Kenneth Einar HIMMA, PhD, JD, is Associate Professor of Philosophy at Seattle Pacific University. His research interests include legal philosophy, applied ethics, information ethics, and computer ethics. Dr. Himma has authored more than 100 scholarly articles, encyclopedia entries, book reviews, and op-ed newspaper pieces, as well as a book, Internet Security: Hacking, Counterhacking, and Society.
Herman T. Tavani, PhD, is Professor of Philosophy at Rivier College (New Hampshire) and President of the International Society for Ethics and Information Technology (INSEIT). He also holds appointments as a visiting lecturer at Boston College and as a visiting scholar at the Harvard School of Public Health. Professor Tavani is the author, editor, or coeditor of five books, including Ethics and Technology (Wiley), now in its second edition.
Foreword | p. xi |
Preface | p. xiii |
Contributors | p. xvii |
Introduction | p. xxiii |
Foundational Issues and Methodological Frameworks | p. 1 |
Foundations of Information Ethics | p. 3 |
Milestones in the History of Information and Computer Ethics | p. 25 |
Moral Methodology and Information Technology | p. 49 |
Value Sensitive Design and Information Systems | p. 69 |
Theoretical Issues Affecting Property, Privacy, Anonymity, and Security | p. 103 |
Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property | p. 105 |
Informational Privacy: Concepts, Theories, and Controversies | p. 131 |
Online Anonymity | p. 165 |
Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking | p. 191 |
Professional Issues and the Information-Related Professions | p. 219 |
Information Ethics and the Library Profession | p. 221 |
Ethical Interest in Free and Open Source Software | p. 245 |
Internet Research Ethics: The Field and Its Critical Issues | p. 273 |
Health Information Technology: Challenges in Ethics, Science, and Uncertainty | p. 293 |
Ethical Issues of Information and Business | p. 311 |
Responsibility Issues and Risk Assessment | p. 337 |
Responsibilities for Information on the Internet | p. 339 |
Virtual Reality and Computer Simulation | p. 361 |
Genetic Information: Epistemological and Ethical Issues | p. 385 |
The Ethics of Cyber Conflict | p. 407 |
A Practical Mechanism for Ethical Risk Assessment - A SoDIS Inspection | p. 429 |
Regulatory Issues and Challenges | p. 473 |
Regulation and Governance of the Internet | p. 475 |
Information Overload | p. 497 |
Email Spam | p. 517 |
The Matter of Plagiarism: What, Why, and If | p. 533 |
Intellectual Property: Legal and Moral Challenges of Online File Sharing | p. 553 |
Access and Equity Issues | p. 571 |
Censorship and Access to Expression | p. 573 |
The Gender Agenda in Computer Ethics | p. 589 |
The Digital Divide: A Perspective for the Future | p. 621 |
Intercultural Information Ethics | p. 639 |
Index | p. 667 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.