1.
Quinn MJ. Chapter 2: Introduction to ethics. Ethics for the information age. 2nd ed. Boston: Pearson/Addison-Wesley; 2006. p. 77–128.
2.
Martin C. A brief introduction to morality. Ethics in information technology. 2nd ed. Australia: Thomson Course Technology; 2007. p. 293–308.
3.
Johnson DG, Miller KW. Computer ethics : analyzing information technology. Pages 167-177. Computer Ethics: analyzing Information Technology. Pearson Education; 2009. p. 167–177.
4.
Professions Australia - Ethics Resoure Centre [Internet]. Available from: http://www.professions.com.au/ethicsresource.html
5.
Ethics Resource Centre [Internet]. Available from: http://www.professions.com.au/Homepage.html
6.
The Office of the Privacy Commissioner: Information Technology and Internet Issues [Internet]. Available from: https://www.oaic.gov.au/privacy/your-privacy-rights/social-media-and-technology/
7.
Vanderbilt University Center for Ethics: case studies [Internet]. Available from: http://www.vanderbilt.edu/CenterforEthics/cases.html#computer
8.
Business Roundtable Institute for Corporate Ethics [Internet]. Available from: http://www.corporate-ethics.org/
9.
CAPPE. Centre For Applied Philosophy and Public Ethics. [Internet]. Available from: http://arts-ed.csu.edu.au/schools/humss/research#horizontalTab6
10.
Reynolds GW. Ethics in information technology. 4th ed. Boston, MA: Course Technology, Cengage Learning; 2012.
11.
Board, ACS Professional Standards. ACS Code of Professional Conduct [Internet]. Australian Computer Society; 2012. Available from: https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf
12.
Anderson P, Queensland. Exposing corruption: a CJC guide to whistleblowing in Queensland. [Brisbane]: Criminal Justice Commission; 1996.
13.
Murphy S, Australia. Parliament. Senate. Select Committee on Unresolved Whistleblower Cases. The public interest revisited / report of the Senate Select Committee on Unresolved Whistleblower Cases. [Canberra]: The Parliament of the Commonwealth of Australia; 1995.
14.
Pourciau LJ. Ethics and electronic information in the twenty-first century. West Lafayette, Ind: Purdue University Press; 1999.
15.
Spier R. Science and technology ethics. New York: Routledge; 2001.
16.
Electronic Frontiers Australia Inc. (EFA) [Internet]. Available from: http://www.efa.org.au/
17.
Martin B. Whistleblowing and Nonviolence. Peace & Change. 1999 Jan;24(1):15–28.
18.
Computer Professionals for Social Responsibility Mission [Internet]. Computer Professionals for Social Responsibility; Available from: http://cpsr.org/about/mission/
19.
Electrical and Electronics Engineers, Inc. (IEEE) [Internet]. Available from: http://www.ieee.org/web/aboutus/home/index.html
20.
ACM Code of Ethics and Professional Conduct [Internet]. Association for Computing Machinery; 1992. Available from: http://www.acm.org/about/code-of-ethics
21.
Browse Inside Australian Story: Behind the Scenes by Deborah Fleming [Internet]. Available from: http://browseinside.harpercollins.com.au/index.aspx?isbn13=9780733314421
22.
Hodgkinson A, Farthing S. Blowing the whistle: protection for whistleblowers in Australia [Internet]. 2014. Available from: https://www.kordamentha.com/getmedia/57522ffd-7648-49f9-a812-2e612dc30a11/issue-14-05-protection-for-whistleblowers-in-australia.pdf.aspx?ext=.pdf
23.
ACS Code of Ethics [Internet]. Available from: https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Ethics.pdf
24.
The Online Ethics Center for Engineering and Science [Internet]. Available from: https://onlineethics.org/
25.
Association for the Advancement of Artificial Intelligence [Internet]. Available from: http://www.aaai.org/Library/Reports/reports-library.php
26.
AI Topics Ethics & Social Issues [Internet]. Available from: https://aitopics.org/class/Technology/IT/AI/Issues
27.
Reynolds GW. Chapte 8: The impact of information technology on productivity and quality of life. Ethics in information technology. Fifth edition. Boston, MA: Cengage Learning; 2015. p. 297–328.
28.
McDermid D. Chapter 5: Cyberspace. Ethics in ICT: an Australian perspective. Frenchs Forest, N.S.W.: Pearson Education Australia; 2008. p. 125–162.
29.
Tavani HT. Chapter 12: Ethical aspects of emerging and converging technologies. Ethics and technology: controversies, questions, and strategies for ethical computing. 3rd ed. Hoboken, N.J.: John Wiley & Sons; 2011. p. 361–390.
30.
King, J. Technology for the greater good. Information Age. 2012;
31.
Tonkens R. Out of character: on the creation of virtuous machines. Ethics and Information Technology. 2012 Jun;14(2):137–149.
32.
Wakefield J. World wakes up to digital divide [Internet]. British Broadcasting Corporation; 2010. Available from: http://news.bbc.co.uk/2/hi/technology/8568681.stm
33.
Zuckerberg M. Is Connectivity A Human Right? [Internet]. Available from: https://prandtheweb.files.wordpress.com/2013/08/connectivity-a-human-right.pdf
34.
Kassam, AlnaazIding, MarieHogenbirk, Pieter. Unraveling the digital divide: Time well spent or ‘wasted’? Education and Information Technologies [Internet]. 2013;18(2):215–221. Available from: https://search.proquest.com/docview/1422045691/citation/159EF1E516E84E49PQ/1?accountid=12629
35.
News International phone hacking scandal [Internet]. Available from: http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal
36.
WikiLeaks [Internet]. Available from: http://en.wikipedia.org/wiki/WikiLeaks
37.
Only 6 percent mobile users in India are over 50 years of age: Telenor | Latest Tech News, Video & Photo Reviews at BGR India [Internet]. Available from: http://www.bgr.in/news/only-6-percent-mobile-users-in-india-are-over-50-years-of-age-telenor/
38.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
39.
Mohan T. Communicating as professionals. 2nd ed. South Melbourne, Vic: Cengage Learning; 2008.
40.
McDermid D. Chapter 5: Cyberspace. Ethics in ICT: an Australian perspective. Frenchs Forest, N.S.W.: Pearson Education Australia; 2008. p. 125–162.
41.
Elder, B. Communication skills. MacMillan Education Australia; 1994.
42.
Harris TA. I’m ok - you’re OK. London: Pan; 1973.
43.
Mohan, T, McGregor, H, Saunders, S, Archee, R. Communicating as professionals. Thomson Learning Australia; 2004.
44.
Pease, A. Body Language: how to read others’ thoughts by their gestures [Internet]. Camel Publishing; 1981. Available from: https://archive.org/details/BodyLanguageHowToReadOthersThoughtsByTheirGestures_201403
45.
Unavoidable Ethical Questions About Social Networking [Internet]. Markkula Center for Applied Ethics. Santa Clara University; 2010. Available from: http://www.scu.edu/ethics/publications/submitted/social-networking.html
46.
Consulting, Project Management. Project Management Issues and Considerations [Internet]. AEW Services; 2002. Available from: http://www.maxwideman.com/issacons4/iac1435/sld001.htm
47.
How To Read Good Body Language [Internet]. Professional CV Services; Available from: http://www.professional-cv-services.co.uk/intv/positive_body_language_at_job_interview.html
48.
RSA Animate -- The Secret Powers of Time [Internet]. 23AD. Available from: https://www.youtube.com/watch?v=A3oIiH7BLmg
49.
Netflix has a problem with unmetered streaming | Analysis | Information Age | Australian Computer Society [Internet]. Available from: https://ia.acs.org.au/news/netflix-has-a-problem-with-unmetered-streaming-402827?eid=70&edate=20150420&utm_source=20150420&utm_medium=newsletter&utm_campaign=newsletter
50.
Hughes, S. Professional presentations: a practical guide to the preparation and performance of successful business presentations. McGraw-Hill; 1990.
51.
Leech T, Leech T. How to prepare, stage, and deliver winning presentations. 3rd ed. New York: American Management Association; 2004.
52.
Matejka K, Ramos DP. Hook ’em: speaking & writing to catch & keep a business audience. New York: AMACOM; 1996.
53.
Mohan T. Communicating as professionals. 2nd ed. South Melbourne, Vic: Cengage Learning; 2008.
54.
Hargie O, Dickson D, Tourish D. That silver-tongued devil...: making presentations matter. Communication skills for effective management. New York: Palgrave Macmillan; 2004. p. 147–174.
55.
Toastmasters [Internet]. Available from: http://www.toastmasters.org/about
56.
Barrett, E., Paradis, J., Perelman, L. C. The Mayfield Handbook of Technical Scientific Writing [Internet]. McGraw-Hill; 1997. Available from: http://www.mhhe.com/mayfieldpub/tsw/toc.htm
57.
Rubens P. Science and technical writing: a manual of style [Internet]. 2nd ed. New York: Routledge; 2001. Available from: https://ebookcentral.proquest.com/lib/murdoch/reader.action?ppg=68&docID=170530&tm=1483931464666
58.
Mohan T. Communicating as professionals. 2nd ed. South Melbourne, Vic: Cengage Learning; 2008.
59.
Rubens P. Science and technical writing: a manual of style [Internet]. 2nd ed. New York: Routledge; 2001. Available from: https://ebookcentral.proquest.com/lib/murdoch/detail.action?docID=170530
60.
Beer DF, McMurrey DA. A guide to writing as an engineer. 2nd ed. New York: Wiley; 2005.
61.
Budinski KG. Engineers’ guide to technical writing. Materials Park, OH: ASM International; 2001.
62.
Truss L. Eats, shoots & leaves: the zero tolerance approach to punctuation. Paperback ed. London: Profile; 2005.
63.
Cook, V. Accomodating Brocolli in the Cemetary: or why can’t anybody spell? Profile Books; 2004.
64.
Huff C, Martin CD. Computing consequences: a framework for teaching ethical computing. Communications of the ACM [Internet]. 1995;38(12):75–84. Available from: https://go.gale.com/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm¤tPosition=1&docId=GALE%7CA17779533&docType=Article&sort=Relevance&contentSegment=ZONE-MOD1&prodId=AONE&contentSet=GALE%7CA17779533&searchId=R2&userGroupName=murdoch&inPS=true&ps=1&cp=1
65.
Social impact assessment guideline [Internet]. Available from: https://www.statedevelopment.qld.gov.au/resources/cg/social-impact-assessment-guideline.pdf
66.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
67.
Commissioner, Office of the Privacy. private i - your ultimate privacy survival guide [Internet]. Office of the Privacy Commissioner; 2009. Available from: http://www.privacy.gov.au/materials/topics/internet
68.
Seddon, N, Ellinghaus., M. Cheshire & Fifoot’s Law of Contract. 7th ed. Butterworths; 1997.
69.
Buckley RA. Illegality and public policy. London: Sweet & Maxwell; 2002.
70.
Perelman M. Steal this idea: intellectual property rights and the corporate confiscation of creativity. 1st ed. New York: Palgrave; 2002.
71.
Tavani HT. Informational privacy, data mining, and the Internet. Ethics and Information Technology. 1999;1(2):137–145.
72.
Australia, State of Western. The Sale of Goods Act 1895: An Act for codifying the law relating to the sale of goods [Internet]. 1895. Available from: https://www.slp.wa.gov.au/legislation/statutes.nsf/law_a726.html
73.
Government, Australian. Trade Practices Act 1975 [Internet]. 1975. Available from: http://www.comlaw.gov.au/Details/C2004A00285
74.
What is Privacy? [Internet]. Available from: http://news.rutgers.edu/research-news/what-privacy/20150305#.VS4YlBZh8n0
75.
BIG DATA: SEIZING OPPORTUNITIES, PRESERVING VALUES [Internet]. Available from: https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
76.
private i - your ultimate privacy survival guide [Internet]. Available from: https://www.oaic.gov.au/images/documents/privacy/privacy-topics/youth/private-i_reduced.pdf
77.
What is ‘metadata’ and should you worry if yours is stored by law? [Internet]. Available from: http://www.smh.com.au/digital-life/digital-life-news/what-is-metadata-and-should-you-worry-if-yours-is-stored-by-law-20140806-100zae.html
78.
Metadata retention: What is it and how might it impact whistleblowers in media and politics? - ABC News (Australian Broadcasting Corporation) [Internet]. Available from: http://www.abc.net.au/news/2015-03-17/metadata-data-retention-what-is-it/6324962
79.
CISPA: The Awful Anti-Privacy Law That Won’t Prevent Another Sony Hack [Internet]. Available from: http://gizmodo.com/cispa-the-awful-anti-privacy-law-that-wont-prevent-ano-1678561060
80.
Andrejevic M. Big Data, Big Questions| The Big Data Divide |. International Journal of Communication [Internet]. International Journal of Communication; 2014;8:1673–1689. Available from: http://ijoc.org/index.php/ijoc/article/view/2161/1163
81.
Communications Surveillance: Privacy and Security at Risk [Internet]. Available from: https://cacm.acm.org/magazines/2009/11/48445-communications-surveillance-privacy-and-security-at-risk/fulltext
82.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
83.
Forum, Information Security. The Standard of Good Practice for Information Security [Internet]. Information Security Forum; 2007. Available from: https://kr-labs.com.ua/books/isf-standarts.pdf
84.
AusCert [Internet]. AusCert; Available from: http://www.auscert.org.au
85.
Neumann, Peter. Risks [Internet]. SRI International Computer Science Laboratory; Available from: http://www.csl.sri.com/users/neumann/#3
86.
Information Security Forum: Research Reports (for non-Members) [Internet]. Available from: https://www.securityforum.org/research/
87.
2015 Cybercrime Trends: Things are Going to Get Interesting [Internet]. Available from: https://www.slideshare.net/galbaatar1/ss-62879383?next_slideshow=1
88.
2015 Cybercrime Trends: Things are Going to Get Interesting [Internet]. Available from: http://securityintelligence.com/events/2015-cybercrime-trends-things-going-get-interesting/#.VTcHfBZh8n1
89.
Cybercrime predictions for 2015 [Internet]. Available from: http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/
90.
TRENDS FOR 2015: TARGETING THE CORPORATE WORLD [Internet]. Available from: http://www.welivesecurity.com/wp-content/uploads/2015/02/trends-2015-targeting-corporate-world.pdf
91.
Chatterjee S, Sarker S, Valacich JS. The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use. Journal of Management Information Systems. 2015;31(4):49–87.
92.
Ramnit botnet: Cybercrime ring that used 3.2 million hacked computers to steal bank information disrupted by European police - ABC News (Australian Broadcasting Corporation) [Internet]. Available from: http://www.abc.net.au/news/2015-02-26/ramnit-botnet-cybercrime-ring-disrupted-by-police/6263038
93.
Ramnit - Symantec and Other Industry Partners Assist Europol in Botnet Take Down [Internet]. 26AD. Available from: https://www.youtube.com/watch?v=U36S9Bwe3vY
94.
Reynolds GW. Ethics in information technology. 4th ed. Boston, MA: Course Technology, Cengage Learning; 2012.
95.
Stallman R, Johnson DG. Chapter 13 and 14. Computer ethics and professional responsibility. Malden, MA: Blackwell Pub; 2004. p. 285–314.
96.
Murphy DJ. Are intellectual property rights compatible with Rawlsian principles of justice? Ethics and Information Technology. 2012 Jun;14(2):109–121.
97.
IP Australia. 2001 corporate profile. Woden, A.C.T.: IP Australia; 2000.
98.
Sainsbury M. Annotated Copyright Act. Sydney: Lawbook Co.; 2004.
99.
Australian intellectual property cases [Internet]. [S.l.]: [s.n.]; Available from: http://prod.resource.wkasiapacific.com/resource/scion/toc/atlas-csh/(WKAP_TAL_403334288)3EDEC6055B4FE2B3823DB08C:WKAP_TAL_ALECCASE_REFERENCE?cpid=WKAP-TAL-IC&cfu=WKAP&wksso=false
100.
Allen, K R. Bringing New Technology to Market. Prentice Hall; 2003.
101.
Phillips JJ. Butterworths intellectual property law handbook. 5th ed. London: Butterworths; 2001.
102.
Weckert, J. Computer and Information Ethics. Greenwood Press; 1997.
103.
Kizza, J M. Ethical and Social Issues in the Information Age. Springer-Verlag; 2003.
104.
Himanen P. The hacker ethic: and the spirit of the information age. London: Secker & Warburg; 2001.
105.
Australian Copyright Council - Find an Answer [Internet]. Australian Copyright Council; Available from: https://www.copyright.org.au/ACC/Find_an_Answer/ACC/Public_Content/Find_an_Answer.aspx?hkey=b0de2cd4-daa3-47da-95a5-1e7ecdc8dddc
106.
Creative Commons Australia [Internet]. Creative Commons Australia; Available from: http://creativecommons.org.au/
107.
Murphy DJ. Are intellectual property rights compatible with Rawlsian principles of justice? Ethics and Information Technology. 2012 Jun;14(2):109–121.
108.
Trademark victory allows Cadbury to retain its purple reign [Internet]. Available from: http://theconversation.com/trademark-victory-allows-cadbury-to-retain-its-purple-reign-9950
109.
Russell J. Nestle wins latest battle with Cadbury over the colour purple [Internet]. IP Whiteboard. 2013. Available from: http://ipwhiteboard.com.au/nestle-wins-latest-battle-with-cadbury-over-the-colour-purple-in-the-uk/
110.
| IP Australia [Internet]. Available from: http://www.ipaustralia.gov.au/
111.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
112.
Bolton S, McDermid D. System reliability. Ethics in ICT: an Australian perspective. Frenchs Forest, N.S.W.: Pearson Education Australia; 2008. p. 179–198.
113.
Flood, R L. A brief review of Peter B. Checkland’s contribution to systemic thinking. Systemic Practice and Action Research [Internet]. 2000;13(6):723–731. Available from: https://search.proquest.com/docview/211444426/4DCA4C80E8FD4160PQ/2?accountid=12629
114.
Jackson MC. Beyond a System of Systems Methodologies. The Journal of the Operational Research Society. 1990 Aug;41(8).
115.
Skyttner L. General Systems Theory: ideas & applications [Internet]. World Scientific; 2001. Available from: https://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=nlebk&AN=82612&site=ehost-live&custid=s1113140
116.
Feiler P. Improving Safety-Critical Systems with a Reliability Validation and Improvement Framework [Internet]. Carnegie Mellon University; 2012. Available from: https://insights.sei.cmu.edu/sei_blog/2013/06/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework.html
117.
Pan J. Software Reliability [Internet]. Carnegie Mellon University; 1999. Available from: http://users.ece.cmu.edu/~koopman/des_s99/sw_reliability/
118.
Bowen, Jonathan. The Ethics of Safety-Critical Systems. Communications of the ACM [Internet]. Association for Computing Machinery; 2000;43(4):91–97. Available from: https://go.galegroup.com/ps/i.do?p=ITOF&u=murdoch&id=GALE|A61792759&v=2.1&it=r&sid=summon
119.
Software Quality Institute [Internet]. Griffith University; Available from: https://www2.griffith.edu.au/institute-integrated-intelligent-systems/our-research/expertise/software-engineering-software-quality
120.
Schonbeck, Martin. Introduction to the Reliability of Safety Systems [Internet]. Norwegian University of Science and Technology (NTNU); 2007. Available from: https://dvikan.no/ntnu-studentserver/reports/martin07.pdf
121.
Dekker SWA. The danger of losing situation awareness. Cognition, Technology & Work. 2015 May;17(2):159–161.
122.
The danger of losing situation awareness [Internet]. Available from: http://download-v2.springer.com/static/pdf/918/art%253A10.1007%252Fs10111-015-0324-4.pdf?token2=exp=1430288771~acl=%2Fstatic%2Fpdf%2F918%2Fart%25253A10.1007%25252Fs10111-015-0324-4.pdf*~hmac=cda4b3d0d4a4333b23b48adf8bbcc9168ddf4be88886efc4c76d17d6de1b8a7a
123.
Improving Safety-critical Systems with a Reliability Validation & Improvement Framework » SEI Blog [Internet]. Available from: http://blog.sei.cmu.edu/post.cfm/improving-safety-critical-systems-with-a-reliability-validation-improvement-framework
124.
Trevino, L. The key role of HR in organizational ethics. Ethics Resource Center; 2007;2008. Available from: http://www.ethics.org/erc-publications/staff-articles.asp?aid=1084
125.
Reynolds, G W. Ethics in Information Technology. 5th ed. Course Technology, Cengage Learning; 2015.
126.
CCH. HR Strategy and Workforce Planning. CCH Australia Ltd; 2005.
127.
Cooke, E. The Modern Law of Estoppel. Oxford University Press; 2000.
128.
Rudman, R. HR’s dilemma: value or values? Human Resources Bulletin. 2005;5 December.
129.
Kramar, R. HR’s role in ethics and corporate social responsibility. Human Resources Bulletin. 2005;13 October.
130.
Halleck J. Free Software Dilemma [Internet]. University of Utah; 2000. Available from: http://www.cc.utah.edu/~nahaj/ethics/freesoftware.html
131.
Management, Society for Human Resource. SHRM Code of Ethical and Professional Standards in Human Resource Management [Internet]. Society for Human Resource Management; 2008. Available from: https://www.shrm.org/about-shrm/pages/bylaws--code-of-ethics.aspx
132.
Global Project Management.org Home Page [Internet]. Global Project Management.org; 2007. Available from: http://globalprojectmanagement.org/
133.
Briguglio C. Linguistic and Cultural Skills for Communication in Global Workplaces of the 21st Century. Cross-cultural interaction: concepts, methodologies, tools, and applications [Internet]. Hershey, PA: Information Science Reference; 2014. p. 832–848. Available from: https://www.igi.global.com/gateway/chapter/97506
134.
Singh M, Cui G. Multiple Dimensions of Media Communication Skills. New media communication skills for engineers and IT professionals: trans-national and trans-cultural demands [Internet]. Hershey, PA: Information Science Reference; 2012. p. 160–174. Available from: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-0243-4.ch010
135.
Chua RYJ, Roth Y, Lemoine JF. The Impact of Culture on Creativity. Administrative Science Quarterly. 2015 Jun;60(2):189–227.
136.
Bennett M. INTERCULTURAL COMPETENCE FOR GLOBAL LEADERSHIP [Internet]. Available from: https://www.idrinstitute.org/resources/intercultural-competence-global-leadership/