|
|
|||
|
||||
OverviewThe frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual’s social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations’ strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services. Full Product DetailsAuthor: Joseph Migga KizzaPublisher: Springer London Ltd Imprint: Springer London Ltd Edition: Softcover reprint of hardcover 4th ed. 2010 Dimensions: Width: 15.50cm , Height: 1.90cm , Length: 23.50cm Weight: 0.545kg ISBN: 9781447125457ISBN 10: 1447125452 Pages: 335 Publication Date: 04 May 2012 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Replaced By: 9781447159728 Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsHistory of Computing.- Morality and the Law.- Ethics and Ethical Analysis.- Ethics and the Professions.- Anonymity, Security, Privacy, and Civil Liberties.- Intellectual Property Rights and Computer Technology.- Social Context of Computing.- Software Issues: Risks and Liabilities.- Computer Crimes.- New Frontiers for Computer Ethics.- Cyberspace, Cyberethics, and Social Networking.- Computer Networks and Online Crimes.- Computer Crime Investigations – Computer Forensics.- Biometrics.ReviewsFrom the reviews of the third edition: It is encouraging to encounter a textbook for undergraduate students that is devoted to information age ethics ... . This third edition contains three new chapters. ... I appreciate Kizza's work in the ethical education of information technology (IT) students. ... Overall, I recommend this very basic ... but significant educational topic as an introductory text. (Brad Reid, ACM Computing Reviews, December, 2008) From the reviews of the fourth edition: It could work in a computers and society course for students majoring in information technology or in a general education computers and society course for students with other majors. ... Companies that have a serious and ongoing commitment to ethical and privacy issues might use the book as a reference. ... I recommend this book to those who develop computer and business ethics coursework; it is as good as any other option available. (J. Fendrich, ACM Computing Reviews, October, 2010) From the reviews of the third edition: It is encouraging to encounter a textbook for undergraduate students that is devoted to information age ethics ... . This third edition contains three new chapters. ... I appreciate Kizza's work in the ethical education of information technology (IT) students. ... Overall, I recommend this very basic ... but significant educational topic as an introductory text. (Brad Reid, ACM Computing Reviews, December, 2008)From the reviews of the fourth edition: It could work in a computers and society course for students majoring in information technology or in a general education computers and society course for students with other majors. ... Companies that have a serious and ongoing commitment to ethical and privacy issues might use the book as a reference. ... I recommend this book to those who develop computer and business ethics coursework; it is as good as any other option available. (J. Fendrich, ACM Computing Reviews, October, 2010) Author InformationTab Content 6Author Website:Countries AvailableAll regions |