Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Preface | |
Catalysts for Change | |
Introduction | |
Milestones in Computing | |
Milestones in Networking | |
Milestones in Information Storage and Retrieval | |
Information Technology Issues | |
Introduction to Ethics | |
Introduction | |
Subjective Relativism | |
Cultural Relativism | |
Divine Command Theory | |
Kantianism | |
Act Utilitarianism | |
Rule Utilitarianism | |
Social Contract Theory | |
Comparing Workable Ethical Theories | |
Morality of Breaking the Law | |
Networking | |
Introduction | |
Email and Spam | |
Fighting Spam | |
The World Wide Web | |
Ethical Perspectives on Pornography | |
Censorship | |
Freedom of Expression | |
Children and the Web | |
Breaking Trust on the Internet | |
Internet Addiction | |
Intellectual Property | |
Introduction | |
Intellectual Property Rights | |
Protecting Intellectual Property | |
Fair Use | |
New Restrictions on Use | |
Peer-to-Peer Networks | |
Protections for Software | |
Open-Source Software | |
Legitimacy of Intellectual Property Protection for Software | |
Creative Commons | |
Privacy | |
Introduction | |
Perspectives on Privacy | |
Disclosing Information | |
Public Information | |
U.S. Legislation | |
Public Records | |
Covert Government Surveillance | |
U.S. Legislation Authorizing Wiretapping | |
Data Mining | |
Identity Theft | |
Encryption | |
Computer and Network Security | |
Introduction | |
Viruses, Worms, and Trojan Horses | |
Phreaks and Hackers | |
Denial-of-Service Attacks | |
Online Voting | |
Computer Reliability | |
Introduction | |
Data-Entry or Data-Retrieval Errors | |
Software and Billing Errors | |
Notable Software System Failures | |
Therac-25 | |
Computer Simulations | |
Software Engineering | |
Software Warranties | |
Introduction | |
Is Software Engineering a Profession? | |
Software Engineering Code of Ethics | |
Analysis of the Code | |
Case Studies | |
Whistleblowing | |
Work and Wealth | |
Introduction | |
Automation and Unemployment | |
Workplace Changes | |
Globalization | |
The Digital Divide | |
The "Winner-Take-All Society" | |
Access to Public Colleges | |
Plagiarism | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.