US: 'Character Education' may become NeeA of 90's. The Christian Science Monitor, Jan. 14, 1993, p. 1.Google ScholarGoogle Scholar
  7. Harrington, Susan & McCollum, Rebecca (1990). Lessons from Corporate America applied to training in Computer ethics. Computer & Society, 20, pp 169-173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Hollinger, R (1991, June). Hackers: Computer Heros or Electronic Highwaymen? Computers & Societz vol. 21, no. 1, pp 6-17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kizza, Joseph M, (1991). "Ethics in the Computer and Information professions", PrOngs, 9th Annual Conference of the Association of Management, Information Technology, pp 72-75.Google ScholarGoogle Scholar
  10. Kizza, Joseph M, (1992). "Towards A Virus And Worm Free Computing Environment", Proceedings, 9th Annual Conference of the Association of Management, Information Technology, pp 11-14. Also to appear in journal of Information Ethics, vol. 2, Spring 1993.Google ScholarGoogle Scholar
  11. Maarten, Van Sway, (1990). Can Rules and Fences be the solution, Proceedings, 6'# Annual Computer Security Applications Conference. p 165.Google ScholarGoogle Scholar
  12. Moody, Paul.(1983). Decision Makinz: Proven Methods for Better Decisions, New York, McGrow-Hill.Google ScholarGoogle Scholar
  13. Robert, M. (1991). Positioning the national Research and Education Network. Educon Review vol. 26, No. 2, Summer 1991, pp 16-17.Google ScholarGoogle Scholar
  14. Robitt, J (1991). Ethics in Invisible Communities: Looking at Network Security in our Changing Society, Computin# Research News, January, 1991, pp 16-17. Member news (1991). Educom Review, vol. 26, No. 2 Summer 1991, p 44.Google ScholarGoogle Scholar
  15. Christian Science Monitor, August 13, 1991, p 8.Google ScholarGoogle Scholar
  16. Christian Science Monitorr, August 15, 1991, p 8.Google ScholarGoogle Scholar
  17. The Teachin# of Ethics in Hizh Education: Institute of Society, Ethics and the Life Sciences., 1980.Google ScholarGoogle Scholar

Index Terms

  1. Combating computer crimes: a long term strategy

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ECA '94: Proceedings of the conference on Ethics in the computer age
          November 1994
          210 pages
          ISBN:0897916441
          DOI:10.1145/199544

          Copyright © 1994 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 November 1994

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article
        • Article Metrics

          • Downloads (Last 12 months)13
          • Downloads (Last 6 weeks)3

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader