SlideShare a Scribd company logo
1 of 1
นาย จักรี โคตพจน์ 53011220030 Is ระบบ
                      พิเศษ
(2009 ). "จริยธรรมและคุณธรรมในการใช้เทคโนโลยีสารสนเทศ." from
        http://sw07013.blogspot.com/2009/02/blog-post_9261.html.
*ไสว มาลาทอง". (2552). "จริยธรรมคอมพิวเตอร์." from
        http://www.thai3dviz.com/board/blog.php?b=19.
Brenner, J. (2010). "A Logic of Ethical Information." Knowledge, Technology, & Policy
        23(1-2): 109.
Floridi, L. (2008). "Information ethics: a reappraisal." Ethics and Information Technology
        10(2-3): 189.
Floridi, L. (2009). "Network Ethics: Information and Business Ethics in a Networked
        Society." Journal of Business Ethics 90: 649.
Hauptman, R. (2008). "Ethics and information: An encylopedic overview." Business
        Information Review 25(4): 238.
Kemp, J. and E. Frierson (2010). "Perspectives on Leadership." Library Leadership &
        Management (Online) 24(4): 183.
Rubin, R., - Foundations of library and information science / Richard E. Rubin.
Severson, R. J., - Encyclopedia of information ethics and security / Marian Quigley,
        editor
The principles of information ethics [electronic resource] / Richard J. Severson.
Tavani, H. T. Ethics and technology : ethical issues in an age of information and
        communication technology / Herman T. Tavani.

More Related Content

Viewers also liked

Lei anti nepotismo
Lei anti nepotismoLei anti nepotismo
Lei anti nepotismoJamildo Melo
 
Show da quimicacelular
Show da quimicacelularShow da quimicacelular
Show da quimicacelularnaymarques
 
Bio 1 REINOS
Bio 1 REINOSBio 1 REINOS
Bio 1 REINOSSegundao
 
El sueño de un campeon novela_atv
El sueño de un campeon novela_atvEl sueño de un campeon novela_atv
El sueño de un campeon novela_atvAlejandro Vega
 
Plantilla Analisis Informacion
Plantilla Analisis InformacionPlantilla Analisis Informacion
Plantilla Analisis Informacionsusylizara
 
Primaria karina
Primaria karinaPrimaria karina
Primaria karinakariesme
 
Làm sao để ngừa chứng đau lưng
Làm sao để ngừa chứng đau lưngLàm sao để ngừa chứng đau lưng
Làm sao để ngừa chứng đau lưngrashad704
 
7 mons superstar
7 mons superstar7 mons superstar
7 mons superstarFARO
 
Ativ3 3mapa pitec_sheilajanes
Ativ3 3mapa pitec_sheilajanesAtiv3 3mapa pitec_sheilajanes
Ativ3 3mapa pitec_sheilajanessheilajanes
 
Ojibwe and Dakota
Ojibwe and DakotaOjibwe and Dakota
Ojibwe and Dakotacierralewis
 

Viewers also liked (14)

Lei anti nepotismo
Lei anti nepotismoLei anti nepotismo
Lei anti nepotismo
 
Show da quimicacelular
Show da quimicacelularShow da quimicacelular
Show da quimicacelular
 
Bio 1 REINOS
Bio 1 REINOSBio 1 REINOS
Bio 1 REINOS
 
El sueño de un campeon novela_atv
El sueño de un campeon novela_atvEl sueño de un campeon novela_atv
El sueño de un campeon novela_atv
 
Plantilla Analisis Informacion
Plantilla Analisis InformacionPlantilla Analisis Informacion
Plantilla Analisis Informacion
 
Sku ubu
Sku ubuSku ubu
Sku ubu
 
Primaria karina
Primaria karinaPrimaria karina
Primaria karina
 
Làm sao để ngừa chứng đau lưng
Làm sao để ngừa chứng đau lưngLàm sao để ngừa chứng đau lưng
Làm sao để ngừa chứng đau lưng
 
1013
10131013
1013
 
7 mons superstar
7 mons superstar7 mons superstar
7 mons superstar
 
Ativ3 3mapa pitec_sheilajanes
Ativ3 3mapa pitec_sheilajanesAtiv3 3mapa pitec_sheilajanes
Ativ3 3mapa pitec_sheilajanes
 
u0xge.pdf
u0xge.pdfu0xge.pdf
u0xge.pdf
 
ebcbe.docx
ebcbe.docxebcbe.docx
ebcbe.docx
 
Ojibwe and Dakota
Ojibwe and DakotaOjibwe and Dakota
Ojibwe and Dakota
 

Similar to 53011220030

Suny faculty senate
Suny faculty senateSuny faculty senate
Suny faculty senateSUNY Oneonta
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Info 2402 information retrieval technologies course_outline
Info 2402 information retrieval technologies course_outlineInfo 2402 information retrieval technologies course_outline
Info 2402 information retrieval technologies course_outlineShahriar Rafee
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Ullmann
UllmannUllmann
Ullmannanesah
 
Extraction and Analysis of Publication Data of Conferences - ICACCE 2015
Extraction and Analysis of Publication Data of Conferences - ICACCE 2015Extraction and Analysis of Publication Data of Conferences - ICACCE 2015
Extraction and Analysis of Publication Data of Conferences - ICACCE 2015Sohom Ghosh
 
acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBJaina Hirai
 
Presentation at School of Information and Library Science, UNC, USA
Presentation at School of Information and Library Science, UNC, USAPresentation at School of Information and Library Science, UNC, USA
Presentation at School of Information and Library Science, UNC, USACharles Seger
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
Scaling Social Innovations by Calongne
Scaling Social Innovations by CalongneScaling Social Innovations by Calongne
Scaling Social Innovations by CalongneCynthia Calongne
 
December 2022: Top 10 Read Articles in Web & Semantic Technology
December 2022: Top 10  Read Articles in Web & Semantic TechnologyDecember 2022: Top 10  Read Articles in Web & Semantic Technology
December 2022: Top 10 Read Articles in Web & Semantic Technologydannyijwest
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research AIRCC Publishing Corporation
 
Social Media MOOC Mentions - iHCI 2016
Social Media MOOC Mentions - iHCI 2016Social Media MOOC Mentions - iHCI 2016
Social Media MOOC Mentions - iHCI 2016Eamon Costello
 

Similar to 53011220030 (20)

Suny faculty senate
Suny faculty senateSuny faculty senate
Suny faculty senate
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
Digital+issues[1]
Digital+issues[1]Digital+issues[1]
Digital+issues[1]
 
Info 2402 information retrieval technologies course_outline
Info 2402 information retrieval technologies course_outlineInfo 2402 information retrieval technologies course_outline
Info 2402 information retrieval technologies course_outline
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
Ullmann
UllmannUllmann
Ullmann
 
Extraction and Analysis of Publication Data of Conferences - ICACCE 2015
Extraction and Analysis of Publication Data of Conferences - ICACCE 2015Extraction and Analysis of Publication Data of Conferences - ICACCE 2015
Extraction and Analysis of Publication Data of Conferences - ICACCE 2015
 
acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEB
 
Presentation at School of Information and Library Science, UNC, USA
Presentation at School of Information and Library Science, UNC, USAPresentation at School of Information and Library Science, UNC, USA
Presentation at School of Information and Library Science, UNC, USA
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
Scaling Social Innovations by Calongne
Scaling Social Innovations by CalongneScaling Social Innovations by Calongne
Scaling Social Innovations by Calongne
 
December 2022: Top 10 Read Articles in Web & Semantic Technology
December 2022: Top 10  Read Articles in Web & Semantic TechnologyDecember 2022: Top 10  Read Articles in Web & Semantic Technology
December 2022: Top 10 Read Articles in Web & Semantic Technology
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
 
Social Media MOOC Mentions - iHCI 2016
Social Media MOOC Mentions - iHCI 2016Social Media MOOC Mentions - iHCI 2016
Social Media MOOC Mentions - iHCI 2016
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

53011220030

  • 1. นาย จักรี โคตพจน์ 53011220030 Is ระบบ พิเศษ (2009 ). "จริยธรรมและคุณธรรมในการใช้เทคโนโลยีสารสนเทศ." from http://sw07013.blogspot.com/2009/02/blog-post_9261.html. *ไสว มาลาทอง". (2552). "จริยธรรมคอมพิวเตอร์." from http://www.thai3dviz.com/board/blog.php?b=19. Brenner, J. (2010). "A Logic of Ethical Information." Knowledge, Technology, & Policy 23(1-2): 109. Floridi, L. (2008). "Information ethics: a reappraisal." Ethics and Information Technology 10(2-3): 189. Floridi, L. (2009). "Network Ethics: Information and Business Ethics in a Networked Society." Journal of Business Ethics 90: 649. Hauptman, R. (2008). "Ethics and information: An encylopedic overview." Business Information Review 25(4): 238. Kemp, J. and E. Frierson (2010). "Perspectives on Leadership." Library Leadership & Management (Online) 24(4): 183. Rubin, R., - Foundations of library and information science / Richard E. Rubin. Severson, R. J., - Encyclopedia of information ethics and security / Marian Quigley, editor The principles of information ethics [electronic resource] / Richard J. Severson. Tavani, H. T. Ethics and technology : ethical issues in an age of information and communication technology / Herman T. Tavani.