1.
Quinn MJ. Chapter 2: Introduction to ethics. In: Ethics for the Information Age. 2nd ed. Pearson/Addison-Wesley; 2006:77-128.
2.
Martin C. A brief introduction to morality. In: Ethics in Information Technology. Vol Excellence in information systems. 2nd ed. Thomson Course Technology; 2007:293-308.
3.
Johnson DG, Miller KW. Computer ethics : analyzing information technology. Pages 167-177. In: Computer Ethics: Analyzing Information Technology. Pearson Education; 2009:167-177.
4.
Professions Australia - Ethics Resoure Centre. http://www.professions.com.au/ethicsresource.html
5.
Ethics Resource Centre. http://www.professions.com.au/Homepage.html
6.
The Office of the Privacy Commissioner: Information Technology and Internet Issues. https://www.oaic.gov.au/privacy/your-privacy-rights/social-media-and-technology/
7.
Vanderbilt University Center for Ethics: case studies. http://www.vanderbilt.edu/CenterforEthics/cases.html#computer
8.
Business Roundtable Institute for Corporate Ethics. http://www.corporate-ethics.org/
9.
CAPPE. Centre For Applied Philosophy and Public Ethics. http://arts-ed.csu.edu.au/schools/humss/research#horizontalTab6
10.
Reynolds GW. Ethics in Information Technology. 4th ed. Course Technology, Cengage Learning; 2012.
11.
Board, ACS Professional Standards. ACS Code of Professional Conduct. Published online 2012. https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf
12.
Anderson P, Queensland. Exposing Corruption: A CJC Guide to Whistleblowing in Queensland. Criminal Justice Commission; 1996.
13.
Murphy S, Australia. Parliament. Senate. Select Committee on Unresolved Whistleblower Cases. The Public Interest Revisited / Report of the Senate Select Committee on Unresolved Whistleblower Cases. Vol no. 344 of 1995. The Parliament of the Commonwealth of Australia; 1995.
14.
Pourciau LJ. Ethics and Electronic Information in the Twenty-First Century. Purdue University Press; 1999.
15.
Spier R. Science and Technology Ethics. Vol Professional ethics. Routledge; 2001.
16.
Electronic Frontiers Australia Inc. (EFA). http://www.efa.org.au/
17.
Martin B. Whistleblowing and Nonviolence. Peace & Change. 1999;24(1):15-28. doi:10.1111/0149-0508.00107
18.
Computer Professionals for Social Responsibility Mission. http://cpsr.org/about/mission/
19.
Electrical and Electronics Engineers, Inc. (IEEE). http://www.ieee.org/web/aboutus/home/index.html
20.
ACM Code of Ethics and Professional Conduct. Published 1992. http://www.acm.org/about/code-of-ethics
21.
Browse Inside Australian Story: Behind the Scenes by Deborah Fleming. http://browseinside.harpercollins.com.au/index.aspx?isbn13=9780733314421
22.
Hodgkinson A, Farthing S. Blowing the whistle: protection for whistleblowers in Australia. Published online 2014. https://www.kordamentha.com/getmedia/57522ffd-7648-49f9-a812-2e612dc30a11/issue-14-05-protection-for-whistleblowers-in-australia.pdf.aspx?ext=.pdf
23.
ACS Code of Ethics. https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Ethics.pdf
24.
The Online Ethics Center for Engineering and Science. https://onlineethics.org/
25.
Association for the Advancement of Artificial Intelligence. http://www.aaai.org/Library/Reports/reports-library.php
26.
AI Topics Ethics & Social Issues. https://aitopics.org/class/Technology/IT/AI/Issues
27.
Reynolds GW. Chapte 8: The impact of information technology on productivity and quality of life. In: Ethics in Information Technology. Fifth edition. Cengage Learning; 2015:297-328.
28.
McDermid D. Chapter 5: Cyberspace. In: Ethics in ICT: An Australian Perspective. Pearson Education Australia; 2008:125-162.
29.
Tavani HT. Chapter 12: Ethical aspects of emerging and converging technologies. In: Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. 3rd ed. John Wiley & Sons; 2011:361-390.
30.
King, J. Technology for the greater good. Information Age. Published online 2012.
31.
Tonkens R. Out of character: on the creation of virtuous machines. Ethics and Information Technology. 2012;14(2):137-149. doi:10.1007/s10676-012-9290-1
32.
Wakefield J. World wakes up to digital divide. Published 2010. http://news.bbc.co.uk/2/hi/technology/8568681.stm
33.
Zuckerberg M. Is Connectivity A Human Right? https://prandtheweb.files.wordpress.com/2013/08/connectivity-a-human-right.pdf
34.
Kassam, AlnaazIding, MarieHogenbirk, Pieter. Unraveling the digital divide: Time well spent or ‘wasted’? Education and Information Technologies. 2013;18(2):215-221. https://search.proquest.com/docview/1422045691/citation/159EF1E516E84E49PQ/1?accountid=12629
35.
News International phone hacking scandal. http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal
36.
WikiLeaks. http://en.wikipedia.org/wiki/WikiLeaks
37.
Only 6 percent mobile users in India are over 50 years of age: Telenor | Latest Tech News, Video & Photo Reviews at BGR India. http://www.bgr.in/news/only-6-percent-mobile-users-in-india-are-over-50-years-of-age-telenor/
38.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
39.
Mohan T. Communicating as Professionals. 2nd ed. Cengage Learning; 2008.
40.
McDermid D. Chapter 5: Cyberspace. In: Ethics in ICT: An Australian Perspective. Pearson Education Australia; 2008:125-162.
41.
Elder, B. Communication Skills. MacMillan Education Australia; 1994.
42.
Harris TA. I’m Ok - You’re OK. Pan; 1973.
43.
Mohan, T, McGregor, H, Saunders, S, Archee, R. Communicating as Professionals. Thomson Learning Australia; 2004.
44.
Pease, A. Body Language: how to read others’ thoughts by their gestures. Published online 1981. https://archive.org/details/BodyLanguageHowToReadOthersThoughtsByTheirGestures_201403
45.
Unavoidable Ethical Questions About Social Networking. Published online 2010. http://www.scu.edu/ethics/publications/submitted/social-networking.html
46.
Consulting, Project Management. Project Management Issues and Considerations. Published online 2002. http://www.maxwideman.com/issacons4/iac1435/sld001.htm
47.
How To Read Good Body Language. http://www.professional-cv-services.co.uk/intv/positive_body_language_at_job_interview.html
48.
RSA Animate -- The Secret Powers of Time. Published online 23AD. https://www.youtube.com/watch?v=A3oIiH7BLmg
49.
Netflix has a problem with unmetered streaming | Analysis | Information Age | Australian Computer Society. https://ia.acs.org.au/news/netflix-has-a-problem-with-unmetered-streaming-402827?eid=70&edate=20150420&utm_source=20150420&utm_medium=newsletter&utm_campaign=newsletter
50.
Hughes, S. Professional Presentations: A Practical Guide to the Preparation and Performance of Successful Business Presentations. McGraw-Hill; 1990.
51.
Leech T, Leech T. How to Prepare, Stage, and Deliver Winning Presentations. 3rd ed. American Management Association; 2004.
52.
Matejka K, Ramos DP. Hook ’em: Speaking & Writing to Catch & Keep a Business Audience. AMACOM; 1996.
53.
Mohan T. Communicating as Professionals. 2nd ed. Cengage Learning; 2008.
54.
Hargie O, Dickson D, Tourish D. That silver-tongued devil...: making presentations matter. In: Communication Skills for Effective Management. Palgrave Macmillan; 2004:147-174.
55.
Toastmasters. http://www.toastmasters.org/about
56.
Barrett, E., Paradis, J., Perelman, L. C. The Mayfield Handbook of Technical Scientific Writing. Published 1997. http://www.mhhe.com/mayfieldpub/tsw/toc.htm
57.
Rubens P. Science and Technical Writing: A Manual of Style. 2nd ed. Routledge; 2001. https://ebookcentral.proquest.com/lib/murdoch/reader.action?ppg=68&docID=170530&tm=1483931464666
58.
Mohan T. Communicating as Professionals. 2nd ed. Cengage Learning; 2008.
59.
Rubens P. Science and Technical Writing: A Manual of Style. 2nd ed. Routledge; 2001. https://ebookcentral.proquest.com/lib/murdoch/detail.action?docID=170530
60.
Beer DF, McMurrey DA. A Guide to Writing as an Engineer. 2nd ed. Wiley; 2005.
61.
Budinski KG. Engineers’ Guide to Technical Writing. ASM International; 2001.
62.
Truss L. Eats, Shoots & Leaves: The Zero Tolerance Approach to Punctuation. Paperback ed. Profile; 2005.
63.
Cook, V. Accomodating Brocolli in the Cemetary: Or Why Can’t Anybody Spell? Profile Books; 2004.
64.
Huff C, Martin CD. Computing consequences: a framework for teaching ethical computing. Communications of the ACM. 1995;38(12):75-84. https://go.gale.com/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm&currentPosition=1&docId=GALE%7CA17779533&docType=Article&sort=Relevance&contentSegment=ZONE-MOD1&prodId=AONE&contentSet=GALE%7CA17779533&searchId=R2&userGroupName=murdoch&inPS=true&ps=1&cp=1
65.
Social impact assessment guideline. https://www.statedevelopment.qld.gov.au/resources/cg/social-impact-assessment-guideline.pdf
66.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
67.
Commissioner, Office of the Privacy. Private i - Your Ultimate Privacy Survival Guide. Office of the Privacy Commissioner; 2009. http://www.privacy.gov.au/materials/topics/internet
68.
Seddon, N, Ellinghaus., M. Cheshire & Fifoot’s Law of Contract. 7th ed. Butterworths; 1997.
69.
Buckley RA. Illegality and Public Policy. Vol The contract law library. Sweet & Maxwell; 2002.
70.
Perelman M. Steal This Idea: Intellectual Property Rights and the Corporate Confiscation of Creativity. 1st ed. Palgrave; 2002.
71.
Tavani HT. Informational privacy, data mining, and the Internet. Ethics and Information Technology. 1999;1(2):137-145. doi:10.1023/A:1010063528863
72.
Australia, State of Western. The Sale of Goods Act 1895: An Act for codifying the law relating to the sale of goods. 1895;(59 Vict. No. 41). https://www.slp.wa.gov.au/legislation/statutes.nsf/law_a726.html
73.
Government, Australian. Trade Practices Act 1975. 1975;No. 63 of 1975. http://www.comlaw.gov.au/Details/C2004A00285
74.
What is Privacy? http://news.rutgers.edu/research-news/what-privacy/20150305#.VS4YlBZh8n0
75.
BIG DATA: SEIZING OPPORTUNITIES, PRESERVING VALUES. https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
76.
private i - your ultimate privacy survival guide. https://www.oaic.gov.au/images/documents/privacy/privacy-topics/youth/private-i_reduced.pdf
77.
What is ‘metadata’ and should you worry if yours is stored by law? http://www.smh.com.au/digital-life/digital-life-news/what-is-metadata-and-should-you-worry-if-yours-is-stored-by-law-20140806-100zae.html
78.
Metadata retention: What is it and how might it impact whistleblowers in media and politics? - ABC News (Australian Broadcasting Corporation). http://www.abc.net.au/news/2015-03-17/metadata-data-retention-what-is-it/6324962
79.
CISPA: The Awful Anti-Privacy Law That Won’t Prevent Another Sony Hack. http://gizmodo.com/cispa-the-awful-anti-privacy-law-that-wont-prevent-ano-1678561060
80.
Andrejevic M. Big Data, Big Questions| The Big Data Divide |. International Journal of Communication. 2014;8:1673-1689. http://ijoc.org/index.php/ijoc/article/view/2161/1163
81.
Communications Surveillance: Privacy and Security at Risk. https://cacm.acm.org/magazines/2009/11/48445-communications-surveillance-privacy-and-security-at-risk/fulltext
82.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
83.
Forum, Information Security. The Standard of Good Practice for Information Security. Information Security Forum; 2007. https://kr-labs.com.ua/books/isf-standarts.pdf
84.
AusCert. http://www.auscert.org.au
85.
Neumann, Peter. Risks. http://www.csl.sri.com/users/neumann/#3
86.
Information Security Forum: Research Reports (for non-Members). https://www.securityforum.org/research/
87.
2015 Cybercrime Trends: Things are Going to Get Interesting. https://www.slideshare.net/galbaatar1/ss-62879383?next_slideshow=1
88.
2015 Cybercrime Trends: Things are Going to Get Interesting. http://securityintelligence.com/events/2015-cybercrime-trends-things-going-get-interesting/#.VTcHfBZh8n1
89.
Cybercrime predictions for 2015. http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/
90.
TRENDS FOR 2015: TARGETING THE CORPORATE WORLD. http://www.welivesecurity.com/wp-content/uploads/2015/02/trends-2015-targeting-corporate-world.pdf
91.
Chatterjee S, Sarker S, Valacich JS. The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use. Journal of Management Information Systems. 2015;31(4):49-87. doi:10.1080/07421222.2014.1001257
92.
Ramnit botnet: Cybercrime ring that used 3.2 million hacked computers to steal bank information disrupted by European police - ABC News (Australian Broadcasting Corporation). http://www.abc.net.au/news/2015-02-26/ramnit-botnet-cybercrime-ring-disrupted-by-police/6263038
93.
Ramnit - Symantec and Other Industry Partners Assist Europol in Botnet Take Down. Published online 26AD. https://www.youtube.com/watch?v=U36S9Bwe3vY
94.
Reynolds GW. Ethics in Information Technology. 4th ed. Course Technology, Cengage Learning; 2012.
95.
Stallman R, Johnson DG. Chapter 13 and 14. In: Computer Ethics and Professional Responsibility. Blackwell Pub; 2004:285-314.
96.
Murphy DJ. Are intellectual property rights compatible with Rawlsian principles of justice? Ethics and Information Technology. 2012;14(2):109-121. doi:10.1007/s10676-012-9288-8
97.
IP Australia. 2001 Corporate Profile. IP Australia; 2000.
98.
Sainsbury M. Annotated Copyright Act. Lawbook Co.; 2004.
99.
Australian intellectual property cases. http://prod.resource.wkasiapacific.com/resource/scion/toc/atlas-csh/(WKAP_TAL_403334288)3EDEC6055B4FE2B3823DB08C:WKAP_TAL_ALECCASE_REFERENCE?cpid=WKAP-TAL-IC&cfu=WKAP&wksso=false
100.
Allen, K R. Bringing New Technology to Market. Prentice Hall; 2003.
101.
Phillips JJ. Butterworths Intellectual Property Law Handbook. 5th ed. Butterworths; 2001.
102.
Weckert, J. Computer and Information Ethics. Greenwood Press; 1997.
103.
Kizza, J M. Ethical and Social Issues in the Information Age. Springer-Verlag; 2003.
104.
Himanen P. The Hacker Ethic: And the Spirit of the Information Age. Secker & Warburg; 2001.
105.
Australian Copyright Council - Find an Answer. https://www.copyright.org.au/ACC/Find_an_Answer/ACC/Public_Content/Find_an_Answer.aspx?hkey=b0de2cd4-daa3-47da-95a5-1e7ecdc8dddc
106.
Creative Commons Australia. http://creativecommons.org.au/
107.
Murphy DJ. Are intellectual property rights compatible with Rawlsian principles of justice? Ethics and Information Technology. 2012;14(2):109-121. doi:10.1007/s10676-012-9288-8
108.
Trademark victory allows Cadbury to retain its purple reign. http://theconversation.com/trademark-victory-allows-cadbury-to-retain-its-purple-reign-9950
109.
Russell J. Nestle wins latest battle with Cadbury over the colour purple. IP Whiteboard. Published 2013. http://ipwhiteboard.com.au/nestle-wins-latest-battle-with-cadbury-over-the-colour-purple-in-the-uk/
110.
| IP Australia. http://www.ipaustralia.gov.au/
111.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
112.
Bolton S, McDermid D. System reliability. In: Ethics in ICT: An Australian Perspective. Pearson Education Australia; 2008:179-198.
113.
Flood, R L. A brief review of Peter B. Checkland’s contribution to systemic thinking. Systemic Practice and Action Research. 2000;13(6):723-731. https://search.proquest.com/docview/211444426/4DCA4C80E8FD4160PQ/2?accountid=12629
114.
Jackson MC. Beyond a System of Systems Methodologies. The Journal of the Operational Research Society. 1990;41(8). doi:10.2307/2583472
115.
Skyttner L. General Systems Theory: Ideas & Applications. World Scientific; 2001. https://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=nlebk&AN=82612&site=ehost-live&custid=s1113140
116.
Feiler P. Improving Safety-Critical Systems with a Reliability Validation and Improvement Framework. Published online 2012. https://insights.sei.cmu.edu/sei_blog/2013/06/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework.html
117.
Pan J. Software Reliability. Published 1999. http://users.ece.cmu.edu/~koopman/des_s99/sw_reliability/
118.
Bowen, Jonathan. The Ethics of Safety-Critical Systems. Communications of the ACM. 2000;43(4):91-97. https://go.galegroup.com/ps/i.do?p=ITOF&u=murdoch&id=GALE|A61792759&v=2.1&it=r&sid=summon
119.
Software Quality Institute. https://www2.griffith.edu.au/institute-integrated-intelligent-systems/our-research/expertise/software-engineering-software-quality
120.
Schonbeck, Martin. Introduction to the Reliability of Safety Systems. Published online 2007. https://dvikan.no/ntnu-studentserver/reports/martin07.pdf
121.
Dekker SWA. The danger of losing situation awareness. Cognition, Technology & Work. 2015;17(2):159-161. doi:10.1007/s10111-015-0320-8
122.
The danger of losing situation awareness. http://download-v2.springer.com/static/pdf/918/art%253A10.1007%252Fs10111-015-0324-4.pdf?token2=exp=1430288771~acl=%2Fstatic%2Fpdf%2F918%2Fart%25253A10.1007%25252Fs10111-015-0324-4.pdf*~hmac=cda4b3d0d4a4333b23b48adf8bbcc9168ddf4be88886efc4c76d17d6de1b8a7a
123.
Improving Safety-critical Systems with a Reliability Validation & Improvement Framework » SEI Blog. http://blog.sei.cmu.edu/post.cfm/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework
124.
Trevino, L. The key role of HR in organizational ethics. 2007;2008. http://www.ethics.org/erc-publications/staff-articles.asp?aid=1084
125.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
126.
CCH. HR Strategy and Workforce Planning. CCH Australia Ltd; 2005.
127.
Cooke, E. The Modern Law of Estoppel. Oxford University Press; 2000.
128.
Rudman, R. HR’s dilemma: value or values? Human Resources Bulletin. 2005;5 December.
129.
Kramar, R. HR’s role in ethics and corporate social responsibility. Human Resources Bulletin. 2005;13 October.
130.
Halleck J. Free Software Dilemma. Published 2000. http://www.cc.utah.edu/~nahaj/ethics/freesoftware.html
131.
Management, Society for Human Resource. SHRM Code of Ethical and Professional Standards in Human Resource Management. Published online 2008. https://www.shrm.org/about-shrm/pages/bylaws--code-of-ethics.aspx
132.
Global Project Management.org Home Page. Published online 2007. http://globalprojectmanagement.org/
133.
Briguglio C. Linguistic and Cultural Skills for Communication in Global Workplaces of the 21st Century. In: Cross-Cultural Interaction: Concepts, Methodologies, Tools, and Applications. Information Science Reference; 2014:832-848. doi:10.4018/978-1-4666-4979-8.ch047
134.
Singh M, Cui G. Multiple Dimensions of Media Communication Skills. In: New Media Communication Skills for Engineers and IT Professionals: Trans-National and Trans-Cultural Demands. Information Science Reference; 2012:160-174. doi:10.4018/978-1-4666-0243-4.ch010
135.
Chua RYJ, Roth Y, Lemoine JF. The Impact of Culture on Creativity. Administrative Science Quarterly. 2015;60(2):189-227. doi:10.1177/0001839214563595
136.
Bennett M. INTERCULTURAL COMPETENCE FOR GLOBAL LEADERSHIP. https://www.idrinstitute.org/resources/intercultural-competence-global-leadership/