Allen, K R, Bringing New Technology to Market (Prentice Hall, 2003)
Anderson, Peter and Queensland, Exposing Corruption: A CJC Guide to Whistleblowing in Queensland (Criminal Justice Commission, 1996)
Andrejevic, Mark, ‘Big Data, Big Questions| The Big Data Divide |’ (2014) 8 International Journal of Communication 1673 <http://ijoc.org/index.php/ijoc/article/view/2161/1163>
Beer, David F and David A McMurrey, A Guide to Writing as an Engineer (Wiley, 2nd ed, 2005)
Bolton, Sue and Donald McDermid, ‘System Reliability’ in Ethics in ICT: An Australian Perspective (Pearson Education Australia, 2008) 179
Bowen, Jonathan, ‘The Ethics of Safety-Critical Systems’ (2000) 43(4) Communications of the ACM 91 <https://go.galegroup.com/ps/i.do?p=ITOF&u=murdoch&id=GALE|A61792759&v=2.1&it=r&sid=summon>
Briguglio, Carmela, ‘Linguistic and Cultural Skills for Communication in Global Workplaces of the 21st Century’ in Cross-Cultural Interaction: Concepts, Methodologies, Tools, and Applications (Electronic resource, Information Science Reference, 2014) 832 <https://www.igi.global.com/gateway/chapter/97506>
Buckley, RA, Illegality and Public Policy, vol The contract law library (Sweet & Maxwell, 2002)
Budinski, Kenneth G, Engineers’ Guide to Technical Writing (ASM International, 2001)
CCH, HR Strategy and Workforce Planning (CCH Australia Ltd, 2005)
Chatterjee, Sutirtha, Suprateek Sarker and Joseph S Valacich, ‘The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use’ (2015) 31(4) Journal of Management Information Systems 49
Chua, Roy YJ, Yannig Roth and Jean-François Lemoine, ‘The Impact of Culture on Creativity’ (2015) 60(2) Administrative Science Quarterly 189
Commissioner, Office of the Privacy, Private i - Your Ultimate Privacy Survival Guide (Office of the Privacy Commissioner, 2009) <http://www.privacy.gov.au/materials/topics/internet>
Cook, V, Accomodating Brocolli in the Cemetary: Or Why Can’t Anybody Spell? (Profile Books, 2004)
Cooke, E., The Modern Law of Estoppel (Oxford University Press, 2000)
Dekker, Sidney WA, ‘The Danger of Losing Situation Awareness’ (2015) 17(2) Cognition, Technology & Work 159
Elder, B, Communication Skills (MacMillan Education Australia, 1994)
Flood, R L, ‘A Brief Review of Peter B. Checkland’s Contribution to Systemic Thinking’ (2000) 13(6) Systemic Practice and Action Research 723 <https://search.proquest.com/docview/211444426/4DCA4C80E8FD4160PQ/2?accountid=12629>
Forum, Information Security, The Standard of Good Practice for Information Security (Information Security Forum, 2007) <https://kr-labs.com.ua/books/isf-standarts.pdf>
Hargie, Owen, David Dickson and Dennis Tourish, ‘That Silver-Tongued Devil...: Making Presentations Matter’ in Communication Skills for Effective Management (Palgrave Macmillan, 2004) 147
Harris, Thomas A, I’m Ok - You’re OK (Pan, 1973)
Himanen, Pekka, The Hacker Ethic: And the Spirit of the Information Age (Secker & Warburg, 2001)
Huff, Chuck and C Dianne Martin, ‘Computing Consequences: A Framework for Teaching Ethical Computing’ (1995) 38(12) Communications of the ACM 75 <https://go.gale.com/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm&currentPosition=1&docId=GALE%7CA17779533&docType=Article&sort=Relevance&contentSegment=ZONE-MOD1&prodId=AONE&contentSet=GALE%7CA17779533&searchId=R2&userGroupName=murdoch&inPS=true&ps=1&cp=1>
Hughes, S, Professional Presentations: A Practical Guide to the Preparation and Performance of Successful Business Presentations (McGraw-Hill, 1990)
IP Australia, 2001 Corporate Profile (IP Australia, 2000)
Jackson, MC, ‘Beyond a System of Systems Methodologies’ (1990) 41(8) The Journal of the Operational Research Society
Johnson, Deborah G and Keith W Miller, ‘Computer Ethics : Analyzing Information Technology. Pages 167-177’ in Computer Ethics: Analyzing Information Technology (Pearson Education, 2009) 167
Kassam, AlnaazIding, MarieHogenbirk, Pieter, ‘Unraveling the Digital Divide: Time Well Spent or “Wasted”?’ (2013) 18(2) Education and Information Technologies 215 <https://search.proquest.com/docview/1422045691/citation/159EF1E516E84E49PQ/1?accountid=12629>
King, J, ‘Technology for the Greater Good’ [2012] Information Age
Kizza, J M, Ethical and Social Issues in the Information Age (Springer-Verlag, 2003)
Kramar, R, ‘HR’s Role in Ethics and Corporate Social Responsibility’ (2005) 13 October Human Resources Bulletin
Leech, Thomas and Thomas Leech, How to Prepare, Stage, and Deliver Winning Presentations (American Management Association, 3rd ed, 2004)
Martin, Brian, ‘Whistleblowing and Nonviolence’ (1999) 24(1) Peace & Change 15
Martin, Clancy, ‘A Brief Introduction to Morality’ in Ethics in Information Technology (Thomson Course Technology, 2nd ed, 2007) 293
Matejka, Ken and Diane P Ramos, Hook ’em: Speaking & Writing to Catch & Keep a Business Audience (AMACOM, 1996)
McDermid, Donald, ‘Chapter 5: Cyberspace’ in Ethics in ICT: An Australian Perspective (Pearson Education Australia, 2008) 125
McDermid, Donald, ‘Chapter 5: Cyberspace’ in Ethics in ICT: An Australian Perspective (Pearson Education Australia, 2008) 125
Mohan, T et al, Communicating as Professionals (Thomson Learning Australia, 2004)
Mohan, Terry, Communicating as Professionals (Cengage Learning, 2nd ed, 2008)
Mohan, Terry, Communicating as Professionals (Cengage Learning, 2nd ed, 2008)
Mohan, Terry, Communicating as Professionals (Cengage Learning, 2nd ed, 2008)
Murphy, Darryl J, ‘Are Intellectual Property Rights Compatible with Rawlsian Principles of Justice?’ (2012) 14(2) Ethics and Information Technology 109
Murphy, Darryl J, ‘Are Intellectual Property Rights Compatible with Rawlsian Principles of Justice?’ (2012) 14(2) Ethics and Information Technology 109
Murphy, Shayne and Australia. Parliament. Senate. Select Committee on Unresolved Whistleblower Cases, The Public Interest Revisited / Report of the Senate Select Committee on Unresolved Whistleblower Cases, vol no. 344 of 1995 (The Parliament of the Commonwealth of Australia, 1995)
Perelman, Michael, Steal This Idea: Intellectual Property Rights and the Corporate Confiscation of Creativity (Palgrave, 1st ed, 2002)
Phillips, Jeremy J, Butterworths Intellectual Property Law Handbook (Butterworths, 5th ed, 2001)
Pourciau, Lester J, Ethics and Electronic Information in the Twenty-First Century (Purdue University Press, 1999)
Quinn, Michael J, ‘Chapter 2: Introduction to Ethics’ in Ethics for the Information Age (Pearson/Addison-Wesley, 2nd ed, 2006) 77
Reynolds, G W, Ethics in Information Technology (Course Technology, Cengage Learning, 5th ed, 2015)
Reynolds, G W, Ethics in Information Technology (Course Technology, Cengage Learning, 5th ed, 2015)
Reynolds, G W, Ethics in Information Technology (Course Technology, Cengage Learning, 5th ed, 2015)
Reynolds, G W, Ethics in Information Technology (Course Technology, Cengage Learning, 5th ed, 2015)
Reynolds, G W, Ethics in Information Technology (Course Technology, Cengage Learning, 5th ed, 2015)
Reynolds, George Walter, ‘Chapte 8: The Impact of Information Technology on Productivity and Quality of Life’ in Ethics in Information Technology (Cengage Learning, Fifth edition, 2015) 297
Reynolds, George Walter, Ethics in Information Technology (Course Technology, Cengage Learning, 4th ed, 2012)
Reynolds, George Walter, Ethics in Information Technology (Course Technology, Cengage Learning, 4th ed, 2012)
Rubens, Philip, Science and Technical Writing: A Manual of Style (Routledge, 2nd ed, 2001) <https://ebookcentral.proquest.com/lib/murdoch/reader.action?ppg=68&docID=170530&tm=1483931464666>
Rubens, Philip, Science and Technical Writing: A Manual of Style (Routledge, 2nd ed, 2001) <https://ebookcentral.proquest.com/lib/murdoch/detail.action?docID=170530>
Rudman, R, ‘HR’s Dilemma: Value or Values?’ (2005) 5 December Human Resources Bulletin
Sainsbury, Maree, Annotated Copyright Act (Lawbook Co., 2004)
Seddon, N and Ellinghaus., M, Cheshire & Fifoot’s Law of Contract (Butterworths, 7th ed, 1997)
Singh, Michael and Guihua Cui, ‘Multiple Dimensions of Media Communication Skills’ in New Media Communication Skills for Engineers and IT Professionals: Trans-National and Trans-Cultural Demands (Electronic resource, Information Science Reference, 2012) 160 <http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0243-4.ch010>
Skyttner, Lars, General Systems Theory: Ideas & Applications (World Scientific, 2001) <https://search.ebscohost.com/login.aspx?direct=true&amp;AuthType=shib&amp;db=nlebk&amp;AN=82612&amp;site=ehost-live&amp;custid=s1113140>
Spier, R, Science and Technology Ethics, vol Professional ethics (Routledge, 2001)
Stallman, Richard and Deborah G Johnson, ‘Chapter 13 and 14’ in Computer Ethics and Professional Responsibility (Blackwell Pub, 2004) 285
Tavani, Herman T, ‘Chapter 12: Ethical Aspects of Emerging and Converging Technologies’ in Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing (John Wiley & Sons, 3rd ed, 2011) 361
Tavani, Herman T, ‘Informational Privacy, Data Mining, and the Internet’ (1999) 1(2) Ethics and Information Technology 137
Tonkens, Ryan, ‘Out of Character: On the Creation of Virtuous Machines’ (2012) 14(2) Ethics and Information Technology 137
Trevino, L, ‘The Key Role of HR in Organizational Ethics’ (2007) 2008 <http://www.ethics.org/erc-publications/staff-articles.asp?aid=1084>
Truss, Lynne, Eats, Shoots & Leaves: The Zero Tolerance Approach to Punctuation (Profile, Paperback ed, 2005)
Weckert, J, Computer and Information Ethics (Greenwood Press, 1997)
‘| IP Australia’ <http://www.ipaustralia.gov.au/>
‘2015 Cybercrime Trends: Things Are Going to Get Interesting’ <https://www.slideshare.net/galbaatar1/ss-62879383?next_slideshow=1>
‘2015 Cybercrime Trends: Things Are Going to Get Interesting’ <http://securityintelligence.com/events/2015-cybercrime-trends-things-going-get-interesting/#.VTcHfBZh8n1>
‘ACM Code of Ethics and Professional Conduct’ (1992) <http://www.acm.org/about/code-of-ethics>
‘ACS Code of Ethics’ <https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Ethics.pdf>
‘AI Topics Ethics & Social Issues’ <https://aitopics.org/class/Technology/IT/AI/Issues>
‘Association for the Advancement of Artificial Intelligence’ <http://www.aaai.org/Library/Reports/reports-library.php>
‘AusCert’ <http://www.auscert.org.au>
Australia, State of Western, ‘The Sale of Goods Act 1895: An Act for Codifying the Law Relating to the Sale of Goods’ <https://www.slp.wa.gov.au/legislation/statutes.nsf/law_a726.html>
‘Australian Copyright Council - Find an Answer’ <https://www.copyright.org.au/ACC/Find_an_Answer/ACC/Public_Content/Find_an_Answer.aspx?hkey=b0de2cd4-daa3-47da-95a5-1e7ecdc8dddc>
‘Australian Intellectual Property Cases’ <http://prod.resource.wkasiapacific.com/resource/scion/toc/atlas-csh/(WKAP_TAL_403334288)3EDEC6055B4FE2B3823DB08C:WKAP_TAL_ALECCASE_REFERENCE?cpid=WKAP-TAL-IC&cfu=WKAP&wksso=false>
Barrett, E., Paradis, J., and Perelman, L. C., ‘The Mayfield Handbook of Technical Scientific Writing’ (1997) <http://www.mhhe.com/mayfieldpub/tsw/toc.htm>
Bennett, Milton, ‘INTERCULTURAL COMPETENCE FOR GLOBAL LEADERSHIP’ <https://www.idrinstitute.org/resources/intercultural-competence-global-leadership/>
‘BIG DATA: SEIZING OPPORTUNITIES, PRESERVING VALUES’ <https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf>
Board, ACS Professional Standards, ‘ACS Code of Professional Conduct’ <https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf>
‘Browse Inside Australian Story: Behind the Scenes by Deborah Fleming’ <http://browseinside.harpercollins.com.au/index.aspx?isbn13=9780733314421>
‘Business Roundtable Institute for Corporate Ethics’ <http://www.corporate-ethics.org/>
‘CAPPE. Centre For Applied Philosophy and Public Ethics.’ <http://arts-ed.csu.edu.au/schools/humss/research#horizontalTab6>
‘CISPA: The Awful Anti-Privacy Law That Won’t Prevent Another Sony Hack’ <http://gizmodo.com/cispa-the-awful-anti-privacy-law-that-wont-prevent-ano-1678561060>
‘Communications Surveillance: Privacy and Security at Risk’ <https://cacm.acm.org/magazines/2009/11/48445-communications-surveillance-privacy-and-security-at-risk/fulltext>
‘Computer Professionals for Social Responsibility Mission’ <http://cpsr.org/about/mission/>
Consulting, Project Management, ‘Project Management Issues and Considerations’ <http://www.maxwideman.com/issacons4/iac1435/sld001.htm>
‘Creative Commons Australia’ <http://creativecommons.org.au/>
‘Cybercrime Predictions for 2015’ <http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/>
‘Electrical and Electronics Engineers, Inc. (IEEE)’ <http://www.ieee.org/web/aboutus/home/index.html>
‘Electronic Frontiers Australia Inc. (EFA)’ <http://www.efa.org.au/>
‘Ethics Resource Centre’ <http://www.professions.com.au/Homepage.html>
Feiler, Peter, ‘Improving Safety-Critical Systems with a Reliability Validation and Improvement Framework’ <https://insights.sei.cmu.edu/sei_blog/2013/06/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework.html>
‘Global Project Management.Org Home Page’ <http://globalprojectmanagement.org/>
Government, Australian, ‘Trade Practices Act 1975’ <http://www.comlaw.gov.au/Details/C2004A00285>
Halleck, John, ‘Free Software Dilemma’ (2000) <http://www.cc.utah.edu/~nahaj/ethics/freesoftware.html>
Hodgkinson, Anthony and Samantha Farthing, ‘Blowing the Whistle: Protection for Whistleblowers in Australia’ <https://www.kordamentha.com/getmedia/57522ffd-7648-49f9-a812-2e612dc30a11/issue-14-05-protection-for-whistleblowers-in-australia.pdf.aspx?ext=.pdf>
‘How To Read Good Body Language’ <http://www.professional-cv-services.co.uk/intv/positive_body_language_at_job_interview.html>
‘Improving Safety-Critical Systems with a Reliability Validation & Improvement Framework » SEI Blog’ <http://blog.sei.cmu.edu/post.cfm/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework>
‘Information Security Forum: Research Reports (for Non-Members)’ <https://www.securityforum.org/research/>
Management, Society for Human Resource, ‘SHRM Code of Ethical and Professional Standards in Human Resource Management’ <https://www.shrm.org/about-shrm/pages/bylaws--code-of-ethics.aspx>
‘Metadata Retention: What Is It and How Might It Impact Whistleblowers in Media and Politics? - ABC News (Australian Broadcasting Corporation)’ <http://www.abc.net.au/news/2015-03-17/metadata-data-retention-what-is-it/6324962>
‘Netflix Has a Problem with Unmetered Streaming | Analysis | Information Age | Australian Computer Society’ <https://ia.acs.org.au/news/netflix-has-a-problem-with-unmetered-streaming-402827?eid=70&edate=20150420&utm_source=20150420&utm_medium=newsletter&utm_campaign=newsletter>
Neumann, Peter, ‘Risks’ <http://www.csl.sri.com/users/neumann/#3>
‘News International Phone Hacking Scandal’ <http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal>
‘Only 6 Percent Mobile Users in India Are over 50 Years of Age: Telenor | Latest Tech News, Video & Photo Reviews at BGR India’ <http://www.bgr.in/news/only-6-percent-mobile-users-in-india-are-over-50-years-of-age-telenor/>
Pan, Jiantao, ‘Software Reliability’ (1999) <http://users.ece.cmu.edu/~koopman/des_s99/sw_reliability/>
Pease, A, ‘Body Language: How to Read Others’ Thoughts by Their Gestures’ <https://archive.org/details/BodyLanguageHowToReadOthersThoughtsByTheirGestures_201403>
‘Private i - Your Ultimate Privacy Survival Guide’ <https://www.oaic.gov.au/images/documents/privacy/privacy-topics/youth/private-i_reduced.pdf>
‘Professions Australia - Ethics Resoure Centre’ <http://www.professions.com.au/ethicsresource.html>
‘Ramnit - Symantec and Other Industry Partners Assist Europol in Botnet Take Down’ <https://www.youtube.com/watch?v=U36S9Bwe3vY>
‘Ramnit Botnet: Cybercrime Ring That Used 3.2 Million Hacked Computers to Steal Bank Information Disrupted by European Police - ABC News (Australian Broadcasting Corporation)’ <http://www.abc.net.au/news/2015-02-26/ramnit-botnet-cybercrime-ring-disrupted-by-police/6263038>
‘RSA Animate -- The Secret Powers of Time’ <https://www.youtube.com/watch?v=A3oIiH7BLmg>
Russell, James, ‘Nestle Wins Latest Battle with Cadbury over the Colour Purple’, IP Whiteboard (2013) <http://ipwhiteboard.com.au/nestle-wins-latest-battle-with-cadbury-over-the-colour-purple-in-the-uk/>
Schonbeck, Martin, ‘Introduction to the Reliability of Safety Systems’ <https://dvikan.no/ntnu-studentserver/reports/martin07.pdf>
‘Social Impact Assessment Guideline’ <https://www.statedevelopment.qld.gov.au/resources/cg/social-impact-assessment-guideline.pdf>
‘Software Quality Institute’ <https://www2.griffith.edu.au/institute-integrated-intelligent-systems/our-research/expertise/software-engineering-software-quality>
‘The Danger of Losing Situation Awareness’ <http://download-v2.springer.com/static/pdf/918/art%253A10.1007%252Fs10111-015-0324-4.pdf?token2=exp=1430288771~acl=%2Fstatic%2Fpdf%2F918%2Fart%25253A10.1007%25252Fs10111-015-0324-4.pdf*~hmac=cda4b3d0d4a4333b23b48adf8bbcc9168ddf4be88886efc4c76d17d6de1b8a7a>
‘The Office of the Privacy Commissioner: Information Technology and Internet Issues’ <https://www.oaic.gov.au/privacy/your-privacy-rights/social-media-and-technology/>
‘The Online Ethics Center for Engineering and Science’ <https://onlineethics.org/>
‘Toastmasters’ <http://www.toastmasters.org/about>
‘Trademark Victory Allows Cadbury to Retain Its Purple Reign’ <http://theconversation.com/trademark-victory-allows-cadbury-to-retain-its-purple-reign-9950>
‘TRENDS FOR 2015: TARGETING THE CORPORATE WORLD’ <http://www.welivesecurity.com/wp-content/uploads/2015/02/trends-2015-targeting-corporate-world.pdf>
‘Unavoidable Ethical Questions About Social Networking’ <http://www.scu.edu/ethics/publications/submitted/social-networking.html>
‘Vanderbilt University Center for Ethics: Case Studies’ <http://www.vanderbilt.edu/CenterforEthics/cases.html#computer>
Wakefield, Jane, ‘World Wakes up to Digital Divide’ (2010) <http://news.bbc.co.uk/2/hi/technology/8568681.stm>
‘What Is “metadata” and Should You Worry If Yours Is Stored by Law?’ <http://www.smh.com.au/digital-life/digital-life-news/what-is-metadata-and-should-you-worry-if-yours-is-stored-by-law-20140806-100zae.html>
‘What Is Privacy?’ <http://news.rutgers.edu/research-news/what-privacy/20150305#.VS4YlBZh8n0>
‘WikiLeaks’ <http://en.wikipedia.org/wiki/WikiLeaks>
Zuckerberg, Mark, ‘Is Connectivity A Human Right?’ <https://prandtheweb.files.wordpress.com/2013/08/connectivity-a-human-right.pdf>