Ethics for the information age

cover image

Where to find it

Information & Library Science Library

Call Number
QA76.9.M65 Q56 2009
Status
Available
Call Number
QA76.9.M65 Q56 2009
Status
Available

Authors, etc.

Names:

Summary

In an era where IT changes constantly, a thoughtful response to these rapid changes requires a basic understanding of IT history, an awareness of current issues, and a familiarity with ethics. This book provides an overview of ethical theories and problems encountered by computer professionals in today's environment.

Contents

  • Preface
  • Chapter 1 Catalysts for Change
  • 1.1 Introduction
  • 1.2 Milestones in Computing
  • 1.3 Milestones in Networking
  • 1.4 Milestones in Information Storage and Retrieval
  • 1.5 Information Technology Issues
  • Chapter 2 Introduction to Ethics
  • 2.1 Introduction
  • 2.2 Subjective Relativism
  • 2.3 Cultural Relativism
  • 2.4 Divine Command Theory
  • 2.5 Kantianism
  • 2.6 Act Utilitarianism
  • 2.7 Rule Utilitarianism
  • 2.8 Social Contract Theory
  • 2.9 Comparing Workable Ethical Theories
  • 2.10 Morality of Breaking the Law
  • Chapter 3 Networking
  • 3.1 Introduction
  • 3.2 Email and Spam
  • 3.3 Fighting Spam
  • 3.4 The World Wide Web
  • 3.5 Ethical Perspectives on Pornography
  • 3.6 Censorship
  • 3.7 Freedom of Expression
  • 3.8 Children and the Web
  • 3.9 Breaking Trust on the Internet
  • 3.10 Internet Addiction
  • Chapter 4 Intellectual Property
  • 4.1 Introduction
  • 4.2 Intellectual Property Rights
  • 4.3 Protecting Intellectual Property
  • 4.4 Fair Use
  • 4.5 New Restrictions on Use
  • 4.6 Peer-to-Peer Networks
  • 4.7 Protections for Software
  • 4.8 Open-Source Software
  • 4.9 Legitimacy of Intellectual Property Protection for Software
  • 4.10 Creative Commons
  • Chapter 5 Privacy
  • 5.1 Introduction
  • 5.2 Perspectives on Privacy
  • 5.3 Disclosing Information
  • 5.4 Public Information
  • 5.5 U.S. Legislation
  • 5.6 Public Records
  • 5.7 Covert Government Surveillance
  • 5.8 U.S. Legislation Authorizing Wiretapping
  • 5.9 Data Mining
  • 5.10 Identity Theft
  • 5.11 Encryption
  • Chapter 6 Computer and Network Security
  • 6.1 Introduction
  • 6.2 Viruses, Worms, and Trojan Horses
  • 6.3 Phreaks and Hackers
  • 6.4 Denial-of-Service Attacks
  • 6.5 Online Voting
  • Chapter 7 Computer Reliability
  • 7.1 Introduction
  • 7.2 Data-Entry or Data-Retrieval Errors
  • 7.3 Software and Billing Errors
  • 7.4 Notable Software System Failures
  • 7.5 Therac-25
  • 7.6 Computer Simulations
  • 7.7 Software Engineering
  • 7.8 Software Warranties
  • Chapter 8 Professional Ethics 
  • 8.1 Introduction
  • 8.2 Is Software Engineering a Profession?
  • 8.3 Software Engineering Code of Ethics
  • 8.4 Analysis of the Code
  • 8.5 Case Studies
  • 8.6 Whistleblowing
  • Chapter 9 Work and Wealth
  • 9.1 Introduction
  • 9.2 Automation and Unemployment
  • 9.3 Workplace Changes
  • 9.4 Globalization
  • 9.5 The Digital Divide
  • 9.6 The "Winner-Take-All Society"
  • 9.7 Access to Public Colleges
  • Appendix A Plagiarism

Other details