1. Neumann, P. (1994) Computer insecurity, Issues in Science and Technology XI (1): 50–54.
2. Association for Computing Machinery. Forum on risks to the public in computers and related systems: http://www.csl.sri.com/~risks/risks.txt (last accessed 1998).
3. Smith, H.J. (1996) How private are personal databases? Beyond Computing 5 (4): 14–15.
4. Institute for Global Ethics: http://www.globalethics.org (last accessed 1998).
5. Association for Computing Machinery and IEEE-Computer Society (1991) Computing Curricula 1991, a Joint Curriculum Task Force Report, ACM Press.