Sara Baase is Professor Emeritus with the Department of Computer Science, San Diego State University, where she won awards for outstanding teaching. Her textbooks in computer science have been translated into several languages. Dr. Baase received her doctoral degree from the University of California, Berkeley.
Preface | |
Unwrapping the Gift | |
The Ubiquity of Computers and the Rapid Pace of Change | |
New Developments and Dramatic Impacts | |
Amateur Creative Works: Blogs and Video Sharing | |
Connections | |
Collaborative Efforts Among Strangers | |
E-commerce and Free Stuff | |
Artificial Intelligence, Robotics, and Motion | |
Tools for Disabled People | |
What Next? | |
An Introduction to Some Issues and Themes | |
Issues | |
Themes | |
Ethics | |
What Is Ethics, Anyway? | |
A Variety of Ethical Views | |
Some Important Distinctions | |
Privacy | |
Privacy and Computer Technology | |
Introduction | |
New Technology, New Risks | |
Terminology and Principles for Data Collection and Use | |
Big Brother Is Watching You | |
Databases | |
The Fourth Amendment, Expectation of Privacy, and Surveillance Technologies | |
Video Surveillance | |
Diverse Privacy Topics | |
Marketing, Personalization and Consumer Dossiers | |
Location Tracking | |
Stolen and Lost Data | |
What We Do Ourselves | |
Public Records: Access vs Privacy | |
National ID Systems | |
Children | |
Protecting Privacy: Technology, Markets, Rights, and Laws | |
Technology and Markets | |
Rights and Law | |
Privacy Regulations in the European Union | |
Communications | |
Wiretapping and E-mail Protection | |
Designing Communications Systems for Interception | |
Secret Intelligence Gathering | |
Encryption Policy | |
Freedom of Speech | |
Changing Communications Paradigms | |
Regulating Communications Media | |
Free-Speech Principles | |
Controlling Offensive Speech | |
Offensive Speech: What Is It? What Is Illegal? | |
Internet Censorship Laws and Alternatives | |
Spam | |
Challenging Old Regulatory Paradigms and Special Interests | |
Posting and Selling Sensitive Material: Ethics and Social Concerns | |
Censorship on the Global Net | |
The Global Impact of Censorship | |
Yahoo and French Censorship | |
Censorship in Other Nations | |
Aiding Foreign Censors | |
Political Campaign Regulations in Cyberspace | |
Anonymity | |
Common Sense and the Internet | |
Is Anonymity Protected? | |
Against Anonymity | |
Protecting Access and Innovation: Net Neutrality or Deregulation? | |
Intellectual Property | |
Intellectual Property and Changing Technology | |
What Is Intellectual Property? | |
Challenges of New Technologies | |
Copyright Law and Significant Cases | |
A Bit of History | |
The Fair-Use Doctrine | |
Significant Cases | |
Copying and Sharing | |
Defensive and Aggressive Responses from the Content Industries | |
The DMCA vs Fair Use, Freedom of Speech, and Innovation | |
Video Sharing | |
New Business Models and Constructive Solutions | |
Ethical Arguments About Copying | |
International Piracy | |
Search Engines and Online Libraries | |
Free Speech Issues | |
Free Software | |
What Is Free Software? | |
Should All Software Be Free? | |
Issues for Software Developers | |
Patents for Software? | |
Patents for Web Technologies | |
Copyright and Similar Software Products | |
Crime | |
Introduction | |
Hacking | |
What is Hacking? | |
Ha | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.