一、中文部份
石世豪,大西洋兩岸資訊冷戰的啟示,中國時報,1998年11月17日。
宋鎧等,管理資訊系統,國立空中大學,1993年8月。
林子銘,台灣被撕裂的隱私權,中國時報,1998年11月4日。
高思謙,中外倫理哲學比較研究,台北:中央文物供應社,1983年12月。
周科鈞,電腦軟體個人盜版行為之結構性分析,國立台灣大學國際企業研究所未出版碩士論文,1996年6月。唐日新,范錚強、郭鴻志,軟體盜版的因素探討,國立中央大學資訊管理學系未出版碩士論文,1996年6月。許孟祥,林東清,以意向模式研究資訊人員之專業倫理行為,國立中山大學資訊管理學系未出版博士論文,1998年6月。許孟祥,林東清,IT使用之倫理決策分析,資訊管理研究,第二卷,第一期,1997年7月,77-105。
黃俊英,多變量分析,台北:華泰文化事業公司,1998年1月。
張紹勳,林秀娟,SPSS for Windows統計分析,台北:松崗,1998年10月。
章倩萍,侵犯通信秘密者將處徒刑或科罰金,聯合報,1998年12月20日。
楊國樞等,社會及行為科學研究法,台北:東華,1997年5月。
二、英文部份
ABA. "Report on Computer Crime," pamphlet prepared by the Task Force on Computer Crime, American Bar Association, Section on Criminal Justice, 1800 M Street, Washington, D. C., 20036, 1984.
Anderson, R. E., Johnson, D. G., Gotterbarn, D., and Perrolle, J., "Using the New ACM Code of Ethics in Decision Making," Communication of the ACM, Vol. 36, No. 2, 1993, 98-107.
Aiken, R. M., "Reflections on Teaching Computer Ethics," paper presented at the Fourteenth SIGCSE Technical Symposium on Computer Science Education, 1988, 8-11.
Ajzen, I., "From Intentions to Actions," In Ajzen I., Attitudes, Personaliity, and Behavior, The Dorsey Press, 1988.
Baker, S., "Europe''s Privacy Cops," Business Week, November 2, 1998, 21-22.
Baki, H., and Harwick, J., "Rethinking the Concept of User Involvement," MIS Quarterly, March , 1989, 53-63.
Banerjee, D., Cronan, T. P., and Jones, T. W., "Modeling IT Ethics: A Study in Situational Ethics," MIS Quarterly, March, 1998, 31-60.
Behar, R., "Who''s Reading Your E-mail?" Fortune, February 3, 1997, 57-70.
Bentler, P. M., and Speckart, G., "Models of Attitude-Behavior Relations," Psychological Review, Vol. 86, No. 5, 1979, 452-464.
Bommer, M., Gratto, C., Gravander, J., and Tuttle. M., "A Behavioral Model of Ethical and Unethical Decision Making," Journal of Business Ethics, 6, 1987, 265-280.
Couger, J. D. "Preparing IS Students to Deal with Ethical Issues," MIS Quarterly, June, 1989, 211-218.
Dejoie, R., Flower, G., and Paradice, D. (eds), Ethical Issues in Information System, Boyd & Fraster Publishing Company, Boston, MA 02116, 1991.
Dubinsky, A. J., and Loken, B., "Analyzing Ethical Decision Making in Marketing," Journal of Business Research, 19, 1989, 83-107.
Eining, M. M. and Christensen A. L., "A Psycho-Social Model of Software Piracy: The Development and Test of a Model," In Dejoie, R., Flower, G., and Paradice D., Ethical Issues in Information Systems, 1991, 182-188.
Fishbein, M., "Attitude and Prediction of Behavior," in Fishbein, M., Reading in Attitude Theory and Measurement, New York: John Wiley & Son, 1966, 477-492.
Ford, R. C., and Richardson, W. D., "Ethical Decision Making: A Review of the Empirical Literature," Journal of Business Ethics, 13, 1994, 205-221.
Fredricks, A. J., and Dossett, D. L., "Attitude-Behavior Relations: A Comparison of the Fishebin-Ajzen and Bentler-Speckart Models," Journal of Personality and Social Psychology, Vol, 45, No. 3, 1983, 501-512.
Glover, S. H., Bumpus, M. A., Logan, J. E., and Ciesla, J. R., "Re-examining the Influence of Individual Values on Ethical Decision Making," Journal of Business Ethics, 16, 1997, 1319-1329.
Harrington, S. J., "A Test of a Person -- Issue Contingent Model of Ethical Decision Making in Organizations," Journal of Business Ethics, 16, 1997, 363-375.
Harrington, S. J., "The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions," MIS Quarterly, September, 1996, 257-278.
Heide, D., and Hightower, J. K., "Teaching Ethics in the Information Sciences Curricula," Proceedings of the 1988 Annual Meeting of the Decision Sciences Institute (1), 1988, 198-200.
Herndon, N. C., "A New Context for Ethics Education Objectives in a College of Business: Ethical Decision-Making Models," Journal of Business Ethics, 15, 1996, 501-510.
Hunt, S. D., and Vitell, S. J., "A General Theory of Marketing Ethics," Journal of Macromarketing, 6, Spring, 1986, 5-16.
Hunt, T. G., and Jennings, D. F., "Ethics and Performance: A Simulation Analysis of Team Decision Making," Journal of Business Ethics, 16, 1997, 195-203.
Huff, C., and Martin, C. D., "Computing Consequences: A Framework for Teaching Ethical Computing," Communications of the ACM, Vol. 38, No. 12, 1995, 76-84.
Johnson, D. G., "Philosophical Ethics," In Johnson, D. G., Computer Ethics, Prentice-Hall, 1994.
Jones, T. M., "Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model," Academy of Management Reivew, Vol. 16, No. 2, 1991, 366-395.
Kallman, E. A., and Grillo, J. P., Ethical Decision Making and Information Technology, McGraw-Hill Press, 1996.
Kreie, J., and Gronan, T. P., "How Men and Women View Ethics," Communications of the ACM, Vol. 41, No. 9, 1998, 70-76.
Loch, K. D., and Conger, S., "Evaluating Ethical Decision Making and Computer Use," Communication of the ACM, Vol. 39, No. 7, 1996, 74-83.
Logsdon, J. M., Thompson, J. K., and Reid, R. A., "Software Piracy: Is It Related to Level of Moral Judgement?" Journal of Business Ethics, 13, 849-857.
Mason, R. O., "Applying Ethics to Information Technology Issues," Communications of the ACM, Vol. 38, No.12, 1995, 55-57.
Mason, R. O., "Four Ethical Issues of the Information Age," MIS Quarterly, Vol. 10, No. 1, 1986, 5-12.
Moseley, O. B., and Whitis, R. E., "Preventing software piracy," Management Accounting, Vol. 77, Iss. 6, December, 1995, 42-43.
Oz, Effy, "What is Ethics?" In Oz, Effy, Ethics for the Information Age, Wm. C. Brown Communications, Inc., 1994.
Panettieri, J. C., "Security," Information Week (555), November 27, 1995, 32-40.
Parker, D. B., Ethical Conflicts in Computer Science and Technology. American Federation in Information Processing Societies (AFIPS) Press, Reston, VA, 1980.
Parker, D., Swope, D., and Baker, B. Ethical Conflicts in Information and Computer Science, Technology, and Business, Wellesley, MA: QED Information Sciences, 1990.
Research Institute of American, "Safeguarding Your Business Against Theft and Vandalism," Computer Crime Digest, November 1983, 5.
Saari, J. "Computer Crime - Numbers Lie," Computers and Security (6), June, 1987, 111-117.
Simpon, P. M., Banerjee, D., Simpson, C. L., "Softlifting: A Model of Motivating Factors," Journal of Business Ethics, 13, 1994, 431-438.
Straub, D. W., and Nance, W. D., "Discovering and Disciplining Computer Abuse in Organizations: A Field Study," MIS Quarterly, March, 1990, 45-60.
Thong, J. Y. L., and Yap, C. S., "Testing an Ethical Decision-Making Theory: The Case of Softlifting," Journal of Management Information Systems, Vol. 15, No.1, 1998, 213-237.
Trevino, L. K., "Ethical Decision Making in Organizations: A Person-Situation Interactionist Model," Academy of Management Review, Vol. 11, No. 3, 1986, 601-617.