(1)
Quinn, M. J. Chapter 2: Introduction to Ethics. In Ethics for the information age; Pearson/Addison-Wesley: Boston, 2006; pp 77–128.
(2)
Martin, C. A Brief Introduction to Morality. In Ethics in information technology; Thomson Course Technology: Australia, 2007; Vol. Excellence in information systems, pp 293–308.
(3)
Johnson, D. G.; Miller, K. W. Computer Ethics : Analyzing Information Technology. Pages 167-177. In Computer Ethics: analyzing Information Technology; Pearson Education, 2009; pp 167–177.
(4)
Professions Australia - Ethics Resoure Centre. http://www.professions.com.au/ethicsresource.html.
(5)
Ethics Resource Centre. http://www.professions.com.au/Homepage.html.
(6)
The Office of the Privacy Commissioner: Information Technology and Internet Issues. https://www.oaic.gov.au/privacy/your-privacy-rights/social-media-and-technology/.
(7)
Vanderbilt University Center for Ethics: case studies. http://www.vanderbilt.edu/CenterforEthics/cases.html#computer.
(8)
Business Roundtable Institute for Corporate Ethics. http://www.corporate-ethics.org/.
(9)
CAPPE. Centre For Applied Philosophy and Public Ethics. http://arts-ed.csu.edu.au/schools/humss/research#horizontalTab6.
(10)
Reynolds, G. W. Ethics in Information Technology, 4th ed.; Course Technology, Cengage Learning: Boston, MA, 2012.
(11)
Board, ACS Professional Standards. ACS Code of Professional Conduct, 2012.
(12)
Anderson, P.; Queensland. Exposing Corruption: A CJC Guide to Whistleblowing in Queensland; Criminal Justice Commission: [Brisbane], 1996.
(13)
Murphy, S.; Australia. Parliament. Senate. Select Committee on Unresolved Whistleblower Cases. The Public Interest Revisited / Report of the Senate Select Committee on Unresolved Whistleblower Cases; The Parliament of the Commonwealth of Australia: [Canberra], 1995; Vol. no. 344 of 1995.
(14)
Pourciau, L. J. Ethics and Electronic Information in the Twenty-First Century; Purdue University Press: West Lafayette, Ind, 1999.
(15)
Spier, R. Science and Technology Ethics; Routledge: New York, 2001; Vol. Professional ethics.
(16)
Electronic Frontiers Australia Inc. (EFA). http://www.efa.org.au/.
(17)
Martin, B. Whistleblowing and Nonviolence. Peace & Change 1999, 24 (1), 15–28. https://doi.org/10.1111/0149-0508.00107.
(18)
Computer Professionals for Social Responsibility Mission. http://cpsr.org/about/mission/.
(19)
Electrical and Electronics Engineers, Inc. (IEEE). http://www.ieee.org/web/aboutus/home/index.html.
(20)
ACM Code of Ethics and Professional Conduct. http://www.acm.org/about/code-of-ethics.
(21)
Browse Inside Australian Story: Behind the Scenes by Deborah Fleming. http://browseinside.harpercollins.com.au/index.aspx?isbn13=9780733314421.
(22)
Hodgkinson, A.; Farthing, S. Blowing the Whistle: Protection for Whistleblowers in Australia, 2014.
(23)
ACS Code of Ethics. https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Ethics.pdf.
(24)
The Online Ethics Center for Engineering and Science. https://onlineethics.org/.
(25)
Association for the Advancement of Artificial Intelligence. http://www.aaai.org/Library/Reports/reports-library.php.
(26)
AI Topics Ethics & Social Issues. https://aitopics.org/class/Technology/IT/AI/Issues.
(27)
Reynolds, G. W. Chapte 8: The Impact of Information Technology on Productivity and Quality of Life. In Ethics in information technology; Cengage Learning: Boston, MA, 2015; pp 297–328.
(28)
McDermid, D. Chapter 5: Cyberspace. In Ethics in ICT: an Australian perspective; Pearson Education Australia: Frenchs Forest, N.S.W., 2008; pp 125–162.
(29)
Tavani, H. T. Chapter 12: Ethical Aspects of Emerging and Converging Technologies. In Ethics and technology: controversies, questions, and strategies for ethical computing; John Wiley & Sons: Hoboken, N.J., 2011; pp 361–390.
(30)
King, J. Technology for the Greater Good. Information Age 2012.
(31)
Tonkens, R. Out of Character: On the Creation of Virtuous Machines. Ethics and Information Technology 2012, 14 (2), 137–149. https://doi.org/10.1007/s10676-012-9290-1.
(32)
Wakefield, J. World wakes up to digital divide. http://news.bbc.co.uk/2/hi/technology/8568681.stm.
(33)
Zuckerberg, M. Is Connectivity A Human Right?
(34)
Kassam, AlnaazIding, MarieHogenbirk, Pieter. Unraveling the Digital Divide: Time Well Spent or ‘Wasted’? Education and Information Technologies 2013, 18 (2), 215–221.
(35)
News International phone hacking scandal. http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal.
(36)
WikiLeaks. http://en.wikipedia.org/wiki/WikiLeaks.
(37)
Only 6 percent mobile users in India are over 50 years of age: Telenor | Latest Tech News, Video & Photo Reviews at BGR India. http://www.bgr.in/news/only-6-percent-mobile-users-in-india-are-over-50-years-of-age-telenor/.
(38)
Reynolds, G W. Ethics in Information Technology, 5th ed.; Course Technology, Cengage Learning, 2015.
(39)
Mohan, T. Communicating as Professionals, 2nd ed.; Cengage Learning: South Melbourne, Vic, 2008.
(40)
McDermid, D. Chapter 5: Cyberspace. In Ethics in ICT: an Australian perspective; Pearson Education Australia: Frenchs Forest, N.S.W., 2008; pp 125–162.
(41)
Elder, B. Communication Skills; MacMillan Education Australia, 1994.
(42)
Harris, T. A. I’m Ok - You’re OK; Pan: London, 1973.
(43)
Mohan, T; McGregor, H; Saunders, S; Archee, R. Communicating as Professionals; Thomson Learning Australia, 2004.
(44)
Pease, A. Body Language: How to Read Others’ Thoughts by Their Gestures, 1981.
(45)
Unavoidable Ethical Questions About Social Networking, 2010.
(46)
Consulting, Project Management. Project Management Issues and Considerations, 2002.
(47)
How To Read Good Body Language.
(48)
RSA Animate -- The Secret Powers of Time, 23AD.
(49)
Netflix has a problem with unmetered streaming | Analysis | Information Age | Australian Computer Society. https://ia.acs.org.au/news/netflix-has-a-problem-with-unmetered-streaming-402827?eid=70&edate=20150420&utm_source=20150420&utm_medium=newsletter&utm_campaign=newsletter.
(50)
Hughes, S. Professional Presentations: A Practical Guide to the Preparation and Performance of Successful Business Presentations; McGraw-Hill, 1990.
(51)
Leech, T.; Leech, T. How to Prepare, Stage, and Deliver Winning Presentations, 3rd ed.; American Management Association: New York, 2004.
(52)
Matejka, K.; Ramos, D. P. Hook ’em: Speaking & Writing to Catch & Keep a Business Audience; AMACOM: New York, 1996.
(53)
Mohan, T. Communicating as Professionals, 2nd ed.; Cengage Learning: South Melbourne, Vic, 2008.
(54)
Hargie, O.; Dickson, D.; Tourish, D. That Silver-Tongued Devil...: Making Presentations Matter. In Communication skills for effective management; Palgrave Macmillan: New York, 2004; pp 147–174.
(55)
Toastmasters. http://www.toastmasters.org/about.
(56)
Barrett, E.; Paradis, J.; Perelman, L. C. The Mayfield Handbook of Technical Scientific Writing. http://www.mhhe.com/mayfieldpub/tsw/toc.htm.
(57)
Rubens, P. Science and Technical Writing: A Manual of Style, 2nd ed.; Routledge: New York, 2001.
(58)
Mohan, T. Communicating as Professionals, 2nd ed.; Cengage Learning: South Melbourne, Vic, 2008.
(59)
Rubens, P. Science and Technical Writing: A Manual of Style, 2nd ed.; Routledge: New York, 2001.
(60)
Beer, D. F.; McMurrey, D. A. A Guide to Writing as an Engineer, 2nd ed.; Wiley: New York, 2005.
(61)
Budinski, K. G. Engineers’ Guide to Technical Writing; ASM International: Materials Park, OH, 2001.
(62)
Truss, L. Eats, Shoots & Leaves: The Zero Tolerance Approach to Punctuation, Paperback ed.; Profile: London, 2005.
(63)
Cook, V. Accomodating Brocolli in the Cemetary: Or Why Can’t Anybody Spell?; Profile Books, 2004.
(64)
Huff, C.; Martin, C. D. Computing Consequences: A Framework for Teaching Ethical Computing. Communications of the ACM 1995, 38 (12), 75–84.
(65)
Social Impact Assessment Guideline.
(66)
Reynolds, G W. Ethics in Information Technology, 5th ed.; Course Technology, Cengage Learning, 2015.
(67)
Commissioner, Office of the Privacy. Private i - Your Ultimate Privacy Survival Guide; Office of the Privacy Commissioner, 2009.
(68)
Seddon, N; Ellinghaus., M. Cheshire & Fifoot’s Law of Contract, 7th ed.; Butterworths, 1997.
(69)
Buckley, R. A. Illegality and Public Policy; Sweet & Maxwell: London, 2002; Vol. The contract law library.
(70)
Perelman, M. Steal This Idea: Intellectual Property Rights and the Corporate Confiscation of Creativity, 1st ed.; Palgrave: New York, 2002.
(71)
Tavani, H. T. Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1999, 1 (2), 137–145. https://doi.org/10.1023/A:1010063528863.
(72)
Australia, State of Western. The Sale of Goods Act 1895: An Act for Codifying the Law Relating to the Sale of Goods, 1895, (59 Vict. No. 41).
(73)
Government, Australian. Trade Practices Act 1975, 1975, No. 63 of 1975.
(74)
What is Privacy?. http://news.rutgers.edu/research-news/what-privacy/20150305#.VS4YlBZh8n0.
(75)
BIG DATA: SEIZING OPPORTUNITIES, PRESERVING VALUES.
(76)
Private i - Your Ultimate Privacy Survival Guide.
(77)
What is ‘metadata’ and should you worry if yours is stored by law? http://www.smh.com.au/digital-life/digital-life-news/what-is-metadata-and-should-you-worry-if-yours-is-stored-by-law-20140806-100zae.html.
(78)
Metadata retention: What is it and how might it impact whistleblowers in media and politics? - ABC News (Australian Broadcasting Corporation). http://www.abc.net.au/news/2015-03-17/metadata-data-retention-what-is-it/6324962.
(79)
CISPA: The Awful Anti-Privacy Law That Won’t Prevent Another Sony Hack. http://gizmodo.com/cispa-the-awful-anti-privacy-law-that-wont-prevent-ano-1678561060.
(80)
Andrejevic, M. Big Data, Big Questions| The Big Data Divide |. International Journal of Communication 2014, 8, 1673–1689.
(81)
Communications Surveillance: Privacy and Security at Risk. https://cacm.acm.org/magazines/2009/11/48445-communications-surveillance-privacy-and-security-at-risk/fulltext.
(82)
Reynolds, G W. Ethics in Information Technology, 5th ed.; Course Technology, Cengage Learning, 2015.
(83)
Forum, Information Security. The Standard of Good Practice for Information Security; Information Security Forum, 2007.
(84)
AusCert.
(85)
Neumann, Peter. Risks.
(86)
Information Security Forum: Research Reports (for non-Members). https://www.securityforum.org/research/.
(87)
2015 Cybercrime Trends: Things are Going to Get Interesting. https://www.slideshare.net/galbaatar1/ss-62879383?next_slideshow=1.
(88)
2015 Cybercrime Trends: Things are Going to Get Interesting. http://securityintelligence.com/events/2015-cybercrime-trends-things-going-get-interesting/#.VTcHfBZh8n1.
(89)
Cybercrime predictions for 2015. http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/.
(90)
TRENDS FOR 2015: TARGETING THE CORPORATE WORLD.
(91)
Chatterjee, S.; Sarker, S.; Valacich, J. S. The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use. Journal of Management Information Systems 2015, 31 (4), 49–87. https://doi.org/10.1080/07421222.2014.1001257.
(92)
Ramnit botnet: Cybercrime ring that used 3.2 million hacked computers to steal bank information disrupted by European police - ABC News (Australian Broadcasting Corporation). http://www.abc.net.au/news/2015-02-26/ramnit-botnet-cybercrime-ring-disrupted-by-police/6263038.
(93)
Ramnit - Symantec and Other Industry Partners Assist Europol in Botnet Take Down, 26AD.
(94)
Reynolds, G. W. Ethics in Information Technology, 4th ed.; Course Technology, Cengage Learning: Boston, MA, 2012.
(95)
Stallman, R.; Johnson, D. G. Chapter 13 and 14. In Computer ethics and professional responsibility; Blackwell Pub: Malden, MA, 2004; pp 285–314.
(96)
Murphy, D. J. Are Intellectual Property Rights Compatible with Rawlsian Principles of Justice? Ethics and Information Technology 2012, 14 (2), 109–121. https://doi.org/10.1007/s10676-012-9288-8.
(97)
IP Australia. 2001 Corporate Profile; IP Australia: Woden, A.C.T., 2000.
(98)
Sainsbury, M. Annotated Copyright Act; Lawbook Co.: Sydney, 2004.
(99)
Australian Intellectual Property Cases.
(100)
Allen, K R. Bringing New Technology to Market; Prentice Hall, 2003.
(101)
Phillips, J. J. Butterworths Intellectual Property Law Handbook, 5th ed.; Butterworths: London, 2001.
(102)
Weckert, J. Computer and Information Ethics; Greenwood Press, 1997.
(103)
Kizza, J M. Ethical and Social Issues in the Information Age; Springer-Verlag, 2003.
(104)
Himanen, P. The Hacker Ethic: And the Spirit of the Information Age; Secker & Warburg: London, 2001.
(105)
Australian Copyright Council - Find an Answer.
(106)
Creative Commons Australia.
(107)
Murphy, D. J. Are Intellectual Property Rights Compatible with Rawlsian Principles of Justice? Ethics and Information Technology 2012, 14 (2), 109–121. https://doi.org/10.1007/s10676-012-9288-8.
(108)
Trademark victory allows Cadbury to retain its purple reign. http://theconversation.com/trademark-victory-allows-cadbury-to-retain-its-purple-reign-9950.
(109)
Russell, J. Nestle wins latest battle with Cadbury over the colour purple. IP Whiteboard. http://ipwhiteboard.com.au/nestle-wins-latest-battle-with-cadbury-over-the-colour-purple-in-the-uk/.
(110)
| IP Australia. http://www.ipaustralia.gov.au/.
(111)
Reynolds, G W. Ethics in Information Technology, 5th ed.; Course Technology, Cengage Learning, 2015.
(112)
Bolton, S.; McDermid, D. System Reliability. In Ethics in ICT: an Australian perspective; Pearson Education Australia: Frenchs Forest, N.S.W., 2008; pp 179–198.
(113)
Flood, R L. A Brief Review of Peter B. Checkland’s Contribution to Systemic Thinking. Systemic Practice and Action Research 2000, 13 (6), 723–731.
(114)
Jackson, M. C. Beyond a System of Systems Methodologies. The Journal of the Operational Research Society 1990, 41 (8). https://doi.org/10.2307/2583472.
(115)
Skyttner, L. General Systems Theory: Ideas & Applications; World Scientific, 2001.
(116)
Feiler, P. Improving Safety-Critical Systems with a Reliability Validation and Improvement Framework, 2012.
(117)
Pan, J. Software Reliability. http://users.ece.cmu.edu/~koopman/des_s99/sw_reliability/.
(118)
Bowen, Jonathan. The Ethics of Safety-Critical Systems. Communications of the ACM 2000, 43 (4), 91–97.
(119)
Software Quality Institute. https://www2.griffith.edu.au/institute-integrated-intelligent-systems/our-research/expertise/software-engineering-software-quality.
(120)
Schonbeck, Martin. Introduction to the Reliability of Safety Systems, 2007.
(121)
Dekker, S. W. A. The Danger of Losing Situation Awareness. Cognition, Technology & Work 2015, 17 (2), 159–161. https://doi.org/10.1007/s10111-015-0320-8.
(122)
The danger of losing situation awareness. http://download-v2.springer.com/static/pdf/918/art%253A10.1007%252Fs10111-015-0324-4.pdf?token2=exp=1430288771~acl=%2Fstatic%2Fpdf%2F918%2Fart%25253A10.1007%25252Fs10111-015-0324-4.pdf*~hmac=cda4b3d0d4a4333b23b48adf8bbcc9168ddf4be88886efc4c76d17d6de1b8a7a.
(123)
Improving Safety-critical Systems with a Reliability Validation & Improvement Framework » SEI Blog. http://blog.sei.cmu.edu/post.cfm/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework.
(124)
Trevino, L. The Key Role of HR in Organizational Ethics. 2007, 2008.
(125)
Reynolds, G W. Ethics in Information Technology, 5th ed.; Course Technology, Cengage Learning, 2015.
(126)
CCH. HR Strategy and Workforce Planning; CCH Australia Ltd, 2005.
(127)
Cooke, E. The Modern Law of Estoppel; Oxford University Press, 2000.
(128)
Rudman, R. HR’s Dilemma: Value or Values? Human Resources Bulletin 2005, 5 December.
(129)
Kramar, R. HR’s Role in Ethics and Corporate Social Responsibility. Human Resources Bulletin 2005, 13 October.
(130)
Halleck, J. Free Software Dilemma. http://www.cc.utah.edu/~nahaj/ethics/freesoftware.html.
(131)
Management, Society for Human Resource. SHRM Code of Ethical and Professional Standards in Human Resource Management, 2008.
(132)
Global Project Management.Org Home Page, 2007.
(133)
Briguglio, C. Linguistic and Cultural Skills for Communication in Global Workplaces of the 21st Century. In Cross-cultural interaction: concepts, methodologies, tools, and applications; Information Science Reference: Hershey, PA, 2014; pp 832–848. https://doi.org/10.4018/978-1-4666-4979-8.ch047.
(134)
Singh, M.; Cui, G. Multiple Dimensions of Media Communication Skills. In New media communication skills for engineers and IT professionals: trans-national and trans-cultural demands; Information Science Reference: Hershey, PA, 2012; pp 160–174. https://doi.org/10.4018/978-1-4666-0243-4.ch010.
(135)
Chua, R. Y. J.; Roth, Y.; Lemoine, J.-F. The Impact of Culture on Creativity. Administrative Science Quarterly 2015, 60 (2), 189–227. https://doi.org/10.1177/0001839214563595.
(136)
Bennett, M. INTERCULTURAL COMPETENCE FOR GLOBAL LEADERSHIP.