توضیحاتی در مورد کتاب Ethical and Social Issues in the Information Age
نام کتاب : Ethical and Social Issues in the Information Age
ویرایش : 7
عنوان ترجمه شده به فارسی : مسائل اخلاقی و اجتماعی در عصر اطلاعات
سری : Texts in Computer Science
نویسندگان : Joseph Migga Kizza
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 432
ISBN (شابک) : 9783031248627 , 9783031248634
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 7 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface to the Seventh Edition
What is New in This Edition
Chapter Overview
Audience
Associate-Degree Computing Curricula
Kindergarten Through 12th Grade
Contents
1 History of Computing
1.1 Historical Development of Computing and Information Technology
1.1.1 Before AD 1900
1.1.2 After AD 1900
1.1.3 The Development of the Microprocessor
1.1.4 Historical Development of Computer Software and the Personal Computer (PC)
1.2 Development of the Internet
1.3 Development of the World Wide Web
1.4 The Emergence of Social and Ethical Problems in Computing
1.4.1 The Emergence of Computer Crimes
1.4.2 The Present Status: An Uneasy Cyberspace
1.5 The Case for Computer Ethics Education
1.5.1 What is Computer Ethics?
1.5.2 Why You Should Study Computer Ethics
References
2 Morality and the Law
2.1 Introduction
2.2 Morality
2.2.1 Moral Theories
2.2.2 Moral Decision-Making
2.2.3 Moral Codes
2.2.4 Moral Standards
2.2.5 Guilt and Conscience
2.2.6 Morality and Religion
2.3 Law
2.3.1 The Natural Law
2.3.2 Conventional Law
2.3.3 The Purpose of Law
2.3.4 The Penal Code
2.3.5 Morality and the Law
2.3.6 Issues for Discussion
2.4 Morality, Etiquettes, and Manners
2.4.1 Issues for Discussion
References
3 Ethics and Ethical Analysis
3.1 Traditional Definition
3.2 Ethical Theories
3.2.1 Consequentialism
3.2.2 Deontology
3.2.3 Human Nature
3.2.4 Relativism
3.2.5 Hedonism
3.2.6 Emotivism
3.3 Functional Definition of Ethics
3.4 Ethical Reasoning and Decision-Making
3.4.1 A Framework for Ethical Decision-Making
3.4.2 Making and Evaluating Ethical Arguments
3.5 Codes of Ethics
3.5.1 Preamble
3.5.2 Objectives of Codes of Ethics
3.6 Reflections on Computer Ethics
3.6.1 New Wine in an Old Bottle
3.7 Technology and Values
References
4 Ethics and the Professions
4.1 Introduction
4.2 Evolution of Professions
4.2.1 Origins of Professions
4.2.2 Requirements of a Professional
4.2.3 Pillars of Professionalism
4.3 The Making of an Ethical Professional: Education and Licensing
4.3.1 Formal Education
4.3.2 Licensing Authorities
4.3.3 Professional Codes of Conduct
4.4 Professional Decision-Making and Ethics
4.4.1 Professional Dilemma in Decision-Making
4.4.2 Guilt and Making Ethical Decisions
4.5 Professionalism and Ethical Responsibilities
4.5.1 Whistleblowing
4.5.2 Harassment and Discrimination
4.5.3 Ethical and Moral Implications
References
5 Anonymity, Security, Privacy, and Civil Liberties
5.1 Introduction
5.2 Anonymity
5.2.1 Anonymity on the Internet and Social Media
5.2.2 Advantages and Disadvantages of Anonymity
5.2.3 Legal View of Anonymity
5.3 Security
5.3.1 Physical Security
5.3.2 Physical Access Controls
5.3.3 Cyber Security Controls
5.3.4 Information Security Controls
5.3.5 Operational Security
5.4 Privacy
5.4.1 Definition
5.4.2 Types of Privacy
5.4.3 Value of Privacy
5.4.4 Privacy Implications of Database System
5.4.5 Privacy Violations and Legal Implications
5.4.6 Privacy Protection and Civil Liberties
5.5 Ethical and Legal Framework for Information
5.5.1 Ethics and Privacy
5.5.2 Ethical and Legal Basis for Privacy Protection
References
6 Intellectual Property Rights and Computer Technology
6.1 Definitions
6.2 Computer Products and Services
6.3 Foundations of Intellectual Property
6.3.1 Copyrights
6.3.2 Patents
6.3.3 Trade Secrets
6.3.4 Trademarks
6.3.5 Personal Identity
6.4 Ownership
6.4.1 The Politics of Ownership
6.4.2 The Psychology of Ownership
6.5 Intellectual Property Crimes
6.5.1 Infringement
6.5.2 The First Sale Doctrine
6.5.3 The Fair Use Doctrine
6.6 Protection of Ownership Rights
6.6.1 Domain of Protection
6.6.2 Source and Types of Protection
6.6.3 Duration of Protection
6.6.4 Strategies of Protection
6.7 Protecting Computer Software Under the IP
6.7.1 Software Piracy
6.7.2 Protection of Software Under Copyright Laws
6.7.3 Protection of Software Under Patent Laws
6.7.4 Protection of Software Under Trademarks
6.7.5 Protection of Software Under Trade Secrets
6.8 Transnational Issues and Intellectual Property
References
7 Social Context of Computing
7.1 Introduction
7.2 The Digital Divide
7.2.1 Access
7.2.2 Technology
7.2.3 Humanware (Human Capacity)
7.2.4 Infrastructure
7.2.5 Enabling Environments
7.3 Obstacles to Overcoming the Digital Divide
7.4 Technologies in the Workplace
7.4.1 The Office then and Now
7.4.2 Workplace Transformation
7.4.3 Challenges and Benefits of Remote and Hybrid Working
7.5 Workplace Social and Ethical Issues
7.5.1 Discrimination and Harassment
7.5.2 Workplace Safety
7.5.3 Growing and Questionable Use of Technology in the Workplace
7.5.4 Workplace Privacy and Surveillance
References
8 Software Issues: Risks and Liabilities
8.1 Definitions
8.1.1 Standards
8.1.2 Reliability
8.1.3 Security
8.1.4 Safety
8.1.5 Quality
8.1.6 Quality of Service
8.2 Causes of Software Failures
8.2.1 Human Factors
8.2.2 Nature of Software: Complexity
8.3 Risk
8.3.1 Risk Assessment and Management
8.3.2 Risks and Hazards in Workplace Systems
8.3.3 Historic Examples of Software Risks
8.4 Consumer Protection
8.4.1 Buyer and Provider Rights
8.4.2 A Service Provider-User Contract
8.4.3 The Tort Option
8.5 Improving Software Quality
8.5.1 Techniques for Improving Software Quality
8.6 Producer Protection
References
9 Computer Crimes
9.1 Introduction
9.2 History of Computer Crimes
9.3 Types of Computer Systems Attacks
9.3.1 Penetration
9.3.2 Denial of Service
9.4 Motives of Computer Crimes
9.5 Costs and Social Consequences
9.5.1 Lack of Cost Estimate Model for Cyberspace Attacks
9.5.2 Social and Ethical Consequences
9.6 Computer Crime Prevention Strategies
9.6.1 Protecting Your Computer
9.6.2 The Computer Criminal
9.6.3 The Innocent Victim
References
10 Cyberbullying, Cyberstalking, and Cyber Harassment
10.1 Definitions
10.1.1 Cyberbullying
10.1.2 Cyberstalking
10.1.3 Cyberharassment
10.2 Types of Cyberbullying
10.2.1 Harassment
10.2.2 Flaming
10.2.3 Exclusion
10.2.4 Outing
10.2.5 Masquerading
10.3 Areas of Society Most Affected by Cyberbullying
10.3.1 Schools
10.3.2 Cyberbullying in the Workplace
10.4 Legislation Against Cyberbullying
10.4.1 Federal Laws
10.4.2 State Laws
10.4.3 International Laws
10.5 Effects of Cyberbullying
10.6 Dealing with Cyberbullying
10.6.1 Awareness
10.6.2 Legislations
10.6.3 Community Support
10.7 Resources
References
11 Virtualization, Virtual Reality, and Ethics
11.1 Virtualization
11.2 Different Aspects of Virtualization
11.3 Virtualization of Computing Resources
11.3.1 History of Computing Virtualization
11.3.2 Computing Virtualization Terminologies
11.3.3 Types of Computing System Virtualization
11.3.4 The Benefits of Computing Virtualization
11.4 Virtual Reality/(Virtual Presence)
11.4.1 Different Types of Virtual Reality
11.5 Virtualization and Ethics
11.6 Social and Ethical Implication of Virtualization
11.7 Virtualization Security as an Ethical Imperative
11.7.1 Hypervisor Security
11.7.2 Securing Communications Between Desktop and Virtual Environment
11.7.3 Security of Communication Between Virtual Environments
11.7.4 Threats and Vulnerabilities Originating from a Virtual Environment
References
12 Cyberspace and the Changing Frontiers of Ethics
12.1 Introduction
12.2 Cyberspace and the Concepts of Telepresence and Immersion
12.3 Securing Cyberspace
12.3.1 Detecting Attacks in Cyberspace
12.3.2 Cyberspace Systems Survivability
12.4 Intellectual Property Rights in Cyberspace
12.4.1 Copyrights
12.4.2 Patents
12.4.3 Trade Secrets
12.4.4 Trademarks
12.4.5 Personal Identity
12.5 Regulating and Censoring Cyberspace
12.6 The Social Value of Cyberspace
12.7 Privacy in Cyberspace
12.7.1 Privacy Protection
12.8 Global Cyberethics
12.9 Cyberspace Lingua Franca
12.9.1 Global Cyber Culture
References
13 Metaverse—The Evolving Realities and Ethics
13.1 Introduction
13.2 Definition
13.3 The Evolution of Metaverse
13.4 The Architecture of Metaverse
13.4.1 Metaverse Avatars
13.4.2 Metaverse Platforms
13.5 Actualization of Metaverse
13.5.1 The Concept of Telepresence
13.5.2 Localization
13.6 Benefits of Metaverse
13.6.1 E-commerce in Metaverse
13.6.2 Metaverse Billing and Payment Systems
13.7 Social and Ethical Concerns of the Metaverse
13.7.1 Metaverse Immersion and Autonomy
13.7.2 Metaverse and Transparency
13.7.3 Metaverse and Trustworthiness
13.7.4 Metaverse and Privacy
13.7.5 Metaverse and Access Inequality
13.7.6 Interoperability in Metaverse
13.7.7 Metaverse and Freedom of Expression
References
14 Artificial Intelligence and the Changing Frontiers of Ethics
14.1 Introduction
14.2 Artificial Intelligence
14.2.1 Advances in Artificial Intelligence
14.2.2 Artificial Intelligence and Ethics
14.2.3 The Future Role of Autonomous Agents
References
15 New Frontiers of Ethics and Security: Internet of Things (IoT)
15.1 Introduction
15.2 Overview and Growth of the Internet of Things
15.3 Architecture and Networking of IoT
15.3.1 Architecture and Protocol Stack of IoTs
15.3.2 Challenges of Using TCP/IP Architecture Over the IoT
15.4 IoT Governance, Privacy, and Security Challenges
15.4.1 Governance and Privacy Concerns
15.4.2 Security Challenges
15.4.3 Autonomy
15.4.4 Computational Constraints
15.4.5 Discovery
15.4.6 Trust Relationships
References
16 Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems
16.1 Introduction
16.2 Introduction to Computer Networks
16.2.1 Computer Network Models
16.2.2 Computer Network Types
16.3 Social Networks (SNs)
16.4 Online Social Networks (OSNs)
16.4.1 Types of Online Social Networks
16.4.2 Online Social Networking Services
16.4.3 The Growth of Online Social Networks
16.5 Ethical and Privacy Issues in Online Social Networks
16.5.1 Privacy Issues in OSNs
16.5.2 Strengthening Privacy in OSNs
16.5.3 Ethical Issues in Online Social Networks
16.6 Security and Crimes in Online Social Networks
16.6.1 Beware of Ways to Perpetuate Crimes in Online Social Networks
16.6.2 Defense Against Crimes in Online Social Networks
16.7 Proven Security Protocols and Best Practices in Online Social Networks
16.7.1 Authentication
16.7.2 Access Control
16.7.3 Legislation
16.7.4 Self-regulation
16.7.5 Detection
16.7.6 Recovery
References
17 Mobile Systems and Their Intractable Social, Ethical, and Security Issues
17.1 Introduction
17.2 Role of Operating Systems in the Growth of the Mobile Ecosystem
17.2.1 Android
17.2.2 iOS
17.2.3 Windows mOS
17.2.4 BlackBerry mOS
17.2.5 Other Smaller mOS
17.3 Ethical and Privacy Issues in Mobile Ecosystems
17.4 Security Issues in Mobile Ecosystems
17.4.1 Application-Based Threats
17.4.2 Web-Based Threats
17.4.3 Network Threats
17.4.4 Physical Threats
17.4.5 Operating System-Based Threats
17.5 General Mobile Devices Attack Types
17.6 Mitigation of Mobile Device Attacks
17.6.1 Mobile Device Encryption
17.6.2 Mobile Remote Wiping
17.6.3 Mobile Passcode Policy
17.7 Users’ Role in Securing Mobile Devices
References
18 Computer Crime Investigations and Ethics
18.1 Introduction
18.2 Digital Evidence
18.2.1 Looking for Digital Evidence
18.2.2 Digital Evidence: Previewing and Acquisition
18.3 Preserving Evidence
18.4 Analysis of Digital Evidence
18.4.1 Analyzing Data Files
18.4.2 Analysis Based on Operating Systems
18.4.3 Analysis Based on Digital Media
18.5 Relevance and Validity of Digital Evidence
18.6 Writing Investigative Reports
18.7 Ethical Implications and Responsibilities in Computer Forensic Investigations
References
19 Biometric Technologies and Ethics
19.1 Introduction and Definitions
19.1.1 Definitions
19.2 The Biometric Authentication Process
19.3 Biometric System Components
19.3.1 Data Acquisition
19.3.2 Enrollments
19.3.3 Signal Processing
19.3.4 Decision Policy
19.4 Types of Biometric Technologies
19.4.1 Finger Biometrics
19.4.2 Hand Geometry
19.4.3 Face Biometrics
19.4.4 Voice Biometrics
19.4.5 Handwriting Analysis
19.4.6 Iris Biometrics
19.4.7 Retina
19.5 Ethical Implications of Biometric Technologies
19.6 The Future of Biometrics
References
Appendix A The Digital Millennium Copyright Act
Appendix B The Federal False Claims Act
Appendix C Projects
Index