Questions About This Book?
- The Used copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included.
Information technology professionals must not only have a strong understanding of the latest technology, but they also need to be grounded in ethics. The third edition provides them with the information they need to succeed in the field. Each chapter is updated with new case studies and scenarios to provide the most current information. Review and discussion questions are included to reinforce key concepts.
The in text citations and references are revised to offer additional resources. Updated material is also presented on online communities and democracy, globalization and job outsourcing, security for wireless networking, and international cybercrime legislation. This enables information technology professionals to apply the concepts with a focus on ethics.
"Herman Tavani has written an excellent introduction to the field of cyberethics ,that is extraordinarily comprehensive and up to date ,We need a good book in cyberethics to deal with the present and prepare us for an uncertain future. Tavani's Ethics and Technology is such a book." - from the Foreword by James H. Moor, Dartmouth College
The new edition of this respected text continues to provide students the information they need to fully grasp the complex issues in cyberethics that computer and noncomputer professionals alike need to navigate the challenging waters of cyberspace. Each chapter is updated with new examples and scenarios to provide the most current information.
New Issues examined in this edition include ethical implications of controversies involving:
-Blogs and the 'blogosphere";
-Web mining and personal privacy, including the Facebook Beacon controversy;
-Cyberbullying on social networking services (SNSs);
-"Sexting" incidents involving teenagers vis-à-vis current child pornography laws;
-Violence and pornography in massively multiplayer online role-playing games (MMORPGs), including World of Warcraft and Second Life;
-Virtual economies and "gold farming" in virtual worlds;
-Cyberespionage activities carried out by governments and state-sponsored organizations;
-"Certified Ethical Hackers" who carry out pre-emptive counter hacking activities on the part of organizations that hire them.
Updated material is also presented on ethical controversies affecting P2P file sharing sites, DRM systems, employee monitoring, spam and phishing, and cyberterrorism and information warfare. In addition to review and discussion questions that reinforce key concepts, newly constructed Essay Presentation questions are included in each chapter to provide instructors and students with additional resources for in class group projects and outside class assignments.
Table of Contents
|Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks|
|Ethical Concepts and Ethical Theory: Establishing and Justifying A Moral System|
|Critical Thinking Skills and Logical Arguments: Tools For Evaluating Cyberethics Issues|
|Professional Ethics, Codes of Conduct, and Moral Responsibility|
|Privacy and Cyberspace|
|Security in Cyberspace|
|Cybercrime and Cyberrelated Crimes|
|Intellectual Property Disputes in Cyberspace|
|Regulating Commerce and Speech in Cyberspace|
|Social Inclusion, the Digital Divide, and the Transformation of Work: The Impact for Class, Race and Gender|
|Community and Identity in Cyberspace: Ethical Aspects of Virtual-Reality and Artificial-Intelligence Technologies|
|Pervasive Computing and Converging Technologies: Ethical Aspects of Ambient Intelligence, Bioinformatics, and Nanocomputing|
|Table of Contents provided by Publisher. All Rights Reserved.|