Managing Information Technology

(Frankie) #1
Chapter 15 • Social, Ethical, and Legal Issues 593

iSpit. 2010. “What retailers really know about us: Data collec-
tion.” I Am Not A Rapper Web site, iamnotarapperispit.com/
blog/2010/08/01/what-retailers-really-know-about-us-data-
collection(August 1).
ITRC. 2010. “Identity theft: The aftermath 2009.” Identity Theft
Resource Center Web site, http://www.idtheftcenter.org/artman2/
uploads/1/Aftermath_2009_20100520.pdf(May 20).
Javelin Strategy & Research. 2010. “2010 identify fraud survey
report: Consumer version.” Javelin Strategy & Research
Web site, http://www.javelinstrategy.com/uploads/files/1004.
R_2010IdentityFraudSurveyConsumer.pdf(February).
Moritz, Robert. 2003. “When someone steals your identity.”
Parade Magazine(July 6): 3–4.
Newman, Matthew. 2003. “EU improves software patent, but out-
laws Amazon One Click.” Dow Jones, news.morningstar.com/
news/DJ/Mo6/D17/1055868063730.html(June 17).
Nusbaum, Marci Alboher. 2003. “New kind of snooping arrives
at the office.” The New York Times(July 11).
Pew Hispanic Center. 2009. “Latinos online, 2006–2008: Narrowing
the gap.” A Pew Research Center Report, Pew Hispanic Center
Web site, pewhispanic.org/reports/report.php?ReportID=119
(December 22).
Public Affairs. 2003. “Internet piracy on campus, a survey of 1000
U.S. college and university students and 300 U.S. college and
university educators.” Washington, DC (September 16).


Sager, Ira, Steve Hamm, Neil Gross, John Carey, and Robert D.
Hof. 2000. “Cyber crime.” BusinessWeek(February 21).
Cover story, Web site, http://www.businessweek.com/2000/00_08/
b3669001.htm.
Schoenbachler, Denise D., Geoffrey L. Gordon, Dawn Foley, and
Linda Spellman. 1997. “Understanding consumer database
marketing.” Journal of Consumer Marketing14(1): 5–19.
Sipior, Janice C., Burke T. Ward, and Georgina R. Roselli. 2005.
“The ethical and legal concerns of spyware.” Information
Systems Management 22 (Spring): 39–49.
Smith, H. Jeff. 2004. “Information privacy and its management.”
MIS Quarterly Executive3 (December): 201–213.
Stoll, Cliff. 1989. The Cuckoo’s Egg: Tracking a Spy through the
Maze of Computer Espionage. New York: Pocket Books.
Swartz, Jon, and Paul Davidson. 2003. “Spam thrives despite
effort to screen it out.” Cover Story, USA Today(May 8).
TorrentFreak. 2009. “Top 10 most pirated TV shows of 2009.”
TorrentFreak Web site, torrentfreak.com/top-10-most-pirated-
tv-shows-of-2009-091231/(December 31).
U.S. PIRG. 2004. “Mistakes do happen: A look at errors in con-
sumer credit reports.” U.S. Public Interest Research Group
Web site, uspirg.org/uspirg.asp?id2=13649(June).
Whitney, Daisy. 2009. “As piracy climbs, TV takes up arms.”
TV WeekWeb site, http://www.tvweek.com/news/2009/05/as_
piracy_climbs_tv_takes_up_a.php(May).
Free download pdf