CART

(0) items

A Gift of Fire Social, Legal, and Ethical Issues for Computing and the Internet,9780136008484
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

A Gift of Fire Social, Legal, and Ethical Issues for Computing and the Internet

by
Edition:
3rd
ISBN13:

9780136008484

ISBN10:
0136008488
Format:
Paperback
Pub. Date:
12/27/2007
Publisher(s):
Prentice Hall
List Price: $108.27

Buy Used Textbook

(Recommended)
Usually Ships in 2-3 Business Days
U9780136008484
$75.79

eTextbook


 
Duration
Price
$51.59

Rent Textbook

We're Sorry
Sold Out

New Textbook

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $1.14
See Prices

Questions About This Book?

What version or edition is this?
This is the 3rd edition with a publication date of 12/27/2007.
What is included with this book?
  • The Used copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included.

Related Products


  • A Gift of Fire Social, Legal, and Ethical Issues for Computing Technology
    A Gift of Fire Social, Legal, and Ethical Issues for Computing Technology
  • Gift of Fire, A: Social, Legal, and Ethical Issues for Computing and the Internet
    Gift of Fire, A: Social, Legal, and Ethical Issues for Computing and the Internet
  • PACKAGE: GIFT OF FIRE
    PACKAGE: GIFT OF FIRE




Summary

KEY BENEFIT: Baase explores timely social, legal, philosophical, ethical, political, constitutional and economic implications of computing from a computer scientist's perspective.KEY TOPICS: Coverage of the issues readers face both as members of a technological society and as professionals in computer-related fields. Adds new information on phenomena such as the growth of amateur work on the Web, blogs, video sharing, collaborative works (such as Wikipedia), and social networking. Includes new privacy topics such as cameras in cell phones, access to our search queries and all sorts of data we put on the Web, social networking, location tracking, high-tech surveillance systems, and some anti-terrorism programs. Updated chapters on intellectual property, professional ethics and responsibilities, and crime.MARKET: A useful reference for computer science professionals or anyone interested in learning more about computing technology and its arising issues.

Author Biography

Sara Baase is Professor Emeritus with the Department of Computer Science, San Diego State University, where she won awards for outstanding teaching. Her textbooks in computer science have been translated into several languages. Dr. Baase received her doctoral degree from the University of California, Berkeley.

Table of Contents

Preface
Unwrapping the Gift
The Ubiquity of Computers and the Rapid Pace of Change
New Developments and Dramatic Impacts
Amateur Creative Works: Blogs and Video Sharing
Connections
Collaborative Efforts Among Strangers
E-commerce and Free Stuff
Artificial Intelligence, Robotics, and Motion
Tools for Disabled People
What Next?
An Introduction to Some Issues and Themes
Issues
Themes
Ethics
What Is Ethics, Anyway?
A Variety of Ethical Views
Some Important Distinctions
Privacy
Privacy and Computer Technology
Introduction
New Technology, New Risks
Terminology and Principles for Data Collection and Use
Big Brother Is Watching You
Databases
The Fourth Amendment, Expectation of Privacy, and Surveillance Technologies
Video Surveillance
Diverse Privacy Topics
Marketing, Personalization and Consumer Dossiers
Location Tracking
Stolen and Lost Data
What We Do Ourselves
Public Records: Access vs Privacy
National ID Systems
Children
Protecting Privacy: Technology, Markets, Rights, and Laws
Technology and Markets
Rights and Law
Privacy Regulations in the European Union
Communications
Wiretapping and E-mail Protection
Designing Communications Systems for Interception
Secret Intelligence Gathering
Encryption Policy
Freedom of Speech
Changing Communications Paradigms
Regulating Communications Media
Free-Speech Principles
Controlling Offensive Speech
Offensive Speech: What Is It? What Is Illegal?
Internet Censorship Laws and Alternatives
Spam
Challenging Old Regulatory Paradigms and Special Interests
Posting and Selling Sensitive Material: Ethics and Social Concerns
Censorship on the Global Net
The Global Impact of Censorship
Yahoo and French Censorship
Censorship in Other Nations
Aiding Foreign Censors
Political Campaign Regulations in Cyberspace
Anonymity
Common Sense and the Internet
Is Anonymity Protected?
Against Anonymity
Protecting Access and Innovation: Net Neutrality or Deregulation?
Intellectual Property
Intellectual Property and Changing Technology
What Is Intellectual Property?
Challenges of New Technologies
Copyright Law and Significant Cases
A Bit of History
The Fair-Use Doctrine
Significant Cases
Copying and Sharing
Defensive and Aggressive Responses from the Content Industries
The DMCA vs Fair Use, Freedom of Speech, and Innovation
Video Sharing
New Business Models and Constructive Solutions
Ethical Arguments About Copying
International Piracy
Search Engines and Online Libraries
Free Speech Issues
Free Software
What Is Free Software?
Should All Software Be Free?
Issues for Software Developers
Patents for Software?
Patents for Web Technologies
Copyright and Similar Software Products
Crime
Introduction
Hacking
What is Hacking?
Ha
Table of Contents provided by Publisher. All Rights Reserved.


Please wait while the item is added to your cart...