Welcome to STUDYtactics.com    
  BOOKS eCONTENT SPECIALTY STORES MY STUDYaides MY ACCOUNT  
New & Used Books
 
Product Detail
Product Information   |  Other Product Information

Product Information
Ethics for Information Age
Ethics for Information Age
Author: Quinn, Mike
Edition/Copyright: 3RD 08
ISBN: 0-321-53685-1
Publisher: Addison-Wesley Longman, Inc.
Type: Paperback
Used Print:  $69.75
Other Product Information
Summary
Table of Contents
 
  Summary

KEY MESSAGE:In an era where information technology changes constantly, a thoughtful response to these rapid changes requires a basic understanding of IT history, an awareness of current issues, and a familiarity with ethics.Ethics for the Information Ageprovides an overview of ethical theories and problems encountered by computer professionals in today's environment. Catalysts for Change; Introduction to Ethics; Networking; Intellectual Property; Privacy; Computer and Network Security; Computer Reliability; Work and Wealth; Professional Ethics; Plagiarism. For all readers interested in computers and society or computer ethics.

 
  Table of Contents

Preface
Chapter 1 Catalysts for Change 1.1 Introduction 1.2 Milestones in Computing 1.3 Milestones in Networking 1.4 Milestones in Information Storage and Retrieval 1.5 Information Technology Issues
Chapter 2 Introduction to Ethics 2.1 Introduction 2.2 Subjective Relativism 2.3 Cultural Relativism 2.4 Divine Command Theory 2.5 Kantianism 2.6 Act Utilitarianism 2.7 Rule Utilitarianism 2.8 Social Contract Theory 2.9 ComparingWorkable Ethical Theories 2.10 Morality of Breaking the Law
Chapter 3 Networking 3.1 Introduction 3.2 Email and Spam 3.3 Fighting Spam 3.4 The World Wide Web 3.5 Ethical Perspectives on Pornography 3.6 Censorship 3.7 Freedom of Expression 3.8 Children and the Web 3.9 Breaking Trust on the Internet 3.10 Internet Addiction
Chapter 4 Intellectual Property 4.1 Introduction 4.2 Intellectual Property Rights 4.3 Protecting Intellectual Property 4.4 Fair Use 4.5 New Restrictions on Use 4.6 Peer-to-Peer Networks 4.7 Protections for Software 4.8 Open-Source Software 4.9 Legitimacy of Intellectual Property Protection for Software 4.10 Creative Commons
Chapter 5 Privacy 5.1 Introduction 5.2 Perspectives on Privacy 5.3 Disclosing Information 5.4 Public Information 5.5 U.S. Legislation 5.6 Public Records 5.7 Covert Government Surveillance 5.8 U.S. Legislation Authorizing Wiretapping 5.9 Data Mining 5.10 Identity Theft 5.11 Encryption
Chapter 6 Computer and Network Security 6.1 Introduction 6.2 Viruses, Worms, and Trojan Horses 6.3 Phreaks and Hackers 6.4 Denial-of-Service Attacks 6.5 Online Voting
Chapter 7 Computer Reliability 7.1 Introduction 7.2 Data-Entry or Data-Retrieval Errors 7.3 Software and Billing Errors 7.4 Notable Software System Failures 7.5 Therac-25 7.6 Computer Simulations 7.7 Software Engineering 7.8 Software Warranties
Chapter 8 Work and Wealth 8.1 Introduction 8.2 Automation and Unemployment 8.3 Workplace Changes 8.4 Globalization 8.5 The Digital Divide 8.6 The "Winner-Take-All Society" 8.7 Access to Public Colleges
Chapter 9 Professional Ethics 9.1 Introduction 9.2 Is Software Engineering a Profession? 9.3 Software Engineering Code of Ethics 9.4 Analysis of the Code 9.5 Case Studies 9.6 Whistleblowing Appendix A Plagiarism

 

New & Used Books -  eContent -  Specialty Stores -  My STUDYaides -  My Account

Terms of Service & Privacy PolicyContact UsHelp © 1995-2024 STUDYtactics, All Rights Reserved