Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
A highly relevant text that describes how changes in information technology influence morality and the law
Offers a pertinent discussion on civil liberties, harassment, and discrimination
Assesses workplace concerns related to privacy, surveillance, and virtual offices
Ethical dilemmas have risen in number and intensity with the increasing dependence of contemporary society on computers and computer networks. Despite the proliferation of expert remedies, viable solutions to computer security issues remain too elusive, and society continues to suffer at the hands of cyber criminals, vandals, and hackers.
This comprehensive third edition of the successful Ethical and Social Issues in the Information Age takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence of cyberspace, the convergence of telecommunication and computing technologies, and the miniaturalization of computing, telecommunication, and information-enabling devices. This accessible volume broadly surveys thought-provoking questions about the impact of these new technologies, with particular emphasis on the rapid growth of a multitude of computer networks, including the Internet. It assumes only a very modest familiarity with the basic computer literacy.
Topics and features:
• Describes how changes in information technology influence morality and the law
• Provides fundamental discussion of network-security system design and operation to reveal vulnerable areas in computer network infrastructure (NEW chapter)
• Surveys the history of computing and the evolution of computer crimes
• Explores biometric techniques to system access control (NEW chapter)
• Incorporates recent requirements for computer curricula
• Introduces and explores techniques in electronic crime investigation (NEW chapter)
• Assesses workplace concerns related to privacy, surveillance, and virtual offices
• Offers a pertinent discussion on civil liberties, harassment, and discrimination
• Contains chapter-ending exercises, and the author provides instructor classroom support materials and teaching guides at his website
This newly revised text/reference provides an updated discussion of the ethical and social issues that continue to evolve as computing and information technologies proliferate. Students at all levels who need to learn about computer ethics, the legal aspects of computing, network security, computer crime investigation, and biometrics will find this well documented work an invaluable resource. The book is also highly useful for practitioners needing such insights for their work.
Supplementary material can be found at: www.utc.edu/faculty/Joseph-Kizza
Content Level »Lower undergraduate
Keywords »Internet - Moral - anonymity - artificial intelligence - communication - computer crime - computer ethics - cyberspace - data security - ethics - information - information technology - privacy - security - technology
To Social And Ethical Computing.- Morality And The Law.- Ethics, Technology, And Value.- Ethics And The Professions.- Anonymity, Security, Privacy, And Civil Liberties.- Intellectual Property Rights And Computer Technology.- Social Context Of Computing.- Software Issues: Risks And Liabilities.- Computer Crimes.- New Frontiers For Computer Ethics Artificial Intelligence, Cyberspace, And Virtual Reality.- Cyberspace And Cyberethics.- Computer Networks And Online Crimes.- Computer Crime Investigations-Computer Forensics.- Biometrics.