8.3 ▌≥ΦΩα

[CPSR89]
Computer Professionals for Social Responsibility, "CPSR Statement on the Computer Virus", CPSR, Communications of the ACM, Vol. 32, No. 6, Pg. 699, June 1989.

▌≥α ±≥α≥ⁿ   Γδ σ≥±  τα ΓδσφΦσ∞ εß ╚φ≥σ≡φσ≥εΓ±Ωε∞ Ωε∞∩ⁿ■≥σ≡φε∞ ΓΦ≡≤±σ ╩ε∞∩ⁿ■≥σ≡φ√⌡ ∩≡ε⌠σ±±ΦεφαδεΓ τα ±ε÷Φαδⁿφ≤■ ε≥Γσ≥±≥Γσφφε±≥ⁿ.

[DENNING]
Denning, Peter J., Editor, "Computers Under Attack: Intruders, Worms, and Viruses", ACM Press, 1990.

═αßε≡ Φτ 40 πδαΓ, ≡ατΣσδσφφ√⌡ ∞σµΣ≤ °σ±≥ⁿ■ ≈α±≥ ∞Φ: ε∩α±φε±≥ⁿ Γ±σ∞Φ≡φ√⌡ Ωε∞∩ⁿ■≥σ≡φ√⌡ ±σ≥σΘ, ²δσΩ≥≡εφφ√σ ∩≡εφΦΩφεΓσφΦ , ≈σ≡ΓΦ, ΓΦ≡≤±√, Ωεφ≥≡Ω≤δⁿ≥≤≡α(±≥α≥ⁿΦ ε∩Φ±√Γα■≥ ∞Φ≡ "⌡αΩσ≡εΓ"), Φ φαΩεφσ÷, ≈α±≥ⁿ, ε∩Φ±√Γα■∙≤■ ±ε÷Φαδⁿφ√σ, ■≡ΦΣΦ≈σ±ΩΦσ Φ ²≥Φ≈σ±ΩΦσ Γε∩≡ε±√.

╤εΣσ≡µα≥σδⁿφα  ΩεδδσΩ÷Φ , Ωε≥ε≡α  ≡α±±∞α≥≡ΦΓασ≥ ⌠σφε∞σφ α≥αΩ φα Ωε∞∩ⁿ■≥σ≡√. ╬φα ΓΩδ■≈ασ≥ ≡ Σ ≡αφσσ ε∩≤ßδΦΩεΓαφφ√⌡ ±≥α≥σΘ, α ≥αΩµσ ≡ Σ φεΓ√⌡ ±≥α≥σΘ. ┬√ß≡αφ√ ±α∞√σ δ≤≈°Φσ Φτ ε∩≤ßδΦΩεΓαφφ√⌡ ≡αφσσ, Γ φΦ⌡ Σαφ√ φσΩε≥ε≡√σ ±±√δΩΦ φα Φ±≥ε≈φΦΩΦ, Ωε≥ε≡√σ Φφα≈σ ≥ µσδε ß√δε ß√ φαΘ≥Φ. ▌≥α ΩφΦπα  Γδ σ≥±  Γαµφ√∞ ±∩≡αΓε≈φΦΩε∞ ∩ε ≤π≡ετα∞ Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ, Ωε≥ε≡√σ ∩≡ΦΓδσΩδΦ ≥αΩεσ ΓφΦ∞αφΦσ Ω Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ Γ ∩ε±δσΣφΦσ πεΣ√.

[ERMANN]
Ermann, D., Williams, M., and C. Gutierrez, Editors, "Computers, Ethics, and Society", Oxford University Press, NY, 1990. (376 pages, includes bibliographical references).

[FORESTER]
Forester, T., and P. Morrison, "Computer Ethics: Tales and Ethical Dilemmas in Computing", MIT Press, Cambridge, MA, 1990. (192 pages including index.)

╚τ ∩≡σΣΦ±δεΓΦ : "╓σδⁿ■ ²≥εΘ ΩφΦπΦ  Γδ σ≥± : Γε-∩σ≡Γ√⌡, ε∩Φ±α≥ⁿ φσΩε≥ε≡√σ Φτ ∩≡εßδσ∞, ±ετΣαφφ√⌡ Σδ  εß∙σ±≥Γα Ωε∞∩ⁿ■≥σ≡α∞Φ, Φ, Γε-Γ≥ε≡√⌡, ∩εΩατα≥ⁿ, ΩαΩ ²≥Φ ∩≡εßδσ∞√ ∩≡ΦΓεΣ ≥ Ω ΓετφΦΩφεΓσφΦ■ ²≥Φ≈σ±ΩΦ⌡ ΣΦδσ∞∞ Σδ  Ωε∞∩ⁿ■≥σ≡φ√⌡ ∩≡ε⌠σ±±ΦεφαδεΓ Φ Ωε∞∩ⁿ■≥σ≡φ√⌡ ∩εδⁿτεΓα≥σδσΘ. ╧≡εßδσ∞√, ±ετΣαφφ√σ Ωε∞∩ⁿ■≥σ≡α∞Φ, Φ∞σ■≥, Γ ±Γε■ ε≈σ≡σΣⁿ, ΣΓα Φ±≥ε≈φΦΩα: φσ∩≡αΓΦδⁿφα  ≡αßε≥α εßε≡≤ΣεΓαφΦ  Φ ∩≡επ≡α∞∞ Φ φσ∩≡αΓΦδⁿφεσ Φ⌡ Φ±∩εδⁿτεΓαφΦσ δ■Σⁿ∞Φ. ╠√ ΣεΩατ√Γασ∞, ≈≥ε Ωε∞∩ⁿ■≥σ≡φ√σ ±Φ±≥σ∞√ ∩ε ±ΓεσΘ ∩≡Φ≡εΣσ φσßστε∩α±φ√, φσφαΣσµφ√, φσ∩≡σΣ±Ωατ≤σ∞√ - Φ ≈≥ε εß∙σ±≥Γε σ∙σ φσ ∩≡σΣ±≥αΓδ σ≥ ±σßσ Γ±σ⌡ ∩ε±δσΣ±≥ΓΦΘ. ╠√ ≥αΩµσ ⌡ε≥Φ∞ ∩εΩατα≥ⁿ, ΩαΩ εß∙σ±≥Γε ±≥αδε ßεδσσ ≤ τΓΦ∞ε Ω φσ∩≡αΓΦδⁿφε∞≤ Φ±∩εδⁿτεΓαφΦ■ δ■Σⁿ∞Φ Ωε∞∩ⁿ■≥σ≡εΓ Γ ΓΦΣσ ≥αΩΦ⌡  ΓδσφΦΘ, ΩαΩ Ωε∞∩ⁿ■≥σ≡φ√σ ∩≡σ±≥≤∩δσφΦ , Ω≡αµΦ ∩≡επ≡α∞∞, ⌡αΩσ≡√, ±ετΣαφΦσ ΓΦ≡≤±εΓ, φα≡≤°σφΦσ δΦ≈φ√⌡ ±ΓεßεΣ Φ ≥.Σ."

┬ε±σ∞ⁿ πδαΓ ΓΩδ■≈α■≥: "╩ε∞∩ⁿ■≥σ≡φ√σ ∩≡σ±≥≤∩δσφΦ ", "╩≡αµΦ ∩≡επ≡α∞∞", "╒αΩσ≡√ Φ ΓΦ≡≤±√", "═σφαΣσµφ√σ Ωε∞∩ⁿ■≥σ≡√", "═α≡≤°σφΦσ δΦ≈φ√⌡ ±ΓεßεΣ", "╚╚ Φ ²Ω±∩σ≡≥φ√σ ±Φ±≥σ∞√", "╩ε∞∩ⁿ■≥σ≡Φτα÷Φ  ≡αßε≈σπε ∞σ±≥α". ╚∞σσ≥±  αφφε≥Φ≡εΓαφφ√σ Φ±≥ε≈φΦΩΦ Φ ΦφΣσΩ±.

[GOULD]
Gould, C., Editor, "The Information Web: Ethical and Social Implications of Computer Networking", Westview Press, Boulder, CO, 1989.

[IAB89]
Internet Activities Board, "Ethics and the Internet", RFC 1087, IAB, January 1989. Also appears in the Communications of the ACM, Vol. 32, No. 6, Pg. 710, June 1989.

▌≥ε≥ ΣεΩ≤∞σφ≥  Γδ σ≥±  ╧╨─ Internet Activities Board(IAB), ±Γ ταφφ√∞Φ ± ∩≡αΓΦδⁿφ√∞ Φ±∩εδⁿτεΓαφΦσ∞ ≡σ±≤≡±εΓ ╚φ≥σ≡φσ≥α. ─ε±≥≤∩σφ Γ ε∩σ≡α≥ΦΓφε∞ ≡σµΦ∞σ φα ⌡ε±≥σ ftp.nisc.sri.com, ΣΦ≡σΩ≥ε≡Φ  rfc, Φ∞  ⌠αΘδα rfc1087.txt. ╥αΩµσ Σε±≥≤∩σφ φα ⌡ε±≥σ nis.nsf.net, ΣΦ≡σΩ≥ε≡Φ  RFC, Φ∞  ⌠αΘδα RFC1087.TXT-1.

[MARTIN]
Martin, M., and R. Schinzinger, "Ethics in Engineering", McGraw Hill, 2nd Edition, 1989.

[MIT89]
Massachusetts Institute of Technology, "Teaching Students About Responsible Use of Computers", MIT, 1985-1986. Also reprinted in the Communications of the ACM, Vol. 32, No. 6, Pg. 704, Athena Project, MIT, June 1989.

▌≥ε≥ ΣεΩ≤∞σφ≥  Γδ σ≥±  ╧╨─ ╠╥╚ ∩ε ∩≡εßδσ∞α∞ Φ±∩εδⁿτεΓαφΦ  Ωε∞∩ⁿ■≥σ≡εΓ.

[NIST]
National Institute of Standards and Technology, "Computer Viruses and Related Threats: A Management Guide", NIST Special Publication 500-166, August 1989.

[NSF88]
National Science Foundation, "NSF Poses Code of Networking Ethics", Communications of the ACM, Vol. 32, No. 6, Pg. 688, June 1989. Also appears in the minutes of the regular meeting of the Division Advisory Panel for Networking and Communications Research and Infrastructure, Dave Farber, Chair, November 29-30, 1988.

▌≥ε≥ ΣεΩ≤∞σφ≥  Γδ σ≥±  ╧╨─ ═α÷Φεφαδⁿφεπε ═α≤≈φεπε ╘εφΣα(NSF), ±Γ ταφφ√∞Φ ± ²≥Φ≈σ±ΩΦ∞ Φ±∩εδⁿτεΓαφΦσ∞ ╚φ≥σ≡φσ≥α.

[PARKER90]
Parker, D., Swope, S., and B. Baker, "Ethical Conflicts: Information and Computer Science, Technology and Business", QED Information Sciences, Inc., Wellesley, MA. (245 pages).

─ε∩εδφΦ≥σδⁿφ√σ ∩≤ßδΦΩα÷ΦΦ ∩ε ▌≥ΦΩσ:

═αταΣ | ╤εΣσ≡µαφΦσ | ┬∩σ≡σΣ