SlideShare uma empresa Scribd logo
1 de 24
r r M. SETIAWAN KUSMULYONO Business Ethics S1 Business Prasetiya Mulya Business School
Business Ethics r Muhammad Setiawan Kusmulyono PRESENTATION 1
Business Ethics r S e s s i o n  9 E t h i c a l  I s s u e s i n Information Technology 2
r A g e n d a Business Ethics Chronology Back to Definition Ethical Issues Netiquette Cyber-ethics Conclusion  Discussion Session  3
Business Ethics r C h r o n o l o g y 4 Information Technology have closely related to : Computer & Communications Within this Information Age [ begin in 1990 ], Computer and Communications started to combine.   The combination results: Convergence Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc Personalization Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
Business Ethics r D e f i n i t i o n 5 Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Using Information Technology 6 th  Ed. p.25 O b j e c t i v e s To understand many kinds of ethical issues in Information Technology To understand the basic concepts of ethics in IT Developments
Business Ethics r P e r s p e c t i v e 6 Tom Forester and Perry Morrison in  Computer Ethics , discuss about some considerations in ethical issues in Information Technology, such as: Speed and Scale Unpredictability Complexity Great amounts of information can be stored, retrieved, and transmitted at any speed and scale Com&Com are pervasive, touching nearly every aspects of our lives  Computers are incredibly complex, even their creators are not always understood about the complexity.
Business Ethics r Ethical Issues 7 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Richard O Mason Carr P. Collins Management Information Sciences Quarterly P Privacy A Accuracy P Property A Accessibility
Business Ethics r Ethical Issues 8 Plagiarism Privacy Data Security Less Predictable Less Reliable Unmanageable Out-of-control Cost Morphing  Photo Manipulation Technology Manipulation
Business Ethics r Ethical Issues 9 Privacy Privacy is the right of people not to reveal information about themselves. Using Information Technology 6 th  Ed. p.369 Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system. Data Security Example : Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue.  Prevention: PIN [Personal Identification Number] Change Password Regularly
Business Ethics r Ethical Issues 10 Less Predictable Less Reliable Computers and communications are pervasive, touching nearly every aspects of our lives. If we compare Com & Com with other pervasive technologies; electricity, television, etc, Com & Com seems lot of less predictable and reliable ,[object Object],[object Object],[object Object],[object Object]
Business Ethics r Ethical Issues 11 Unmanageable Out-of-control Cost Good Example: Linux Operating System Bad Example: Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
Business Ethics r Ethical Issues 12 Technology Manipulation SOUND Manipulation PHOTO Manipulation VIDEO & Television  Manipulation Morphing
Business Ethics r Ethical Issues 13 Technology Manipulation SOUND Manipulation ,[object Object],[object Object],[object Object],[object Object],[object Object],Example  2: L I P S I N G
Ethical Issues 14 Technology Manipulation PHOTO Manipulation Morphing
Business Ethics r Ethical Issues 15 Technology Manipulation MEDIA Manipulation Manipulation
Business Ethics r Ethical Issues 16 Technology Manipulation MEDIA Manipulation Manipulation
Business Ethics r Ethical Issues 17 Technology Manipulation MEDIA Manipulation
Business Ethics r Ethical Issues 18 P L A G I A R I S M Plagiarism  Illegal Copy-Paste Activity Not inserted the original author, if we use their theory
Business Ethics r Netiquette 19 Netiquette ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Network Etiquette Appropriate online behavior
Business Ethics r Cyber-ethics 20 Cyber-ethics   = related with censorship of internet information Data The word “sex” is the most popular search word on the net. [Yahoo data] ,[object Object],[object Object],[object Object],[object Object]
r r C O N C L U S I O N Ethical issues in ICT is not only existed in sex, crime, or hack, but also happened in another area of life (entertainment, education, etc) ,[object Object],[object Object],[object Object],[object Object],21
r r BIBLIOGRAPHY 21 Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005 Management Information Sciences Quarterly Richard O. Mason and Carr P. Collins
r r thank you discussion session

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Ict application in business
Ict application in businessIct application in business
Ict application in business
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it era
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Impact of ICT
Impact of ICTImpact of ICT
Impact of ICT
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
 

Destaque

Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
harshhanu
 

Destaque (8)

BTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical IssuesBTEC National in ICT: Unit 3 - Ethical Issues
BTEC National in ICT: Unit 3 - Ethical Issues
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
 
Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Semelhante a Ethical Issues In ICT

Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
Prof. Othman Alsalloum
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
SANSKAR20
 
Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigation
uk01f0015
 

Semelhante a Ethical Issues In ICT (20)

TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
 
Ethics in IT
Ethics in ITEthics in IT
Ethics in IT
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Electronic poster
Electronic posterElectronic poster
Electronic poster
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Share Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptxShare Digital Society and Computer Ethics.pptx
Share Digital Society and Computer Ethics.pptx
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
Reem's Investigation
Reem's InvestigationReem's Investigation
Reem's Investigation
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
portfolio.docx
portfolio.docxportfolio.docx
portfolio.docx
 
Chapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxChapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptx
 

Mais de kelly kusmulyono (10)

Arcelik Turkey
Arcelik TurkeyArcelik Turkey
Arcelik Turkey
 
Product Development (Indonesian Version)
Product Development (Indonesian Version)Product Development (Indonesian Version)
Product Development (Indonesian Version)
 
Problem Analysis
Problem AnalysisProblem Analysis
Problem Analysis
 
Problem Analysis Framework
Problem Analysis FrameworkProblem Analysis Framework
Problem Analysis Framework
 
Decision Analysis Introduction
Decision Analysis IntroductionDecision Analysis Introduction
Decision Analysis Introduction
 
Nike Internal-External Assessment
Nike Internal-External AssessmentNike Internal-External Assessment
Nike Internal-External Assessment
 
Celebrity Endorser
Celebrity EndorserCelebrity Endorser
Celebrity Endorser
 
Nike Environmental Analysis
Nike Environmental AnalysisNike Environmental Analysis
Nike Environmental Analysis
 
Risk Exposure & Internal Control Structure
Risk Exposure & Internal Control StructureRisk Exposure & Internal Control Structure
Risk Exposure & Internal Control Structure
 
ICC
ICCICC
ICC
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Ethical Issues In ICT

  • 1. r r M. SETIAWAN KUSMULYONO Business Ethics S1 Business Prasetiya Mulya Business School
  • 2. Business Ethics r Muhammad Setiawan Kusmulyono PRESENTATION 1
  • 3. Business Ethics r S e s s i o n 9 E t h i c a l I s s u e s i n Information Technology 2
  • 4. r A g e n d a Business Ethics Chronology Back to Definition Ethical Issues Netiquette Cyber-ethics Conclusion Discussion Session 3
  • 5. Business Ethics r C h r o n o l o g y 4 Information Technology have closely related to : Computer & Communications Within this Information Age [ begin in 1990 ], Computer and Communications started to combine. The combination results: Convergence Allow device [electronic product] to perform in multiple functions. Example: Cellphone+Digicam, TV+Internet Access, etc Portability Trading off the power and move to convenience in return for smaller size and weight. Example: PC Tablet, Smartphone, etc Personalization Creation of information tailored to your preferences. Example: We will receive special ad that we often needed.
  • 6. Business Ethics r D e f i n i t i o n 5 Ethics is defined as a set of moral values or principles that govern the conduct of an individual or a group. Using Information Technology 6 th Ed. p.25 O b j e c t i v e s To understand many kinds of ethical issues in Information Technology To understand the basic concepts of ethics in IT Developments
  • 7. Business Ethics r P e r s p e c t i v e 6 Tom Forester and Perry Morrison in Computer Ethics , discuss about some considerations in ethical issues in Information Technology, such as: Speed and Scale Unpredictability Complexity Great amounts of information can be stored, retrieved, and transmitted at any speed and scale Com&Com are pervasive, touching nearly every aspects of our lives Computers are incredibly complex, even their creators are not always understood about the complexity.
  • 8.
  • 9. Business Ethics r Ethical Issues 8 Plagiarism Privacy Data Security Less Predictable Less Reliable Unmanageable Out-of-control Cost Morphing Photo Manipulation Technology Manipulation
  • 10. Business Ethics r Ethical Issues 9 Privacy Privacy is the right of people not to reveal information about themselves. Using Information Technology 6 th Ed. p.369 Privacy is had closely related to Data Security. This ethical issues occur when unauthorized access tried to attack our system. Data Security Example : Today, e-banking and e-commerce have becoming lifestyle. People tend to do transaction through internet. Privacy and Data Security become an issue. Prevention: PIN [Personal Identification Number] Change Password Regularly
  • 11.
  • 12. Business Ethics r Ethical Issues 11 Unmanageable Out-of-control Cost Good Example: Linux Operating System Bad Example: Sometimes, we don’t know the development of a program. Someone could modify the program until the initial creator don’t know what happen to the program
  • 13. Business Ethics r Ethical Issues 12 Technology Manipulation SOUND Manipulation PHOTO Manipulation VIDEO & Television Manipulation Morphing
  • 14.
  • 15. Ethical Issues 14 Technology Manipulation PHOTO Manipulation Morphing
  • 16. Business Ethics r Ethical Issues 15 Technology Manipulation MEDIA Manipulation Manipulation
  • 17. Business Ethics r Ethical Issues 16 Technology Manipulation MEDIA Manipulation Manipulation
  • 18. Business Ethics r Ethical Issues 17 Technology Manipulation MEDIA Manipulation
  • 19. Business Ethics r Ethical Issues 18 P L A G I A R I S M Plagiarism Illegal Copy-Paste Activity Not inserted the original author, if we use their theory
  • 20.
  • 21.
  • 22.
  • 23. r r BIBLIOGRAPHY 21 Using Infromation and Communication Technology. Williams Sawyer. McGraw-Hill. 2005 Management Information Sciences Quarterly Richard O. Mason and Carr P. Collins
  • 24. r r thank you discussion session