Search dblp for Publications

export results for "toc:db/journals/sigcas/sigcas26.bht:"

 download as .bib file

@article{DBLP:journals/sigcas/Artz96,
  author       = {John M. Artz},
  title        = {Computers and the quality of life: assessing flow in information systems},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {3},
  pages        = {7--12},
  year         = {1996},
  url          = {https://doi.org/10.1145/606032.606033},
  doi          = {10.1145/606032.606033},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Artz96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Bartlett96,
  author       = {Andrew Bartlett},
  title        = {Tools for change and progress},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {3},
  pages        = {28--29},
  year         = {1996},
  url          = {https://doi.org/10.1145/606032.606039},
  doi          = {10.1145/606032.606039},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Bartlett96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Blyth96,
  author       = {Andrew Blyth},
  title        = {What happens when a medical office information system fails},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {4},
  pages        = {25--26},
  year         = {1996},
  url          = {https://doi.org/10.1145/242889.242895},
  doi          = {10.1145/242889.242895},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Blyth96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Cosin96,
  author       = {Jos{\'{e}} Javier Dolado Cos{\'{\i}}n},
  title        = {The {ACM} code of etics and professional conduct},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {4},
  pages        = {27--30},
  year         = {1996},
  url          = {https://doi.org/10.1145/242889.606060},
  doi          = {10.1145/242889.606060},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Cosin96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/DranGP96,
  author       = {Gisela M. von Dran and
                  Carl Stephen Guynes and
                  Victor R. Prybutok},
  title        = {The information infrastructure: policy and security considerations},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {1},
  pages        = {13--15},
  year         = {1996},
  url          = {https://doi.org/10.1145/229403.229410},
  doi          = {10.1145/229403.229410},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/DranGP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Epstein96,
  author       = {Richard G. Epstein},
  title        = {Noah, the Ark and the Turing Test},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {2},
  pages        = {16--21},
  year         = {1996},
  url          = {https://doi.org/10.1145/236394.606021},
  doi          = {10.1145/236394.606021},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Epstein96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Fulda96,
  author       = {Joseph S. Fulda},
  title        = {Ethics: the appearance of impropriety},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {4},
  pages        = {22--23},
  year         = {1996},
  url          = {https://doi.org/10.1145/242889.242893},
  doi          = {10.1145/242889.242893},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Fulda96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/GuynesVV96,
  author       = {Carl Stephen Guynes and
                  Richard G. Vedder and
                  Michael T. Vanecek},
  title        = {Privacy and security},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {1},
  pages        = {11--13},
  year         = {1996},
  url          = {https://doi.org/10.1145/229403.229409},
  doi          = {10.1145/229403.229409},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/GuynesVV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Hopper96,
  author       = {Nick Hopper},
  title        = {Politics on the web: making political candidates flies instead of
                  spiders},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {3},
  pages        = {23--26},
  year         = {1996},
  url          = {https://doi.org/10.1145/606032.606036},
  doi          = {10.1145/606032.606036},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Hopper96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Huff96,
  author       = {Chuck Huff},
  title        = {Unintentional power in the design of computer systems},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {4},
  pages        = {6--9},
  year         = {1996},
  url          = {https://doi.org/10.1145/242889.242890},
  doi          = {10.1145/242889.242890},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Huff96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Kling96,
  author       = {Rob Kling},
  title        = {Beyond outlaws, hackers and pirates},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {2},
  pages        = {5--15},
  year         = {1996},
  url          = {https://doi.org/10.1145/236394.236395},
  doi          = {10.1145/236394.236395},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Kling96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Martin96,
  author       = {C. Dianne Martin},
  title        = {Teaching practices},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {1},
  pages        = {3--6},
  year         = {1996},
  url          = {https://doi.org/10.1145/229403.229406},
  doi          = {10.1145/229403.229406},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Martin96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/MartinRES96,
  author       = {C. Dianne Martin and
                  Joseph M. Reagle Jr. and
                  Michael Evans and
                  Pat Shareck},
  title        = {An alternative to government regulation and censorship},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {4},
  pages        = {10--14},
  year         = {1996},
  url          = {https://doi.org/10.1145/242889.242891},
  doi          = {10.1145/242889.242891},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/MartinRES96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Orwant96,
  author       = {Carol J. Orwant},
  title        = {Book review: The Electronic Eye by David Lyon},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {2},
  pages        = {30--31},
  year         = {1996},
  url          = {https://doi.org/10.1145/236394.606030},
  doi          = {10.1145/236394.606030},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Orwant96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/PierceBHDDH96,
  author       = {Margaret Anne Pierce and
                  Jacques Berleur and
                  Joseph R. Herkert and
                  Dorothy E. Denning and
                  Charles Dunlop and
                  Chuck Huff},
  title        = {Responses to "The consequences of computing"},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {1},
  pages        = {7--10},
  year         = {1996},
  url          = {https://doi.org/10.1145/229403.229407},
  doi          = {10.1145/229403.229407},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/PierceBHDDH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Podolsky96,
  author       = {Joe Podolsky},
  title        = {Book Review: American Technological Sublime by David E. Nye},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {1},
  pages        = {25--26},
  year         = {1996},
  url          = {https://doi.org/10.1145/229403.583874},
  doi          = {10.1145/229403.583874},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Podolsky96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Podolsky96a,
  author       = {Joe Podolsky},
  title        = {City of bits: space, place and the infobahn},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {3},
  pages        = {27--28},
  year         = {1996},
  url          = {https://doi.org/10.1145/606032.606038},
  doi          = {10.1145/606032.606038},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Podolsky96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Redding96,
  author       = {Randolf Redding},
  title        = {Sunday Magazine: This is your life},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {4},
  pages        = {40},
  year         = {1996},
  url          = {https://doi.org/10.1145/242889.606059},
  doi          = {10.1145/242889.606059},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Redding96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Resnik96,
  author       = {David B. Resnik},
  title        = {The ethics of cyber relationships},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {1},
  pages        = {16--19},
  year         = {1996},
  url          = {https://doi.org/10.1145/229403.229412},
  doi          = {10.1145/229403.229412},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Resnik96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Resnik96a,
  author       = {David B. Resnik},
  title        = {Conference report: ethics in the cybersociety, Jackson, WY, October
                  4-5, 1996},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {4},
  pages        = {23--24},
  year         = {1996},
  url          = {https://doi.org/10.1145/242889.242894},
  doi          = {10.1145/242889.242894},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Resnik96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/RiserG96,
  author       = {Robert Riser and
                  Don Gotterbarn},
  title        = {Ethics activities in computer science courses},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {3},
  pages        = {13--18},
  year         = {1996},
  url          = {https://doi.org/10.1145/606032.606034},
  doi          = {10.1145/606032.606034},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigcas/RiserG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Shade96,
  author       = {Leslie Regan Shade},
  title        = {Book Reviews: The Information Highway Should be Paved with the Public
                  Good..},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {4},
  pages        = {31--34},
  year         = {1996},
  url          = {https://doi.org/10.1145/242889.606058},
  doi          = {10.1145/242889.606058},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Shade96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Shostak96,
  author       = {Inna Shostak},
  title        = {Computers and employment},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {1},
  pages        = {21--24},
  year         = {1996},
  url          = {https://doi.org/10.1145/229403.229416},
  doi          = {10.1145/229403.229416},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Shostak96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Tavani96,
  author       = {Herman T. Tavani},
  title        = {Cyberethics and the future of computing},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {2},
  pages        = {22--29},
  year         = {1996},
  url          = {https://doi.org/10.1145/236394.236396},
  doi          = {10.1145/236394.236396},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Tavani96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Tavani96a,
  author       = {Herman T. Tavani},
  title        = {Selecting a computer ethics coursebook: a comparative study of five
                  recent works},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {4},
  pages        = {15--21},
  year         = {1996},
  url          = {https://doi.org/10.1145/242889.242892},
  doi          = {10.1145/242889.242892},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Tavani96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Visala96,
  author       = {Seppo Visala},
  title        = {Interests and rationality of information systems development},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {3},
  pages        = {19--22},
  year         = {1996},
  url          = {https://doi.org/10.1145/606032.606035},
  doi          = {10.1145/606032.606035},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Visala96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Winrich96,
  author       = {Lonny B. Winrich},
  title        = {The virtual staff},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {26},
  number       = {1},
  pages        = {20},
  year         = {1996},
  url          = {https://doi.org/10.1145/229403.229414},
  doi          = {10.1145/229403.229414},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Winrich96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics