Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Guidelines for using case scenarios to teach computer ethics

Published: 01 September 1998 Publication History
First page of PDF

References

[1]
Anderson, R.; Johnson, D.; Gotterbarn, D. and Perolle, J. 1993. Using the New ACM Code of Ethics in Decision Making. Communications of the ACM. Vol. 36, No. 2, 98-108.
[2]
Benbasat, I. and Taylor, R. 1982. "Behavioral Aspects of Information Processing for the Design of Management Information Systems". Transactions on Systems, Man and Cybernetics, Vol. SMC-12, n. 4, July-August, pp. 439-450.
[3]
Benbunan-Fich, R. 1997. Effects of Computer-Mediated Communication Systems on Learning, Performance and Satisfaction: A Comparison of Groups and Individuals Solving Ethical Scenarios. Doctoral Dissertation. Rutgers University, Newark, NJ.
[4]
Chaney, L. and Simon, J. 1994. "Strategies for Teaching Computer Ethics". The Journal of Computers and Information Systems. Vol. 35, N. 1, pp. 19-22.
[5]
Christensen, C. and Hansen, A. 1981. Teaching and the Case Method. Boston: Harvard Business School Publishing Division.
[6]
Dufner, D.; Hilhz, R. and Turoff, M. 1994. Distributed Group Support: A preliminary Analysis of the effects of the use of voting tools and sequential procedures. Proceedings of the Hawaii International Conference on Systems Sciences.
[7]
Harasim, L. Ed. 1990. On-Line Education: Perspectives on a new medium, New York: Praeger/Greenwood.
[8]
Hashim, S., Rathnam, S. and Whiston, A. 1991. "CATT: An Argumentation Based Groupware System for Enhancing Case Discussion in Business Schools". Proceedings of the International Conference on Information Systems (ICIS), pp. 371-385.
[9]
Hiltz, S.R. 1994. The Virtual Classroom: Learning without limits via computer networks. Norwood, New Jersey: Ablex Publishing Corporation.
[10]
Johnson, D. 1994. Computer Ethics. Second Edition. New Jersey: Prentice Hall.
[11]
Kallman, E.A. and Grillo, J.P. 1993. Ethical Decision Making and Information Technology: An Introduction with Cases. New York: McGraw-Hill.
[12]
Kling, R. 1996. "Beyond Outlaws, Hackers and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals". ACM SIGCAS Bulletin. Vol. 26, No. 2, pp. 5-15.
[13]
Laudon, K. 1995. 1995. "Ethical Concepts and Information Technology". Communications of the ACM. Vol. 38, N. 12, December, pp. 33-39.
[14]
Mai-Dalton, R. 1987. "The Experience of One Faculty Member in a Business Ethics Seminar: What Can We Take Back to the Classroom?". Journal of Business Ethics, Vol. 6, pp. 509-511.
[15]
Moor, J. H. 1985. "What is Computer Ethics?". Metaphilosophy, Vol. 16, No. 4, October, pp. 266-275.
[16]
Nichols, M. and Day, V. 1982. "A Comparison of Moral Reasoning of Groups and Individuals on the Defining Issues Test". Academy of Management Journal, Vol. 25, N. 1, pp. 201-208.
[17]
Nunamaker, J.; Dennis, A.; Valacich, J.; Vogel, D. and George, J. 1991. "Electronic Meeting Systems to Support Group Work". Communications of the ACM, Vol. 34, N. 7, pp. 41-61.
[18]
Parker, D., Swope, S. and Baker, B. 1990. "Ethical Conflicts in Information and Computer Science", Technology and Business. Wellesley, MA: QED Information Sciences, Inc.
[19]
Peek, L.E.; Peek, G.S. and Horras, M. 1994. "Enhancing Arthur Andersen Business Ethics Vignettes: Group Discussions using Cooperative/Collaborative Learning Techniques". Journal of Business Ethics. Vol. 13, pp. 189-196.
[20]
Rice, R. 1984. The new media: Communication, Research and Technology. Beverly Hills: Sage.
[21]
Salomon, G. and Globerson, T. 1989. "When Teams do not Function the Way the ought to". Journal of Educational Research, Vol. 13, N. 1, pp. 89-100.
[22]
Shepperd, J.A. 1993. "Productivity Loss in Performance Groups: A Motivation Analysis". Psychological Bulletin. Vol. 113, N. 1, pp. 67-81.
[23]
Weiss, E. 1990. "Self-Assessment Procedures XXII". Communications of the ACM. Vol. 33, No. 11, November, p. 119.

Cited By

View all
  • (2013)Computer and Information Security Ethics -- ModelsProceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies10.1109/ACSAT.2013.36(145-149)Online publication date: 23-Dec-2013
  • (2011)A Framework for Professional Ethics Courses in Teacher EducationJournal of Teacher Education10.1177/002248711039800262:3(273-285)Online publication date: 21-Apr-2011
  • (2009)Is music downloading the new prohibition? What students reveal through an ethical dilemmaEthics and Information Technology10.1007/s10676-008-9179-111:1(49-56)Online publication date: 1-Mar-2009
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCAS Computers and Society
ACM SIGCAS Computers and Society  Volume 28, Issue 3
Sept. 1, 1998
47 pages
ISSN:0095-2737
DOI:10.1145/298972
  • Editor:
  • Tom Jewett
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 1998
Published in SIGCAS Volume 28, Issue 3

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)115
  • Downloads (Last 6 weeks)12
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Computer and Information Security Ethics -- ModelsProceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies10.1109/ACSAT.2013.36(145-149)Online publication date: 23-Dec-2013
  • (2011)A Framework for Professional Ethics Courses in Teacher EducationJournal of Teacher Education10.1177/002248711039800262:3(273-285)Online publication date: 21-Apr-2011
  • (2009)Is music downloading the new prohibition? What students reveal through an ethical dilemmaEthics and Information Technology10.1007/s10676-008-9179-111:1(49-56)Online publication date: 1-Mar-2009
  • (2008)Mock trials and role-playing in computer ethics coursesACM SIGCSE Bulletin10.1145/1352322.135218740:1(148-152)Online publication date: 12-Mar-2008
  • (2008)Mock trials and role-playing in computer ethics coursesProceedings of the 39th SIGCSE technical symposium on Computer science education10.1145/1352135.1352187(148-152)Online publication date: 12-Mar-2008
  • (2007)Students respond to IT ethicsProceedings of the 8th ACM SIGITE conference on Information technology education10.1145/1324302.1324349(219-224)Online publication date: 18-Oct-2007
  • (2006)Facing the challenges of teaching IT ethicsProceedings of the 7th conference on Information technology education10.1145/1168812.1168837(95-98)Online publication date: 19-Oct-2006
  • (2006)Educational Applications of CMCS: Solving Case Studies through Asynchronous Learning NetworksJournal of Computer-Mediated Communication10.1111/j.1083-6101.1999.tb00098.x4:3(0-0)Online publication date: 23-Jun-2006
  • (2005)Raising student awareness of computing concerns and ethical practicesJournal of Computing Sciences in Colleges10.5555/1089053.108906721:2(95-103)Online publication date: 1-Dec-2005
  • (2005)Teaching ethics in a virtual classroomACM SIGCSE Bulletin10.1145/1151954.106750937:3(232-236)Online publication date: 27-Jun-2005
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media