December 1995 - Vol. 38 No. 12
Features
When an advantage is not an advantage
Discussion of the merits and shortcomings of affirmative action (AA) has raged at all levels and in many forums and has been the concern of many policymakers, including…
Cyberspace across the Sahara: computing in North Africa
Spanning 7.2 million square kilometers from the Atlantic Ocean to the Red Sea, and encompassing the Great Saharan Desert and Nile River Valley, North Africa embraces…
Over the past 50 years, computers have undergone transformation from monolithic number crunchers, to centralized repositories of management information systems, to…
Ethical concepts and information technology
The fundamental aspects of classical and contemporary ethics, particularly as they apply to the use of IT, offer valuable lessons of professional conduct.
Managing user perceptions of email privacy
Email users, expecting privacy, risk embarassment, lawsuits, and worse.
The ethical and legal quandary of email privacy
What should conscientious employees and their ethical employers expect? It's hard to say.
Applying ethics to information technology issues
The articles in this special section express a common theme; the use of information technology in society is creating a rather unique set of ethical issues that requires…
Accountability and computer decision systems
Are designers responsible for all of the uses of the systems they create?
Values, personal information privacy, and regulatory approaches
The relationships among nationality, cultural values, personal information privacy concerns, and information privacy regulation are examined in this article.
Computing consequences: a framework for teaching ethical computing
How to prepare tomorrow's professionals for questions that can't always be answered with faster, better, or more technology.
Ok, you expect your shrink-wrapped software to work properly, without annoying reliability bugs and security holes. Or maybe you would like the systems you develop to…