KEY MESSAGE:In an era where information technology changes constantly, a thoughtful response to these rapid changes requires a basic understanding of IT history, an awareness of current issues, and a familiarity with ethics.Ethics for the Information Ageprovides an overview of ethical theories and problems encountered by computer professionals in today's environment. Catalysts for Change; Introduction to Ethics; Networking; Intellectual Property; Privacy; Computer and Network Security; Computer Reliability; Work and Wealth; Professional Ethics; Plagiarism. For all readers interested in computers and society or computer ethics.
Table of Contents
Preface
Chapter 1 Catalysts for Change 1.1 Introduction 1.2 Milestones in Computing 1.3 Milestones in Networking 1.4 Milestones
in Information Storage and Retrieval 1.5 Information Technology Issues
Chapter 2 Introduction to Ethics 2.1 Introduction 2.2 Subjective Relativism 2.3 Cultural Relativism 2.4 Divine
Command Theory 2.5 Kantianism 2.6 Act Utilitarianism 2.7 Rule Utilitarianism 2.8 Social Contract Theory 2.9 ComparingWorkable
Ethical Theories 2.10 Morality of Breaking the Law
Chapter 3 Networking 3.1 Introduction 3.2 Email and Spam 3.3 Fighting Spam 3.4 The World Wide Web 3.5 Ethical Perspectives
on Pornography 3.6 Censorship 3.7 Freedom of Expression 3.8 Children and the Web 3.9 Breaking Trust on the Internet
3.10 Internet Addiction
Chapter 4 Intellectual Property 4.1 Introduction 4.2 Intellectual Property Rights 4.3 Protecting Intellectual Property
4.4 Fair Use 4.5 New Restrictions on Use 4.6 Peer-to-Peer Networks 4.7 Protections for Software 4.8 Open-Source
Software 4.9 Legitimacy of Intellectual Property Protection for Software 4.10 Creative Commons
Chapter 5 Privacy 5.1 Introduction 5.2 Perspectives on Privacy 5.3 Disclosing Information 5.4 Public Information
5.5 U.S. Legislation 5.6 Public Records 5.7 Covert Government Surveillance 5.8 U.S. Legislation Authorizing Wiretapping
5.9 Data Mining 5.10 Identity Theft 5.11 Encryption
Chapter 6 Computer and Network Security 6.1 Introduction 6.2 Viruses, Worms, and Trojan Horses 6.3 Phreaks and
Hackers 6.4 Denial-of-Service Attacks 6.5 Online Voting
Chapter 7 Computer Reliability 7.1 Introduction 7.2 Data-Entry or Data-Retrieval Errors 7.3 Software and Billing
Errors 7.4 Notable Software System Failures 7.5 Therac-25 7.6 Computer Simulations 7.7 Software Engineering 7.8
Software Warranties
Chapter 8 Work and Wealth 8.1 Introduction 8.2 Automation and Unemployment 8.3 Workplace Changes 8.4 Globalization
8.5 The Digital Divide 8.6 The "Winner-Take-All Society" 8.7 Access to Public Colleges
Chapter 9 Professional Ethics 9.1 Introduction 9.2 Is Software Engineering a Profession? 9.3 Software Engineering
Code of Ethics 9.4 Analysis of the Code 9.5 Case Studies 9.6 Whistleblowing Appendix A Plagiarism