[1]
M. J. Quinn, ‘Chapter 2: Introduction to ethics’, in Ethics for the information age, 2nd ed., Boston: Pearson/Addison-Wesley, 2006, pp. 77–128.
[2]
C. Martin, ‘A brief introduction to morality’, in Ethics in information technology, 2nd ed., vol. Excellence in information systems, Australia: Thomson Course Technology, 2007, pp. 293–308.
[3]
D. G. Johnson and K. W. Miller, ‘Computer ethics : analyzing information technology. Pages 167-177’, in Computer Ethics: analyzing Information Technology, Pearson Education, 2009, pp. 167–177.
[4]
‘Professions Australia - Ethics Resoure Centre’. [Online]. Available: http://www.professions.com.au/ethicsresource.html
[5]
‘Ethics Resource Centre’. [Online]. Available: http://www.professions.com.au/Homepage.html
[6]
‘The Office of the Privacy Commissioner: Information Technology and Internet Issues’. [Online]. Available: https://www.oaic.gov.au/privacy/your-privacy-rights/social-media-and-technology/
[7]
‘Vanderbilt University Center for Ethics: case studies’. [Online]. Available: http://www.vanderbilt.edu/CenterforEthics/cases.html#computer
[8]
‘Business Roundtable Institute for Corporate Ethics’. [Online]. Available: http://www.corporate-ethics.org/
[9]
‘CAPPE. Centre For Applied Philosophy and Public Ethics.’ [Online]. Available: http://arts-ed.csu.edu.au/schools/humss/research#horizontalTab6
[10]
G. W. Reynolds, Ethics in information technology, 4th ed. Boston, MA: Course Technology, Cengage Learning, 2012.
[11]
Board, ACS Professional Standards, ‘ACS Code of Professional Conduct’. Australian Computer Society, 2012 [Online]. Available: https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf
[12]
P. Anderson and Queensland, Exposing corruption: a CJC guide to whistleblowing in Queensland. [Brisbane]: Criminal Justice Commission, 1996.
[13]
S. Murphy and Australia. Parliament. Senate. Select Committee on Unresolved Whistleblower Cases, The public interest revisited / report of the Senate Select Committee on Unresolved Whistleblower Cases, vol. no. 344 of 1995. [Canberra]: The Parliament of the Commonwealth of Australia, 1995.
[14]
L. J. Pourciau, Ethics and electronic information in the twenty-first century. West Lafayette, Ind: Purdue University Press, 1999.
[15]
R. Spier, Science and technology ethics, vol. Professional ethics. New York: Routledge, 2001.
[16]
‘Electronic Frontiers Australia Inc. (EFA)’. [Online]. Available: http://www.efa.org.au/
[17]
B. Martin, ‘Whistleblowing and Nonviolence’, Peace & Change, vol. 24, no. 1, pp. 15–28, Jan. 1999, doi: 10.1111/0149-0508.00107.
[18]
‘Computer Professionals for Social Responsibility Mission’. [Online]. Available: http://cpsr.org/about/mission/
[19]
‘Electrical and Electronics Engineers, Inc. (IEEE)’. [Online]. Available: http://www.ieee.org/web/aboutus/home/index.html
[20]
‘ACM Code of Ethics and Professional Conduct’, 1992. [Online]. Available: http://www.acm.org/about/code-of-ethics
[21]
‘Browse Inside Australian Story: Behind the Scenes by Deborah Fleming’. [Online]. Available: http://browseinside.harpercollins.com.au/index.aspx?isbn13=9780733314421
[22]
A. Hodgkinson and S. Farthing, ‘Blowing the whistle: protection for whistleblowers in Australia’. 2014 [Online]. Available: https://www.kordamentha.com/getmedia/57522ffd-7648-49f9-a812-2e612dc30a11/issue-14-05-protection-for-whistleblowers-in-australia.pdf.aspx?ext=.pdf
[23]
‘ACS Code of Ethics’. [Online]. Available: https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Ethics.pdf
[24]
‘The Online Ethics Center for Engineering and Science’. [Online]. Available: https://onlineethics.org/
[25]
‘Association for the Advancement of Artificial Intelligence’. [Online]. Available: http://www.aaai.org/Library/Reports/reports-library.php
[26]
‘AI Topics Ethics & Social Issues’. [Online]. Available: https://aitopics.org/class/Technology/IT/AI/Issues
[27]
G. W. Reynolds, ‘Chapte 8: The impact of information technology on productivity and quality of life’, in Ethics in information technology, Fifth edition., Boston, MA: Cengage Learning, 2015, pp. 297–328.
[28]
D. McDermid, ‘Chapter 5: Cyberspace’, in Ethics in ICT: an Australian perspective, Frenchs Forest, N.S.W.: Pearson Education Australia, 2008, pp. 125–162.
[29]
H. T. Tavani, ‘Chapter 12: Ethical aspects of emerging and converging technologies’, in Ethics and technology: controversies, questions, and strategies for ethical computing, 3rd ed., Hoboken, N.J.: John Wiley & Sons, 2011, pp. 361–390.
[30]
King, J, ‘Technology for the greater good’, Information Age, 2012.
[31]
R. Tonkens, ‘Out of character: on the creation of virtuous machines’, Ethics and Information Technology, vol. 14, no. 2, pp. 137–149, Jun. 2012, doi: 10.1007/s10676-012-9290-1.
[32]
J. Wakefield, ‘World wakes up to digital divide’, 2010. [Online]. Available: http://news.bbc.co.uk/2/hi/technology/8568681.stm
[33]
M. Zuckerberg, ‘Is Connectivity A Human Right?’ [Online]. Available: https://prandtheweb.files.wordpress.com/2013/08/connectivity-a-human-right.pdf
[34]
Kassam, AlnaazIding, MarieHogenbirk, Pieter, ‘Unraveling the digital divide: Time well spent or “wasted”?’, Education and Information Technologies, vol. 18, no. 2, pp. 215–221, 2013 [Online]. Available: https://search.proquest.com/docview/1422045691/citation/159EF1E516E84E49PQ/1?accountid=12629
[35]
‘News International phone hacking scandal’. [Online]. Available: http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal
[36]
‘WikiLeaks’. [Online]. Available: http://en.wikipedia.org/wiki/WikiLeaks
[37]
‘Only 6 percent mobile users in India are over 50 years of age: Telenor | Latest Tech News, Video & Photo Reviews at BGR India’. [Online]. Available: http://www.bgr.in/news/only-6-percent-mobile-users-in-india-are-over-50-years-of-age-telenor/
[38]
Reynolds, G W, Ethics in Information Technology, 5th ed. Course Technology, Cengage Learning, 2015.
[39]
T. Mohan, Communicating as professionals, 2nd ed. South Melbourne, Vic: Cengage Learning, 2008.
[40]
D. McDermid, ‘Chapter 5: Cyberspace’, in Ethics in ICT: an Australian perspective, Frenchs Forest, N.S.W.: Pearson Education Australia, 2008, pp. 125–162.
[41]
Elder, B, Communication skills. MacMillan Education Australia, 1994.
[42]
T. A. Harris, I’m ok - you’re OK. London: Pan, 1973.
[43]
Mohan, T, McGregor, H, Saunders, S, and Archee, R, Communicating as professionals. Thomson Learning Australia, 2004.
[44]
Pease, A, ‘Body Language: how to read others’ thoughts by their gestures’. Camel Publishing, 1981 [Online]. Available: https://archive.org/details/BodyLanguageHowToReadOthersThoughtsByTheirGestures_201403
[45]
‘Unavoidable Ethical Questions About Social Networking’. Markkula Center for Applied Ethics. Santa Clara University, 2010 [Online]. Available: http://www.scu.edu/ethics/publications/submitted/social-networking.html
[46]
Consulting, Project Management, ‘Project Management Issues and Considerations’. AEW Services, 2002 [Online]. Available: http://www.maxwideman.com/issacons4/iac1435/sld001.htm
[47]
‘How To Read Good Body Language’. Professional CV Services [Online]. Available: http://www.professional-cv-services.co.uk/intv/positive_body_language_at_job_interview.html
[48]
‘RSA Animate -- The Secret Powers of Time’. 23AD [Online]. Available: https://www.youtube.com/watch?v=A3oIiH7BLmg
[49]
‘Netflix has a problem with unmetered streaming | Analysis | Information Age | Australian Computer Society’. [Online]. Available: https://ia.acs.org.au/news/netflix-has-a-problem-with-unmetered-streaming-402827?eid=70&edate=20150420&utm_source=20150420&utm_medium=newsletter&utm_campaign=newsletter
[50]
Hughes, S, Professional presentations: a practical guide to the preparation and performance of successful business presentations. McGraw-Hill, 1990.
[51]
T. Leech and T. Leech, How to prepare, stage, and deliver winning presentations, 3rd ed. New York: American Management Association, 2004.
[52]
K. Matejka and D. P. Ramos, Hook ’em: speaking & writing to catch & keep a business audience. New York: AMACOM, 1996.
[53]
T. Mohan, Communicating as professionals, 2nd ed. South Melbourne, Vic: Cengage Learning, 2008.
[54]
O. Hargie, D. Dickson, and D. Tourish, ‘That silver-tongued devil...: making presentations matter’, in Communication skills for effective management, New York: Palgrave Macmillan, 2004, pp. 147–174.
[55]
‘Toastmasters’. [Online]. Available: http://www.toastmasters.org/about
[56]
Barrett, E., Paradis, J., and Perelman, L. C., ‘The Mayfield Handbook of Technical Scientific Writing’, 1997. [Online]. Available: http://www.mhhe.com/mayfieldpub/tsw/toc.htm
[57]
P. Rubens, Science and technical writing: a manual of style, 2nd ed. New York: Routledge, 2001 [Online]. Available: https://ebookcentral.proquest.com/lib/murdoch/reader.action?ppg=68&docID=170530&tm=1483931464666
[58]
T. Mohan, Communicating as professionals, 2nd ed. South Melbourne, Vic: Cengage Learning, 2008.
[59]
P. Rubens, Science and technical writing: a manual of style, 2nd ed. New York: Routledge, 2001 [Online]. Available: https://ebookcentral.proquest.com/lib/murdoch/detail.action?docID=170530
[60]
D. F. Beer and D. A. McMurrey, A guide to writing as an engineer, 2nd ed. New York: Wiley, 2005.
[61]
K. G. Budinski, Engineers’ guide to technical writing. Materials Park, OH: ASM International, 2001.
[62]
L. Truss, Eats, shoots & leaves: the zero tolerance approach to punctuation, Paperback ed. London: Profile, 2005.
[63]
Cook, V, Accomodating Brocolli in the Cemetary: or why can’t anybody spell? Profile Books, 2004.
[64]
C. Huff and C. D. Martin, ‘Computing consequences: a framework for teaching ethical computing’, Communications of the ACM, vol. 38, no. 12, pp. 75–84, 1995 [Online]. Available: https://go.gale.com/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm¤tPosition=1&docId=GALE%7CA17779533&docType=Article&sort=Relevance&contentSegment=ZONE-MOD1&prodId=AONE&contentSet=GALE%7CA17779533&searchId=R2&userGroupName=murdoch&inPS=true&ps=1&cp=1
[65]
‘Social impact assessment guideline’. [Online]. Available: https://www.statedevelopment.qld.gov.au/resources/cg/social-impact-assessment-guideline.pdf
[66]
Reynolds, G W, Ethics in Information Technology, 5th ed. Course Technology, Cengage Learning, 2015.
[67]
Commissioner, Office of the Privacy, ‘private i - your ultimate privacy survival guide’, Office of the Privacy Commissioner, 2009 [Online]. Available: http://www.privacy.gov.au/materials/topics/internet
[68]
Seddon, N and Ellinghaus., M, Cheshire & Fifoot’s Law of Contract, 7th ed. Butterworths, 1997.
[69]
R. A. Buckley, Illegality and public policy, vol. The contract law library. London: Sweet & Maxwell, 2002.
[70]
M. Perelman, Steal this idea: intellectual property rights and the corporate confiscation of creativity, 1st ed. New York: Palgrave, 2002.
[71]
H. T. Tavani, ‘Informational privacy, data mining, and the Internet’, Ethics and Information Technology, vol. 1, no. 2, pp. 137–145, 1999, doi: 10.1023/A:1010063528863.
[72]
Australia, State of Western, ‘The Sale of Goods Act 1895: An Act for codifying the law relating to the sale of goods’, vol. (59 Vict. No. 41). 1895 [Online]. Available: https://www.slp.wa.gov.au/legislation/statutes.nsf/law_a726.html
[73]
Government, Australian, ‘Trade Practices Act 1975’, vol. No. 63 of 1975. 1975 [Online]. Available: http://www.comlaw.gov.au/Details/C2004A00285
[74]
‘What is Privacy?’ [Online]. Available: http://news.rutgers.edu/research-news/what-privacy/20150305#.VS4YlBZh8n0
[75]
‘BIG DATA: SEIZING OPPORTUNITIES, PRESERVING VALUES’. [Online]. Available: https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
[76]
‘private i - your ultimate privacy survival guide’. [Online]. Available: https://www.oaic.gov.au/images/documents/privacy/privacy-topics/youth/private-i_reduced.pdf
[77]
‘What is “metadata” and should you worry if yours is stored by law?’ [Online]. Available: http://www.smh.com.au/digital-life/digital-life-news/what-is-metadata-and-should-you-worry-if-yours-is-stored-by-law-20140806-100zae.html
[78]
‘Metadata retention: What is it and how might it impact whistleblowers in media and politics? - ABC News (Australian Broadcasting Corporation)’. [Online]. Available: http://www.abc.net.au/news/2015-03-17/metadata-data-retention-what-is-it/6324962
[79]
‘CISPA: The Awful Anti-Privacy Law That Won’t Prevent Another Sony Hack’. [Online]. Available: http://gizmodo.com/cispa-the-awful-anti-privacy-law-that-wont-prevent-ano-1678561060
[80]
M. Andrejevic, ‘Big Data, Big Questions| The Big Data Divide |’, International Journal of Communication, vol. 8, pp. 1673–1689, 2014 [Online]. Available: http://ijoc.org/index.php/ijoc/article/view/2161/1163
[81]
‘Communications Surveillance: Privacy and Security at Risk’. [Online]. Available: https://cacm.acm.org/magazines/2009/11/48445-communications-surveillance-privacy-and-security-at-risk/fulltext
[82]
Reynolds, G W, Ethics in Information Technology, 5th ed. Course Technology, Cengage Learning, 2015.
[83]
Forum, Information Security, The Standard of Good Practice for Information Security. Information Security Forum, 2007 [Online]. Available: https://kr-labs.com.ua/books/isf-standarts.pdf
[84]
‘AusCert’. AusCert [Online]. Available: http://www.auscert.org.au
[85]
Neumann, Peter, ‘Risks’. SRI International Computer Science Laboratory [Online]. Available: http://www.csl.sri.com/users/neumann/#3
[86]
‘Information Security Forum: Research Reports (for non-Members)’. [Online]. Available: https://www.securityforum.org/research/
[87]
‘2015 Cybercrime Trends: Things are Going to Get Interesting’. [Online]. Available: https://www.slideshare.net/galbaatar1/ss-62879383?next_slideshow=1
[88]
‘2015 Cybercrime Trends: Things are Going to Get Interesting’. [Online]. Available: http://securityintelligence.com/events/2015-cybercrime-trends-things-going-get-interesting/#.VTcHfBZh8n1
[89]
‘Cybercrime predictions for 2015’. [Online]. Available: http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/
[90]
‘TRENDS FOR 2015: TARGETING THE CORPORATE WORLD’. [Online]. Available: http://www.welivesecurity.com/wp-content/uploads/2015/02/trends-2015-targeting-corporate-world.pdf
[91]
S. Chatterjee, S. Sarker, and J. S. Valacich, ‘The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use’, Journal of Management Information Systems, vol. 31, no. 4, pp. 49–87, 2015, doi: 10.1080/07421222.2014.1001257.
[92]
‘Ramnit botnet: Cybercrime ring that used 3.2 million hacked computers to steal bank information disrupted by European police - ABC News (Australian Broadcasting Corporation)’. [Online]. Available: http://www.abc.net.au/news/2015-02-26/ramnit-botnet-cybercrime-ring-disrupted-by-police/6263038
[93]
‘Ramnit - Symantec and Other Industry Partners Assist Europol in Botnet Take Down’. 26AD [Online]. Available: https://www.youtube.com/watch?v=U36S9Bwe3vY
[94]
G. W. Reynolds, Ethics in information technology, 4th ed. Boston, MA: Course Technology, Cengage Learning, 2012.
[95]
R. Stallman and D. G. Johnson, ‘Chapter 13 and 14’, in Computer ethics and professional responsibility, Malden, MA: Blackwell Pub, 2004, pp. 285–314.
[96]
D. J. Murphy, ‘Are intellectual property rights compatible with Rawlsian principles of justice?’, Ethics and Information Technology, vol. 14, no. 2, pp. 109–121, Jun. 2012, doi: 10.1007/s10676-012-9288-8.
[97]
IP Australia, 2001 corporate profile. Woden, A.C.T.: IP Australia, 2000.
[98]
M. Sainsbury, Annotated Copyright Act. Sydney: Lawbook Co., 2004.
[99]
‘Australian intellectual property cases’. [s.n.], [S.l.] [Online]. Available: http://prod.resource.wkasiapacific.com/resource/scion/toc/atlas-csh/(WKAP_TAL_403334288)3EDEC6055B4FE2B3823DB08C:WKAP_TAL_ALECCASE_REFERENCE?cpid=WKAP-TAL-IC&cfu=WKAP&wksso=false
[100]
Allen, K R, Bringing New Technology to Market. Prentice Hall, 2003.
[101]
J. J. Phillips, Butterworths intellectual property law handbook, 5th ed. London: Butterworths, 2001.
[102]
Weckert, J, Computer and Information Ethics. Greenwood Press, 1997.
[103]
Kizza, J M, Ethical and Social Issues in the Information Age. Springer-Verlag, 2003.
[104]
P. Himanen, The hacker ethic: and the spirit of the information age. London: Secker & Warburg, 2001.
[105]
‘Australian Copyright Council - Find an Answer’. Australian Copyright Council [Online]. Available: https://www.copyright.org.au/ACC/Find_an_Answer/ACC/Public_Content/Find_an_Answer.aspx?hkey=b0de2cd4-daa3-47da-95a5-1e7ecdc8dddc
[106]
‘Creative Commons Australia’. Creative Commons Australia [Online]. Available: http://creativecommons.org.au/
[107]
D. J. Murphy, ‘Are intellectual property rights compatible with Rawlsian principles of justice?’, Ethics and Information Technology, vol. 14, no. 2, pp. 109–121, Jun. 2012, doi: 10.1007/s10676-012-9288-8.
[108]
‘Trademark victory allows Cadbury to retain its purple reign’. [Online]. Available: http://theconversation.com/trademark-victory-allows-cadbury-to-retain-its-purple-reign-9950
[109]
J. Russell, ‘Nestle wins latest battle with Cadbury over the colour purple’, IP Whiteboard, 2013. [Online]. Available: http://ipwhiteboard.com.au/nestle-wins-latest-battle-with-cadbury-over-the-colour-purple-in-the-uk/
[110]
‘| IP Australia’. [Online]. Available: http://www.ipaustralia.gov.au/
[111]
Reynolds, G W, Ethics in Information Technology, 5th ed. Course Technology, Cengage Learning, 2015.
[112]
S. Bolton and D. McDermid, ‘System reliability’, in Ethics in ICT: an Australian perspective, Frenchs Forest, N.S.W.: Pearson Education Australia, 2008, pp. 179–198.
[113]
Flood, R L, ‘A brief review of Peter B. Checkland’s contribution to systemic thinking’, Systemic Practice and Action Research, vol. 13, no. 6, pp. 723–731, 2000 [Online]. Available: https://search.proquest.com/docview/211444426/4DCA4C80E8FD4160PQ/2?accountid=12629
[114]
M. C. Jackson, ‘Beyond a System of Systems Methodologies’, The Journal of the Operational Research Society, vol. 41, no. 8, Aug. 1990, doi: 10.2307/2583472.
[115]
L. Skyttner, General Systems Theory: ideas & applications. World Scientific, 2001 [Online]. Available: https://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=nlebk&AN=82612&site=ehost-live&custid=s1113140
[116]
P. Feiler, ‘Improving Safety-Critical Systems with a Reliability Validation and Improvement Framework’. Carnegie Mellon University, 2012 [Online]. Available: https://insights.sei.cmu.edu/sei_blog/2013/06/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework.html
[117]
J. Pan, ‘Software Reliability’, 1999. [Online]. Available: http://users.ece.cmu.edu/~koopman/des_s99/sw_reliability/
[118]
Bowen, Jonathan, ‘The Ethics of Safety-Critical Systems’, Communications of the ACM, vol. 43, no. 4, pp. 91–97, 2000 [Online]. Available: https://go.galegroup.com/ps/i.do?p=ITOF&u=murdoch&id=GALE|A61792759&v=2.1&it=r&sid=summon
[119]
‘Software Quality Institute’. [Online]. Available: https://www2.griffith.edu.au/institute-integrated-intelligent-systems/our-research/expertise/software-engineering-software-quality
[120]
Schonbeck, Martin, ‘Introduction to the Reliability of Safety Systems’. Norwegian University of Science and Technology (NTNU), 2007 [Online]. Available: https://dvikan.no/ntnu-studentserver/reports/martin07.pdf
[121]
S. W. A. Dekker, ‘The danger of losing situation awareness’, Cognition, Technology & Work, vol. 17, no. 2, pp. 159–161, May 2015, doi: 10.1007/s10111-015-0320-8.
[122]
‘The danger of losing situation awareness’. [Online]. Available: http://download-v2.springer.com/static/pdf/918/art%253A10.1007%252Fs10111-015-0324-4.pdf?token2=exp=1430288771~acl=%2Fstatic%2Fpdf%2F918%2Fart%25253A10.1007%25252Fs10111-015-0324-4.pdf*~hmac=cda4b3d0d4a4333b23b48adf8bbcc9168ddf4be88886efc4c76d17d6de1b8a7a
[123]
‘Improving Safety-critical Systems with a Reliability Validation & Improvement Framework » SEI Blog’. [Online]. Available: http://blog.sei.cmu.edu/post.cfm/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework
[124]
Trevino, L, ‘The key role of HR in organizational ethics’, vol. 2008, 2007 [Online]. Available: http://www.ethics.org/erc-publications/staff-articles.asp?aid=1084
[125]
Reynolds, G W, Ethics in Information Technology, 5th ed. Course Technology, Cengage Learning, 2015.
[126]
CCH, HR Strategy and Workforce Planning. CCH Australia Ltd, 2005.
[127]
Cooke, E., The Modern Law of Estoppel. Oxford University Press, 2000.
[128]
Rudman, R, ‘HR’s dilemma: value or values?’, Human Resources Bulletin, vol. 5 December, 2005.
[129]
Kramar, R, ‘HR’s role in ethics and corporate social responsibility’, Human Resources Bulletin, vol. 13 October, 2005.
[130]
J. Halleck, ‘Free Software Dilemma’, 2000. [Online]. Available: http://www.cc.utah.edu/~nahaj/ethics/freesoftware.html
[131]
Management, Society for Human Resource, ‘SHRM Code of Ethical and Professional Standards in Human Resource Management’. Society for Human Resource Management, 2008 [Online]. Available: https://www.shrm.org/about-shrm/pages/bylaws--code-of-ethics.aspx
[132]
‘Global Project Management.org Home Page’. Global Project Management.org, 2007 [Online]. Available: http://globalprojectmanagement.org/
[133]
C. Briguglio, ‘Linguistic and Cultural Skills for Communication in Global Workplaces of the 21st Century’, in Cross-cultural interaction: concepts, methodologies, tools, and applications, Hershey, PA: Information Science Reference, 2014, pp. 832–848 [Online]. Available: https://www.igi.global.com/gateway/chapter/97506
[134]
M. Singh and G. Cui, ‘Multiple Dimensions of Media Communication Skills’, in New media communication skills for engineers and IT professionals: trans-national and trans-cultural demands, Hershey, PA: Information Science Reference, 2012, pp. 160–174 [Online]. Available: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0243-4.ch010
[135]
R. Y. J. Chua, Y. Roth, and J.-F. Lemoine, ‘The Impact of Culture on Creativity’, Administrative Science Quarterly, vol. 60, no. 2, pp. 189–227, Jun. 2015, doi: 10.1177/0001839214563595.
[136]
M. Bennett, ‘INTERCULTURAL COMPETENCE FOR GLOBAL LEADERSHIP’. [Online]. Available: https://www.idrinstitute.org/resources/intercultural-competence-global-leadership/