1.丁惠民,建構企業資訊安全防護網,電子化企業經理人報告,No.40,2002年,頁58-67。2.王世中,公務人員資訊倫理態度之研究-以臺北市府為分析個案,國立政治大學公共行政學系碩士論文,1999年。3.古彩彥、吳昱曄,防洩密、中毒 教育部8月1日起禁用MSN,2007年7月31日;2007年8月23日,取自:http://www.tvbs.com.tw/news/news_list.asp?no=aj100920070731183402。
4.台灣商業軟體聯盟,IDC經濟影響報告,2005年12月;2007年11月4日,取自:http://w3.bsa.org/taiwan//report/upload/2005-IDC-study_TWN.pdf
5.行政院主計處,電腦處理個人資料保護法,1995年8月11日;2007年11月4日,取自:http://www.dgbas.gov.tw/ct.asp?xItem=10116&ctNode=2286。
6.吳永猛、餘坤東、陳松柏,企業倫理,台北:國立空中大學, 2004年。
7.吳成豐,企業倫理的實踐,台北:前程文化事業有限公司,2002年。
8.吳佩諭,優質網路社會與良善資訊倫理之建立,2007年01月18日;2007年08月27日,取自:http://www.ithome.com.tw/itadm/article.php?c=41521。
9.吳健平,大專院校資訊倫理課程教學模式研究,私立輔仁大學資訊管理所碩士論文,2007年。10.李怡慧,網路流言殺傷力強~蘋果電腦6分鐘損失台幣9百億元,2007年5月19日;2007年8月26,取自:http://ettvasia.ettoday.com/2007/05/19/339-2099076.htm。
11.李順仁,資訊安全,台北:文魁資訊股份有限公司,2003年。
12.李鴻生,探討企業採用資訊科技基礎架構庫因素之研究,私立輔仁大學資訊管理所在職專班碩士論文,2006年。13.林火旺,倫理學,五南圖書出版股份有限公司,2004年。
14.林杏子,資訊專業人員隱私保護行為的自我規範機制之研究,國立中山大學資訊管理所博士論文,2003年。15.林杏子等,資訊倫理,台北:華泰文化事業公司,2001年。
16.林宜隆,資訊倫理與資訊教育之新思維、新挑戰,2007年第四屆「資訊科技與人文管理教育論壇」研討會論文集,2007年3月16日。
17.法務部,APEC隱私保護綱領,2006年12;2007年11月4日,取自:http://www.moj.gov.tw/public/Attachment/7199515432.pdf。
18.法務部,法務部及所屬機關資訊安全政策,2006年3月19日;2007年11月4日,取自http://www.moj.gov.tw/public/data/8312174716274.pdf。
19.法務部全國法規資料庫,妨害電腦使用罪,第二編分則第三十六章,2008年1月2日修正;2008年2月23日,取自http://law.moj.gov.tw/Scripts/Query4B.asp?Lcode=C0000001&LCC=2&LCNO=358。
20.洪嘉玟,國中小學校園數位落差指標建立之研究,私立輔仁大學資訊管理所碩士論文,2007年。21.徐敏榮,國民小學教師評鑑規準之研究,國立屏東師範學院國民教育研究所碩士論文,2002年。22.高希均,事業雄心應植基於企業倫理,收錄於李克特、馬家敏原編,企業全面品德管理,台北:天下文化公司,2004年。
23.張旺祥,結合AHP與可拓理論應用於資訊系統委外承包商評選評估準則與權重之建立,私立輔仁大學資訊管理所在職專班碩士論文,2005年。24.張鐸,電腦與資訊倫理,初版,台北:文魁資訊股份有限公司,2004年。
25.張豔華,建構中學教師專業評鑑指標之研究,國立高雄師範大學工業科技教育研究所碩士論文,2002年。
26.莊道明,資訊網路倫理初探,21世紀資訊科學與技術的展望國際學術研討會論文集,1996年,頁193-206。
27.許士軍,新管理典範下的企業倫理,世界經理文摘,第101期,1991年。28.許孟祥、黃貞芬,資訊時代中倫理導向之決策制訂架構,中央研究院「資訊科技與社會轉型」研討會論文集,1996年12月;2007年8月25日,取自:http://www.ios.sinica.edu.tw/pages/seminar/infotec1/ethic.htm。
29.許明恥,臺灣企業倫理衡量指標之探索性研究,國立台灣科技大學,企業管理系碩士班論文,2005年。30.郭俊宏,台灣企業資訊倫理政策現況調查,私立輔仁大學資訊管理所碩士論文,2006年。31.陳文玲,倫理守則在諮商實務中所扮演的角色,測驗與輔導,105,頁2105-2107,1991年。
32.陳雅慧,國民小學交通安全教育課程教材之建構研究,國立新竹師範學院課程與教學研究所碩士論文,1992年。33.游家政,德懷術及其課程研究上的應用,花蓮師院學報,第6卷,第1-24頁,1996年。34.黃貞芬、許孟祥,資訊倫理守則現況:以社會層級及倫理議題分析,中央研究院「資訊科技與社會轉型」研討會論文集,1996月12日;2007年8月25日,取自:http://www.ios.sinica.edu.tw/pages/seminar/infotec1/code.htm。
35.黃博謙,國民小學資訊教育評鑑指標之研究,國立屏東師範學院教育科技研究所碩士論文,2005年。36.楊政學,企業倫理,台北:揚智文化,2006年。
37.楊政學,企業倫理-倫理教育與社會責任,台北縣:全華圖書股份有限公司,2007年4月。
38.經濟部智慧財產局,貫徹保護智慧財產權行動計畫,2008年2月2日;2008年2月23日,取自:http://www.tipo.gov.tw/service/about/about_us/貫徹保護智慧財產權行動計畫(95-97年).pdf。
39.經濟部智慧財產局,智慧財產權面面觀,2004年;2008年2月23日,取自: http://www.tipo.gov.tw/copyright/copyright_book/智慧財產權面面觀.pdf。
40.劉建人、柯菁菁、陳協志,資訊倫理與社會-重建網路社會新秩序,台北:普林斯頓國際有限公司,2004年。
41.鄭進斛,國民小學校務評鑑指標建構之研究,國立中山大學教育研究所教師在職進修教學及學校行政碩士學位班論文,2005年。42.鄧振源、曾國雄,層級分析法(AHP)的內涵特性與應用(下),中國統計學報,第27卷,第7期,1989年,頁1-20。43.鄧振源、曾國雄,層級分析法(AHP)的內涵特性與應用(上),中國統計學報,第27卷,第6期,1989年,頁5-22。44.謝明昆,道德教學法,台北:心理出版社,1994年。
45.嚴振昌,台灣高速鐵路競爭策略之研究,國立交通大學運輸工程與管理系碩士論文,2001年。46.Adamski A., “Crime Related to the Computer Network, Threats and Opportunities: Criminological Perspective, Proceedings of the VI European Colloquium on Crime and Criminal Policy, Matti Justen Eds., Helesinki Finlan, 1998. Retrieved April 01, 2006, from the World Wide Web: http://www.escape.ca/~mkr.
47.AICPA. Report on the Study of EDP-Related Fraud in the Banking and Insurance Industries, pamphlet from the American Instituted of Certified Public Accountants, New York, 1984.
48.Anderson R.E., Johnson D.G., Gotterbarn D. & Perrole Judith., “Using the New ACM code of ethics in Decision Making”, Communications of ACM, 36(2), 1993, pp.98-107.
49.Athey, S., “A Comparison of Expert’s and High Tech Students’ Ethical Beliefs in Computer-related Situations”, Journal of Business Ethics, Vol.12, 1993, pp.359-370.
50.Banerjee, D., Cronan, T. P. and Jones, T. W. “Modeling IT Ethics: A Study inSituational Ethics,” MIS Quarterly, 22(1), 1998, pp. 31-60.
51.Berenbeim, R.E., Corporate Ethics Practices, The Conference Board, New York, 1992, pp.7-10.
52.Bommer, M., Gratto, C., Gravander, J., & Tuttle, M., “A behavioral model of ethical and unethical decision making”, Journal of Business Ethics, 6, 1987, pp.265-280.
53.Bynum, T.W., “Coumputer Ethics: Its Birth and Its Future”, Ethics and Information Technology, 3(2), 2001, pp.109-112.
54.Carroll, A. B., “Linking Business Ethics to Behavior in Organizations”, Advanced Management Journal, 44(1), 1978, pp.4-11.
55.Carroll, A.B., Business and Society: Ethics and Stakeholder Management, 3rd edition, South-Western Publishing Company, Ohio, 1996.
56.Center for Business Ethics, “Instilling Ethical Values in Large Corporations”, Journal of Business Ethics, 11(11), Nov. 1992, pp.863-867.
57.Charlesworth, M., & Sewry, D., Ethical Issues in Enabling Information Technologies, SAICSIT, 2002, pp.163-171.
58.Colton, K.W., Tien, J.M., Tvedt, S., Dunn, B. & Barnett, A.I., Electronic Fund Transfer Systems and Crime, U.S. Department of Justice, Bureau of Justice Statistics, Washington, D.C., 1982.
59.Conger, S. & Loch, K.D., “Evaluating Ethical Decision Making and Computer Use”, Communication of the ACM, 39(7), 1996, pp.74-83.
60.Conger, S., & Loch, K.D., “Ethics and Computer Use”, Communications of the ACM, 38(12), 1995a, pp.31-39.
61.Conger, S., Loch, K.D., & Helft, B.L., “Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use”, Information Systems Journal, 5 1995b, pp.161-184.
62.Dalkey, N., & Helmer, O., “An experimental Application of the Delphi Method to the Use of Experts”, Management Science, 9(3), 1963, pp.458-467.
63.Dejoie, R., Fowler, G., & Paradice, D., Ethical Issues in Information Systems, Boyd & Fraser Publishing Company, Boston, 1991.
64.Delbecq, A.L., Andrew V.d.V., & David G., Group Techniques for Program Planning: A Guide to Nominal Group and Delphi Processes, Scott, Foresman and Company, New Jersey, 1975.
65.Doke, E.R., & Swanson, N.E., “Decision Variables for Selecting Prototyping in Information Systems Development: a Delphi Study of MIS Managers”, Information & Management, 29(4), 1995, pp.173-182.
66.Fimbel, N. & Burstein, J.S., “Defining the Ethical Standards of the High-Technology Industry”, Journal of Business Ethics, 9, 1990, pp.929-948.
67.Frankel, M.S., “Professional Codes: Why, How, and with What Impact? ”, Journal of Business Ethics, 8(2-3), 1989, pp.109-115.
68.Frankena, W.K., Ethics, Prentice Hall, Englewood Cliffs, NJ, 1963.
69.Genfan, H., “Formalizing business ethics”, Traning and Development Journal, Nov. 1987, pp.35-37.
70.Harrington, S.J., “The Effects of Codes of Ethics and Personal Denials of Responsibility on Computer Abuse Judgments and Intentions”, MIS Quarterly, 20(3), 1996, pp.257-278.
71.Harrington, S.J., “Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors”, Information Resources Management Journal, 2(3), 1989, pp.28-37.
72.Heide, D., & Hightower, J.K., “Organizations, Ethics, and the Computing professional”, Journal of Systems Management, 34(11), Nov. 1983, pp.37-42.
73.Hitt, W.D., Ethics and Leadership: Putting Theory into Practices, Battelle Memorial Institute, 1990.
74.Hoffer, J.A., & Straub, D.W., “The 9 to 5 Underground: Are You Policing Computer Crimes? ”, Sloan Management Review, Summer 1989, pp.35-43.
75.Holden, M.C., & Wedman, J.F., “Future Issues of Computer-Mediated Communication: The Results of a Delphi Study”, Educational Technology Research and Development, 41(4), 1993, pp.5-24.
76.Huff, C., & Martin, C.D., “Computing Consequences: a Framework for Teaching Ethical Computing”, Communication of the ACM, 38(12), 1995, pp.75-84.
77.iThome,研討會紀實-企業IM的趨利弊害之道,2006年4月5日;2007年10月10日,取自http://www.ithome.com.tw/itadm/article.php?c=36488。
78.Johnson, D., & Snapper, S., Ethical Issues in the Use of Computers, Belmont, Wadsworth Publishing, CA,1985.
79.Kallman, E.A., & Grillo, J.P., Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw-Hill, New York, 1996.
80.Keith-Spiegel, P., & Koocher, G.P., Ethics in psychology: Professional standards and cases, Random House, New York, 1985.
81.Khazanchi, D., “Unethical Behavior in Information Systems: The Gender Factor”, Journal of Business Ethics, 14, 1995, pp.741-749.
82.Kling, R., “Computer Abuse and Computer Crime as Organizational Activities,” Computer/Law Journal, 2(2), 1980, pp.186-196.
83.Kohlberg, L., The philosophy of moral development, Harper & Row., San Franciso, 1984.
84.Lanford, H.W., Technological Forecasting Methodologies: A Synthesis, American Management Association, Inc., New York, 1972.
85.Laudon, K.C., & Landon, J.P., Management Information Systems: Organization and Technology in the Networked Enterprise, Prentice Hall, 2000.
86.Laudon, K.C., “Ethical concepts and information technology”, Communications of the ACM, Dec. 1995, 38(12), pp.33-39.
87.Manley, W.J., Executive’s Handbook of Model Business Conduct Codes, Prentice-Hall, Englewood Cliffs, NJ, 1991, pp.3-10.
88.Mason, R.O., “Ethics to Information Technology Issues”, Communications of the ACM, 38(12), Dec. 1995, pp.55-57.
89.Mason, R.O., “Four Ethical Issues of The Information Age”, MIS Quarterly, March 1986, pp.4-12.
90.McDonald, G.M., & Zepp, R.A., “What should be done? A Practice Approach to Business Ethics”, Management Decision, 1990, 28, pp.9-14.
91.Murry, J.W., & Hammons, J. O., “Delphi: A Versatile Methodology for Conducting Qualitative Research”, The Review of Higher Education, 18(4), 1995, pp.423-436.
92.O’Boyle, E. J., “An Ethical Decision-Making Process for Computing Professionals”, Ethics and Information Technology, Vol. 4, 2002, pp.267-277.
93.Parker D.B., Ethical Conflicts in Computer Science and Technology, AFIP Press, 1990.
94.Parker, D.B., “Ethical Dilemmas in Computer Technology: Ethics and Management of computer Technology”, Proceedings of the Fourth National Conference on Business Ethics, Waltham, Bentley College, MA, 1981.
95.Parker, D.B., Crime by Computer, Scribner’s, New York, 1976.
96.Parker, D.B., Ethical Conflicts in Computer Science and Technology, American Federation of Information Processing Societies (AFIPS) Press, Reston, VA, 1980.
97.Parker, D.B., Fighting Computer Crime, Scribner’s, New York, 1983.
98.Pierce, M.A, & Henry, J.W., “Computer Ethics: The Role of Personal, Informal, and Formal Codes”, Journal of Business Ethics, 15, 1996, pp.425-437.
99.Research Institute of America, “Safequarding Your Business against Theft and Vandalism”, Computer Crime Digest, Nov. 1983, p.5.
100.Robin, D., Giallourakis, M., David, F.R., & Moritz, T.E., “A Different Look at Codes of Ethics”, Business Horizons, 32(1), 1989, pp.66-73.
101.Saaty, T.L., Decision Making in Economic, Political, Social and Technological Environments: The Analytic Hierarchy Process, RWS Publications, University of Pittsburgh, 1994.
102.Saaty, T.L., The Analytic Hierarchy Process, McGraw-Hill Companies Inc, New York, 1980.
103.Sergiovanni, T.J., Moral Leadership: Getting to the heart of School Improvement, Jossey-Bass Publishers, San Francisco, 1992.
104.Siau, K., Nah, F., & Teng, L., “Acceptable Internet Use Policy”, Communications of the ACM, 45(1), 2002, pp.75-79.
105.Stevens, B., “An Analysis of Corporate Ethical Code Studies: ‘Where Do We Go From Here? ”, Journal of Business Ethics, 13(1), Jan. 1994, pp.63-69.
106.Straub, D.W. & Nance, W.D., “Discovering and Disciplining Computer Abuse in organizations: A Field Study”, MIS Quarterly, March 1990, pp.45-60.
107.Straub, D.W. “Computer Abuse and Computer Security: Update on an Empirical Study, Security, Audit, and Control Review”, ACM Special Interest Group Journal, 4(2), Spring 1986, pp.21-31.
108.Tersine, R.J., & Riggs, W.E., “The Delphi technique: A Long-Range Planning Tool”, Business Horizons, 19(2), 1976, pp.51-56.
109.Trevino, L.K., “Ethical Decision Making in Organizations: A Person-Situation Interactionist Model,” Academy of Management Review, 11(3), 1986, pp.601-617.
110.Trevion, L.K., Brown, M., & Hartman, L.P., “A Qualitative Investigation of Perceived Executive Ethical Leadership: Perceptions From Inside and Outside the Executive Suite”, Human Relations, 56(1), 2003, pp.5-37.
111.Vitell, S.J., Davis, D.L., “Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior ”, Journal of Business Ethics, 9(1), Jan. 1990, pp.63-70.
112.Weaver, K.M. & Ferrel O.C. The Impact of Corporate Policy on Reported Ethical Beliefs and Behavior of Marketing practitioners, In Contemporary Marketing Thought, Barnett Breenberg and Danny N. Bellenger, eds., American marketing, Chicago, 1977.