|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-84628-659-9 |
003 |
DE-He213 |
005 |
20220116140905.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 xxk| s |||| 0|eng d |
020 |
|
|
|a 9781846286599
|9 978-1-84628-659-9
|
024 |
7 |
|
|a 10.1007/978-1-84628-659-9
|2 doi
|
050 |
|
4 |
|a QA76.9.C66
|
072 |
|
7 |
|a UBJ
|2 bicssc
|
072 |
|
7 |
|a COM079000
|2 bisacsh
|
072 |
|
7 |
|a UBJ
|2 thema
|
082 |
0 |
4 |
|a 303.4834
|2 23
|
100 |
1 |
|
|a Kizza, Joseph Migga.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Ethical and Social Issues in the Information Age
|h [electronic resource] /
|c by Joseph Migga Kizza.
|
250 |
|
|
|a 3rd ed. 2007.
|
264 |
|
1 |
|a London :
|b Springer London :
|b Imprint: Springer,
|c 2007.
|
300 |
|
|
|a XXII, 432 p. 17 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Texts in Computer Science,
|x 1868-095X
|
505 |
0 |
|
|a To Social And Ethical Computing -- Morality And The Law -- Ethics, Technology, And Value -- Ethics And The Professions -- Anonymity, Security, Privacy, And Civil Liberties -- Intellectual Property Rights And Computer Technology -- Social Context Of Computing -- Software Issues: Risks And Liabilities -- Computer Crimes -- New Frontiers For Computer Ethics Artificial Intelligence, Cyberspace, And Virtual Reality -- Cyberspace And Cyberethics -- Computer Networks And Online Crimes -- Computer Crime Investigations-Computer Forensics -- Biometrics.
|
520 |
|
|
|a Ethical dilemmas have risen in number and intensity with the increasing dependence of contemporary society on computers and computer networks. Despite the proliferation of expert remedies, viable solutions to computer security issues remain too elusive, and society continues to suffer at the hands of cyber criminals, vandals, and hackers. This comprehensive third edition of the successful Ethical and Social Issues in the Information Age takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence of cyberspace, the convergence of telecommunication and computing technologies, and the miniaturalization of computing, telecommunication, and information-enabling devices. This accessible volume broadly surveys thought-provoking questions about the impact of these new technologies, with particular emphasis on the rapid growth of a multitude of computer networks, including the Internet. It assumes only a very modest familiarity with the basic computer literacy. Topics and features: • Describes how changes in information technology influence morality and the law • Provides fundamental discussion of network-security system design and operation to reveal vulnerable areas in computer network infrastructure (NEW chapter) • Surveys the history of computing and the evolution of computer crimes • Explores biometric techniques to system access control (NEW chapter) • Incorporates recent requirements for computer curricula • Introduces and explores techniques in electronic crime investigation (NEW chapter) • Assesses workplace concerns related to privacy, surveillance, and virtual offices • Offers a pertinent discussion on civil liberties, harassment, and discrimination • Contains chapter-ending exercises, and the author provides instructor classroom support materials and teaching guides at his website This newly revised text/reference provides an updated discussion of the ethical and social issues that continue to evolve as computing and information technologies proliferate. Students at all levels who need to learn about computer ethics, the legal aspects of computing, network security, computer crime investigation, and biometrics will find this well documented work an invaluable resource. The book is also highly useful for practitioners needing such insights for their work. Supplementary material can be found at: www.utc.edu/faculty/Joseph-Kizza.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Ethics.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
|
0 |
|a Human-computer interaction.
|
650 |
|
0 |
|a Social sciences.
|
650 |
1 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Moral Philosophy and Applied Ethics.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a User Interfaces and Human Computer Interaction.
|
650 |
2 |
4 |
|a Society.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781848005907
|
776 |
0 |
8 |
|i Printed edition:
|z 9781846286582
|
830 |
|
0 |
|a Texts in Computer Science,
|x 1868-095X
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-84628-659-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|