Encyclopedia of information ethics and security:
"This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a usefu...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA [u.a.]
Information Science Reference
2008
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher. |
Beschreibung: | Topics address a wide range of life areas affected by computer technology, including: education, the workplace, health, privacy, intellectual property, identity, computer crime, cyber terrorism, equity and access, banking, shopping, publishing, legal and political issues, censorship, artificial intelligence, the environment, communication. Includes bibliographical references and index -- "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher. |
Beschreibung: | XVII, 661, 8 S. Ill., graph. Darst., Kt. |
ISBN: | 9781591409878 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022375729 | ||
003 | DE-604 | ||
005 | 20080117 | ||
007 | t | ||
008 | 070403s2008 xxuabd| |||| 00||| eng d | ||
010 | |a 2007007277 | ||
020 | |a 9781591409878 |9 978-1-59140-987-8 | ||
035 | |a (OCoLC)85444168 | ||
035 | |a (DE-599)BVBBV022375729 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-473 |a DE-384 |a DE-M382 | ||
050 | 0 | |a HM851 | |
082 | 0 | |a 174/.900403 | |
084 | |a CC 7100 |0 (DE-625)17671: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Encyclopedia of information ethics and security |c Marian Quigley |
246 | 1 | 3 | |a Information ethics and security |
264 | 1 | |a Hershey, PA [u.a.] |b Information Science Reference |c 2008 | |
300 | |a XVII, 661, 8 S. |b Ill., graph. Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Topics address a wide range of life areas affected by computer technology, including: education, the workplace, health, privacy, intellectual property, identity, computer crime, cyber terrorism, equity and access, banking, shopping, publishing, legal and political issues, censorship, artificial intelligence, the environment, communication. | ||
500 | |a Includes bibliographical references and index -- "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher. | ||
520 | 3 | |a "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher. | |
650 | 4 | |a Criminalité informatique - Encyclopédies | |
650 | 4 | |a Réseaux d'information - Sécurité - Mesures - Encyclopédies | |
650 | 4 | |a Sécurité informatique - Encyclopédies | |
650 | 4 | |a Technologie de l'information - Aspect moral - Encyclopédies | |
650 | 4 | |a Technologie de l'information - Aspect social - Encyclopédies | |
650 | 4 | |a Ethik | |
650 | 4 | |a Gesellschaft | |
650 | 4 | |a Information technology |x Social aspects |v Encyclopedias | |
650 | 4 | |a Information technology |x Moral and ethical aspects |v Encyclopedias | |
650 | 4 | |a Computer crimes |v Encyclopedias | |
650 | 4 | |a Computer security |v Encyclopedias | |
650 | 4 | |a Information networks |x Security measures |v Encyclopedias | |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ethik |0 (DE-588)4015602-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 1 | 1 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Quigley, Marian |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015584807&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-015584807 |
Datensatz im Suchindex
_version_ | 1811011506821660672 |
---|---|
adam_text |
Contents
3D
and Mark Power
Access Control for Healthcare
Advertising in the Networked Environment
Anonymous Peer-to-Peer Systems/ WenbingZhao
Argumentation and Computing
Argumentation with Wigmore Charts and Computing
Artificial Intelligence Tools for Handling Legal Evidence
Barriers Facing African American Women in Technology
Deneen Sherrod, and Wei-Chieh Yu
B-POS Secure Mobile Payment System I Antonio
Building Secure and Dependable Information Systems/ Wenbing Zhao
Classifying Articles in Information Ethics and Security
and Thomas E. Marshall
Computational Ethics I Alicia I. Ruvinsky
Computer Ethics and Intelligent Technologies
Computer Worms, Detection, and Defense
Conflicting Value of Digital Music Piracy
Content Filtering Methods for Internet Pornography I Jengchung V. Chen andShaoYu F. Huang
Cyber-Terrorism in Australia/ Christopher Beggs
Data Security and Chase
Defending against Distributed Denial of Service/ Yang Xiang and Wanlei Zhou
Digital Divide Implications and Trends I Irene Chen and Terry T. Kidd
Digital Rights Management Metadata and Standards I Jo Anne Cote and Eun G. Park
Dilemmas of Online Identity Theft/ Omer Mahmood
Document Security in the Ancient World
DRM Practices in the E-Publication Industry
Educational Technology Practitioner-Research Ethics I Kathleen Gray
Е
Electronic Signatures and Ethics/A Srivastava and S. B. Thomson
Engineering Multi-Agent Systems
Ethical Approach to Gathering Survey Data Online
Ethical Behaviour in Technology-Mediated Communication I Sutirtha Chatterjee
Ethical Concerns in Computer Science Projects I Alistair Irons and Roger Boyle
Ethical Debate Surrounding RFID The
Susan
Ethical Dilemmas in Data Mining and Warehousing/ Joseph
Ethical Erosion at Enron/ John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee
Ethical Usability Testing with Children
Ethics and Access to Technology for Persons with Disabilities
Ethics and Perceptions in Online Learning Environments I Michelle M. Ramim
Ethics and Security under the Sarbanes-Oxley Act
Ethics Education for the Online Environment
Ethics in Software Engineering
Ethics in the Security of Organizational Information Systems I Sushma Mishra
andAmita Goyal Chin
Ethics of
Fair Use
Federal Information Security Law
Formulating a Code of Cyberethics for a Municipality
Hackers and Cyber Terrorists
Homo Electricus and the Continued Speciation of Humans
IT Security Culture Transition Process
ICT Leapfrogging Policy and Development in the Third World /Amanda Third and Kai-Ti
Identity Verification using Resting State Brain Signals
and
Individual and Institutional Responses to Staff Plagiarism
Information Ethics as Ideology
Information Ethics from an Islamic Perspective
Information Security and the "Privacy Broker"
Information Security Policies for Networkable Devices /Julia
and Corey
Information Security Policy Research Agenda
Internet and Suicide I Dianne Currier
Internet Piracy and Copyright Debates
Internet Research Ethics Questions and Considerations
Interviews with Young People using Online Chat
Intrusion Detection and Information Security Audits
Investigation Strategy for the Small Pedophiles World
Managed Services and Changing Workplace Ethics I Alan Sixsmith
Managing the Environmental Impact of Information Technology
Measuring Ethical Reasoning of IT Professionals and Students
and Jane Fedorowicz
Meta
Mitigation of Identity Theft in the Information Age
and Allen
Mobile Agents and Security I FeiXue
Modelling Context-Aware Security for Electronic Health Records
Moral Rights in the Australian Public Sector
Multimodal
Objective Ethics for Managing Information Technology I John R. Drake
Parental Rights to Monitor Internet Usage
Patient Centric Healthcare Information Systems in the U.S. I Nilmini Wickramasinghe
Pedagogical Framework for Ethical Development
Terry Countermine, Qing Yuan,
Personal Information Ethics
Pharming Attack Designs
Port Scans
Privacy and Access to Electronic Health Records
and Jocelyn Handy
Privacy and Online Data Collection
Privacy in Data Mining Textbooks I James Lawler and John C. Molluzzo
Protection of Mobile Agent Data
Rule-Based Policies for Secured Defense Meetings
Secure Agent Roaming under M-Commerce
Secure Automated Clearing House Transactions
Security Dilemmas for Canada's New Government
Security Model for Educational Satellite Networks
Security of Communication and Quantum Technology
Security Protection for Critical Infrastructure
Spyware
Sustainable Information Society
Taxonomy of Computer and Information Ethics I SabahS. Al-Fedaghi
Tools for Representing and Processing Narratives I
Traditional Knowledge and Intellectual Property
Universal Internet Access under an Ethical Lens |
adam_txt |
Contents
3D
and Mark Power
Access Control for Healthcare
Advertising in the Networked Environment
Anonymous Peer-to-Peer Systems/ WenbingZhao
Argumentation and Computing
Argumentation with Wigmore Charts and Computing
Artificial Intelligence Tools for Handling Legal Evidence
Barriers Facing African American Women in Technology
Deneen Sherrod, and Wei-Chieh Yu
B-POS Secure Mobile Payment System I Antonio
Building Secure and Dependable Information Systems/ Wenbing Zhao
Classifying Articles in Information Ethics and Security
and Thomas E. Marshall
Computational Ethics I Alicia I. Ruvinsky
Computer Ethics and Intelligent Technologies
Computer Worms, Detection, and Defense
Conflicting Value of Digital Music Piracy
Content Filtering Methods for Internet Pornography I Jengchung V. Chen andShaoYu F. Huang
Cyber-Terrorism in Australia/ Christopher Beggs
Data Security and Chase
Defending against Distributed Denial of Service/ Yang Xiang and Wanlei Zhou
Digital Divide Implications and Trends I Irene Chen and Terry T. Kidd
Digital Rights Management Metadata and Standards I Jo Anne Cote and Eun G. Park
Dilemmas of Online Identity Theft/ Omer Mahmood
Document Security in the Ancient World
DRM Practices in the E-Publication Industry
Educational Technology Practitioner-Research Ethics I Kathleen Gray
Е
Electronic Signatures and Ethics/A Srivastava and S. B. Thomson
Engineering Multi-Agent Systems
Ethical Approach to Gathering Survey Data Online
Ethical Behaviour in Technology-Mediated Communication I Sutirtha Chatterjee
Ethical Concerns in Computer Science Projects I Alistair Irons and Roger Boyle
Ethical Debate Surrounding RFID The
Susan
Ethical Dilemmas in Data Mining and Warehousing/ Joseph
Ethical Erosion at Enron/ John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee
Ethical Usability Testing with Children
Ethics and Access to Technology for Persons with Disabilities
Ethics and Perceptions in Online Learning Environments I Michelle M. Ramim
Ethics and Security under the Sarbanes-Oxley Act
Ethics Education for the Online Environment
Ethics in Software Engineering
Ethics in the Security of Organizational Information Systems I Sushma Mishra
andAmita Goyal Chin
Ethics of
Fair Use
Federal Information Security Law
Formulating a Code of Cyberethics for a Municipality
Hackers and Cyber Terrorists
Homo Electricus and the Continued Speciation of Humans
IT Security Culture Transition Process
ICT Leapfrogging Policy and Development in the Third World /Amanda Third and Kai-Ti
Identity Verification using Resting State Brain Signals
and
Individual and Institutional Responses to Staff Plagiarism
Information Ethics as Ideology
Information Ethics from an Islamic Perspective
Information Security and the "Privacy Broker"
Information Security Policies for Networkable Devices /Julia
and Corey
Information Security Policy Research Agenda
Internet and Suicide I Dianne Currier
Internet Piracy and Copyright Debates
Internet Research Ethics Questions and Considerations
Interviews with Young People using Online Chat
Intrusion Detection and Information Security Audits
Investigation Strategy for the Small Pedophiles World
Managed Services and Changing Workplace Ethics I Alan Sixsmith
Managing the Environmental Impact of Information Technology
Measuring Ethical Reasoning of IT Professionals and Students
and Jane Fedorowicz
Meta
Mitigation of Identity Theft in the Information Age
and Allen
Mobile Agents and Security I FeiXue
Modelling Context-Aware Security for Electronic Health Records
Moral Rights in the Australian Public Sector
Multimodal
Objective Ethics for Managing Information Technology I John R. Drake
Parental Rights to Monitor Internet Usage
Patient Centric Healthcare Information Systems in the U.S. I Nilmini Wickramasinghe
Pedagogical Framework for Ethical Development
Terry Countermine, Qing Yuan,
Personal Information Ethics
Pharming Attack Designs
Port Scans
Privacy and Access to Electronic Health Records
and Jocelyn Handy
Privacy and Online Data Collection
Privacy in Data Mining Textbooks I James Lawler and John C. Molluzzo
Protection of Mobile Agent Data
Rule-Based Policies for Secured Defense Meetings
Secure Agent Roaming under M-Commerce
Secure Automated Clearing House Transactions
Security Dilemmas for Canada's New Government
Security Model for Educational Satellite Networks
Security of Communication and Quantum Technology
Security Protection for Critical Infrastructure
Spyware
Sustainable Information Society
Taxonomy of Computer and Information Ethics I SabahS. Al-Fedaghi
Tools for Representing and Processing Narratives I
Traditional Knowledge and Intellectual Property
Universal Internet Access under an Ethical Lens |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV022375729 |
callnumber-first | H - Social Science |
callnumber-label | HM851 |
callnumber-raw | HM851 |
callnumber-search | HM851 |
callnumber-sort | HM 3851 |
callnumber-subject | HM - Sociology |
classification_rvk | CC 7100 ST 277 |
ctrlnum | (OCoLC)85444168 (DE-599)BVBBV022375729 |
dewey-full | 174/.900403 |
dewey-hundreds | 100 - Philosophy & psychology |
dewey-ones | 174 - Occupational ethics |
dewey-raw | 174/.900403 |
dewey-search | 174/.900403 |
dewey-sort | 3174 6900403 |
dewey-tens | 170 - Ethics (Moral philosophy) |
discipline | Informatik Philosophie |
discipline_str_mv | Informatik Philosophie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV022375729</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080117</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070403s2008 xxuabd| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007007277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781591409878</subfield><subfield code="9">978-1-59140-987-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85444168</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022375729</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M382</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HM851</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">174/.900403</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">CC 7100</subfield><subfield code="0">(DE-625)17671:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Encyclopedia of information ethics and security</subfield><subfield code="c">Marian Quigley</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Information ethics and security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA [u.a.]</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 661, 8 S.</subfield><subfield code="b">Ill., graph. Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Topics address a wide range of life areas affected by computer technology, including: education, the workplace, health, privacy, intellectual property, identity, computer crime, cyber terrorism, equity and access, banking, shopping, publishing, legal and political issues, censorship, artificial intelligence, the environment, communication.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index -- "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique - Encyclopédies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'information - Sécurité - Mesures - Encyclopédies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Encyclopédies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information - Aspect moral - Encyclopédies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information - Aspect social - Encyclopédies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gesellschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Social aspects</subfield><subfield code="v">Encyclopedias</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Moral and ethical aspects</subfield><subfield code="v">Encyclopedias</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="v">Encyclopedias</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Encyclopedias</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Encyclopedias</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Quigley, Marian</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015584807&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015584807</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV022375729 |
illustrated | Illustrated |
index_date | 2024-07-02T17:09:10Z |
indexdate | 2024-09-23T18:12:40Z |
institution | BVB |
isbn | 9781591409878 |
language | English |
lccn | 2007007277 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015584807 |
oclc_num | 85444168 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG DE-384 DE-M382 |
owner_facet | DE-12 DE-473 DE-BY-UBG DE-384 DE-M382 |
physical | XVII, 661, 8 S. Ill., graph. Darst., Kt. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Information Science Reference |
record_format | marc |
spelling | Encyclopedia of information ethics and security Marian Quigley Information ethics and security Hershey, PA [u.a.] Information Science Reference 2008 XVII, 661, 8 S. Ill., graph. Darst., Kt. txt rdacontent n rdamedia nc rdacarrier Topics address a wide range of life areas affected by computer technology, including: education, the workplace, health, privacy, intellectual property, identity, computer crime, cyber terrorism, equity and access, banking, shopping, publishing, legal and political issues, censorship, artificial intelligence, the environment, communication. Includes bibliographical references and index -- "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher. "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher. Criminalité informatique - Encyclopédies Réseaux d'information - Sécurité - Mesures - Encyclopédies Sécurité informatique - Encyclopédies Technologie de l'information - Aspect moral - Encyclopédies Technologie de l'information - Aspect social - Encyclopédies Ethik Gesellschaft Information technology Social aspects Encyclopedias Information technology Moral and ethical aspects Encyclopedias Computer crimes Encyclopedias Computer security Encyclopedias Information networks Security measures Encyclopedias Informationstechnik (DE-588)4026926-7 gnd rswk-swf Ethik (DE-588)4015602-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Informationstechnik (DE-588)4026926-7 s Computersicherheit (DE-588)4274324-2 s DE-604 Ethik (DE-588)4015602-3 s Quigley, Marian Sonstige oth Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015584807&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Encyclopedia of information ethics and security Criminalité informatique - Encyclopédies Réseaux d'information - Sécurité - Mesures - Encyclopédies Sécurité informatique - Encyclopédies Technologie de l'information - Aspect moral - Encyclopédies Technologie de l'information - Aspect social - Encyclopédies Ethik Gesellschaft Information technology Social aspects Encyclopedias Information technology Moral and ethical aspects Encyclopedias Computer crimes Encyclopedias Computer security Encyclopedias Information networks Security measures Encyclopedias Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4026926-7 (DE-588)4015602-3 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Encyclopedia of information ethics and security |
title_alt | Information ethics and security |
title_auth | Encyclopedia of information ethics and security |
title_exact_search | Encyclopedia of information ethics and security |
title_exact_search_txtP | Encyclopedia of information ethics and security |
title_full | Encyclopedia of information ethics and security Marian Quigley |
title_fullStr | Encyclopedia of information ethics and security Marian Quigley |
title_full_unstemmed | Encyclopedia of information ethics and security Marian Quigley |
title_short | Encyclopedia of information ethics and security |
title_sort | encyclopedia of information ethics and security |
topic | Criminalité informatique - Encyclopédies Réseaux d'information - Sécurité - Mesures - Encyclopédies Sécurité informatique - Encyclopédies Technologie de l'information - Aspect moral - Encyclopédies Technologie de l'information - Aspect social - Encyclopédies Ethik Gesellschaft Information technology Social aspects Encyclopedias Information technology Moral and ethical aspects Encyclopedias Computer crimes Encyclopedias Computer security Encyclopedias Information networks Security measures Encyclopedias Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Criminalité informatique - Encyclopédies Réseaux d'information - Sécurité - Mesures - Encyclopédies Sécurité informatique - Encyclopédies Technologie de l'information - Aspect moral - Encyclopédies Technologie de l'information - Aspect social - Encyclopédies Ethik Gesellschaft Information technology Social aspects Encyclopedias Information technology Moral and ethical aspects Encyclopedias Computer crimes Encyclopedias Computer security Encyclopedias Information networks Security measures Encyclopedias Informationstechnik Computersicherheit Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015584807&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT quigleymarian encyclopediaofinformationethicsandsecurity AT quigleymarian informationethicsandsecurity |