داناییفر، حسن و دیگران، (1386)، روش شناسی پژوهش کیفی در مدیریت: رویکردی جامع، تهران، انتشارات صفار-اشراقی، چاپ دوم.
Adam, A. (2001), "Computer ethics in a different voice", Information and Organization Journal, Vol. 11.
Al-A’ali, M. (2008), "Computer ethics for the computer professional from an Islamic point of view, Journal of Information, Communication & Ethics in Society, Vol. 6, No. 1.
Baase, S. (2003), A Gift of Fire, Social, Legal and Ethical Issues for Computers and the Internet, Prentice-Hall, Englewood Cliffs, NJ, 2nd ed.
Bommer, M., Gratto, C., Gravander, J. and Tuttle, M., (1987), "A behavioural model of ethical and unethical decision making", Journal of Business Ethics, 6.
Bynum, T.W. (2006), "Flourishing ethics", Ethics and Information Technology Journal, Vol. 8, No. 4.
Eining, M.M. and Christensen, A.L., (2006) "A psychosocial model of software piracy: the development and test of a model", in Dejoie, R., Fowler, G. and Paradice, D., Ethical Issues in Information Systems, Boyd & Fraser, Boston, MA,
Ferrell, O.C. and Gresham, L.G. (1985), "A contingency framework for understanding ethical decision making in marketing", Journal of Marketing, 49.
Floridi, L. (2001), "Ethics in the Infosphere", The Philosophers’ Magazine, 6.
Floridi ,L. Sanders, J.W (2002), "Mapping the foundationalist debate in computer ethics", Ethics and Information Technology, 4.
Forcht, K.A., Mason, R.O. and McFarlan, F.W. (1989) "Ethical use of computers: an international perspective", in DeGross, J.I.,Henderson, J.C. and Konsynski, B.R., Proceedings of the Tenth International Conference on Information Systems, Boston, MA,4-6 December.
Gotterbarn, D.W. (1992), "The Use and Abuse of Computer Ethics", special ethics issue of The Journal of Systems and Software: www.southernct.edu/ organizations/ rccs/ resources/ teaching/ teaching_mono/ gotterbarn02/ gotter barn02_intro.html.
Guthrie, R. (1997), "The ethics of telework", Journal of iInformation system management, 14, 4.
Hilton, T. & etc. (2006), "information systems ethics in the triad", Journal of computer summery, 8.
LaPlante, A., (1987), "Computer fraud threat increasing,study says", Infoworld Journal, 18.
Miller, S. and Wecker, J. (2004), "Privacy, the workplace and the Internet", Journal of Business Ethics, Vol. 28, No. 3.
Namlu, A.G. and Odabasi, H.F. (2007), "Unethical computer using behavior scale: a study of reliability and validity on Turkish university students", Computers & Education, Vol.48, No. 2.
Naresh, S. (1999), Ethical Norms for the Information Society, Proceedingsof the First Session of UNESCO’s COMEST, Oslo April 1999, Paris: UNESCO.
Orito, Y. and Murata , K. (2008), "Socio-cultural analysis of personal information leakage in Japan", Journal of Information, Communication & Ethics in Society, Vol.6, No. 2.
Parker, Donn. (1968),"Rules of Ethics in Information Processing", Communications of the ACM, 11.
Rest, J.R., (1979), Development in Judging Moral Issues, University of Minnesota Press, Minneapolis, MN.
Straub, D.W. and Nance, W.D. (1990), "Discovering and disciplining computer abuse in organizations:a field study", MIS Quarterly, Vol.14, No. 1.
Thome, L. and S.B Saunders (2002), "the socio-cultural embededness of individuals", Journal of business of ethical, 35.
Tsui, J.and C. Windsor (2001), "some cross-culture evidence on ethical reasoning", Journal of Business ethics, 31, 2.
Whitman, Michael E., Townsend, Anthony M., Hendrickson, Anthony R. (1999), "Cross national Differences in Computer-use Ethics: A Nine-country study", Journal of International Business Studies, 30, 4.