did-you-know? rent-now

Rent More, Save More! Use code: ECRENTAL

did-you-know? rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780321536853

Ethics for the Information Age

by
  • ISBN13:

    9780321536853

  • ISBN10:

    0321536851

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2009-01-01
  • Publisher: Addison Wesley
  • View Upgraded Edition

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $93.00 Save up to $26.04
  • Buy Used
    $66.96
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 24-48 HOURS

Supplemental Materials

What is included with this book?

Summary

KEY MESSAGE:In an era where information technology changes constantly, a thoughtful response to these rapid changes requires a basic understanding of IT history, an awareness of current issues, and a familiarity with ethics.Ethics for the Information Ageprovides an overview of ethical theories and problems encountered by computer professionals in todayrs"s environment. Catalysts for Change; Introduction to Ethics; Networking; Intellectual Property; Privacy; Computer and Network Security; Computer Reliability; Work and Wealth; Professional Ethics; Plagiarism. For all readers interested in computers and society or computer ethics.

Table of Contents

Preface
Catalysts for Change
Introduction
Milestones in Computing
Milestones in Networking
Milestones in Information Storage and Retrieval
Information Technology Issues
Introduction to Ethics
Introduction
Subjective Relativism
Cultural Relativism
Divine Command Theory
Kantianism
Act Utilitarianism
Rule Utilitarianism
Social Contract Theory
Comparing Workable Ethical Theories
Morality of Breaking the Law
Networking
Introduction
Email and Spam
Fighting Spam
The World Wide Web
Ethical Perspectives on Pornography
Censorship
Freedom of Expression
Children and the Web
Breaking Trust on the Internet
Internet Addiction
Intellectual Property
Introduction
Intellectual Property Rights
Protecting Intellectual Property
Fair Use
New Restrictions on Use
Peer-to-Peer Networks
Protections for Software
Open-Source Software
Legitimacy of Intellectual Property Protection for Software
Creative Commons
Privacy
Introduction
Perspectives on Privacy
Disclosing Information
Public Information
U.S. Legislation
Public Records
Covert Government Surveillance
U.S. Legislation Authorizing Wiretapping
Data Mining
Identity Theft
Encryption
Computer and Network Security
Introduction
Viruses, Worms, and Trojan Horses
Phreaks and Hackers
Denial-of-Service Attacks
Online Voting
Computer Reliability
Introduction
Data-Entry or Data-Retrieval Errors
Software and Billing Errors
Notable Software System Failures
Therac-25
Computer Simulations
Software Engineering
Software Warranties
Introduction
Is Software Engineering a Profession?
Software Engineering Code of Ethics
Analysis of the Code
Case Studies
Whistleblowing
Work and Wealth
Introduction
Automation and Unemployment
Workplace Changes
Globalization
The Digital Divide
The "Winner-Take-All Society"
Access to Public Colleges
Plagiarism
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program