Preface | p. xix |
Catalysts for Change | p. 1 |
Introduction | p. 2 |
Milestones in Computing | p. 6 |
Mechanical Adding Machines | p. 6 |
The Analytical Engine | p. 9 |
Boolean Algebra | p. 10 |
Zuse's Z Series | p. 11 |
Harvard Mark 1 | p. 12 |
Colossus | p. 13 |
The Atanasoff-Berry Computer | p. 13 |
ENIAC (Electronic Numerical Integrator and Computer) | p. 13 |
Small-Scale Experimental Machine | p. 14 |
First Commerical Computers | p. 15 |
Transistor | p. 17 |
Integrated Circuit | p. 18 |
IBM System/360 | p. 19 |
Microprocessor | p. 20 |
Milestones in Networking | p. 22 |
Electricity and Electromagnetism | p. 22 |
Telegraph | p. 23 |
Telephone | p. 24 |
Typewriter and Teletype | p. 25 |
Radio | p. 26 |
Television | p. 27 |
Remote Computing | p. 28 |
ARPANET | p. 28 |
p. 29 | |
Internet | p. 29 |
NSFNET | p. 31 |
Broadband | p. 31 |
Milestones in Information Storage and Retrieval | p. 31 |
Codex | p. 31 |
Gutenberg's Printing Press | p. 32 |
Newspapers | p. 32 |
Hypertext | p. 33 |
Personal Computers | p. 34 |
Single-Computer Hypertext Systems | p. 36 |
Networked Hypertext: World Wide Web | p. 36 |
Search Engines | p. 38 |
Information Technology Issues | p. 39 |
Summary | p. 40 |
Review Questions | p. 42 |
Discussion Questions | p. 46 |
In-Class Exercises | p. 46 |
Further Reading | p. 47 |
References | p. 48 |
An Interview with Douglas Engelbart | p. 51 |
Introduction to Ethics | p. 53 |
Introduction | p. 53 |
Defining Terms | p. 54 |
Four Scenarios | p. 55 |
Overview of Ethical Theories | p. 59 |
Subjective Relativism | p. 60 |
The Case for Subjective Relativism | p. 60 |
The Case against Subjective Relativism | p. 61 |
Cultural Relativism | p. 62 |
The Case for Cultural Relativism | p. 63 |
The Case against Cultural Relativism | p. 64 |
Divine Command Theory | p. 66 |
The Case for the Divine Command Theory | p. 66 |
The Case against the Divine Command Theory | p. 67 |
Kantianism | p. 69 |
Good Will and the Categorical Imperative | p. 69 |
Evaluating a Scenario Using Kantianism | p. 71 |
The Case for Kantianism | p. 72 |
The Case against Kantianism | p. 73 |
Act Utilitarianism | p. 74 |
Principle of Utility | p. 74 |
Evaluating a Scenario Using Act Utilitarianism | p. 75 |
The Case for Act Utilitarianism | p. 76 |
The Case against Act Utilitarianism | p. 77 |
Rule Utilitarianism | p. 79 |
Basis of Rule Utilitarianism | p. 79 |
Evaluating a Scenario Using Rule Utilitarianism | p. 79 |
The Case for Rule Utilitarianism | p. 80 |
The Case against Utilitarianism in General | p. 81 |
Social Contract Theory | p. 82 |
The Social Contract | p. 82 |
Rawls's Theory of Justice | p. 84 |
Evaluating a Scenario Using Social Contract Theory | p. 87 |
The Case for Social Contract Theory | p. 87 |
The Case against Social Contract Theory | p. 89 |
Comparing Workable Ethical Theories | p. 90 |
Morality of Breaking the Law | p. 91 |
Social Contract Theory Perspective | p. 91 |
Kantian Perspective | p. 91 |
Rule Utilitarian Perspective | p. 92 |
Act Utilitarian Perspective | p. 93 |
Conclusion | p. 93 |
Summary | p. 94 |
Review Questions | p. 95 |
Discussion Questions | p. 97 |
In-Class Exercises | p. 98 |
Further Reading | p. 99 |
References | p. 99 |
An Interview with James Moor | p. 103 |
Networking | p. 107 |
Introduction | p. 107 |
Email and Spam | p. 109 |
How Email Works | p. 109 |
The Spam Epidemic | p. 110 |
Ethical Evaluations of Spamming | p. 112 |
Fighting Spam | p. 115 |
Mail Abuse Prevention System | p. 115 |
Ethical Evaluations of Blacklisting by MAPS | p. 116 |
Proposed Solutions to the Spam Epidemic | p. 117 |
CAN SPAM Act of 2003 | p. 118 |
Emergence of "Spim" | p. 120 |
The World Wide Web | p. 120 |
Attributes of the Web | p. 120 |
How We Use the Web | p. 121 |
Too Much Control or Too Little? | p. 123 |
Ethical Perspectives on Pornography | p. 124 |
Analyses Concluding Pornography Is Immoral | p. 124 |
Analyses Concluding Adult Pornography Is Moral | p. 125 |
Commentary | p. 125 |
Summary | p. 125 |
Censorship | p. 126 |
Direct Censorship | p. 126 |
Self-Censorship | p. 127 |
Challenges Posed by the Internet | p. 127 |
Ethical Perspectives on Censorship | p. 128 |
Freedom of Expression | p. 129 |
History | p. 129 |
Freedom of Expression Not an Absolute Right | p. 130 |
FCC v. Pacifica Foundation et al. | p. 131 |
Children and the Web | p. 132 |
Web Filters | p. 132 |
Child Internet Protection Act | p. 133 |
Ethical Evaluations of CIPA | p. 133 |
Breaking Trust on the Internet | p. 135 |
Identity Theft | p. 135 |
Chat-Room Predators | p. 137 |
Ethical Evaluations of Police "Sting" Operations | p. 138 |
False Information | p. 139 |
Internet Addiction | p. 140 |
Is Internet Addiction Real? | p. 140 |
Contributing Factors | p. 142 |
Ethical Evaluation of Internet Addiction | p. 143 |
Summary | p. 144 |
Review Questions | p. 145 |
Discussion Questions | p. 146 |
In-Class Exercises | p. 147 |
Further Reading | p. 148 |
References | p. 148 |
An Interview with Jennifer Preece | p. 153 |
Intellectual Property | p. 155 |
Introduction | p. 155 |
Intellectual Property Rights | p. 157 |
What Is Intellectual Property? | p. 157 |
Property Rights | p. 157 |
Extending the Argument to Intellectual Property | p. 159 |
Benefits of Intellectual Property Protection | p. 161 |
Limits to Intellectual Property Protection | p. 161 |
Protecting Intellectual Property | p. 163 |
Trade Secrets | p. 163 |
Trademarks and Service Marks | p. 164 |
Patents | p. 165 |
Copyrights | p. 165 |
Fair Use | p. 169 |
Sony v. Universal City Studios | p. 170 |
RIAA v. Diamond Multimedia Systems Inc. | p. 171 |
Digital Technology and Fair Use | p. 173 |
New Restrictions on Use | p. 174 |
Digital Millennium Copyright Act | p. 174 |
Digital Rights Management | p. 175 |
Secure Digital Music Initiative | p. 175 |
Encrypting DVDs | p. 176 |
Making CDs Copyproof | p. 177 |
Criticisms of Digital Rights Management | p. 177 |
Peer-to-Peer Networks | p. 178 |
Napster | p. 179 |
FastTrack | p. 179 |
BitTorrent | p. 180 |
RIAA Lawsuits | p. 180 |
MP3 Spoofing | p. 181 |
Universities Caught in the Middle | p. 182 |
MGM v. Grokster | p. 183 |
Legal Music Services on the Internet | p. 184 |
Protections for Software | p. 184 |
Software Copyrights | p. 185 |
Violations of Software Copyrights | p. 185 |
Software Patents | p. 186 |
Safe Software Development | p. 187 |
Open-Source Software | p. 188 |
Consequences of Proprietary Software | p. 188 |
Open-Source Definition | p. 189 |
Beneficial Consequences of Open-Source Software | p. 189 |
Examples of Open-Source Software | p. 190 |
The GNU Project and Linux | p. 191 |
Impact of Open-Source Software | p. 192 |
Critique of the Open-Source Software Movement | p. 192 |
Legitimacy of Intellectual Property Protection for Software | p. 193 |
Rights-Based Analysis | p. 193 |
Utilitarian Analysis | p. 194 |
Conclusion | p. 196 |
Creative Commons | p. 196 |
Summary | p. 198 |
Review Questions | p. 202 |
Discussion Questions | p. 203 |
In-Class Exercises | p. 204 |
Further Reading | p. 204 |
References | p. 205 |
An Interview with Wendy Seltzer | p. 209 |
Privacy | p. 211 |
Introduction | p. 211 |
Perspectives on Privacy | p. 213 |
Defining Privacy | p. 213 |
Harms and Benefits of Privacy | p. 214 |
Is There a Natural Right to Privacy? | p. 217 |
Privacy and Trust | p. 220 |
Disclosing Information | p. 221 |
Public Information | p. 223 |
Rewards or Loyalty Programs | p. 223 |
Body Scanners | p. 224 |
Digital Video Recorders | p. 224 |
Automobile "Black Boxes" | p. 225 |
Enhanced 911 Service | p. 225 |
RFIDs | p. 226 |
Implanted Chips | p. 227 |
Cookies | p. 227 |
Spyware | p. 228 |
U.S. Legislation | p. 228 |
Fair Credit Reporting Act | p. 228 |
The Family Education Rights and Privacy Act | p. 229 |
Video Privacy Protection Act | p. 229 |
Financial Services Modernization Act | p. 229 |
Children's Online Privacy Protection Act | p. 229 |
Health Insurance Portability and Accountability Act | p. 230 |
Public Records | p. 230 |
Census Records | p. 230 |
Internal Revenue Service Records | p. 231 |
FBI National Crime Information Center 2000 | p. 231 |
Privacy Act of 1974 | p. 232 |
Covert Government Surveillance | p. 234 |
Wiretaps and Bugs | p. 235 |
Operation Shamrock | p. 237 |
U.S. Legislation Authorizing Wiretapping | p. 238 |
Title III | p. 239 |
Electronic Communications Privacy Act | p. 239 |
Communications Assistance for Law Enforcement Act | p. 239 |
USA PATRIOT Act | p. 240 |
Data Mining | p. 244 |
Marketplace: Households | p. 246 |
IRS Audits | p. 246 |
Syndromic Surveillance System | p. 246 |
Total Information Awareness | p. 247 |
Criticisms of the TIA Program | p. 247 |
Who Should Own Information about a Transaction? | p. 248 |
Opt-in Versus Opt-out | p. 248 |
Platform for Privacy Preferences (P3P) | p. 249 |
Identity Theft | p. 249 |
Background | p. 249 |
History and Role of the Social Security Number | p. 251 |
Debate over a National ID Card | p. 252 |
The REAL ID Act | p. 253 |
Encryption | p. 254 |
Symmetric Encryption | p. 254 |
Public-Key Cryptography | p. 255 |
Pretty Good Privacy | p. 255 |
Clipper Chip | p. 258 |
Effects of U.S. Export Restrictions | p. 258 |
Digital Cash | p. 259 |
Summary | p. 262 |
Review Questions | p. 264 |
Discussion Questions | p. 266 |
In-class Exercises | p. 268 |
Further Reading | p. 269 |
References | p. 269 |
An Interview with Ann Cavoukian | p. 275 |
Computer and Network Security | p. 279 |
Introduction | p. 279 |
Viruses, Worms, and Trojan Horses | p. 280 |
Viruses | p. 280 |
Worms | p. 283 |
The Internet Worm | p. 286 |
Trojan Horses | p. 290 |
Defensive Measures | p. 291 |
Phreaks and Hackers | p. 292 |
Hackers | p. 292 |
Phone Phreaking | p. 296 |
The Cuckoo's Egg | p. 297 |
Legion of Doom | p. 297 |
Fry Guy | p. 298 |
U.S. v. Riggs | p. 299 |
Steve Jackson Games | p. 300 |
Retrospective | p. 301 |
Penalties for Hacking | p. 302 |
Recent Incidents | p. 303 |
Denial-of-Service Attacks | p. 304 |
Attacks that Consume Scarce Resources | p. 304 |
Defensive Measures | p. 307 |
Distributed Denial-of-Service Attacks | p. 307 |
SATAN | p. 308 |
Online Voting | p. 308 |
Motivation for Online Voting | p. 308 |
Proposals | p. 309 |
Ethical Evaluation | p. 310 |
Summary | p. 313 |
Review Questions | p. 314 |
Discussion Questions | p. 315 |
In-Class Exercises | p. 316 |
Further Reading | p. 317 |
References | p. 318 |
An Interview with Matt Bishop | p. 321 |
Computer Reliability | p. 325 |
Introduction | p. 325 |
Data-Entry or Data-Retrieval Errors | p. 326 |
Disfranchised Voters | p. 326 |
False Arrests | p. 327 |
Analysis: Accuracy of NCIC Records | p. 327 |
Software and Billing Errors | p. 328 |
Errors Leading to System Malfunctions | p. 328 |
Errors Leading to System Failures | p. 329 |
Analysis: E-Retailer Posts Wrong Price, Refuses to Deliver | p. 329 |
Notable Software System Failures | p. 330 |
Patriot Missile | p. 331 |
Ariane 5 | p. 332 |
AT&T Long-Distance Network | p. 333 |
Robot Missions to Mars | p. 333 |
Denver International Airport | p. 335 |
Therac-25 | p. 336 |
Genesis of the Therac-25 | p. 337 |
Chronology of Accidents and AECL Responses | p. 337 |
Software Errors | p. 340 |
Post Mortem | p. 342 |
Moral Responsibility of the Therac-25 Team | p. 343 |
Computer Simulations | p. 344 |
Uses of Simulation | p. 344 |
Validating Simulations | p. 345 |
Software Engineering | p. 347 |
Specification | p. 347 |
Development | p. 348 |
Validation | p. 349 |
Software Quality Is Improving | p. 350 |
Software Warranties | p. 350 |
Shrinkwrap Warranties | p. 351 |
Are Software Warranties Enforceable? | p. 352 |
Uniform Computer Information Transaction Act | p. 355 |
Moral Responsibility of Software Manufacturers | p. 357 |
Summary | p. 359 |
Review Questions | p. 361 |
Discussion Questions | p. 363 |
In-class Exercises | p. 364 |
Further Reading | p. 365 |
References | p. 365 |
Work and Wealth | p. 369 |
Introduction | p. 369 |
Automation and Unemployment | p. 370 |
Automation and Job Destruction | p. 371 |
Automation and Job Creation | p. 372 |
Effects of Increase in Productivity | p. 375 |
Rise of the Robots? | p. 376 |
Workplace Changes | p. 379 |
Organizational Changes | p. 379 |
Telework | p. 381 |
Temporary Work | p. 383 |
Monitoring | p. 383 |
Multinational Teams | p. 384 |
Globalization | p. 385 |
Arguments for Globalization | p. 385 |
Arguments against Globalization | p. 387 |
Dot-Com Bust Increases IT Sector Unemployment | p. 387 |
Foreign Workers in the American IT Industry | p. 388 |
Foreign Competition | p. 389 |
The Digital Divide | p. 389 |
Evidence of the Digital Divide | p. 390 |
Models of Technological Diffusion | p. 391 |
Critiques of the Digital Divide | p. 392 |
The "Winner-Take-All Society" | p. 394 |
The Winner-Take-All Phenomenon | p. 394 |
Harmful Effects of Winner-Take-All | p. 395 |
Reducing Winner-Take-All Effects | p. 397 |
Access to Public Colleges | p. 397 |
Effects of Tuition Increases | p. 397 |
Ethical Analysis | p. 398 |
Summary | p. 401 |
Review Questions | p. 403 |
Discussion Questions | p. 403 |
In-class Exercises | p. 404 |
Further Reading | p. 406 |
References | p. 406 |
An Interview with Jerry Berman | p. 411 |
Professional Ethics | p. 415 |
Introduction | p. 415 |
Is Software Engineering a Profession? | p. 416 |
Characteristics of a Profession | p. 416 |
Certified Public Accountants | p. 417 |
Software Engineers | p. 418 |
Software Engineering Code of Ethics | p. 419 |
Preamble | p. 420 |
Principles | p. 421 |
Analysis of the Code | p. 428 |
Preamble | p. 428 |
Virtue Ethics | p. 429 |
Alternative List of Fundamental Principles | p. 432 |
Case Studies | p. 433 |
Software Recommendation | p. 434 |
Child Pornography | p. 435 |
Anti-Worm | p. 436 |
Whistleblowing | p. 438 |
Morton Thiokol/NASA | p. 439 |
Hughes Aircraft | p. 441 |
Morality of Whistleblowing | p. 443 |
Summary | p. 446 |
Review Questions | p. 448 |
Discussion Questions | p. 449 |
In-class Exercises | p. 450 |
Further Reading | p. 451 |
References | p. 451 |
An Interview with Paul Axtell | p. 455 |
Plagiarism | p. 459 |
Consequences of Plagiarism | p. 459 |
Types of Plagiarism | p. 459 |
Guidelines for Citing Sources | p. 460 |
How to Avoid Plagiarism | p. 460 |
Misuse of Sources | p. 460 |
Additional Information | p. 461 |
References | p. 461 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.