Dan Lynch, Bert Herzog
Pages 11-12
Discussion of the merits and shortcomings of affirmative action (AA) has raged at all levels and in many forums and has been the concern of many policymakers, including President Clinton. Notably absent from the discussion is …
Lisa M. Zurk, Barbara Simons, Rebecca Parsons, Dawn Cohen
Pages 17-18
John Perry Barlow
Pages 19-22
Spanning 7.2 million square kilometers from the Atlantic Ocean to the Red Sea, and encompassing the Great Saharan Desert and Nile River Valley, North Africa embraces Mauritania, Western Sahara, Morocco, Algeria, Tunisia, Libya …
A. K. Danowitz, Y. Nassef, S. E. Goodman
Pages 23-28
Peter J. Denning
Page 29
Over the past 50 years, computers have undergone transformation from monolithic number crunchers, to centralized repositories of management information systems, to distributed, networked, cyberspace support systems. During the …
Sue Conger, Karen D. Loch
Pages 30-32
The fundamental aspects of classical and contemporary ethics, particularly as they apply to the use of IT, offer valuable lessons of professional conduct.
Kenneth C. Laudon
Pages 33-39
Email users, expecting privacy, risk embarassment, lawsuits, and worse.
Suzanne P. Weisband, Bruce A. Reinig
Pages 40-47
What should conscientious employees and their ethical employers expect? It's hard to say.
Janice C. Sipior, Burke T. Ward
Pages 48-54
The articles in this special section express a common theme; the use of information technology in society is creating a rather unique set of ethical issues that requires the making of new moral choices on the part of society
…
Richard O. Mason
Pages 55-57
Are designers responsible for all of the uses of the systems they create?
Deborah G. Johnson, John M. Mulvey
Pages 58-64
The relationships among nationality, cultural values, personal information privacy concerns, and information privacy regulation are examined in this article.
Sandra J. Milberg, Sandra J. Burke, H. Jeff Smith, Ernest A. Kallman
Pages 65-74
How to prepare tomorrow's professionals for questions that can't always be answered with faster, better, or more technology.
Chuck Huff, C. Dianne Martin
Pages 75-84
Subject Index
Pages 85-90
Author Index
Pages 91-99
Ok, you expect your shrink-wrapped software to work properly, without annoying reliability bugs and security holes. Or maybe you would like the systems
you develop to work properly, without serious risks to their users. But those …
Peter G. Neumann
Page 138