References
- Association for Computer Machinery (ACM). (2019). ACM code of ethics and professional conduct. ACM. Retrieved from https://www.acm.org/binaries/content/assets/about/acm-code-of-ethics-and-professional-conduct.pdf
- Cameron, S., & Seidel, M. (2019, March 24). About ethics in information technology. bizfluent. Retrieved from https://bizfluent.com/about-4743180-ethics-information-technology.html
- Hurley, D. (2017, May 7). Improving cybersecurity: The diversity imperative. Forbes, CIO Network. Retrieved from https://www.forbes.com/sites/ciocentral/2017/05/07/improving-cybersecurity-the-diversity-imperative/#2f9e31c31e30
- Information System Audit and Control Association (ISACA). (2019). Code of professional ethics. Retrieved from https://www.isaca.org/Certification/Code-of-Professional-Ethics/Pages/default.aspx
- Information Systems Security Certifying Consortium (ISC2). (2019). ISC2 code of ethics. Retrieved from https://resources.infosecinstitute.com/category/certifications-training/cissp/isc2-code-of-ethics/
- Institute for Electrical and Electronic Engineers (IEEE). (2014, June). IEEE code of conduct, approved by the IEEE board of directors. Retrieved from https://www.ieee.org/content/dam/ieee-org/ieee/web/org/about/ieee_code_of_conduct.pdf
- Joint Task Force (JTF) on Cybersecurity Education. (2017, December 31). Cybersecurity curricula 2017, curriculum guidelines for post-secondary degree programs in cybersecurity, a report in the computing curricula series. ACM/IEEE-CS/AIS SIGSEC/IFIP WG 11.8, Version 1.0.
- Knowles. Aiden. (2016, October 12). Tough challenges in cybersecurity ethics. SecurityIntelligence. Retrieved from https://securityintelligence.com/tough-challenges-cybersecurity-ethics/
- MarketWatch. (2013, March 5. 10 companies with the worst reputations. Retrieved from https://www.marketwatch.com/story/10-companies-with-the-worst-reputations
- SANS. (2019). Ethics Policy. Retrieved from https://www.sans.org/security-resources/policies/general/pdf/ethics-policy
- The Software Alliance. (2018, June). Software management: Security imperative, business opportunity. BSA Global Software Survey. Retrieved from https://gss.bsa.org/wp-content/uploads/2018/05/2018_BSA_GSS_Report_en.pdf