Preface and Acknowledgments | |
Introduction: Social, Ethical, and Professional Issues in Computing | p. 1 |
Our Computerized Society | p. 2 |
Some New Social Problems Created by Computers | p. 6 |
Ethical Dilemmas for Computer Users | p. 10 |
How Ethical Theory Can Help | p. 14 |
Ethics and the Computer Professional | p. 16 |
The Responsibility of Computing Educators | p. 19 |
Computer Crime | p. 23 |
The Rise of the High-Tech Heist | p. 23 |
Is Reported Crime the Tip of an Iceberg? | p. 28 |
Targets of the Computer Criminal | p. 34 |
Who Are the Computer Criminals and Why Do They Do It? | p. 41 |
Improving Computer Security | p. 44 |
Fighting Crime with Computers | p. 48 |
Software Theft | p. 51 |
The Problem of Software Piracy | p. 51 |
Revenge of the Nerds? Intellectual Property Rights and the Law | p. 57 |
It Looks and Feels Like the Law Is a Mess | p. 61 |
Software Piracy and Industry Progress | p. 65 |
Busting the Pirates | p. 68 |
Hacking and Viruses | p. 73 |
What Is Hacking? | p. 75 |
Why Do Hackers Hack? | p. 79 |
Hackers: Criminals or Modern Robin Hoods? | p. 84 |
The Hacker Crackdown | p. 86 |
The Virus Invasion | p. 90 |
Ethical Issues Arising from Hacking | p. 99 |
Unreliable Computers | p. 105 |
Many Information Systems Are Failures | p. 106 |
When a Crash Really Can Be a Crash | p. 110 |
Banking Blunders | p. 113 |
More Great Software Disasters | p. 115 |
Why Are Complex Systems So Unreliable? | p. 120 |
What Are Computer Scientists Doing about It? | p. 123 |
The Invasion of Privacy | p. 131 |
Database Disasters | p. 132 |
The Information Mosaic | p. 138 |
The Number of the Beast: Calling Number Identification | p. 142 |
Privacy Legislation | p. 144 |
The National Security Agency: Big Brother Is Watching You | p. 147 |
Surveillance Societies | p. 152 |
Just When You Thought No One Was Listening | p. 155 |
Privacy and the Instrumentalism of Efficiency | p. 159 |
Artificial Intelligence and Expert Systems | p. 163 |
What Is Artificial Intelligence? | p. 164 |
What Is Intelligence? | p. 167 |
Expert Systems | p. 173 |
Legal Problems | p. 176 |
Newer Developments | p. 180 |
Ethical Issues: Is AI A Proper Goal? | p. 184 |
Conclusion: The Limits of Hype | p. 189 |
Computerizing the Workplace | p. 193 |
Where Will the Jobs Come From? Computers and the Quantity of Work | p. 193 |
What Kind of Jobs? Computers and the Quality of Work | p. 203 |
The Dangers of the Techno-Fix: Stress in the Modern Workplace | p. 208 |
Health and Safety Issues: Video Display Terminals and the Repetitive Strain Injury Debate | p. 214 |
The Productivity Paradox: Improving the Payoff from Information Technology | p. 221 |
Hypothetical Scenarios for Classroom Discussion | p. 227 |
Appendix A: ACM Code of Ethics and Professional Conduct | p. 261 |
Appendix B: Computing Curricula 1991: A Summary of the ACM/IEEE-CS Joint Curriculum Task Force Report | p. 271 |
Notes | p. 307 |
Index | p. 333 |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.