Using the new ACM code of ethics in decision making
Communications of the ACM
Modeling IT ethics: a study in situational ethics
MIS Quarterly
Technical opinion: Information system security management in the new millennium
Communications of the ACM
The digital millennium Copyright Act
Ubiquity
Lessons from corporate America applied to training in computer ethics
ACM SIGSAC Review
Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace
ACM SIGCAS Computers and Society
Protecting Your Most Valuable Asset: Intellectual Property
IT Professional
First Principles of Copyright for DRM Design
IEEE Internet Computing
Digital rights management for content distribution
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Fundamental Ethics in Information Systems
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 08
The Simple Economics of Cybercrimes
IEEE Security and Privacy
Queue - Cybercrime
Hi-index | 0.00 |
While computer ethics and information security courses try to teach computer misuse and unauthorized access as clear black and white examples, when examining the use and potentially misuse of URLs the discussion becomes less clear. This paper examines a number of computer use ethical scenarios focusing on the modification of URLs within Web browsers. Using the documented case of applicants to several Ivy-league schools as a discussion point, this paper presents a survey of U.S. students enrolled in information security and computer ethics classes, asking at what point does modifying the URL become hacking, and at what point does it become unethical. The findings of this study are discussed.