Testimony on computer security before the U.S. senate Subcommittee on oversight of government management of the commmittee on governmental affairs

Acm Sigcas Computers and Society 13 (4, 1-3):2-4 (1984)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,072

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Computer security for the people.Jay Bloombecker - 1985 - Acm Sigcas Computers and Society 14 (1, 2, 3, 4):12-15.
Information warfare and security.Gary Gocek - 1999 - Acm Sigcas Computers and Society 29 (3):36-37.
SIGCAS in the early days.Janet Toland - 2016 - Acm Sigcas Computers and Society 46 (3):55-65.
Who should teach computer ethics and computers & society?Deborah Johnson - 1994 - Acm Sigcas Computers and Society 24 (2):6-13.
Internet jurisdiction with a U.S. focus.Dana L. Christensen - 2005 - Acm Sigcas Computers and Society 35 (1):2-2.
A computer ethics bibliography.Herman T. Tavani - 1995 - Acm Sigcas Computers and Society 25 (2):8-18.
The foundation of computer ethics.Terrell Ward Bynum - 2000 - Acm Sigcas Computers and Society 30 (2):6-13.
Computer ethics: philosophical enquiry.Deborah G. Johnson, James H. Moor & Herman T. Tavani - 2000 - Acm Sigcas Computers and Society 30 (4):6-9.
Computer ethics: philosophical enquiry.Herman T. Tavani & Lucas D. Introna - 1999 - Acm Sigcas Computers and Society 29 (1):4-8.
CEPE '97: Computer ethics.David Preston & Jeroen van den Hoven - 1997 - Acm Sigcas Computers and Society 27 (3):4-5.

Analytics

Added to PP
2013-12-12

Downloads
20 (#1,041,285)

6 months
9 (#489,609)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references