CART

(0) items

Ethics in Information Technology,9781418836313

Ethics in Information Technology

by
Edition:
2nd
ISBN13:

9781418836313

ISBN10:
1418836311
Format:
Paperback
Pub. Date:
6/8/2006
Publisher(s):
Cengage Learning
List Price: $126.66

Rent Textbook

(Recommended)
 
Term
Due
Price
$5.00

Hurry!

Only two copies
in stock at this price.

Buy Used Textbook

In Stock Usually Ships in 24 Hours.
U9781418836313
$1.00

Buy New Textbook

Currently Available, Usually Ships in 24-48 Hours
N9781418836313
$113.99

eTextbook

We're Sorry
Not Available

More New and Used
from Private Sellers
Starting at $0.01
See Prices

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 2nd edition with a publication date of 6/8/2006.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Used copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Related Products


  • Ethics in Information Technology
    Ethics in Information Technology
  • Ethics in Information Technology
    Ethics in Information Technology
  • Ethics In Information Technology
    Ethics In Information Technology
  • Ethics in Information Technology
    Ethics in Information Technology
  • Ethics in Information Technology, 3rd Edition
    Ethics in Information Technology, 3rd Edition




Summary

Ethics in Information Technology, Second Edition is a timely offering with updated and brand new coverage of topical issues that we encounter in the news every day such as file sharing, infringement of intellectual property, security risks, Internet crime, identity theft, employee surveillance, privacy, and compliance.

Author Biography

George Reynolds is an Assistant Professor in the Information Systems department of the College of Business at the University of Cincinnati

Table of Contents

Preface xiii
An Overview of Ethics
1(32)
Vignette
1(2)
Parent Company of Philip Morris Strives for Integrity
1(2)
What Is Ethics?
3(2)
Definition of Ethics
3(1)
The Importance of Integrity
4(1)
Ethics in the Business World
5(15)
Why Fostering Good Business Ethics Is Important
8(2)
Improving Corporate Ethics
10(5)
When Good Ethics Result in Short-Term Losses
15(1)
Creating an Ethical Work Environment
15(2)
Ethical Decision Making
17(3)
Ethics in Information Technology
20(2)
An Overview of This Text
21(1)
Summary
22(1)
Self-Assessment Questions
22(1)
Review Questions
23(1)
Discussion Questions
24(1)
What Would You Do?
24(1)
Cases
25(5)
End Notes
30(3)
Ethics for IT Professionals and IT Users
33(34)
Vignette
33(2)
Cleveland State University Accuses PeopleSoft of Selling Vaporware
33(2)
IT Professionals
35(9)
Are IT Workers Professionals?
35(1)
Professional Relationships That Must Be Managed
36(8)
The Ethical Behavior of IT Professionals
44(6)
Professional Codes of Ethics
44(1)
Professional Organizations
45(1)
Certification
46(2)
Government Licensing
48(2)
IT Professional Malpractice
50(1)
IT Users
51(3)
Common Ethical Issues for IT Users
51(1)
Supporting the Ethical Practices of IT Users
52(2)
Summary
54(1)
Self-Assessment Questions
55(1)
Review Questions
56(1)
Discussion Questions
57(1)
What Would You Do?
57(2)
Cases
59(5)
End Notes
64(3)
Computer and Internet Crime
67(38)
Vignette
67(1)
Treatment of Sasser Worm Author Sends Wrong Message
67(1)
IT Security Incidents: A Worsening Problem
68(13)
Increasing Complexity Increases Vulnerability
69(1)
Higher Computer User Expectations
69(1)
Expanding and Changing Systems Introduce New Risks
70(1)
Increased Reliance on Commercial Software with Known Vulnerabilities
70(2)
Types of Attacks
72(3)
Perpetrators
75(6)
Reducing Vulnerabilities
81(13)
Risk Assessment
82(1)
Establishing a Security Policy
82(1)
Educating Employees, Contractors, and Part-Time Workers
83(1)
Prevention
84(4)
Detection
88(1)
Response
89(5)
Summary
94(1)
Self-Assessment Questions
95(1)
Review Questions
96(1)
Discussion Questions
96(1)
What Would You Do?
97(1)
Cases
98(4)
End Notes
102(3)
Privacy
105(40)
Vignette
105(2)
Have You Been Swiped?
105(2)
Privacy Protection and the Law
107(6)
The Right of Privacy
108(1)
Recent History of Privacy Protection
108(5)
Key Privacy and Anonymity Issues
113(19)
Governmental Electronic Surveillance
113(5)
Data Encryption
118(3)
Identity Theft
121(2)
Consumer Profiling
123(3)
Treating Consumer Data Responsibly
126(1)
Workplace Monitoring
127(1)
Spamming
128(2)
Advanced Surveillance Technology
130(2)
Summary
132(2)
Self-Assessment Questions
134(1)
Review Questions
135(1)
Discussion Questions
135(1)
What Would You Do?
136(1)
Cases
137(4)
End Notes
141(4)
Freedom of Expression
145(26)
Vignette
145(1)
China Stifles Online Dissent
145(1)
First Amendment Rights
146(2)
Obscene Speech
147(1)
Defamation
148(1)
Freedom of Expression: Key Issues
148(13)
Controlling Access to Information on the Internet
148(5)
Anonymity
153(3)
National Security Letters
156(1)
Defamation and Hate Speech
157(1)
Pornography
158(3)
Summary
161(1)
Self-Assessment Questions
162(1)
Review Questions
163(1)
Discussion Questions
164(1)
What Would You Do?
164(1)
Cases
165(3)
End Notes
168(3)
Intellectual Property
171(36)
Vignette
171(1)
Apple Trade Secrets Revealed?
171(1)
What Is Intellectual Property?
172(12)
Copyrights
173(3)
Patents
176(4)
Trade Secret Laws
180(4)
Key Intellectual Property Issues
184(10)
Plagiarism
184(2)
Reverse Engineering
186(2)
Open Source Code
188(1)
Competitive Intelligence
189(3)
Cybersquatting
192(2)
Summary
194(1)
Self-Assessment Questions
195(1)
Review Questions
196(1)
Discussion Questions
197(1)
What Would You Do?
198(1)
Cases
198(3)
End Notes
201(6)
Software Development
207(30)
Vignette
207(2)
Antivirus Bug Brings Computers to a Standstill
207(2)
Strategies to Engineer Quality Software
209(8)
The Importance of Software Quality
211(4)
Software Development Process
215(1)
Capability Maturity Model Integration for Software
216(1)
Key Issues in Software Development
217(7)
Development of Safety-Critical Systems
218(3)
Quality Management Standards
221(3)
Summary
224(1)
Self-Assessment Questions
225(1)
Review Questions
226(1)
Discussion Questions
227(1)
What Would You Do?
227(2)
Cases
229(4)
End Notes
233(4)
Employer/Employee Issues
237(30)
Vignette
237(2)
Microsoft and Tata Promote Chinese Outsourcing
237(2)
Use of Nontraditional Workers
239(12)
Contingent Workers
240(3)
H-1B Workers
243(3)
Offshore Outsourcing
246(5)
Whistle-Blowing
251(6)
Protection for Whistle-Blowers
252(2)
Dealing with a Whistle-Blowing Situation
254(3)
Summary
257(1)
Self-Assessment Questions
258(1)
Review Questions
259(1)
Discussion Questions
259(1)
What Would You Do?
259(2)
Cases
261(4)
End Notes
265(2)
The Impact of Information Technology on the Quality of Life
267(26)
Vignette
267(2)
Technological Advances Create Digital Divide in Healthcare
267(2)
The Impact of IT on the Standard of Living and Productivity
269(6)
The Digital Divide
272(3)
The Impact of IT on Healthcare Costs
275(6)
Electronic Health Records
276(2)
Use of Mobile and Wireless Technology
278(1)
Telemedicine
278(1)
Medical Information Web Sites for Lay People
279(2)
Summary
281(1)
Self-Assessment Questions
282(1)
Review Questions
283(1)
Discussion Questions
284(1)
What Would You Do?
284(1)
Cases
285(4)
End Notes
289(4)
Appendix A A Brief Introduction to Morality
293(16)
Introduction
293(1)
The Knotty Question of Goodness
294(1)
Relativism: Why ``Common Sense'' Won't Work
295(3)
Egoism vs. Altrusim
297(1)
Deontology, or the Ethics of Logical Consistency and Duty
298(2)
Happy Consequences, or Utilitarianism
300(4)
Promises and Contracts
303(1)
A Return to the Greeks: The Good Life of Virtue
304(2)
Feminism and the Ethics of Care
305(1)
Pluralism
306(1)
Summary
307(2)
Appendix B Association for Computing Machinery (ACM) Code of Ethics and Professional Conduct
309(8)
Preamble
309(1)
General Moral Imperatives
310(2)
More Specific Professional Responsibilities
312(2)
Organizational Leadership Imperatives
314(2)
Compliance with the Code
316(1)
Appendix C Association of Information Technology Professionals (AITP) Code of Ethics
317(4)
AITP Standards of Conduct
317(4)
Appendix D Software Engineering Code of Ethics and Professional Practice
321(8)
Preamble
321(1)
Principles
322(7)
Appendix E PMI Member Ethical Standards and Member Code of Ethies
329(2)
Preamble
329(1)
Member Code of Ethics
329(2)
Answers to Self-Assessment Questions 331(2)
Glossary 333(8)
Index 341


Please wait while the item is added to your cart...