(1)
Quinn, M. J. Chapter 2: Introduction to Ethics. In Ethics for the information age; Pearson/Addison-Wesley: Boston, 2006; pp 77–128.
(2)
Martin, C. A Brief Introduction to Morality. In Ethics in information technology; Thomson Course Technology: Australia, 2007; Vol. Excellence in information systems, pp 293–308.
(3)
Johnson, D. G.; Miller, K. W. Computer Ethics : Analyzing Information Technology. Pages 167-177. In Computer Ethics: analyzing Information Technology; Pearson Education, 2009; pp 167–177.
(4)
Professions Australia - Ethics Resoure Centre. http://www.professions.com.au/ethicsresource.html.
(5)
Ethics Resource Centre. http://www.professions.com.au/Homepage.html.
(6)
The Office of the Privacy Commissioner: Information Technology and Internet Issues. https://www.oaic.gov.au/privacy/your-privacy-rights/social-media-and-technology/.
(7)
Vanderbilt University Center for Ethics: case studies. http://www.vanderbilt.edu/CenterforEthics/cases.html#computer.
(8)
Business Roundtable Institute for Corporate Ethics. http://www.corporate-ethics.org/.
(9)
CAPPE. Centre For Applied Philosophy and Public Ethics. http://arts-ed.csu.edu.au/schools/humss/research#horizontalTab6.
(10)
Reynolds, G. W. Ethics in Information Technology, 4th ed.; Course Technology, Cengage Learning: Boston, MA, 2012.
(11)
Board, ACS Professional Standards. ACS Code of Professional Conduct, 2012. https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf.
(12)
Anderson, P.; Queensland. Exposing Corruption: A CJC Guide to Whistleblowing in Queensland; Criminal Justice Commission: [Brisbane], 1996.
(13)
Murphy, S.; Australia. Parliament. Senate. Select Committee on Unresolved Whistleblower Cases. The Public Interest Revisited / Report of the Senate Select Committee on Unresolved Whistleblower Cases; The Parliament of the Commonwealth of Australia: [Canberra], 1995; Vol. no. 344 of 1995.
(14)
Pourciau, L. J. Ethics and Electronic Information in the Twenty-First Century; Purdue University Press: West Lafayette, Ind, 1999.
(15)
Spier, R. Science and Technology Ethics; Routledge: New York, 2001; Vol. Professional ethics.
(16)
Electronic Frontiers Australia Inc. (EFA). http://www.efa.org.au/.
(17)
Martin, B. Whistleblowing and Nonviolence. Peace & Change 1999, 24 (1), 15–28. https://doi.org/10.1111/0149-0508.00107.
(18)
Computer Professionals for Social Responsibility Mission. http://cpsr.org/about/mission/.
(19)
Electrical and Electronics Engineers, Inc. (IEEE). http://www.ieee.org/web/aboutus/home/index.html.
(20)
ACM Code of Ethics and Professional Conduct. http://www.acm.org/about/code-of-ethics.
(21)
Browse Inside Australian Story: Behind the Scenes by Deborah Fleming. http://browseinside.harpercollins.com.au/index.aspx?isbn13=9780733314421.
(22)
Hodgkinson, A.; Farthing, S. Blowing the Whistle: Protection for Whistleblowers in Australia, 2014. https://www.kordamentha.com/getmedia/57522ffd-7648-49f9-a812-2e612dc30a11/issue-14-05-protection-for-whistleblowers-in-australia.pdf.aspx?ext=.pdf.
(23)
ACS Code of Ethics. https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Ethics.pdf.
(24)
The Online Ethics Center for Engineering and Science. https://onlineethics.org/.
(25)
Association for the Advancement of Artificial Intelligence. http://www.aaai.org/Library/Reports/reports-library.php.
(26)
AI Topics Ethics & Social Issues. https://aitopics.org/class/Technology/IT/AI/Issues.
(27)
Reynolds, G. W. Chapte 8: The Impact of Information Technology on Productivity and Quality of Life. In Ethics in information technology; Cengage Learning: Boston, MA, 2015; pp 297–328.
(28)
McDermid, D. Chapter 5: Cyberspace. In Ethics in ICT: an Australian perspective; Pearson Education Australia: Frenchs Forest, N.S.W., 2008; pp 125–162.
(29)
Tavani, H. T. Chapter 12: Ethical Aspects of Emerging and Converging Technologies. In Ethics and technology: controversies, questions, and strategies for ethical computing; John Wiley & Sons: Hoboken, N.J., 2011; pp 361–390.
(30)
King, J. Technology for the Greater Good. Information Age 2012.
(31)
Tonkens, R. Out of Character: On the Creation of Virtuous Machines. Ethics and Information Technology 2012, 14 (2), 137–149. https://doi.org/10.1007/s10676-012-9290-1.
(32)
Wakefield, J. World wakes up to digital divide. http://news.bbc.co.uk/2/hi/technology/8568681.stm.
(33)
Zuckerberg, M. Is Connectivity A Human Right? https://prandtheweb.files.wordpress.com/2013/08/connectivity-a-human-right.pdf.
(34)
Kassam, AlnaazIding, MarieHogenbirk, Pieter. Unraveling the Digital Divide: Time Well Spent or ‘Wasted’? Education and Information Technologies 2013, 18 (2), 215–221.
(35)
News International phone hacking scandal. http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal.
(36)
WikiLeaks. http://en.wikipedia.org/wiki/WikiLeaks.
(37)
Only 6 percent mobile users in India are over 50 years of age: Telenor | Latest Tech News, Video & Photo Reviews at BGR India. http://www.bgr.in/news/only-6-percent-mobile-users-in-india-are-over-50-years-of-age-telenor/.
(38)
Reynolds, G W. Ethics in Information Technology, 5th edn; Course Technology, Cengage Learning, 2015.
(39)
Mohan, T. Communicating as Professionals, 2nd ed.; Cengage Learning: South Melbourne, Vic, 2008.
(40)
McDermid, D. Chapter 5: Cyberspace. In Ethics in ICT: an Australian perspective; Pearson Education Australia: Frenchs Forest, N.S.W., 2008; pp 125–162.
(41)
Elder, B. Communication Skills; MacMillan Education Australia, 1994.
(42)
Harris, T. A. I’m Ok - You’re OK; Pan: London, 1973.
(43)
Mohan, T; McGregor, H; Saunders, S; Archee, R. Communicating as Professionals; Thomson Learning Australia, 2004.
(44)
Pease, A. Body Language: How to Read Others’ Thoughts by Their Gestures, 1981. https://archive.org/details/BodyLanguageHowToReadOthersThoughtsByTheirGestures_201403.
(45)
Unavoidable Ethical Questions About Social Networking, 2010. http://www.scu.edu/ethics/publications/submitted/social-networking.html.
(46)
Consulting, Project Management. Project Management Issues and Considerations, 2002. http://www.maxwideman.com/issacons4/iac1435/sld001.htm.
(47)
How To Read Good Body Language. http://www.professional-cv-services.co.uk/intv/positive_body_language_at_job_interview.html.
(48)
RSA Animate -- The Secret Powers of Time, 23 AD. https://www.youtube.com/watch?v=A3oIiH7BLmg.
(49)
Netflix has a problem with unmetered streaming | Analysis | Information Age | Australian Computer Society. https://ia.acs.org.au/news/netflix-has-a-problem-with-unmetered-streaming-402827?eid=70&edate=20150420&utm_source=20150420&utm_medium=newsletter&utm_campaign=newsletter.
(50)
Hughes, S. Professional Presentations: A Practical Guide to the Preparation and Performance of Successful Business Presentations; McGraw-Hill, 1990.
(51)
Leech, T.; Leech, T. How to Prepare, Stage, and Deliver Winning Presentations, 3rd ed.; American Management Association: New York, 2004.
(52)
Matejka, K.; Ramos, D. P. Hook ’em: Speaking & Writing to Catch & Keep a Business Audience; AMACOM: New York, 1996.
(53)
Mohan, T. Communicating as Professionals, 2nd ed.; Cengage Learning: South Melbourne, Vic, 2008.
(54)
Hargie, O.; Dickson, D.; Tourish, D. That Silver-Tongued Devil...: Making Presentations Matter. In Communication skills for effective management; Palgrave Macmillan: New York, 2004; pp 147–174.
(55)
Toastmasters. http://www.toastmasters.org/about.
(56)
Barrett, E.; Paradis, J.; Perelman, L. C. The Mayfield Handbook of Technical Scientific Writing. http://www.mhhe.com/mayfieldpub/tsw/toc.htm.
(57)
Rubens, P. Science and Technical Writing: A Manual of Style, 2nd ed.; Routledge: New York, 2001.
(58)
Mohan, T. Communicating as Professionals, 2nd ed.; Cengage Learning: South Melbourne, Vic, 2008.
(59)
Rubens, P. Science and Technical Writing: A Manual of Style, 2nd ed.; Routledge: New York, 2001.
(60)
Beer, D. F.; McMurrey, D. A. A Guide to Writing as an Engineer, 2nd ed.; Wiley: New York, 2005.
(61)
Budinski, K. G. Engineers’ Guide to Technical Writing; ASM International: Materials Park, OH, 2001.
(62)
Truss, L. Eats, Shoots & Leaves: The Zero Tolerance Approach to Punctuation, Paperback ed.; Profile: London, 2005.
(63)
Cook, V. Accomodating Brocolli in the Cemetary: Or Why Can’t Anybody Spell?; Profile Books, 2004.
(64)
Huff, C.; Martin, C. D. Computing Consequences: A Framework for Teaching Ethical Computing. Communications of the ACM 1995, 38 (12), 75–84.
(65)
Social Impact Assessment Guideline. https://www.statedevelopment.qld.gov.au/resources/cg/social-impact-assessment-guideline.pdf.
(66)
Reynolds, G W. Ethics in Information Technology, 5th edn; Course Technology, Cengage Learning, 2015.
(67)
Commissioner, Office of the Privacy. Private i - Your Ultimate Privacy Survival Guide; Office of the Privacy Commissioner, 2009. http://www.privacy.gov.au/materials/topics/internet.
(68)
Seddon, N; Ellinghaus., M. Cheshire & Fifoot’s Law of Contract, 7th edn; Butterworths, 1997.
(69)
Buckley, R. A. Illegality and Public Policy; Sweet & Maxwell: London, 2002; Vol. The contract law library.
(70)
Perelman, M. Steal This Idea: Intellectual Property Rights and the Corporate Confiscation of Creativity, 1st ed.; Palgrave: New York, 2002.
(71)
Tavani, H. T. Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1999, 1 (2), 137–145. https://doi.org/10.1023/A:1010063528863.
(72)
Australia, State of Western. The Sale of Goods Act 1895: An Act for Codifying the Law Relating to the Sale of Goods, 1895, (59 Vict. No. 41). https://www.slp.wa.gov.au/legislation/statutes.nsf/law_a726.html.
(73)
Government, Australian. Trade Practices Act 1975, 1975, No. 63 of 1975. http://www.comlaw.gov.au/Details/C2004A00285.
(74)
What is Privacy? http://news.rutgers.edu/research-news/what-privacy/20150305#.VS4YlBZh8n0.
(75)
BIG DATA: SEIZING OPPORTUNITIES, PRESERVING VALUES. https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf.
(76)
Private i - Your Ultimate Privacy Survival Guide. https://www.oaic.gov.au/images/documents/privacy/privacy-topics/youth/private-i_reduced.pdf.
(77)
What is ‘metadata’ and should you worry if yours is stored by law? http://www.smh.com.au/digital-life/digital-life-news/what-is-metadata-and-should-you-worry-if-yours-is-stored-by-law-20140806-100zae.html.
(78)
Metadata retention: What is it and how might it impact whistleblowers in media and politics? - ABC News (Australian Broadcasting Corporation). http://www.abc.net.au/news/2015-03-17/metadata-data-retention-what-is-it/6324962.
(79)
CISPA: The Awful Anti-Privacy Law That Won’t Prevent Another Sony Hack. http://gizmodo.com/cispa-the-awful-anti-privacy-law-that-wont-prevent-ano-1678561060.
(80)
Andrejevic, M. Big Data, Big Questions| The Big Data Divide |. International Journal of Communication 2014, 8, 1673–1689.
(81)
Communications Surveillance: Privacy and Security at Risk. https://cacm.acm.org/magazines/2009/11/48445-communications-surveillance-privacy-and-security-at-risk/fulltext.
(82)
Reynolds, G W. Ethics in Information Technology, 5th edn; Course Technology, Cengage Learning, 2015.
(83)
Forum, Information Security. The Standard of Good Practice for Information Security; Information Security Forum, 2007.
(84)
AusCert. http://www.auscert.org.au.
(85)
Neumann, Peter. Risks. http://www.csl.sri.com/users/neumann/#3.
(86)
Information Security Forum: Research Reports (for non-Members). https://www.securityforum.org/research/.
(87)
2015 Cybercrime Trends: Things are Going to Get Interesting. https://www.slideshare.net/galbaatar1/ss-62879383?next_slideshow=1.
(88)
2015 Cybercrime Trends: Things are Going to Get Interesting. http://securityintelligence.com/events/2015-cybercrime-trends-things-going-get-interesting/#.VTcHfBZh8n1.
(89)
Cybercrime predictions for 2015. http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/.
(90)
TRENDS FOR 2015: TARGETING THE CORPORATE WORLD. http://www.welivesecurity.com/wp-content/uploads/2015/02/trends-2015-targeting-corporate-world.pdf.
(91)
Chatterjee, S.; Sarker, S.; Valacich, J. S. The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use. Journal of Management Information Systems 2015, 31 (4), 49–87. https://doi.org/10.1080/07421222.2014.1001257.
(92)
Ramnit botnet: Cybercrime ring that used 3.2 million hacked computers to steal bank information disrupted by European police - ABC News (Australian Broadcasting Corporation). http://www.abc.net.au/news/2015-02-26/ramnit-botnet-cybercrime-ring-disrupted-by-police/6263038.
(93)
Ramnit - Symantec and Other Industry Partners Assist Europol in Botnet Take Down, 26 AD. https://www.youtube.com/watch?v=U36S9Bwe3vY.
(94)
Reynolds, G. W. Ethics in Information Technology, 4th ed.; Course Technology, Cengage Learning: Boston, MA, 2012.
(95)
Stallman, R.; Johnson, D. G. Chapter 13 and 14. In Computer ethics and professional responsibility; Blackwell Pub: Malden, MA, 2004; pp 285–314.
(96)
Murphy, D. J. Are Intellectual Property Rights Compatible with Rawlsian Principles of Justice? Ethics and Information Technology 2012, 14 (2), 109–121. https://doi.org/10.1007/s10676-012-9288-8.
(97)
IP Australia. 2001 Corporate Profile; IP Australia: Woden, A.C.T., 2000.
(98)
Sainsbury, M. Annotated Copyright Act; Lawbook Co.: Sydney, 2004.
(99)
Australian Intellectual Property Cases. http://prod.resource.wkasiapacific.com/resource/scion/toc/atlas-csh/(WKAP_TAL_403334288)3EDEC6055B4FE2B3823DB08C:WKAP_TAL_ALECCASE_REFERENCE?cpid=WKAP-TAL-IC&cfu=WKAP&wksso=false.
(100)
Allen, K R. Bringing New Technology to Market; Prentice Hall, 2003.
(101)
Phillips, J. J. Butterworths Intellectual Property Law Handbook, 5th ed.; Butterworths: London, 2001.
(102)
Weckert, J. Computer and Information Ethics; Greenwood Press, 1997.
(103)
Kizza, J M. Ethical and Social Issues in the Information Age; Springer-Verlag, 2003.
(104)
Himanen, P. The Hacker Ethic: And the Spirit of the Information Age; Secker & Warburg: London, 2001.
(105)
Australian Copyright Council - Find an Answer. https://www.copyright.org.au/ACC/Find_an_Answer/ACC/Public_Content/Find_an_Answer.aspx?hkey=b0de2cd4-daa3-47da-95a5-1e7ecdc8dddc.
(106)
Creative Commons Australia. http://creativecommons.org.au/.
(107)
Murphy, D. J. Are Intellectual Property Rights Compatible with Rawlsian Principles of Justice? Ethics and Information Technology 2012, 14 (2), 109–121. https://doi.org/10.1007/s10676-012-9288-8.
(108)
Trademark victory allows Cadbury to retain its purple reign. http://theconversation.com/trademark-victory-allows-cadbury-to-retain-its-purple-reign-9950.
(109)
Russell, J. Nestle wins latest battle with Cadbury over the colour purple. IP Whiteboard. http://ipwhiteboard.com.au/nestle-wins-latest-battle-with-cadbury-over-the-colour-purple-in-the-uk/.
(110)
| IP Australia. http://www.ipaustralia.gov.au/.
(111)
Reynolds, G W. Ethics in Information Technology, 5th edn; Course Technology, Cengage Learning, 2015.
(112)
Bolton, S.; McDermid, D. System Reliability. In Ethics in ICT: an Australian perspective; Pearson Education Australia: Frenchs Forest, N.S.W., 2008; pp 179–198.
(113)
Flood, R L. A Brief Review of Peter B. Checkland’s Contribution to Systemic Thinking. Systemic Practice and Action Research 2000, 13 (6), 723–731.
(114)
Jackson, M. C. Beyond a System of Systems Methodologies. The Journal of the Operational Research Society 1990, 41 (8). https://doi.org/10.2307/2583472.
(115)
Skyttner, L. General Systems Theory: Ideas & Applications; World Scientific, 2001.
(116)
Feiler, P. Improving Safety-Critical Systems with a Reliability Validation and Improvement Framework, 2012. https://insights.sei.cmu.edu/sei_blog/2013/06/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework.html.
(117)
Pan, J. Software Reliability. http://users.ece.cmu.edu/~koopman/des_s99/sw_reliability/.
(118)
Bowen, Jonathan. The Ethics of Safety-Critical Systems. Communications of the ACM 2000, 43 (4), 91–97.
(119)
Software Quality Institute. https://www2.griffith.edu.au/institute-integrated-intelligent-systems/our-research/expertise/software-engineering-software-quality.
(120)
Schonbeck, Martin. Introduction to the Reliability of Safety Systems, 2007. https://dvikan.no/ntnu-studentserver/reports/martin07.pdf.
(121)
Dekker, S. W. A. The Danger of Losing Situation Awareness. Cognition, Technology & Work 2015, 17 (2), 159–161. https://doi.org/10.1007/s10111-015-0320-8.
(122)
The danger of losing situation awareness. http://download-v2.springer.com/static/pdf/918/art%253A10.1007%252Fs10111-015-0324-4.pdf?token2=exp=1430288771~acl=%2Fstatic%2Fpdf%2F918%2Fart%25253A10.1007%25252Fs10111-015-0324-4.pdf*~hmac=cda4b3d0d4a4333b23b48adf8bbcc9168ddf4be88886efc4c76d17d6de1b8a7a.
(123)
Improving Safety-critical Systems with a Reliability Validation & Improvement Framework » SEI Blog. http://blog.sei.cmu.edu/post.cfm/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework.
(124)
Trevino, L. The Key Role of HR in Organizational Ethics. 2007, 2008.
(125)
Reynolds, G W. Ethics in Information Technology, 5th edn; Course Technology, Cengage Learning, 2015.
(126)
CCH. HR Strategy and Workforce Planning; CCH Australia Ltd, 2005.
(127)
Cooke, E. The Modern Law of Estoppel; Oxford University Press, 2000.
(128)
Rudman, R. HR’s Dilemma: Value or Values? Human Resources Bulletin 2005, 5 December.
(129)
Kramar, R. HR’s Role in Ethics and Corporate Social Responsibility. Human Resources Bulletin 2005, 13 October.
(130)
Halleck, J. Free Software Dilemma. http://www.cc.utah.edu/~nahaj/ethics/freesoftware.html.
(131)
Management, Society for Human Resource. SHRM Code of Ethical and Professional Standards in Human Resource Management, 2008. https://www.shrm.org/about-shrm/pages/bylaws--code-of-ethics.aspx.
(132)
Global Project Management.Org Home Page, 2007. http://globalprojectmanagement.org/.
(133)
Briguglio, C. Linguistic and Cultural Skills for Communication in Global Workplaces of the 21st Century. In Cross-cultural interaction: concepts, methodologies, tools, and applications; Information Science Reference: Hershey, PA, 2014; pp 832–848. https://doi.org/10.4018/978-1-4666-4979-8.ch047.
(134)
Singh, M.; Cui, G. Multiple Dimensions of Media Communication Skills. In New media communication skills for engineers and IT professionals: trans-national and trans-cultural demands; Information Science Reference: Hershey, PA, 2012; pp 160–174. https://doi.org/10.4018/978-1-4666-0243-4.ch010.
(135)
Chua, R. Y. J.; Roth, Y.; Lemoine, J.-F. The Impact of Culture on Creativity. Administrative Science Quarterly 2015, 60 (2), 189–227. https://doi.org/10.1177/0001839214563595.
(136)
Bennett, M. INTERCULTURAL COMPETENCE FOR GLOBAL LEADERSHIP. https://www.idrinstitute.org/resources/intercultural-competence-global-leadership/.