- Start
- Ethical and Social Issues in the Information Age
Ethical and Social Issues in the Information Age
Angebote / Angebote:
This engaging and thought-provoking textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology, ranging from the Internet to the ubiquitous portable devices we use to access it. The text emphasizes the need for a strong ethical framework for all applications of computer science and engineering in our professional and personal life.This thoroughly revised and updated sixth edition features two new chapters covering online harassment and cyberbullying, and the complex issues introduced by the emergence of the Internet of Things (IoT).Topics and features:Establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativismOffers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discriminationExamines the ethical, cultural and economic realities of mobile telecommunications, computer social network ecosystems, and virtualization technologyReviews issues of property rights, responsibility and accountability relating to information technology and softwareExplores the evolution of electronic crime, network security, and computer forensicsIntroduces the new frontiers of ethics: virtual reality, artificial intelligence, and the InternetDiscusses the security quagmire of the IoT, and the growing threat of bullying facilitated by electronic technology (NEW)Provides exercises, objectives, and issues for discussion with every chapterThis extensive textbook/reference addresses the latest curricula requirements for understanding the cultural, social, legal, and ethical issues in computer science and related fields, and offers invaluable advice for industry professionals wishing to put such principles into practice.Dr. Joseph Migga Kizza is a Professor and Head of the Department of Computer Science and Engineering at the University of Tennessee at Chattanooga, USA. He is also the author of the successful Springer title Guide to Computer Network Security.
Folgt in ca. 5 Arbeitstagen