Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Handbook of Information and Computer Ethics

Buy
This handbook provides an accessible overview of the most important issues in information and computer ethics. It covers: foundational issues and methodological frameworks; theoretical issues affecting property, privacy, anonymity, and security; professional issues and the information-related professions; responsibility issues and risk assessment; regulatory issues and challenges; access and equity issues. Each chapter explains and evaluates the central positions and arguments on the respective issues, and ends with a bibliography that identifies the most important supplements available on the topic.

Discover how developments in information technology are raising new ethical debates

Information and computer ethics has emerged as an important area of philosophical and social theorizing, combining conceptual, meta-ethical, normative, and applied elements. As a result, academic interest in this area has increased dramatically, particularly in computer science, philosophy, and communications departments; business schools; information and library schools; and law schools.

The Handbook of Information and Computer Ethics responds to this growing interest with twenty-seven chapters that address both traditional and current issues in information and computer ethics research. It is organized into six parts:

  • Foundational Issues and Methodological Frameworks

  • Theoretical Issues Affecting Property, Privacy, Anonymity, and Security

  • Professional Issues and the Information-Related Professions

  • Responsibility Issues and Risk Assessment

  • Regulatory Issues and Challenges

  • Access and Equity Issues

Each chapter, written by one or more of the most influential ethicists in their fields of expertise, explains and evaluates the central positions and arguments on the respective issues. Chapters end with a bibliography that identifies the most important supplementary books and papers available on the topic.

This handbook provides an accessible, yet sophisticated, overview of the most important issues we face in information and computer ethics today. It is an ideal supplemental text for advanced undergraduate- and graduate-level courses in information and computer ethics, and is also of interest to readers who are involved in library science, computer science, or philosophy.

About the Author

Kenneth Einar HIMMA, PhD, JD, is Associate Professor of Philosophy at Seattle Pacific University. His research interests include legal philosophy, applied ethics, information ethics, and computer ethics. Dr. Himma has authored more than 100 scholarly articles, encyclopedia entries, book reviews, and op-ed newspaper pieces, as well as a book, Internet Security: Hacking, Counterhacking, and Society.

Herman T. Tavani, PhD, is Professor of Philosophy at Rivier College (New Hampshire) and President of the International Society for Ethics and Information Technology (INSEIT). He also holds appointments as a visiting lecturer at Boston College and as a visiting scholar at the Harvard School of Public Health. Professor Tavani is the author, editor, or coeditor of five books, including Ethics and Technology (Wiley), now in its second edition.

(HTML tags aren't allowed.)

Head First WordPress: A Brain-Friendly Guide to Creating Your Own Custom WordPress Blog
Head First WordPress: A Brain-Friendly Guide to Creating Your Own Custom WordPress Blog

Whether you're promoting your business or writing about your travel adventures, Head First WordPress will teach you not only how to make your blog look unique and attention-grabbing, but also how to take advantage of WordPress platform's more complex features to make your website work well, too.

...

One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work
One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work

Turn your one simple idea into millions―without lifting a finger!

“Ever heard of Teddy Ruxpin or Lazer Tag? Both have Stephen Key’s mark on them. He is the Yoda or ‘renting’ ideas for serious passive income. From how-to to war stories, this is a great book.”
―Tim Ferriss, author
...

Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Information theory lies at the heart of modern technology, underpinning all communications, networking, and data storage systems. This book sets out, for the first time, a complete overview of both classical and quantum information theory. Throughout, the reader is introduced to key results without becoming lost in mathematical details. Opening...

Everyday Cryptography: Fundamental Principles and Applications
Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the...

Voice over 802.11 (Artech House Telecommunications Library)
Voice over 802.11 (Artech House Telecommunications Library)
An understanding of the public switched telephone network (PSTN) and how it is
potentially going to be replaced is best grasped by understanding its three major
components: access, switching, and transport. Access pertains to how a user
accesses the network. Switching refers to how a call is “switched” or routed...
Solid Modelling and CAD Systems: How to Survive a CAD System
Solid Modelling and CAD Systems: How to Survive a CAD System

Solid Modelling and CAD Systems gives users an insight into the methods and problems associated with CAD systems. It acts as a bridge between users who learn interfaces without understanding how they work and developers who create systems without understanding the needs of the users.

The main feature of Solid Modelling...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy