Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security and Ethics: Social and Organizational Issues

Buy
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including: web accessibility, the digital divide, youth protection and surveillance, this book provides an invaluable resource for students, scholars and professionals currently working in Information Technology related areas.

Drawing on the earlier writings of Joseph Weizenbaum (1976), Stacey L. Edgar, in the introduction to his excellent book, Morality and Machines, emphasises the need to “examine the dangers of being too mesmerised by the ‘computational theory of mind,’ which can, with its deterministic and materialistic implications, lead to losing sight of what is of moral (and aesthetic) value” (2003, p. 7). Similarly, the renowned communications theorist Raymond Williams reminds us that “a technology is always, in a full sense, social. It is necessarily in complex and variable connection with other social relations and institutions … ” (1981, p. 227). It is in a timely manner, therefore, that Information Security and Ethics: Social and Organizational Issues brings together a collection of recent work by international scholars addressing a number of significant and current social and moral issues associated with the development and use of new information and communication technologies.

The interrelated areas of information security and information ethics are rapidly gaining importance in the wake of the terrorist attacks on the USA on September 11, 2001 and at the same time as academics, computer professionals, government agencies, business organisations and the general public are becoming increasingly aware of the dangers associated with our growing reliance on computer technologies — particularly with regard to the ubiquitous and unregulated nature of the Internet. Today, all members of society are affected by computers - even if they themselves do not own one. The computer has changed our home and workplace environments, how we communicate, how we do business, how we shop and how our children are educated and entertained. As parents, we may be becoming more and more concerned about our inability to protect our children from what we perceive as the harmful effects of technology. As citizens, we may be growing increasingly anxious about the external threats to our national security posed by cyber-terrorists and the internal threat to us as individuals of government control and the related invasion of our rights to privacy and free speech. Business organisations, meanwhile, need to be constantly alert to the increasing dangers to their information security and intellectual property posed by hackers and white-collar criminals. The responsibility lies not just with managers. Kevin Day suggests that had all employees been educated in security then the majority of recent successful security attacks could have been avoided. “Security is not a technology; it is a thought process and a methodology” (Day, 2003, p. 4).
(HTML tags aren't allowed.)

Microsoft Outlook 2007 Programming: Jumpstart for Power Users and Administrators
Microsoft Outlook 2007 Programming: Jumpstart for Power Users and Administrators
Microsoft Outlook is the most widely used e-mail program and offers the most programmability. Sue Mosher introduces key concepts for programming Outlook using Visual Basic for Applications, custom Outlook forms, and external scripts, without the need for additional development tools.

For those who manage Outlook installations, it
...
Artificial General Intelligence (Cognitive Technologies)
Artificial General Intelligence (Cognitive Technologies)

This is the first book on current research on artificial general intelligence (AGI), work explicitly focused on engineering general intelligence – autonomous, self-reflective, self-improving, commonsensical intelligence. Each author explains a specific aspect of AGI in detail in each chapter, while also investigating the common themes in...

Holub on Patterns: Learning Design Patterns by Looking at Code
Holub on Patterns: Learning Design Patterns by Looking at Code

This is a book about programming in an object -oriented way and about how to use design patterns to solve commonplace problems in object-oriented systems.

I've based this book on the philosophy that the best way to learn and understand the design patterns is to see them in action, all jumbled up, just as they occur in the
...


Primary Mesenchymal Cells (Human Cell Culture) (v. 5)
Primary Mesenchymal Cells (Human Cell Culture) (v. 5)

The human body contains many specialized tissues that are capable of fulfilling an incredible variety of functions necessary for our survival. This volume in the Human Cell Culture Series focuses on mesenchymal tissues and cells. The in vitro study of mesenchymal cells is perhaps the oldest form of human cell culture, beginning with the...

Underwater Photography
Underwater Photography

Underwater photography is a fascinating pursuit for those who aspire to capture the magical world found within our oceans and bring it to the surface. In this book, award-winning photographer Tobias Friedrich teaches us how to create stunning underwater images, covering everything from the equipment needed, to creating powerful...

Beyond Bullet Points: Using Microsoft PowerPoint to Create Presentations that Inform, Motivate, and Inspire
Beyond Bullet Points: Using Microsoft PowerPoint to Create Presentations that Inform, Motivate, and Inspire

Unlock the amazing story buried in your presentation—and forget boring, bullet-point-riddled slides forever! Guided by communications expert Cliff Atkinson, you’ll walk you through an innovative, three-step methodology for increasing the impact of your presentation. Discover how to combine classic storytelling techniques...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy