참고문헌
- Alvin Toffler (1989). The Third Wave. Bantam Books.
- Alvin Toffler. heidi (2006), Revolutionary Wealth. Knopf Doubleday Publishing Group.
- Andrew V. Beale & Kimberly R. Hall (2007). Cyberbullying : What School Administrators (and Parents) Can Do. The Clearing House: A Journal of Educational Strategies. Issues and Ideas. 81(1). 8-12. https://doi.org/10.3200/TCHS.81.1.8-12
- Anton. A. I. Julia B. E., Jessica D. Y. (2010). How Internet Users' Privacy Concerns have Evolved Since 2002. Security & Privacy. IEEE. 8(1). 21-Z7.
- Borenstein. J., Drake, M. J., Kirkman, R, & Swann, J. L.,(2009). The Engineering and Science Issues Test (ESIT) : A Discipline-Specific Approach to Assessing Moral Judgment. Science and Engineering Ethics. 16(2). 387-407.
- Brett H., & fvlark G (2012). Middle School Students' Perceptions of and Responses to Cyber Bullying, Journal of Educational Computing Research. 46(4). 395 - 413. https://doi.org/10.2190/EC.46.4.e
- Brey, P. (2000). Disclosive computer ethics. Computers and Society. 30(4). 10-16.
- Campbell. Mmilyn A (2005). Cyber Bullying: An old Problem in a Kew Guise? Australian Journal of Guidance and Counselling. 15(1). 68-76. https://doi.org/10.1375/ajgc.15.1.68
- CSTA (2011). CSTA K-12 Computer Science Standards. Computer Science Teachers Association.
- Cyber Terror Response Center. Age-specific Status of Cyber Crime. [http://www.ctrc.go.kr/cyber/graph03.jsp].
- Davis, M., & Feinerman. A. (2010). Assessing Graduate Student Progress in Engineering Ethics. Science and Engineering Ethics. 18(2). 351-367.
- Deigh J. (1995). Ethics. In R. Audi (Ed.). Cambridge Dictionary of Philosophy, Cambridge : Cambridge University Press.
- Floridi, L. (1999). Information ethics: on the philosophical foundation of computer ethics. Ethics and Information Technology. 1(1). 33-52. https://doi.org/10.1023/A:1010018611096
- Han-Sung Kim.Hye-Jin Chung.Won-Gyu Lee (2010). Philosophy and Contents of Information Ethics in Informatics Education. Journal of Learner-Centered Curriculum and Instruction 2010. 10(2). 95-119.
- Heidi V.,& Katrien V. Cleemput (2008). Defining Cyherbullying : A Qualitative Research into the Perceptions of Youngsters. CyberPsychology & Behavior. 11(4). 499-503. https://doi.org/10.1089/cpb.2007.0042
- Hyeon-Gi Baek.Jeong-Su Yu (2012). A Development and Application of Role-Playing Instruction Model based on Mind Practice for Intensifying Information & Communication Ethics. Journal of The Korean Association of Information Education. Vol. 16. No. 2. 181-188.
- Hyunjong Choe (2012). A Study about Learning Elements and Teaching Methods of Information Ethics in Primary and Secondary School by Expert Survey. Journal of The Korea Society of Computer and Information. Vol. 17. No. 12. 259-267. https://doi.org/10.9708/jksci/2012.17.12.259
- JaeTaek Yoo, OkSoon Kim, June Lee. SaeHoon Kim. JungHyun Park, SungHum Whang, SeongBin Im (2000). A Study on Protection against the Side Effects of Using Information and Communication Technology among K-12 Schools. KERIS.
- James H. Moor (1985). What is Computer Ethics?. Metaphilosophy. 16(4). 266-275. https://doi.org/10.1111/j.1467-9973.1985.tb00173.x
- Joshua F., Elham N. (2009). Internet Social Network Communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior. 25(1). 153 - 160. https://doi.org/10.1016/j.chb.2008.08.006
- Jun-hee Lee.Kwan-Hee Yoo (2011). Design and Implementation of Blended PBL Systems for Information Communication Ethics Education. Journal of The Korean Association of Information Education. Vol. 15. No. 2. 179-198.
- Kim, Eun-Soo (2005). A Study on Selecting the Contents of Information Ethics Education in Curriculum of Elementary Moral Education. Journal of Ethics Education Studies. Vol. 8. 107-133.
- Lickona T. (1997). Educating for Character: A Comprehensive Approach(Ed.). The University of Chicago Press.
- Matt Brian (2012, Nov 19). Apple's App Store has now seen more than 1 million approved apps since launch. from http://thenextweh.com/apple/2012/11/19/apples-app-store-reaches-1-miliion-approved-app-submissions/
- Mikko S., Anthony V.,& Robert W. (2012). New Insights into the Problem of Software Piracy : The Effects of Neutralization, Shame, and Moral Beliefs. Infomlation & Management. Alticle in press.
- Ministry of Education, Science and Technology (2007). Curriculum of Subject of Social Studies. Notification No. 2009-10 of Ministry of Education, Science and Technology [Supplement 7]. MOE.
- Ministry of Education, Science and Technology (2011). Elective Course Cuniculum of High School (Informatics). Notification No. 2011-361 of Ministry of Education, Science and Technology.
- Ministry of Education, Science and Technology (2007). Elective Course Curriculum of Middle School discretion activity 2. Informatics. Notification No. 2007-79 of Ministry of Education, Science and Technology [Supplement 16]. MOE.
- Ministry of Education, Science and Technology (2011). Elective Course Curriculum of Middle School (Informatics). Notification No. 2011 - 361 of Ministry of Education. Science and Technology. MOE.
- Ministry of Education & Human Resources Development (2006). lnformation and Communication Technology Education Guidelines, Amendment. MOE.
- Ministry of Education, Science and Technology (2007). Moral Subject Curriculum. Notification No. 2007-79 of Ministry of Education, Science and Technology [Supplement 6]. MOE.
- Ministry of Education, Science and Technology (2007), Practical Subject (Technology.Home Economics) Curriculum 7. Informatics. Notification No. 2007-79 of Ministry of Education, Science and Technology [Supplement 10]. MOE.
- Moor, J. H. (1998). Reason, relativity, and responsibility in computer ethics. Computers and Society. 28. 14-21.
- Ontario Ministry of Education (2008). The Ontario Curriculum. Grades 10 to 12, Computer Studies. Ontario Ministry of Education
- Rest, J. R., Narvaez, D., Thoma, S. J., & Bebeau, M. J. (2000). A Neo-Kohlbergian Approach to Morality Research. Journal of Moral Education. 29(4). 381-395. https://doi.org/10.1080/713679390
- Rolf H. W. (2010). Internet of Things - New security and privacy challenges. Computer Law & Security Review, 26(1). 23 - 30. https://doi.org/10.1016/j.clsr.2009.11.008
- Tavani, H. T. (2002). The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter? Ethics and Information Technology. 4(1). 37-54. https://doi.org/10.1023/A:1015283808882
- Woodward, B., Davis, D. C., & Hodis, F. A. (2007). The Relationship hetween Ethical Decision Making and Ethical Reasoning in Information Technology Students. Journal of Information Systems Education. 18(2). 1-10.
- Youtube (2013, Fed 20). Press & Blog. from http://www.youtube.com/yt/press/statistics.html