| IP Australia. (n.d.). http://www.ipaustralia.gov.au/
2015 Cybercrime Trends: Things are Going to Get Interesting. (n.d.-a). https://www.slideshare.net/galbaatar1/ss-62879383?next_slideshow=1
2015 Cybercrime Trends: Things are Going to Get Interesting. (n.d.-b). http://securityintelligence.com/events/2015-cybercrime-trends-things-going-get-interesting/#.VTcHfBZh8n1
ACM Code of Ethics and Professional Conduct. (1992). Association for Computing Machinery. http://www.acm.org/about/code-of-ethics
ACS Code of Ethics. (n.d.). https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Ethics.pdf
AI Topics Ethics & Social Issues. (n.d.). https://aitopics.org/class/Technology/IT/AI/Issues
Allen, K R. (2003). Bringing New Technology to Market. Prentice Hall.
Anderson, P. & Queensland. (1996). Exposing corruption: a CJC guide to whistleblowing in Queensland. Criminal Justice Commission.
Andrejevic, M. (2014). Big Data, Big Questions| The Big Data Divide |. International Journal of Communication, 8, 1673–1689. http://ijoc.org/index.php/ijoc/article/view/2161/1163
Association for the Advancement of Artificial Intelligence. (n.d.). http://www.aaai.org/Library/Reports/reports-library.php
AusCert. (n.d.). AusCert. http://www.auscert.org.au
Australia, State of Western. (1895). The Sale of Goods Act 1895: An Act for codifying the law relating to the sale of goods: Vol. (59 Vict. No. 41). https://www.slp.wa.gov.au/legislation/statutes.nsf/law_a726.html
Australian Copyright Council - Find an Answer. (n.d.). Australian Copyright Council. https://www.copyright.org.au/ACC/Find_an_Answer/ACC/Public_Content/Find_an_Answer.aspx?hkey=b0de2cd4-daa3-47da-95a5-1e7ecdc8dddc
Australian intellectual property cases. (n.d.). [Electronic resource]. [s.n.]. http://prod.resource.wkasiapacific.com/resource/scion/toc/atlas-csh/(WKAP_TAL_403334288)3EDEC6055B4FE2B3823DB08C:WKAP_TAL_ALECCASE_REFERENCE?cpid=WKAP-TAL-IC&cfu=WKAP&wksso=false
Barrett, E., Paradis, J., & Perelman, L. C. (1997). The Mayfield Handbook of Technical Scientific Writing. McGraw-Hill. http://www.mhhe.com/mayfieldpub/tsw/toc.htm
Beer, D. F., & McMurrey, D. A. (2005). A guide to writing as an engineer (2nd ed). Wiley.
Bennett, M. (n.d.). INTERCULTURAL COMPETENCE FOR GLOBAL LEADERSHIP. https://www.idrinstitute.org/resources/intercultural-competence-global-leadership/
BIG DATA: SEIZING OPPORTUNITIES, PRESERVING VALUES. (n.d.). https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
Board, ACS Professional Standards. (2012). ACS Code of Professional Conduct. Australian Computer Society. https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf
Bolton, S., & McDermid, D. (2008). System reliability. In Ethics in ICT: an Australian perspective (pp. 179–198). Pearson Education Australia.
Bowen, Jonathan. (2000). The Ethics of Safety-Critical Systems. Communications of the ACM, 43(4), 91–97. https://go.galegroup.com/ps/i.do?p=ITOF&u=murdoch&id=GALE|A61792759&v=2.1&it=r&sid=summon
Briguglio, C. (2014). Linguistic and Cultural Skills for Communication in Global Workplaces of the 21st Century [Electronic resource]. In Cross-cultural interaction: concepts, methodologies, tools, and applications (pp. 832–848). Information Science Reference. https://doi.org/10.4018/978-1-4666-4979-8.ch047
Browse Inside Australian Story: Behind the Scenes by Deborah Fleming. (n.d.). http://browseinside.harpercollins.com.au/index.aspx?isbn13=9780733314421
Buckley, R. A. (2002). Illegality and public policy: Vol. The contract law library. Sweet & Maxwell.
Budinski, K. G. (2001). Engineers’ guide to technical writing. ASM International.
Business Roundtable Institute for Corporate Ethics. (n.d.). http://www.corporate-ethics.org/
CAPPE. Centre For Applied Philosophy and Public Ethics. (n.d.). http://arts-ed.csu.edu.au/schools/humss/research#horizontalTab6
CCH. (2005). HR Strategy and Workforce Planning. CCH Australia Ltd.
Chatterjee, S., Sarker, S., & Valacich, J. S. (2015). The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use. Journal of Management Information Systems, 31(4), 49–87. https://doi.org/10.1080/07421222.2014.1001257
Chua, R. Y. J., Roth, Y., & Lemoine, J.-F. (2015). The Impact of Culture on Creativity. Administrative Science Quarterly, 60(2), 189–227. https://doi.org/10.1177/0001839214563595
CISPA: The Awful Anti-Privacy Law That Won’t Prevent Another Sony Hack. (n.d.). http://gizmodo.com/cispa-the-awful-anti-privacy-law-that-wont-prevent-ano-1678561060
Commissioner, Office of the Privacy. (2009). private i - your ultimate privacy survival guide. Office of the Privacy Commissioner. http://www.privacy.gov.au/materials/topics/internet
Communications Surveillance: Privacy and Security at Risk. (n.d.). https://cacm.acm.org/magazines/2009/11/48445-communications-surveillance-privacy-and-security-at-risk/fulltext
Computer Professionals for Social Responsibility Mission. (n.d.). Computer Professionals for Social Responsibility. http://cpsr.org/about/mission/
Consulting, Project Management. (2002). Project Management Issues and Considerations. AEW Services. http://www.maxwideman.com/issacons4/iac1435/sld001.htm
Cook, V. (2004). Accomodating Brocolli in the Cemetary: or why can’t anybody spell? Profile Books.
Cooke, E. (2000). The Modern Law of Estoppel. Oxford University Press.
Creative Commons Australia. (n.d.). Creative Commons Australia. http://creativecommons.org.au/
Cybercrime predictions for 2015. (n.d.). http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/
Dekker, S. W. A. (2015). The danger of losing situation awareness. Cognition, Technology & Work, 17(2), 159–161. https://doi.org/10.1007/s10111-015-0320-8
Elder, B. (1994). Communication skills. MacMillan Education Australia.
Electrical and Electronics Engineers, Inc. (IEEE). (n.d.). http://www.ieee.org/web/aboutus/home/index.html
Electronic Frontiers Australia Inc. (EFA). (n.d.). http://www.efa.org.au/
Ethics Resource Centre. (n.d.). http://www.professions.com.au/Homepage.html
Feiler, P. (2012). Improving Safety-Critical Systems with a Reliability Validation and Improvement Framework. Carnegie Mellon University. https://insights.sei.cmu.edu/sei_blog/2013/06/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework.html
Flood, R L. (2000). A brief review of Peter B. Checkland’s contribution to systemic thinking. Systemic Practice and Action Research, 13(6), 723–731. https://search.proquest.com/docview/211444426/4DCA4C80E8FD4160PQ/2?accountid=12629
Forum, Information Security. (2007). The Standard of Good Practice for Information Security. Information Security Forum. https://kr-labs.com.ua/books/isf-standarts.pdf
Global Project Management.org Home Page. (2007). Global Project Management.org. http://globalprojectmanagement.org/
Government, Australian. (1975). Trade Practices Act 1975: Vol. No. 63 of 1975. http://www.comlaw.gov.au/Details/C2004A00285
Halleck, J. (2000). Free Software Dilemma. University of Utah. http://www.cc.utah.edu/~nahaj/ethics/freesoftware.html
Hargie, O., Dickson, D., & Tourish, D. (2004). That silver-tongued devil...: making presentations matter. In Communication skills for effective management (pp. 147–174). Palgrave Macmillan.
Harris, T. A. (1973). I’m ok - you’re OK. Pan.
Himanen, P. (2001). The hacker ethic: and the spirit of the information age. Secker & Warburg.
Hodgkinson, A., & Farthing, S. (2014). Blowing the whistle: protection for whistleblowers in Australia. https://www.kordamentha.com/getmedia/57522ffd-7648-49f9-a812-2e612dc30a11/issue-14-05-protection-for-whistleblowers-in-australia.pdf.aspx?ext=.pdf
How To Read Good Body Language. (n.d.). Professional CV Services. http://www.professional-cv-services.co.uk/intv/positive_body_language_at_job_interview.html
Huff, C., & Martin, C. D. (1995). Computing consequences: a framework for teaching ethical computing. Communications of the ACM, 38(12), 75–84. https://go.gale.com/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm&currentPosition=1&docId=GALE%7CA17779533&docType=Article&sort=Relevance&contentSegment=ZONE-MOD1&prodId=AONE&contentSet=GALE%7CA17779533&searchId=R2&userGroupName=murdoch&inPS=true&ps=1&cp=1
Hughes, S. (1990). Professional presentations: a practical guide to the preparation and performance of successful business presentations. McGraw-Hill.
Improving Safety-critical Systems with a Reliability Validation & Improvement Framework » SEI Blog. (n.d.). http://blog.sei.cmu.edu/post.cfm/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework
Information Security Forum: Research Reports (for non-Members). (n.d.). https://www.securityforum.org/research/
IP Australia. (2000). 2001 corporate profile. IP Australia.
Jackson, M. C. (1990). Beyond a System of Systems Methodologies. The Journal of the Operational Research Society, 41(8). https://doi.org/10.2307/2583472
Johnson, D. G., & Miller, K. W. (2009). Computer ethics : analyzing information technology. Pages 167-177. In Computer Ethics: analyzing Information Technology (pp. 167–177). Pearson Education.
Kassam, AlnaazIding, MarieHogenbirk, Pieter. (2013). Unraveling the digital divide: Time well spent or ‘wasted’? Education and Information Technologies, 18(2), 215–221. https://search.proquest.com/docview/1422045691/citation/159EF1E516E84E49PQ/1?accountid=12629
King, J. (2012). Technology for the greater good. Information Age.
Kizza, J M. (2003). Ethical and Social Issues in the Information Age. Springer-Verlag.
Kramar, R. (2005). HR’s role in ethics and corporate social responsibility. Human Resources Bulletin, 13 October.
Leech, T., & Leech, T. (2004). How to prepare, stage, and deliver winning presentations (3rd ed). American Management Association.
Management, Society for Human Resource. (2008). SHRM Code of Ethical and Professional Standards in Human Resource Management. Society for Human Resource Management. https://www.shrm.org/about-shrm/pages/bylaws--code-of-ethics.aspx
Martin, B. (1999). Whistleblowing and Nonviolence. Peace & Change, 24(1), 15–28. https://doi.org/10.1111/0149-0508.00107
Martin, C. (2007). A brief introduction to morality. In Ethics in information technology: Vol. Excellence in information systems (2nd ed, pp. 293–308). Thomson Course Technology.
Matejka, K., & Ramos, D. P. (1996). Hook ’em: speaking & writing to catch & keep a business audience. AMACOM.
McDermid, D. (2008a). Chapter 5: Cyberspace. In Ethics in ICT: an Australian perspective (pp. 125–162). Pearson Education Australia.
McDermid, D. (2008b). Chapter 5: Cyberspace. In Ethics in ICT: an Australian perspective (pp. 125–162). Pearson Education Australia.
Metadata retention: What is it and how might it impact whistleblowers in media and politics? - ABC News (Australian Broadcasting Corporation). (n.d.). http://www.abc.net.au/news/2015-03-17/metadata-data-retention-what-is-it/6324962
Mohan, T. (2008a). Communicating as professionals (2nd ed). Cengage Learning.
Mohan, T. (2008b). Communicating as professionals (2nd ed). Cengage Learning.
Mohan, T. (2008c). Communicating as professionals (2nd ed). Cengage Learning.
Mohan, T, McGregor, H, Saunders, S, & Archee, R. (2004). Communicating as professionals. Thomson Learning Australia.
Murphy, D. J. (2012a). Are intellectual property rights compatible with Rawlsian principles of justice? Ethics and Information Technology, 14(2), 109–121. https://doi.org/10.1007/s10676-012-9288-8
Murphy, D. J. (2012b). Are intellectual property rights compatible with Rawlsian principles of justice? Ethics and Information Technology, 14(2), 109–121. https://doi.org/10.1007/s10676-012-9288-8
Murphy, S. & Australia. Parliament. Senate. Select Committee on Unresolved Whistleblower Cases. (1995). The public interest revisited / report of the Senate Select Committee on Unresolved Whistleblower Cases: Vol. no. 344 of 1995. The Parliament of the Commonwealth of Australia.
Netflix has a problem with unmetered streaming | Analysis | Information Age | Australian Computer Society. (n.d.). https://ia.acs.org.au/news/netflix-has-a-problem-with-unmetered-streaming-402827?eid=70&edate=20150420&utm_source=20150420&utm_medium=newsletter&utm_campaign=newsletter
Neumann, Peter. (n.d.). Risks. SRI International Computer Science Laboratory. http://www.csl.sri.com/users/neumann/#3
News International phone hacking scandal. (n.d.). http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal
Only 6 percent mobile users in India are over 50 years of age: Telenor | Latest Tech News, Video & Photo Reviews at BGR India. (n.d.). http://www.bgr.in/news/only-6-percent-mobile-users-in-india-are-over-50-years-of-age-telenor/
Pan, J. (1999). Software Reliability. Carnegie Mellon University. http://users.ece.cmu.edu/~koopman/des_s99/sw_reliability/
Pease, A. (1981). Body Language: how to read others’ thoughts by their gestures. Camel Publishing. https://archive.org/details/BodyLanguageHowToReadOthersThoughtsByTheirGestures_201403
Perelman, M. (2002). Steal this idea: intellectual property rights and the corporate confiscation of creativity (1st ed). Palgrave.
Phillips, J. J. (2001). Butterworths intellectual property law handbook (5th ed). Butterworths.
Pourciau, L. J. (1999). Ethics and electronic information in the twenty-first century. Purdue University Press.
private i - your ultimate privacy survival guide. (n.d.). https://www.oaic.gov.au/images/documents/privacy/privacy-topics/youth/private-i_reduced.pdf
Professions Australia - Ethics Resoure Centre. (n.d.). http://www.professions.com.au/ethicsresource.html
Quinn, M. J. (2006). Chapter 2: Introduction to ethics. In Ethics for the information age (2nd ed, pp. 77–128). Pearson/Addison-Wesley.
Ramnit - Symantec and Other Industry Partners Assist Europol in Botnet Take Down. (26 C.E.). https://www.youtube.com/watch?v=U36S9Bwe3vY
Ramnit botnet: Cybercrime ring that used 3.2 million hacked computers to steal bank information disrupted by European police - ABC News (Australian Broadcasting Corporation). (n.d.). http://www.abc.net.au/news/2015-02-26/ramnit-botnet-cybercrime-ring-disrupted-by-police/6263038
Reynolds, G. W. (2012a). Ethics in information technology (4th ed). Course Technology, Cengage Learning.
Reynolds, G. W. (2012b). Ethics in information technology (4th ed). Course Technology, Cengage Learning.
Reynolds, G. W. (2015). Chapte 8: The impact of information technology on productivity and quality of life. In Ethics in information technology (Fifth edition, pp. 297–328). Cengage Learning.
Reynolds, G W. (2015a). Ethics in Information Technology (5th ed.). Course Technology, Cengage Learning.
Reynolds, G W. (2015b). Ethics in Information Technology (5th ed.). Course Technology, Cengage Learning.
Reynolds, G W. (2015c). Ethics in Information Technology (5th ed.). Course Technology, Cengage Learning.
Reynolds, G W. (2015d). Ethics in Information Technology (5th ed.). Course Technology, Cengage Learning.
Reynolds, G W. (2015e). Ethics in Information Technology (5th ed.). Course Technology, Cengage Learning.
RSA Animate -- The Secret Powers of Time. (23 C.E.). https://www.youtube.com/watch?v=A3oIiH7BLmg
Rubens, P. (2001a). Science and technical writing: a manual of style (2nd ed). Routledge. https://ebookcentral.proquest.com/lib/murdoch/reader.action?ppg=68&docID=170530&tm=1483931464666
Rubens, P. (2001b). Science and technical writing: a manual of style (2nd ed). Routledge. https://ebookcentral.proquest.com/lib/murdoch/detail.action?docID=170530
Rudman, R. (2005). HR’s dilemma: value or values? Human Resources Bulletin, 5 December.
Russell, J. (2013). Nestle wins latest battle with Cadbury over the colour purple. IP Whiteboard. http://ipwhiteboard.com.au/nestle-wins-latest-battle-with-cadbury-over-the-colour-purple-in-the-uk/
Sainsbury, M. (2004). Annotated Copyright Act. Lawbook Co.
Schonbeck, Martin. (2007). Introduction to the Reliability of Safety Systems. Norwegian University of Science and Technology (NTNU). https://dvikan.no/ntnu-studentserver/reports/martin07.pdf
Seddon, N & Ellinghaus., M. (1997). Cheshire & Fifoot’s Law of Contract (7th ed.). Butterworths.
Singh, M., & Cui, G. (2012). Multiple Dimensions of Media Communication Skills [Electronic resource]. In New media communication skills for engineers and IT professionals: trans-national and trans-cultural demands (pp. 160–174). Information Science Reference. https://doi.org/10.4018/978-1-4666-0243-4.ch010
Skyttner, L. (2001). General Systems Theory: ideas & applications. World Scientific. https://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=nlebk&AN=82612&site=ehost-live&custid=s1113140
Social impact assessment guideline. (n.d.). https://www.statedevelopment.qld.gov.au/resources/cg/social-impact-assessment-guideline.pdf
Software Quality Institute. (n.d.). Griffith University. https://www2.griffith.edu.au/institute-integrated-intelligent-systems/our-research/expertise/software-engineering-software-quality
Spier, R. (2001). Science and technology ethics: Vol. Professional ethics. Routledge.
Stallman, R., & Johnson, D. G. (2004). Chapter 13 and 14. In Computer ethics and professional responsibility (pp. 285–314). Blackwell Pub.
Tavani, H. T. (1999). Informational privacy, data mining, and the Internet. Ethics and Information Technology, 1(2), 137–145. https://doi.org/10.1023/A:1010063528863
Tavani, H. T. (2011). Chapter 12: Ethical aspects of emerging and converging technologies. In Ethics and technology: controversies, questions, and strategies for ethical computing (3rd ed, pp. 361–390). John Wiley & Sons.
The danger of losing situation awareness. (n.d.). http://download-v2.springer.com/static/pdf/918/art%253A10.1007%252Fs10111-015-0324-4.pdf?token2=exp=1430288771~acl=%2Fstatic%2Fpdf%2F918%2Fart%25253A10.1007%25252Fs10111-015-0324-4.pdf*~hmac=cda4b3d0d4a4333b23b48adf8bbcc9168ddf4be88886efc4c76d17d6de1b8a7a
The Office of the Privacy Commissioner: Information Technology and Internet Issues. (n.d.). https://www.oaic.gov.au/privacy/your-privacy-rights/social-media-and-technology/
The Online Ethics Center for Engineering and Science. (n.d.). https://onlineethics.org/
Toastmasters. (n.d.). http://www.toastmasters.org/about
Tonkens, R. (2012). Out of character: on the creation of virtuous machines. Ethics and Information Technology, 14(2), 137–149. https://doi.org/10.1007/s10676-012-9290-1
Trademark victory allows Cadbury to retain its purple reign. (n.d.). http://theconversation.com/trademark-victory-allows-cadbury-to-retain-its-purple-reign-9950
TRENDS FOR 2015: TARGETING THE CORPORATE WORLD. (n.d.). http://www.welivesecurity.com/wp-content/uploads/2015/02/trends-2015-targeting-corporate-world.pdf
Trevino, L. (2007). The key role of HR in organizational ethics. 2008. http://www.ethics.org/erc-publications/staff-articles.asp?aid=1084
Truss, L. (2005). Eats, shoots & leaves: the zero tolerance approach to punctuation (Paperback ed). Profile.
Unavoidable Ethical Questions About Social Networking. (2010). Markkula Center for Applied Ethics. Santa Clara University. http://www.scu.edu/ethics/publications/submitted/social-networking.html
Vanderbilt University Center for Ethics: case studies. (n.d.). http://www.vanderbilt.edu/CenterforEthics/cases.html#computer
Wakefield, J. (2010). World wakes up to digital divide. British Broadcasting Corporation. http://news.bbc.co.uk/2/hi/technology/8568681.stm
Weckert, J. (1997). Computer and Information Ethics. Greenwood Press.
What is ‘metadata’ and should you worry if yours is stored by law? (n.d.). http://www.smh.com.au/digital-life/digital-life-news/what-is-metadata-and-should-you-worry-if-yours-is-stored-by-law-20140806-100zae.html
What is Privacy? (n.d.). http://news.rutgers.edu/research-news/what-privacy/20150305#.VS4YlBZh8n0
WikiLeaks. (n.d.). http://en.wikipedia.org/wiki/WikiLeaks
Zuckerberg, M. (n.d.). Is Connectivity A Human Right? https://prandtheweb.files.wordpress.com/2013/08/connectivity-a-human-right.pdf