- America Online (Accessed December 21, 1996). Terms of service agreement [Online]. Available: AOL Keyword: TOS.
- American Medical Association (1996). Protecting the confidentiality of patient information. Chicago: Author.
- American Psychological Association. (1994) Publication manual of the American Psychological Association (4th ed.). Washington, D.C.: Author.
- Anonymous (1996). Electronic rights and ethics, Version 0.23 [Online]. Available: http://www.zip.com.au/~pete/ere.html.
- Ball, M. (1996). Computer professionals for social responsibility [Online]. Available: http://snyside.sunnyside.com/home.html.
- Barlow, J. P. (Accessed December 16, 1996). The economy of ideas: A framework for rethinking patents and copyrights in the digital age [Online]. Available: http://www.musicwest.com/MW/95/Panelists/B/Barlow/economy.html.
- Barrett, D. J. (1996). Bandits on the information superhighway. Sebastopol, California: O'Reilly and Associates.
- Bialorucki, T., & Blaine, M. J. (1992). Protecting patient confidentiality in the pursuit of the ultimate computerized information system. Journal of Nursing Care Quality, 7, 53–56.
- Bier, M. C., Sherlblom, S. A., & Gallo, M. A. (1996). Ethical issues in a study of Internet use: Uncertainty, responsibility, and the spirit of research relationships. Ethics and Behavior, 6, 141–151.
- Computer Ethics Institute (Accessed November 5, 1996). The Ten Commandments of computer ethics [Online], Available: http://cpsr.org/dox/cei.html.
- Daley, D. (1996). “Interrupting the conversation”: Stripping sexuality from modem communication. SIECUS Report, 25, 13–15.
- Electronic Frontier Foundation (1996). All about the electronic frontier foundation [Online]. Available: http://www.eff.org/EFFdocs/about_eff.html.
- Fikar, C. R. (1996). The Internet and the pediatrician: Should there be a connection? Clinical Pediatrics, May, 229–235.
- Florida Atlantic University (1995). Network computing policy [Online], Available: http://www.fau.edu/wise/netpol.html.
- Florio, G. (1996). Navajos call on telephone service. The Baltimore Sun, November 28, p. 2A.
- George Washington University (Accessed April 19, 1996). The George Washington University code of conduct for users of computing systems [Online]. Available: http://www.gwu.edu/~circta/help/code_of_conduct.html(a).
- George Washington University (1996). The medical students' computer survival guide. Washington, D.C.: Author (b).
- Georgetown University. (1996). Academic computing services acceptable use policy. Washington, D.C.: Author.
- Goldberg, I. (1996). Instructions for authors. International Journal of Psychopathology, Psychotherapy, and Psychopharmacology, 1 [Online]. Available: (http://www.psycom.net/ijppp.instruct.html).
- Hambridge, S. (1995). Netiquette guidelines. [Online]. Available: http://www.cis.ohio-state.edu/htbin/rfc/rfcl855.html.
- Holmes, L. G. (In press). You can't do psychotherapy on the Net (yet). International Journal of Psychopathology, Psychotherapy, and Psychopharmacology, 1 [Online]. Available: http://www.psycom.net/ijppp.html.
- Holtzclaw, B. J., Boggs, K. U., & Wilson, M. E. (1993). Mail by modem: The BITNET connection. Computers in Nursing, 11, 242–248.
- Hutchinson, S. E. & Sawyer, S. C. (1996). Computer and Information Systems (5th ed.). Chicago: Richard D. Irwin, pp. 437–465.
- Johnson, D. & Miller, K. (1995). Ethical and professional issues in computing [Online], Available: http://www.rpi.edu/-johnsd/epic/epic.html.
Online Ethics: Social Contracts in the Virtual Community
Reprints and Corporate Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
To request a reprint or corporate permissions for this article, please click on the relevant link below:
Academic Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
Obtain permissions instantly via Rightslink by clicking on the button below:
If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.
Related research
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.