Showing 21 - 40 results of 79 for search '"computer ethics"', query time: 0.45s Refine Results
  1. 21

    An ethical assessment of computer ethics using scenario approach by Masrom, Maslin, Ismail, Zuraini, Hussein, Ramlah, Mohamed, Norshidah

    Published 2010
    “…Ethics refers to a set of rules that define right and wrong behavior, used for moral decision making. In this case, computer ethics is one of the major issues in information technology (IT) and information system (IS). …”
    Get full text
    Article
  2. 22

    Comprehensive analysis on the influences of computer ethics on information security by Abdul Rahim, Fiza

    Published 2009
    “…Therefore, the purposes of this project are to identify which component of computer ethics influence information security, to develop framework of computer ethics and information security and to determine the relationship between computer ethics and information security. …”
    Get full text
    Thesis
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27

    Violation of cyberlaws and computer ethics: the consequences and potential legal actions by Abdul Jalil, Juriah, Mohamed, Duryana

    Published 2010
    “…Failure to do so will result in violation of the laws and computer ethics. Consequently, not only the victim will suffer loss but also the country as a whole. …”
    Get full text
    Get full text
    Proceeding Paper
  8. 28

    Development of computer ethical framework for information security (educational context) by Namayander, Meysam

    Published 2009
    “…Using survey research, insight is provided regarding the extent to which and how university student have dealt with issues of computer ethics and results of designed information security and computer ethics framework on their future career and behavioral experience are addressed.…”
    Get full text
    Thesis
  9. 29
  10. 30
  11. 31

    A framework for development of information security with computer ethics : educational perspective by Namayandeh, Meysam, Masrom, Maslin, Ismail, Zuraini

    Published 2008
    “…However, lack of proper computer ethics within information security is affecting educational society day by day…”
    Book Section
  12. 32

    Evaluation of computer ethics: confirmatory factor models using PROC CALIS by Masrom, Maslin, Ismail, Zuraini

    Published 2008
    “…The ECA construct developed from the study could be useful to research a wide range of computer ethics in the future.…”
    Get full text
    Conference or Workshop Item
  13. 33
  14. 34

    Computer ethics awareness among undergraduate students in Malaysian higher education institutions by Masrom, Maslin, Ismail, Zuraini, Hussein, Ramlah

    Published 2008
    “…This suggests that computer ethics awareness training is needed for university users. …”
    Get full text
    Monograph
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39

    Enhancing information security awareness and computer ethics for non-information technology company using integrated model by Zainudin, Mohd. Eyzuan

    Published 2010
    “…Information Security Awareness and Computer Ethic were two important elements in securing company asset in terms information security. …”
    Thesis
  20. 40