1
Quinn MJ. Chapter 2: Introduction to ethics. In: Ethics for the information age. Boston: : Pearson/Addison-Wesley 2006. 77–128.
2
Martin C. A brief introduction to morality. In: Ethics in information technology. Australia: : Thomson Course Technology 2007. 293–308.
3
Johnson DG, Miller KW. Computer ethics : analyzing information technology. Pages 167-177. In: Computer Ethics: analyzing Information Technology. Pearson Education 2009. 167–77.
4
Professions Australia - Ethics Resoure Centre. http://www.professions.com.au/ethicsresource.html
5
Ethics Resource Centre. http://www.professions.com.au/Homepage.html
6
The Office of the Privacy Commissioner: Information Technology and Internet Issues. https://www.oaic.gov.au/privacy/your-privacy-rights/social-media-and-technology/
7
Vanderbilt University Center for Ethics: case studies. http://www.vanderbilt.edu/CenterforEthics/cases.html#computer
8
Business Roundtable Institute for Corporate Ethics. http://www.corporate-ethics.org/
9
CAPPE. Centre For Applied Philosophy and Public Ethics. http://arts-ed.csu.edu.au/schools/humss/research#horizontalTab6
10
Reynolds GW. Ethics in information technology. 4th ed. Boston, MA: : Course Technology, Cengage Learning 2012.
11
Board, ACS Professional Standards. ACS Code of Professional Conduct. 2012.https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf
12
Anderson P, Queensland. Exposing corruption: a CJC guide to whistleblowing in Queensland. [Brisbane]: : Criminal Justice Commission 1996.
13
Murphy S, Australia. Parliament. Senate. Select Committee on Unresolved Whistleblower Cases. The public interest revisited / report of the Senate Select Committee on Unresolved Whistleblower Cases. [Canberra]: : The Parliament of the Commonwealth of Australia 1995.
14
Pourciau LJ. Ethics and electronic information in the twenty-first century. West Lafayette, Ind: : Purdue University Press 1999.
15
Spier R. Science and technology ethics. New York: : Routledge 2001.
16
Electronic Frontiers Australia Inc. (EFA). http://www.efa.org.au/
17
Martin B. Whistleblowing and Nonviolence. Peace & Change 1999;24:15–28. doi:10.1111/0149-0508.00107
18
Computer Professionals for Social Responsibility Mission. http://cpsr.org/about/mission/
19
Electrical and Electronics Engineers, Inc. (IEEE). http://www.ieee.org/web/aboutus/home/index.html
20
ACM Code of Ethics and Professional Conduct. 1992;2014.http://www.acm.org/about/code-of-ethics
21
Browse Inside Australian Story: Behind the Scenes by Deborah Fleming. http://browseinside.harpercollins.com.au/index.aspx?isbn13=9780733314421
22
Hodgkinson A, Farthing S. Blowing the whistle: protection for whistleblowers in Australia. 2014.https://www.kordamentha.com/getmedia/57522ffd-7648-49f9-a812-2e612dc30a11/issue-14-05-protection-for-whistleblowers-in-australia.pdf.aspx?ext=.pdf
23
ACS Code of Ethics. https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Ethics.pdf
24
The Online Ethics Center for Engineering and Science. https://onlineethics.org/
25
Association for the Advancement of Artificial Intelligence. http://www.aaai.org/Library/Reports/reports-library.php
26
AI Topics Ethics & Social Issues. https://aitopics.org/class/Technology/IT/AI/Issues
27
Reynolds GW. Chapte 8: The impact of information technology on productivity and quality of life. In: Ethics in information technology. Boston, MA: : Cengage Learning 2015. 297–328.
28
McDermid D. Chapter 5: Cyberspace. In: Ethics in ICT: an Australian perspective. Frenchs Forest, N.S.W.: : Pearson Education Australia 2008. 125–62.
29
Tavani HT. Chapter 12: Ethical aspects of emerging and converging technologies. In: Ethics and technology: controversies, questions, and strategies for ethical computing. Hoboken, N.J.: : John Wiley & Sons 2011. 361–90.
30
King, J. Technology for the greater good. Information Age 2012.
31
Tonkens R. Out of character: on the creation of virtuous machines. Ethics and Information Technology 2012;14:137–49. doi:10.1007/s10676-012-9290-1
32
Wakefield J. World wakes up to digital divide. 2010.http://news.bbc.co.uk/2/hi/technology/8568681.stm
33
Zuckerberg M. Is Connectivity A Human Right? https://prandtheweb.files.wordpress.com/2013/08/connectivity-a-human-right.pdf
34
Kassam, AlnaazIding, MarieHogenbirk, Pieter. Unraveling the digital divide: Time well spent or ‘wasted’? Education and Information Technologies 2013;18:215–21.https://search.proquest.com/docview/1422045691/citation/159EF1E516E84E49PQ/1?accountid=12629
35
News International phone hacking scandal. http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal
36
WikiLeaks. http://en.wikipedia.org/wiki/WikiLeaks
37
Only 6 percent mobile users in India are over 50 years of age: Telenor | Latest Tech News, Video & Photo Reviews at BGR India. http://www.bgr.in/news/only-6-percent-mobile-users-in-india-are-over-50-years-of-age-telenor/
38
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning 2015.
39
Mohan T. Communicating as professionals. 2nd ed. South Melbourne, Vic: : Cengage Learning 2008.
40
McDermid D. Chapter 5: Cyberspace. In: Ethics in ICT: an Australian perspective. Frenchs Forest, N.S.W.: : Pearson Education Australia 2008. 125–62.
41
Elder, B. Communication skills. MacMillan Education Australia 1994.
42
Harris TA. I’m ok - you’re OK. London: : Pan 1973.
43
Mohan, T, McGregor, H, Saunders, S, et al. Communicating as professionals. Thomson Learning Australia 2004.
44
Pease, A. Body Language: how to read others’ thoughts by their gestures. 1981.https://archive.org/details/BodyLanguageHowToReadOthersThoughtsByTheirGestures_201403
45
Unavoidable Ethical Questions About Social Networking. 2010.http://www.scu.edu/ethics/publications/submitted/social-networking.html
46
Consulting, Project Management. Project Management Issues and Considerations. 2002.http://www.maxwideman.com/issacons4/iac1435/sld001.htm
47
How To Read Good Body Language. http://www.professional-cv-services.co.uk/intv/positive_body_language_at_job_interview.html
48
RSA Animate -- The Secret Powers of Time. 23AD.https://www.youtube.com/watch?v=A3oIiH7BLmg
49
Netflix has a problem with unmetered streaming | Analysis | Information Age | Australian Computer Society. https://ia.acs.org.au/news/netflix-has-a-problem-with-unmetered-streaming-402827?eid=70&edate=20150420&utm_source=20150420&utm_medium=newsletter&utm_campaign=newsletter
50
Hughes, S. Professional presentations: a practical guide to the preparation and performance of successful business presentations. McGraw-Hill 1990.
51
Leech T, Leech T. How to prepare, stage, and deliver winning presentations. 3rd ed. New York: : American Management Association 2004.
52
Matejka K, Ramos DP. Hook ’em: speaking & writing to catch & keep a business audience. New York: : AMACOM 1996.
53
Mohan T. Communicating as professionals. 2nd ed. South Melbourne, Vic: : Cengage Learning 2008.
54
Hargie O, Dickson D, Tourish D. That silver-tongued devil...: making presentations matter. In: Communication skills for effective management. New York: : Palgrave Macmillan 2004. 147–74.
55
Toastmasters. http://www.toastmasters.org/about
56
Barrett, E., Paradis, J., Perelman, L. C. The Mayfield Handbook of Technical Scientific Writing. 1997.http://www.mhhe.com/mayfieldpub/tsw/toc.htm
57
Rubens P. Science and technical writing: a manual of style. 2nd ed. New York: : Routledge 2001. https://ebookcentral.proquest.com/lib/murdoch/reader.action?ppg=68&docID=170530&tm=1483931464666
58
Mohan T. Communicating as professionals. 2nd ed. South Melbourne, Vic: : Cengage Learning 2008.
59
Rubens P. Science and technical writing: a manual of style. 2nd ed. New York: : Routledge 2001. https://ebookcentral.proquest.com/lib/murdoch/detail.action?docID=170530
60
Beer DF, McMurrey DA. A guide to writing as an engineer. 2nd ed. New York: : Wiley 2005.
61
Budinski KG. Engineers’ guide to technical writing. Materials Park, OH: : ASM International 2001.
62
Truss L. Eats, shoots & leaves: the zero tolerance approach to punctuation. Paperback ed. London: : Profile 2005.
63
Cook, V. Accomodating Brocolli in the Cemetary: or why can’t anybody spell? Profile Books 2004.
64
Huff C, Martin CD. Computing consequences: a framework for teaching ethical computing. Communications of the ACM 1995;38:75–84.https://go.gale.com/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm&currentPosition=1&docId=GALE%7CA17779533&docType=Article&sort=Relevance&contentSegment=ZONE-MOD1&prodId=AONE&contentSet=GALE%7CA17779533&searchId=R2&userGroupName=murdoch&inPS=true&ps=1&cp=1
65
Social impact assessment guideline. https://www.statedevelopment.qld.gov.au/resources/cg/social-impact-assessment-guideline.pdf
66
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning 2015.
67
Commissioner, Office of the Privacy. private i - your ultimate privacy survival guide. Office of the Privacy Commissioner 2009. http://www.privacy.gov.au/materials/topics/internet
68
Seddon, N, Ellinghaus., M. Cheshire & Fifoot’s Law of Contract. 7th ed. Butterworths 1997.
69
Buckley RA. Illegality and public policy. London: : Sweet & Maxwell 2002.
70
Perelman M. Steal this idea: intellectual property rights and the corporate confiscation of creativity. 1st ed. New York: : Palgrave 2002.
71
Tavani HT. Informational privacy, data mining, and the Internet. Ethics and Information Technology 1999;1:137–45. doi:10.1023/A:1010063528863
72
Australia, State of Western. The Sale of Goods Act 1895: An Act for codifying the law relating to the sale of goods. 1895;(59 Vict. No. 41).https://www.slp.wa.gov.au/legislation/statutes.nsf/law_a726.html
73
Government, Australian. Trade Practices Act 1975. 1975;No. 63 of 1975.http://www.comlaw.gov.au/Details/C2004A00285
74
What is Privacy? http://news.rutgers.edu/research-news/what-privacy/20150305#.VS4YlBZh8n0
75
BIG DATA: SEIZING OPPORTUNITIES, PRESERVING VALUES. https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
76
private i - your ultimate privacy survival guide. https://www.oaic.gov.au/images/documents/privacy/privacy-topics/youth/private-i_reduced.pdf
77
What is ‘metadata’ and should you worry if yours is stored by law? http://www.smh.com.au/digital-life/digital-life-news/what-is-metadata-and-should-you-worry-if-yours-is-stored-by-law-20140806-100zae.html
78
Metadata retention: What is it and how might it impact whistleblowers in media and politics? - ABC News (Australian Broadcasting Corporation). http://www.abc.net.au/news/2015-03-17/metadata-data-retention-what-is-it/6324962
79
CISPA: The Awful Anti-Privacy Law That Won’t Prevent Another Sony Hack. http://gizmodo.com/cispa-the-awful-anti-privacy-law-that-wont-prevent-ano-1678561060
80
Andrejevic M. Big Data, Big Questions| The Big Data Divide |. International Journal of Communication 2014;8:1673–89.http://ijoc.org/index.php/ijoc/article/view/2161/1163
81
Communications Surveillance: Privacy and Security at Risk. https://cacm.acm.org/magazines/2009/11/48445-communications-surveillance-privacy-and-security-at-risk/fulltext
82
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning 2015.
83
Forum, Information Security. The Standard of Good Practice for Information Security. Information Security Forum 2007. https://kr-labs.com.ua/books/isf-standarts.pdf
84
AusCert. http://www.auscert.org.au
85
Neumann, Peter. Risks. http://www.csl.sri.com/users/neumann/#3
86
Information Security Forum: Research Reports (for non-Members). https://www.securityforum.org/research/
87
2015 Cybercrime Trends: Things are Going to Get Interesting. https://www.slideshare.net/galbaatar1/ss-62879383?next_slideshow=1
88
2015 Cybercrime Trends: Things are Going to Get Interesting. http://securityintelligence.com/events/2015-cybercrime-trends-things-going-get-interesting/#.VTcHfBZh8n1
89
Cybercrime predictions for 2015. http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/
90
TRENDS FOR 2015: TARGETING THE CORPORATE WORLD. http://www.welivesecurity.com/wp-content/uploads/2015/02/trends-2015-targeting-corporate-world.pdf
91
Chatterjee S, Sarker S, Valacich JS. The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use. Journal of Management Information Systems 2015;31:49–87. doi:10.1080/07421222.2014.1001257
92
Ramnit botnet: Cybercrime ring that used 3.2 million hacked computers to steal bank information disrupted by European police - ABC News (Australian Broadcasting Corporation). http://www.abc.net.au/news/2015-02-26/ramnit-botnet-cybercrime-ring-disrupted-by-police/6263038
93
Ramnit - Symantec and Other Industry Partners Assist Europol in Botnet Take Down. 26AD.https://www.youtube.com/watch?v=U36S9Bwe3vY
94
Reynolds GW. Ethics in information technology. 4th ed. Boston, MA: : Course Technology, Cengage Learning 2012.
95
Stallman R, Johnson DG. Chapter 13 and 14. In: Computer ethics and professional responsibility. Malden, MA: : Blackwell Pub 2004. 285–314.
96
Murphy DJ. Are intellectual property rights compatible with Rawlsian principles of justice? Ethics and Information Technology 2012;14:109–21. doi:10.1007/s10676-012-9288-8
97
IP Australia. 2001 corporate profile. Woden, A.C.T.: : IP Australia 2000.
98
Sainsbury M. Annotated Copyright Act. Sydney: : Lawbook Co. 2004.
99
Australian intellectual property cases. http://prod.resource.wkasiapacific.com/resource/scion/toc/atlas-csh/(WKAP_TAL_403334288)3EDEC6055B4FE2B3823DB08C:WKAP_TAL_ALECCASE_REFERENCE?cpid=WKAP-TAL-IC&cfu=WKAP&wksso=false
100
Allen, K R. Bringing New Technology to Market. Prentice Hall 2003.
101
Phillips JJ. Butterworths intellectual property law handbook. 5th ed. London: : Butterworths 2001.
102
Weckert, J. Computer and Information Ethics. Greenwood Press 1997.
103
Kizza, J M. Ethical and Social Issues in the Information Age. Springer-Verlag 2003.
104
Himanen P. The hacker ethic: and the spirit of the information age. London: : Secker & Warburg 2001.
105
Australian Copyright Council - Find an Answer. https://www.copyright.org.au/ACC/Find_an_Answer/ACC/Public_Content/Find_an_Answer.aspx?hkey=b0de2cd4-daa3-47da-95a5-1e7ecdc8dddc
106
Creative Commons Australia. http://creativecommons.org.au/
107
Murphy DJ. Are intellectual property rights compatible with Rawlsian principles of justice? Ethics and Information Technology 2012;14:109–21. doi:10.1007/s10676-012-9288-8
108
Trademark victory allows Cadbury to retain its purple reign. http://theconversation.com/trademark-victory-allows-cadbury-to-retain-its-purple-reign-9950
109
Russell J. Nestle wins latest battle with Cadbury over the colour purple. IP Whiteboard. 2013.http://ipwhiteboard.com.au/nestle-wins-latest-battle-with-cadbury-over-the-colour-purple-in-the-uk/
110
| IP Australia. http://www.ipaustralia.gov.au/
111
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning 2015.
112
Bolton S, McDermid D. System reliability. In: Ethics in ICT: an Australian perspective. Frenchs Forest, N.S.W.: : Pearson Education Australia 2008. 179–98.
113
Flood, R L. A brief review of Peter B. Checkland’s contribution to systemic thinking. Systemic Practice and Action Research 2000;13:723–31.https://search.proquest.com/docview/211444426/4DCA4C80E8FD4160PQ/2?accountid=12629
114
Jackson MC. Beyond a System of Systems Methodologies. The Journal of the Operational Research Society 1990;41. doi:10.2307/2583472
115
Skyttner L. General Systems Theory: ideas & applications. World Scientific 2001. https://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=nlebk&AN=82612&site=ehost-live&custid=s1113140
116
Feiler P. Improving Safety-Critical Systems with a Reliability Validation and Improvement Framework. 2012.https://insights.sei.cmu.edu/sei_blog/2013/06/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework.html
117
Pan J. Software Reliability. 1999.http://users.ece.cmu.edu/~koopman/des_s99/sw_reliability/
118
Bowen, Jonathan. The Ethics of Safety-Critical Systems. Communications of the ACM 2000;43:91–7.https://go.galegroup.com/ps/i.do?p=ITOF&u=murdoch&id=GALE|A61792759&v=2.1&it=r&sid=summon
119
Software Quality Institute. https://www2.griffith.edu.au/institute-integrated-intelligent-systems/our-research/expertise/software-engineering-software-quality
120
Schonbeck, Martin. Introduction to the Reliability of Safety Systems. 2007.https://dvikan.no/ntnu-studentserver/reports/martin07.pdf
121
Dekker SWA. The danger of losing situation awareness. Cognition, Technology & Work 2015;17:159–61. doi:10.1007/s10111-015-0320-8
122
The danger of losing situation awareness. http://download-v2.springer.com/static/pdf/918/art%253A10.1007%252Fs10111-015-0324-4.pdf?token2=exp=1430288771~acl=%2Fstatic%2Fpdf%2F918%2Fart%25253A10.1007%25252Fs10111-015-0324-4.pdf*~hmac=cda4b3d0d4a4333b23b48adf8bbcc9168ddf4be88886efc4c76d17d6de1b8a7a
123
Improving Safety-critical Systems with a Reliability Validation & Improvement Framework » SEI Blog. http://blog.sei.cmu.edu/post.cfm/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework
124
Trevino, L. The key role of HR in organizational ethics. 2007;2008.http://www.ethics.org/erc-publications/staff-articles.asp?aid=1084
125
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning 2015.
126
CCH. HR Strategy and Workforce Planning. CCH Australia Ltd 2005.
127
Cooke, E. The Modern Law of Estoppel. Oxford University Press 2000.
128
Rudman, R. HR’s dilemma: value or values? Human Resources Bulletin 2005;5 December.
129
Kramar, R. HR’s role in ethics and corporate social responsibility. Human Resources Bulletin 2005;13 October.
130
Halleck J. Free Software Dilemma. 2000.http://www.cc.utah.edu/~nahaj/ethics/freesoftware.html
131
Management, Society for Human Resource. SHRM Code of Ethical and Professional Standards in Human Resource Management. 2008.https://www.shrm.org/about-shrm/pages/bylaws--code-of-ethics.aspx
132
Global Project Management.org Home Page. 2007.http://globalprojectmanagement.org/
133
Briguglio C. Linguistic and Cultural Skills for Communication in Global Workplaces of the 21st Century. In: Cross-cultural interaction: concepts, methodologies, tools, and applications. Hershey, PA: : Information Science Reference 2014. 832–48. doi:10.4018/978-1-4666-4979-8.ch047
134
Singh M, Cui G. Multiple Dimensions of Media Communication Skills. In: New media communication skills for engineers and IT professionals: trans-national and trans-cultural demands. Hershey, PA: : Information Science Reference 2012. 160–74. doi:10.4018/978-1-4666-0243-4.ch010
135
Chua RYJ, Roth Y, Lemoine J-F. The Impact of Culture on Creativity. Administrative Science Quarterly 2015;60:189–227. doi:10.1177/0001839214563595
136
Bennett M. INTERCULTURAL COMPETENCE FOR GLOBAL LEADERSHIP. https://www.idrinstitute.org/resources/intercultural-competence-global-leadership/