Ethical and social issues in the information age:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
Springer
2003
|
Ausgabe: | 2. ed. |
Schriftenreihe: | Texts in computer science
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XXIII, 374 S. Ill., graph. Darst. |
ISBN: | 038795421X |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV020839408 | ||
003 | DE-604 | ||
005 | 20051130 | ||
007 | t | ||
008 | 051020s2003 gw ad|| |||| 00||| eng d | ||
016 | 7 | |a 966382862 |2 DE-101 | |
020 | |a 038795421X |c Pp. : EUR 53.45 |9 0-387-95421-X | ||
035 | |a (OCoLC)48906497 | ||
035 | |a (DE-599)BVBBV020839408 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-355 |a DE-634 |a DE-11 | ||
050 | 0 | |a T58.5 | |
082 | 0 | |a 174/.90904 |2 21 | |
084 | |a AP 12900 |0 (DE-625)6873: |2 rvk | ||
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
100 | 1 | |a Kizza, Joseph Migga |d 1950- |e Verfasser |0 (DE-588)118069020 |4 aut | |
245 | 1 | 0 | |a Ethical and social issues in the information age |c Joseph Migga Kizza |
250 | |a 2. ed. | ||
264 | 1 | |a New York [u.a.] |b Springer |c 2003 | |
300 | |a XXIII, 374 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Texts in computer science | |
500 | |a Literaturangaben | ||
650 | 4 | |a Ethik | |
650 | 4 | |a Gesellschaft | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Computers |x Moral and ethical aspects | |
650 | 4 | |a Information technology |x Moral and ethical aspects | |
650 | 4 | |a Information technology |x Social aspects | |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ethik |0 (DE-588)4015602-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziologie |0 (DE-588)4077624-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Soziologie |0 (DE-588)4077624-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 1 | 1 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014161310&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014161310 |
Datensatz im Suchindex
_version_ | 1804134546179883008 |
---|---|
adam_text | JOSEPH MIGGA KIZZA ETHICAL AND SOCIAL ISSUES THE INFORMATION AGE SECOND
EDITION WITH 8 ILLUSTRATIONS SPRINGER CONTENTS PREFACE TO THE SECOND
EDITION VLL PREFACE TO THE FIRST EDITION XIII 1 INTRODUCTION TO SOCIAL
AND ETHICAL COMPUTING 1.1 HISTORICAL DEVELOPMENT OF COMPUTING AND
INFORMATION TECHNOLOGY 1 1.1.1 BEFORE 1900 A.D 1 1.1.2 AFTER 1900 A.D 3
1.1.3 THE DEVELOPMENT OF THE MICROPROCESSOR 6 1.1.4 HISTORICAL
DEVELOPMENT OF COMPUTER SOFTWARE AND THE PERSONAL COMPUTER (PC) 7 1.2
DEVELOPMENT OF THE INTERNET 8 1.3 DEVELOPMENT OF THE WORLD WIDE WEB 10
1.4 THE EMERGENCE OF SOCIAL AND ETHICAL PROBLEMS IN COMPUTING 11 1.4.1
THE EMERGENCE OF COMPUTER CRIMES 11 1.4.2 THE PRESENT STATUS: AN UNEASY
CYBERSPACE 13 CONTENTS 1.5 THE CASE FOR COMPUTER ETHICS EDUCATION 14
1.5.1 WHAT IS COMPUTER ETHICS? 14 1.5.2 WHY YOU SHOULD STUDY COMPUTER
ETHICS 15 1.6 REFERENCES 17 1.7 EXERCISES 17 *** MORALITY AND THE LAW
2.1 INTRODUCTION 20 2.2 MORALITY 21 2.2.1 J MORAL THEORIES 21 2.2.2|
MORAL DECISION MAKING 22 2.2.3J MORAL CODES 23 2.2.4 1 MORAL STANDARD 26
2.2.3 GUILT AND CONSCIENCE 26 2.3 LAW 28 2.3.1 THE NATURAL LAW 29 2.3.2
CONVENTIONAL LAW 30 2.3.3 THE PURPOSE OF LAW 30 2.3.4 THEPENALCODE 31
2.4 MORALITY AND THE LAW 31 2.5 REFERENCES 34 2.6 FURTHER READING 35 2.7
EXERCISES 35 ETHICS, TECHNOLOGY, AND VALUE 3.1 TRADITIONAL DEFINITION OF
ETHICS 38 3.2 ETHICAL THEORIES 39 3.2.1 CONSEQUENTIALISM 39 3.2.2
DEONTOLOGY 40 3.2.3 HUMAN NATURE 41 3.2.4 RELATIVISM 41 CONTENTS 3.2.5
HEDONISM 41 3.2.6 EMOTIVISM 42 3.3 FUNCTIONAL DEFINITION OF ETHICS 43
3.4 CODES OF ETHICS 45 3.4.1 OBJECTIVES OF CODES OF ETHICS 57 3.5
REFLECTION ON COMPUTER ETHICS 57 3.5.1 NEW WINE IN AN OLD BOTTLE 57 3.6
TECHNOLOGY AND VALUE 60 3.7 REFERENCES 62 3.8 FURTHER READING 62 3.9
EXERCISES 63 * ** ZJ. ETHICS AND THE PROFESSIONS 4.1 INTRODUCTION 66 4.2
EVOLUTION OF PROFESSIONS 66 4.2.1 ORIGINS OF PROFESSIONS 66 4.2.2
REQUIREMENTS OF A PROFESSIONAL 67 4.2.3 PILLARS OF PROFESSIONALISM 69
4.3 THE MAKING OF AN ETHICAL PROFESSIONAL- EDUCATION AND LICENSING 74
4.3.1 FORMAL EDUCATION 75 4.3.2 LICENSING AUTHORITIES 76 4.3.3
PROFESSIONAL CODES OF CONDUCT 77 4.4 PROFESSIONAL DECISION MAKING AND
ETHICS 81 4.4.1 PROFESSIONAL DILEMMAS IN DECISION MAKING 82 4.4.2 MAKING
AND EVALUATING ETHICAL ARGUMENTS 84 4.4.3 GUILT AND MAKING ETHICAL
DECISIONS 86 4.5 PROFESSIONALISM AND ETHICAL RESPONSIBILITIES 88 4.5.1
WHISTLE-BLOWING 88 4.5.2 HARASSMENT AND DISCRIMINATION 92 4.5.3 ETHICAL
AND MORAL IMPLICATIONS 93 4.6 REFERENCES 94 4.7 FURTHER READING 95 4.8
EXERCISES 95 XVM CONTENTS * ** C ANONYMITY, SECURITY, 3 PRIVACY, AND
CIVIL LIBERTIES 5.1 INTRODUCTION 100 5.2 ANONYMITY 100 5.2.1 ANONYMITY
AND THE INTERNET 101 5.3 SECURITY 101 5.3.1 PHYSICAL SECURITY 102 5.3.2
INFORMATION SECURITY 104 5.4 PRIVACY 108 5.4.1 DEFINITION 108 5.4.2
VALUE OF PRIVACY 109 5.4.3 INFORMATION GATHERING, DATABASES, AND PRIVACY
110 5.4.4 PRIVACY VIOLATIONS AND LEGAL IMPLICATIONS 112 5.4.5 PRIVACY
PROTECTION AND CIVIL LIBERTIES 116 5.5 ETHICAL AND SOCIAL ISSUES 119
5.5.1 ETHICS AND PRIVACY 119 5.5.2 ETHICS AND SECURITY 120 5.6
REFERENCES 121 5.7 FURTHER READING 122 5.8 EXERCISES 122 ***
INTELLECTUAL PROPERTY RIGHTS O AND COMPUTER TECHNOLOGY 6.1 COMPUTER
PRODUCTS AND SERVICES 126 6.2 FOUNDATIONS OF INTELLECTUAL PROPERTY
RIGHTS 129 6.2.1 COPYRIGHTS 130 6.2.2 PATENTS 133 6.2.3 TRADE SECRETS
135 6.2.4 TRADEMARKS 137 6.2.5 PERSONAL IDENTITY 140 6.3 OWNERSHIP 142
6.3.1 THE POLITICS OF OWNERSHIP 142 6.3.2 THE PSYCHOLOGY OF OWNERSHIP
143 6.4 INFRINGEMENT 144 CONTENTS 6.4.1 COPYRIGHT INFRINGEMENT 144 6.4.2
PATENT INFRINGEMENT 145 6.4.3 TRADEMARK INFRINGEMENT 145 6.4.4 THE FIRST
SALE DOCTRINE 146 6.4.5 THE FAIR USE DOCTRINE 146 6.5 PROTECTION OF
OWNERSHIP RIGHTS 147 6.5.1 DOMAIN OF PROTECTION 147 6.5.2 SOURCE AND
TYPES OF PROTECTION 148 6.5.3 DURATION OF PROTECTION 148 6.5.4
STRATEGIES OF PROTECTION 148 6.6 THE LEGAL PROTECTION OF COMPUTER
SOFTWARE 149 6.6.1 PROTECTION UNDER COPYRIGHT LAWS 150 6.6.2 PROTECTION
UNDER PATENT LAWS 151 6.6.3 PROTECTION UNDER TRADEMARKS 152 6.6.4
PROTECTION UNDER TRADE SECRETS 152 6.7 REFERENCES 153 6.8 FURTHER
READING 154 6.9 EXERCISE 154 *** / SOCIAL CONTEXT OF COMPUTING 7.1
INTRODUCTION 158 7.2 THE DIGITAL DIVIDE 159 7.2.1 ACCESS 159 7.2.2
TECHNOLOGY 167 7.2.3 HUMANWARE (HUMAN CAPACITY) 170 7.2.4 INFRASTRUCTURE
171 7.2.5 ENABLING ENVIRONMENTS 171 7.3 ICT IN THE WORKPLACE 173 7.3.1
THE ELECTRONIC OFFICE 173 7.3.2 OFFICE ON WHEELS AND WINGS 174 7.3.3 THE
VIRTUAL WORKPLACE 175 7.3.4 THE HOME WORKER: A GROWING CONCEPT OF
TELECOMMUTERS 176 7.3.5 EMPLOYEE SOCIAL AND ETHICAL ISSUES 182 CONTENTS
10.6 FURTHER READING 279 10.7 EXERCISES 280 CYBERSPACE AND CYBERETH1CS
11.1 INTRODUCTION 284 11.2 CYBERSPACE SAFEGUARDS 285 11.2.1 DETECTING
COMPUTER ATTACKS 285 11.2.2 SYSTEM SURVIVABILITY 289 11.3 INTELLECTUAL
PROPERTY RIGHTS IN CYBERSPACE 290 11.3.1 COPYRIGHTS 294 11.3.2 PATENTS
295 11.3.3 TRADE SECRETS 296 11.3.4 TRADEMARKS 297 11.3.5 PERSONAL
IDENTITY 298 11.4 REGULATING AND CENSORING CYBERSPACE 299 11.5 THE
SOCIAL VALUE OF CYBERSPACE 303 1 1.6 PRIVACY IN CYBERSPACE 304 11.6.1
PRIVACY PROTECTION 306 11.7 CYBERSPACE SECURITY 306 11.7.1 INSECURITY IN
THE BASIC INTERNET INFRASTRUCTURE 306 11.7.2 SERVER SECURITY 307 11.7.3
SECURITY DURING TRANSMISSION 308 11.8 GLOBAL CYBER ETHICS 311 11.9
CYBERSPACE LINGUA FRANCA 311 11.10 GLOBAL CYBER CULTURE 314 11.11
CYBERETHICS AND SOCIAL REALITIES IN CYBERCOMMUNITIES 315 11.12 REFERENCE
S 318 11.13 FURTHER READING 319 11.14 EXERCISES 320 THE DIGITAL
MILLENNIUM COPYRIGHT ACT 323 CONTENTS THE FEDERAL FALSE CLAIMS ACT 337
*** I PROJECTS 363 INDEX 367 XX11 CONTENTS J 10.6 FURTHER READING 279
10.7 EXERCISES 280 CYBERSPACE AND CYBERETH1CS 11.1 INTRODUCTION 284 11.2
CYBERSPACE SAFEGUARDS 285 11.2.1 DETECTING COMPUTER ATTACKS 285 11.2.2
SYSTEM SURVIVABILITY 289 11.3 INTELLECTUAL PROPERTY RIGHTS IN CYBERSPACE
290 11.3.1 COPYRIGHTS 294 11.3.2 PATENTS 295 11.3.3 TRADE SECRETS 296
11.3.4 TRADEMARKS 297 11.3.5 PERSONAL IDENTITY 298 11.4 REGULATING AND
CENSORING CYBERSPACE 299 11.5 THE SOCIAL VALUE OF CYBERSPACE 303 11.6
PRIVACY IN CYBERSPACE 304 11.6.1 PRIVACY PROTECTION 306 1 1.7 CYBERSPACE
SECURITY 306 11.7.1 INSECURITY IN THE BASIC INTERNET INFRASTRUCTURE 306
11.7.2 SERVER SECURITY 307 11.7.3 SECURITY DURING TRANSMISSION 308 11.8
GLOBAL CYBER ETHICS 311 11.9 CYBERSPACE LINGUA FRANCA 311 11.10 GLOBAL
CYBER CULTURE 314 11.11 CYBERETHICS AND SOCIAL REALITIES IN
CYBERCOMMUNITIES 315 11.12 REFERENCES 318 11.13 FURTHER READING 319
11.14 EXERCISES 320 THE DIGITAL MILLENNIUM COPYRIGHT ACT 323 CONTENTS
XX111 THE FEDERAL FALSE CLAIMS ACT 337 PROJECTS 363 INDEX 367
|
adam_txt |
JOSEPH MIGGA KIZZA ETHICAL AND SOCIAL ISSUES THE INFORMATION AGE SECOND
EDITION WITH 8 ILLUSTRATIONS SPRINGER CONTENTS PREFACE TO THE SECOND
EDITION VLL PREFACE TO THE FIRST EDITION XIII 1 INTRODUCTION TO SOCIAL
AND ETHICAL COMPUTING 1.1 HISTORICAL DEVELOPMENT OF COMPUTING AND
INFORMATION TECHNOLOGY 1 1.1.1 BEFORE 1900 A.D 1 1.1.2 AFTER 1900 A.D 3
1.1.3 THE DEVELOPMENT OF THE MICROPROCESSOR 6 1.1.4 HISTORICAL
DEVELOPMENT OF COMPUTER SOFTWARE AND THE PERSONAL COMPUTER (PC) 7 1.2
DEVELOPMENT OF THE INTERNET 8 1.3 DEVELOPMENT OF THE WORLD WIDE WEB 10
1.4 THE EMERGENCE OF SOCIAL AND ETHICAL PROBLEMS IN COMPUTING 11 1.4.1
THE EMERGENCE OF COMPUTER CRIMES 11 1.4.2 THE PRESENT STATUS: AN UNEASY
CYBERSPACE 13 CONTENTS 1.5 THE CASE FOR COMPUTER ETHICS EDUCATION 14
1.5.1 WHAT IS COMPUTER ETHICS? 14 1.5.2 WHY YOU SHOULD STUDY COMPUTER
ETHICS 15 1.6 REFERENCES 17 1.7 EXERCISES 17 *** MORALITY AND THE LAW
2.1 INTRODUCTION 20 2.2 MORALITY 21 2.2.1 J MORAL THEORIES 21 2.2.2|
MORAL DECISION MAKING 22 2.2.3J MORAL CODES 23 2.2.4 1 MORAL STANDARD 26
2.2.3 GUILT AND CONSCIENCE 26 2.3 LAW 28 2.3.1 THE NATURAL LAW 29 2.3.2
CONVENTIONAL LAW 30 2.3.3 THE PURPOSE OF LAW 30 2.3.4 THEPENALCODE 31
2.4 MORALITY AND THE LAW 31 2.5 REFERENCES 34 2.6 FURTHER READING 35 2.7
EXERCISES 35 ETHICS, TECHNOLOGY, AND VALUE 3.1 TRADITIONAL DEFINITION OF
ETHICS 38 3.2 ETHICAL THEORIES 39 3.2.1 CONSEQUENTIALISM 39 3.2.2
DEONTOLOGY 40 3.2.3 HUMAN NATURE 41 3.2.4 RELATIVISM 41 CONTENTS 3.2.5
HEDONISM 41 3.2.6 EMOTIVISM 42 3.3 FUNCTIONAL DEFINITION OF ETHICS 43
3.4 CODES OF ETHICS 45 3.4.1 OBJECTIVES OF CODES OF ETHICS 57 3.5
REFLECTION ON COMPUTER ETHICS 57 3.5.1 NEW WINE IN AN OLD BOTTLE 57 3.6
TECHNOLOGY AND VALUE 60 3.7 REFERENCES 62 3.8 FURTHER READING 62 3.9
EXERCISES 63 * ** ZJ. ETHICS AND THE PROFESSIONS 4.1 INTRODUCTION 66 4.2
EVOLUTION OF PROFESSIONS 66 4.2.1 ORIGINS OF PROFESSIONS 66 4.2.2
REQUIREMENTS OF A PROFESSIONAL 67 4.2.3 PILLARS OF PROFESSIONALISM 69
4.3 THE MAKING OF AN ETHICAL PROFESSIONAL- EDUCATION AND LICENSING 74
4.3.1 FORMAL EDUCATION 75 4.3.2 LICENSING AUTHORITIES 76 4.3.3
PROFESSIONAL CODES OF CONDUCT 77 4.4 PROFESSIONAL DECISION MAKING AND
ETHICS 81 4.4.1 PROFESSIONAL DILEMMAS IN DECISION MAKING 82 4.4.2 MAKING
AND EVALUATING ETHICAL ARGUMENTS 84 4.4.3 GUILT AND MAKING ETHICAL
DECISIONS 86 4.5 PROFESSIONALISM AND ETHICAL RESPONSIBILITIES 88 4.5.1
WHISTLE-BLOWING 88 4.5.2 HARASSMENT AND DISCRIMINATION 92 4.5.3 ETHICAL
AND MORAL IMPLICATIONS 93 4.6 REFERENCES 94 4.7 FURTHER READING 95 4.8
EXERCISES 95 XVM CONTENTS * ** C ANONYMITY, SECURITY, 3 PRIVACY, AND
CIVIL LIBERTIES 5.1 INTRODUCTION 100 5.2 ANONYMITY 100 5.2.1 ANONYMITY
AND THE INTERNET 101 5.3 SECURITY 101 5.3.1 PHYSICAL SECURITY 102 5.3.2
INFORMATION SECURITY 104 5.4 PRIVACY 108 5.4.1 DEFINITION 108 5.4.2
VALUE OF PRIVACY 109 5.4.3 INFORMATION GATHERING, DATABASES, AND PRIVACY
110 5.4.4 PRIVACY VIOLATIONS AND LEGAL IMPLICATIONS 112 5.4.5 PRIVACY
PROTECTION AND CIVIL LIBERTIES 116 5.5 ETHICAL AND SOCIAL ISSUES 119
5.5.1 ETHICS AND PRIVACY 119 5.5.2 ETHICS AND SECURITY 120 5.6
REFERENCES 121 5.7 FURTHER READING 122 5.8 EXERCISES 122 ***
INTELLECTUAL PROPERTY RIGHTS O AND COMPUTER TECHNOLOGY 6.1 COMPUTER
PRODUCTS AND SERVICES 126 6.2 FOUNDATIONS OF INTELLECTUAL PROPERTY
RIGHTS 129 6.2.1 COPYRIGHTS 130 6.2.2 PATENTS 133 6.2.3 TRADE SECRETS
135 6.2.4 TRADEMARKS 137 6.2.5 PERSONAL IDENTITY 140 6.3 OWNERSHIP 142
6.3.1 THE POLITICS OF OWNERSHIP 142 6.3.2 THE PSYCHOLOGY OF OWNERSHIP
143 6.4 INFRINGEMENT 144 CONTENTS 6.4.1 COPYRIGHT INFRINGEMENT 144 6.4.2
PATENT INFRINGEMENT 145 6.4.3 TRADEMARK INFRINGEMENT 145 6.4.4 THE FIRST
SALE DOCTRINE 146 6.4.5 THE FAIR USE DOCTRINE 146 6.5 PROTECTION OF
OWNERSHIP RIGHTS 147 6.5.1 DOMAIN OF PROTECTION 147 6.5.2 SOURCE AND
TYPES OF PROTECTION 148 6.5.3 DURATION OF PROTECTION 148 6.5.4
STRATEGIES OF PROTECTION 148 6.6 THE LEGAL PROTECTION OF COMPUTER
SOFTWARE 149 6.6.1 PROTECTION UNDER COPYRIGHT LAWS 150 6.6.2 PROTECTION
UNDER PATENT LAWS 151 6.6.3 PROTECTION UNDER TRADEMARKS 152 6.6.4
PROTECTION UNDER TRADE SECRETS 152 6.7 REFERENCES 153 6.8 FURTHER
READING 154 6.9 EXERCISE 154 *** / SOCIAL CONTEXT OF COMPUTING 7.1
INTRODUCTION 158 7.2 THE DIGITAL DIVIDE 159 7.2.1 ACCESS 159 7.2.2
TECHNOLOGY 167 7.2.3 HUMANWARE (HUMAN CAPACITY) 170 7.2.4 INFRASTRUCTURE
171 7.2.5 ENABLING ENVIRONMENTS 171 7.3 ICT IN THE WORKPLACE 173 7.3.1
THE ELECTRONIC OFFICE 173 7.3.2 OFFICE ON WHEELS AND WINGS 174 7.3.3 THE
VIRTUAL WORKPLACE 175 7.3.4 THE HOME WORKER: A GROWING CONCEPT OF
TELECOMMUTERS 176 7.3.5 EMPLOYEE SOCIAL AND ETHICAL ISSUES 182 CONTENTS
10.6 FURTHER READING 279 10.7 EXERCISES 280 CYBERSPACE AND CYBERETH1CS
11.1 INTRODUCTION 284 11.2 CYBERSPACE SAFEGUARDS 285 11.2.1 DETECTING
COMPUTER ATTACKS 285 11.2.2 SYSTEM SURVIVABILITY 289 11.3 INTELLECTUAL
PROPERTY RIGHTS IN CYBERSPACE 290 11.3.1 COPYRIGHTS 294 11.3.2 PATENTS
295 11.3.3 TRADE SECRETS 296 11.3.4 TRADEMARKS 297 11.3.5 PERSONAL
IDENTITY 298 11.4 REGULATING AND CENSORING CYBERSPACE 299 11.5 THE
SOCIAL VALUE OF CYBERSPACE 303 1 1.6 PRIVACY IN CYBERSPACE 304 11.6.1
PRIVACY PROTECTION 306 11.7 CYBERSPACE SECURITY 306 11.7.1 INSECURITY IN
THE BASIC INTERNET INFRASTRUCTURE 306 11.7.2 SERVER SECURITY 307 11.7.3
SECURITY DURING TRANSMISSION 308 11.8 GLOBAL CYBER ETHICS 311 11.9
CYBERSPACE LINGUA FRANCA 311 11.10 GLOBAL CYBER CULTURE 314 11.11
CYBERETHICS AND SOCIAL REALITIES IN CYBERCOMMUNITIES 315 11.12 REFERENCE
S 318 11.13 FURTHER READING 319 11.14 EXERCISES 320 THE DIGITAL
MILLENNIUM COPYRIGHT ACT 323 CONTENTS THE FEDERAL FALSE CLAIMS ACT 337
*** I PROJECTS 363 INDEX 367 XX11 CONTENTS J\ 10.6 FURTHER READING 279
10.7 EXERCISES 280 CYBERSPACE AND CYBERETH1CS 11.1 INTRODUCTION 284 11.2
CYBERSPACE SAFEGUARDS 285 11.2.1 DETECTING COMPUTER ATTACKS 285 11.2.2
SYSTEM SURVIVABILITY 289 11.3 INTELLECTUAL PROPERTY RIGHTS IN CYBERSPACE
290 11.3.1 COPYRIGHTS 294 11.3.2 PATENTS 295 11.3.3 TRADE SECRETS 296
11.3.4 TRADEMARKS 297 11.3.5 PERSONAL IDENTITY 298 11.4 REGULATING AND
CENSORING CYBERSPACE 299 11.5 THE SOCIAL VALUE OF CYBERSPACE 303 11.6
PRIVACY IN CYBERSPACE 304 11.6.1 PRIVACY PROTECTION 306 1 1.7 CYBERSPACE
SECURITY 306 11.7.1 INSECURITY IN THE BASIC INTERNET INFRASTRUCTURE 306
11.7.2 SERVER SECURITY 307 11.7.3 SECURITY DURING TRANSMISSION 308 11.8
GLOBAL CYBER ETHICS 311 11.9 CYBERSPACE LINGUA FRANCA 311 11.10 GLOBAL
CYBER CULTURE 314 11.11 CYBERETHICS AND SOCIAL REALITIES IN
CYBERCOMMUNITIES 315 11.12 REFERENCES 318 11.13 FURTHER READING 319
11.14 EXERCISES 320 THE DIGITAL MILLENNIUM COPYRIGHT ACT 323 CONTENTS
XX111 THE FEDERAL FALSE CLAIMS ACT 337 PROJECTS 363 INDEX 367 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kizza, Joseph Migga 1950- |
author_GND | (DE-588)118069020 |
author_facet | Kizza, Joseph Migga 1950- |
author_role | aut |
author_sort | Kizza, Joseph Migga 1950- |
author_variant | j m k jm jmk |
building | Verbundindex |
bvnumber | BV020839408 |
callnumber-first | T - Technology |
callnumber-label | T58 |
callnumber-raw | T58.5 |
callnumber-search | T58.5 |
callnumber-sort | T 258.5 |
callnumber-subject | T - General Technology |
classification_rvk | AP 12900 SR 850 |
ctrlnum | (OCoLC)48906497 (DE-599)BVBBV020839408 |
dewey-full | 174/.90904 |
dewey-hundreds | 100 - Philosophy & psychology |
dewey-ones | 174 - Occupational ethics |
dewey-raw | 174/.90904 |
dewey-search | 174/.90904 |
dewey-sort | 3174 590904 |
dewey-tens | 170 - Ethics (Moral philosophy) |
discipline | Allgemeines Informatik Philosophie |
discipline_str_mv | Allgemeines Informatik Philosophie |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02060nam a2200553 c 4500</leader><controlfield tag="001">BV020839408</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20051130 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">051020s2003 gw ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">966382862</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">038795421X</subfield><subfield code="c">Pp. : EUR 53.45</subfield><subfield code="9">0-387-95421-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)48906497</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV020839408</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T58.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">174/.90904</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 12900</subfield><subfield code="0">(DE-625)6873:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kizza, Joseph Migga</subfield><subfield code="d">1950-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)118069020</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical and social issues in the information age</subfield><subfield code="c">Joseph Migga Kizza</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIII, 374 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Texts in computer science</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gesellschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Social aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014161310&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014161310</subfield></datafield></record></collection> |
id | DE-604.BV020839408 |
illustrated | Illustrated |
index_date | 2024-07-02T13:15:59Z |
indexdate | 2024-07-09T20:26:19Z |
institution | BVB |
isbn | 038795421X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014161310 |
oclc_num | 48906497 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-634 DE-11 |
owner_facet | DE-355 DE-BY-UBR DE-634 DE-11 |
physical | XXIII, 374 S. Ill., graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer |
record_format | marc |
series2 | Texts in computer science |
spelling | Kizza, Joseph Migga 1950- Verfasser (DE-588)118069020 aut Ethical and social issues in the information age Joseph Migga Kizza 2. ed. New York [u.a.] Springer 2003 XXIII, 374 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Texts in computer science Literaturangaben Ethik Gesellschaft Computers and civilization Computers Moral and ethical aspects Information technology Moral and ethical aspects Information technology Social aspects Informationstechnik (DE-588)4026926-7 gnd rswk-swf Ethik (DE-588)4015602-3 gnd rswk-swf Soziologie (DE-588)4077624-4 gnd rswk-swf Informationstechnik (DE-588)4026926-7 s Soziologie (DE-588)4077624-4 s DE-604 Ethik (DE-588)4015602-3 s HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014161310&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kizza, Joseph Migga 1950- Ethical and social issues in the information age Ethik Gesellschaft Computers and civilization Computers Moral and ethical aspects Information technology Moral and ethical aspects Information technology Social aspects Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd Soziologie (DE-588)4077624-4 gnd |
subject_GND | (DE-588)4026926-7 (DE-588)4015602-3 (DE-588)4077624-4 |
title | Ethical and social issues in the information age |
title_auth | Ethical and social issues in the information age |
title_exact_search | Ethical and social issues in the information age |
title_exact_search_txtP | Ethical and social issues in the information age |
title_full | Ethical and social issues in the information age Joseph Migga Kizza |
title_fullStr | Ethical and social issues in the information age Joseph Migga Kizza |
title_full_unstemmed | Ethical and social issues in the information age Joseph Migga Kizza |
title_short | Ethical and social issues in the information age |
title_sort | ethical and social issues in the information age |
topic | Ethik Gesellschaft Computers and civilization Computers Moral and ethical aspects Information technology Moral and ethical aspects Information technology Social aspects Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd Soziologie (DE-588)4077624-4 gnd |
topic_facet | Ethik Gesellschaft Computers and civilization Computers Moral and ethical aspects Information technology Moral and ethical aspects Information technology Social aspects Informationstechnik Soziologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014161310&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kizzajosephmigga ethicalandsocialissuesintheinformationage |