Ethical and social issues in the information age:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
Springer
2010
|
Ausgabe: | 4. ed. |
Schriftenreihe: | Texts in Computer Science
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVII, 335 S. Ill. |
ISBN: | 9781849960373 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV025599970 | ||
003 | DE-604 | ||
005 | 20100818 | ||
007 | t | ||
008 | 100417s2010 a||| |||| 00||| eng d | ||
016 | 7 | |a 99743340X |2 DE-101 | |
020 | |a 9781849960373 |9 978-1-84996-037-3 | ||
035 | |a (OCoLC)699646791 | ||
035 | |a (DE-599)BVBBV025599970 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
084 | |a CC 7260 |0 (DE-625)17677: |2 rvk | ||
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Kizza, Joseph Migga |d 1950- |e Verfasser |0 (DE-588)118069020 |4 aut | |
245 | 1 | 0 | |a Ethical and social issues in the information age |c Joseph Migga Kizza |
250 | |a 4. ed. | ||
264 | 1 | |a London |b Springer |c 2010 | |
300 | |a XVII, 335 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Texts in Computer Science | |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ethik |0 (DE-588)4015602-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziologie |0 (DE-588)4077624-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Soziologie |0 (DE-588)4077624-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 1 | 1 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020195509&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020195509 |
Datensatz im Suchindex
_version_ | 1810996510730485760 |
---|---|
adam_text |
CONTENTS 1 HISTORY OF COMPUTING 1 1.1 HISTORICAL DEVELOPMENT OF
COMPUTING AND INFORMATION TECHNOLOGY 1 1.1.1 BEFORE AD 1900 1 1.1.2
AFTER AD 1900 2 1.1.3 THE DEVELOPMENT OF THE MICROPROCESSOR 5 1.1.4
HISTORICAL DEVELOPMENT OF COMPUTER SOFTWARE AND THE PERSONAL COMPUTER
(PC) 5 1.2 DEVELOPMENT OF THE INTERNET 6 1.3 DEVELOPMENT OF THE WORLD
WIDE WEB 7 1.4 THE EMERGENCE OF SOCIAL AND ETHICAL PROBLEMS IN COMPUTING
8 1.4.1 THE EMERGENCE OF COMPUTER CRIMES 8 1.4.2 THE PRESENT STATUS: AN
UNEASY CYBERSPACE 9 1.5 THE CASE FOR COMPUTER ETHICS EDUCATION 11 1.5.1
WHAT IS COMPUTER ETHICS? 11 1.5.2 WHY YOU SHOULD STUDY COMPUTER ETHICS
11 REFERENCES 12 2 MORALITY AND THE LAW 15 2.1 INTRODUCTION 16 2.2
MORALITY 17 2.2.1 MORAL THEORIES 18 2.2.2 MORAL DECISION MAKING 18 2.2.3
MORAL CODES 19 2.2.4 MORAL STANDARDS 21 2.2.5 GUILT AND CONSCIENCE 22
2.2.6 MORALITY AND RELIGION 23 2.3 LAW 23 2.3.1 THE NATURAL LAW 24 2.3.2
CONVENTIONAL LAW 25 2.3.3 THE PURPOSE OF LAW 25 2.3.4 THE PENAL CODE 26
2.4 MORALITY AND THE LAW 26 2.4.1 ISSUES FOR DISCUSSION 28 2.5 MORALITY,
ETIQUETTES AND MANNERS 28 2.5.1 ISSUES FOR DISCUSSION 29 REFERENCES 29
FURTHER READINGS 30 3 ETHICS AND ETHICAL ANALYSIS 31 3.1 TRADITIONAL
DEFINITION 33 3.2 ETHICAL THEORIES 33 3.2.1 CONSEQUENTIALISM 34 3.2.2
DEONTOLOGY 34 3.2.3 HUMAN NATURE 35 3.2.4 RELATIVISM 35 3.2.5 HEDONISM
35 3.2.6 EMOTIVISM 35 3.3 FUNCTIONAL DEFINITION OF ETHICS 37 3.4 ETHICAL
REASONING AND DECISION MAKING 38 3.4.1 A FRAMEWORK FOR ETHICAL DECISION
MAKING 39 3.4.2 MAKING AND EVALUATING ETHICAL ARGUMENTS 39 3.5 CODES OF
ETHICS 41 3.5.1 OBJECTIVES OF CODES OF ETHICS 49 3.6 REFLECTIONS ON
COMPUTER ETHICS 50 3.6.1 NEW WINE IN AN OLD BOTTLE 50 3.7 TECHNOLOGY AND
VALUES 52 REFERENCES 54 FURTHER READING 54 4 ETHICS AND THE PROFESSIONS
55 4.1 INTRODUCTION 56 4.2 EVOLUTION OF PROFESSIONS 56 4.2.1 ORIGINS OF
PROFESSIONS 56 4.2.2 REQUIREMENTS OF A PROFESSIONAL 57 4.2.3 PILLARS OF
PROFESSIONALISM 59 4.3 THE MAKING OF AN ETHICAL PROFESSIONAL: EDUCATION
AND LICENSING 63 4.3.1 FORMAL EDUCATION 63 4.3.2 LICENSING AUTHORITIES
64 4.3.3 PROFESSIONAL CODES OF CONDUCT 65 4.4 PROFESSIONAL DECISION
MAKING AND ETHICS 68 4.4.1 PROFESSIONAL DILEMMA IN DECISION MAKING 68
4.4.2 GUILT AND MAKING ETHICAL DECISIONS 70 4.5 PROFESSIONALISM AND
ETHICAL RESPONSIBILITIES 71 4.5.1 WHISTLE-BLOWING 71 4.5.2 HARASSMENT
AND DISCRIMINATION 74 4.5.3 ETHICAL AND MORAL IMPLICATIONS 75 REFERENCES
76 FURTHER READINGS 77 ANONYMITY, SECURITY, PRIVACY, AND CIVIL LIBERTIES
79 5.1 INTRODUCTION 81 5.2 ANONYMITY 82 5.2.1 ANONYMITY AND THE INTERNET
82 5.2.2 ADVANTAGES AND DISADVANTAGES OF ANONYMITY 83 5.2.3 LEGAL VIEW
OF ANONYMITY 83 5.3 SECURITY 84 5.3.1 PHYSICAL SECURITY 84 5.3.2
PHYSICAL ACCESS CONTROLS 85 5.3.3 INFORMATION SECURITY CONTROLS 86 5.3.4
OPERATIONAL SECURITY 89 5.4 PRIVACY 90 5.4.1 DEFINITION 90 5.4.2 TYPES
OF PRIVACY 90 5.4.3 VALUE OF PRIVACY 91 5.4.4 PRIVACY IMPLICATIONS OF
DATABASE SYSTEMS 93 5.4.5 PRIVACY VIOLATIONS AND LEGAL IMPLICATIONS 94
5.4.6 PRIVACY PROTECTION AND CIVIL LIBERTIES 97 5.5 ETHICAL AND
LEGAL^FRAMEWORK FOR INFORMATION 99 5.5.1 ETHICS AND PRIVACY 99 5.5.2
ETHICAL AND LEGAL BASIS FOR PRIVACY PROTECTION 100 REFERENCES 101
FURTHER READINGS 101 INTELLECTUAL PROPERTY RIGHTS AND COMPUTER
TECHNOLOGY 103 6.1 DEFINITIONS 103 6.2 COMPUTER PRODUCTS AND SERVICES
104 6.3 FOUNDATIONS OF INTELLECTUAL PROPERTY 106 6.3.1 COPYRIGHTS 107
6.3.2 PATENTS 109 6.3.3 TRADE SECRETS ILL 6.3.4 TRADEMARKS 113 6.3.5
PERSONAL IDENTITY 115 6.4 OWNERSHIP 116 6.4.1 THE POLITICS OF OWNERSHIP
117 6.4.2 THE PSYCHOLOGY OF OWNERSHIP 117 6.5 INTELLECTUAL PROPERTY
CRIMES 118 6.5.1 INFRINGEMENT 118 6.5.2 THE FIRST SALE DOCTRINE 119
6.5.3 THE FAIR USE DOCTRINE 120 6.6 PROTECTION OF OWNERSHIP RIGHTS 120
6.6.1 DOMAIN OF PROTECTION 120 6.6.2 SOURCE AND TYPES OF PROTECTION 121
6.6.3 DURATION OF PROTECTION 122 6.6.4 STRATEGIES OF PROTECTION 122 6.7
PROTECTING COMPUTER SOFTWARE UNDER THE IP 122 6.7.1 SOFTWARE PIRACY 123
6.7.2 PROTECTION OF SOFTWARE UNDER COPYRIGHT LAWS 123 6.7.3 PROTECTION
OF SOFTWARE UNDER PATENT LAWS 124 6.7.4 PROTECTION OF SOFTWARE UNDER
TRADEMARKS 125 6.7.5 PROTECTION OF SOFTWARE UNDER TRADE SECRETS 125 6.8
TRANSNATIONAL ISSUES AND INTELLECTUAL PROPERTY 126 REFERENCES 127
FURTHER READINGS 128 SOCIAL CONTEXT OF COMPUTING 129 7.1 INTRODUCTION
130 7.2 THE DIGITAL DIVIDE 130 7.2.1 ACCESS 131 7.2.2 TECHNOLOGY 135
7.2.3 HUMANWARE (HUMAN CAPACITY) 137 7.2.4 INFRASTRUCTURE 138 7.2.5
ENABLING ENVIRONMENTS 139 7.3 ICT IN THE WORKPLACE 140 7.3.1 THE
ELECTRONIC OFFICE 140 7.3.2 OFFICE ON WHEELS AND WINGS 141 7.3.3 THE
VIRTUAL WORKPLACE * 141 7.3.4 THE HOME WORKER: A GROWING CONCEPT OF
TELECOMMUTERS 142 7.3.5 EMPLOYEE SOCIAL AND ETHICAL ISSUES 147 7.4
EMPLOYEE MONITORING 147 7.4.1 WORKPLACE PRIVACY AND SURVEILLANCE 149
7.4.2 ELECTRONIC MONITORING 151 7.5 WORKPLACE EMPLOYEE HEALTH AND
PRODUCTIVITY 154 7.5.1 ERGONOMICS 154 REFERENCES 157 FURTHER READINGS
158 SOFTWARE ISSUES: RISKS AND LIABILITIES 159 8.1 DEFINITIONS 160 8.1.1
STANDARDS 160 8.1.2 RELIABILITY 161 8.1.3 SECURITY 162 8.1.4 SAFETY 162
8.1.5 QUALITY 163 8.1.6 QUALITY OF SERVICE 164 8.2 CAUSES OF SOFTWARE
FAILURES 164 8.2.1 HUMAN FACTORS 164 8.2.2 NATURE OF SOFTWARE:
COMPLEXITY 165 8.3 RISK 165 8.3.1 RISK ASSESSMENT AND MANAGEMENT 166
8.3.2 RISKS AND HAZARDS IN WORKPLACE SYSTEMS 168 8.3.3 HISTORIC EXAMPLES
OF SOFTWARE RISKS 169 8.4 CONSUMER PROTECTION 175 8.4.1 BUYERS' RIGHTS
175 8.4.2 CLASSIFICATION OF COMPUTER SOFTWARE 177 8.4.3 THE CONTRACT
OPTION 179 8.4.4 THE TORT OPTION 181 8.5 IMPROVING SOFTWARE QUALITY 183
8.5.1 TECHNIQUES FOR IMPROVING SOFTWARE QUALITY 183 8.6 PRODUCER
PROTECTION 184 REFERENCES 185 FURTHER READINGS 186 9 COMPUTER CRIMES 187
9.1 INTRODUCTION 188 9.2 HISTORY OF COMPUTER CRIMES 189 9.3 COMPUTER
SYSTEMS: TYPES OF ATTACKS 191 9.3.1 PENETRATION 191 9.3.2 DENIAL OF
SERVICE 192 9.4 MOTIVES OF ATTACKS 193 9.5 COSTS AND SOCIAL CONSEQUENCES
195 9.5.1 LACK OF COST ESTIMATE MODEL FOR CYBERSPACE ATTACKS 197 9.5.2
SOCIAL AND ETHICAL CONSEQUENCES 200 9.6 COMPUTER CRIME PREVENTION
STRATEGIES 201 9.6.1 PROTECTING YOUR COMPUTER 201 9.6.2 THE COMPUTER
CRIMINAL 202 9.6.3 THE INNOCENT VICTIM 203 REFERENCES 204 FURTHER
READINGS 205 10 NEW FRONTIERS FOR COMPUTER ETHICS 207 10.1 INTRODUCTION
208 10.2 ARTIFICIAL INTELLIGENCE 208 10.2.1 ADVANCES IN ARTIFICIAL
INTELLIGENCE 209 10.2.2 ARTIFICIAL INTELLIGENCE AND ETHICS 211 10.2.3
THE FUTURE ROLE OF AUTONOMOUS AGENTS 213 10.3 CYBERSPACE 214 10.4
VIRTUAL REALITY 214 10.4.1 ETHICS IN VIRTUAL REALITY 216 REFERENCES 218
FURTHER READINGS 219 11 CYBERSPACE, CYBERETHICS, AND SOCIAL NETWORKING
221 11.1 INTRODUCTION 222 11.2 CYBERSPACE SAFEGUARDS 222 11.2.1
DETECTING COMPUTER ATTACKS 223 11.2.2 SYSTEM SURVIVABILITY 225 11.3
INTELLECTUAL PROPERTY RIGHTS IN CYBERSPACE 226 11.3.1 COPYRIGHTS 229
11.3.2 PATENTS 230 11.3.3 TRADE SECRETS 230 11.3.4 TRADEMARKS 231 11.3.5
PERSONAL IDENTITY 232 11.4 REGULATING AND CENSORING CYBERSPACE 233 11.5
THE SOCIAL VALUE OF CYBERSPACE 236 11.6 PRIVACY IN CYBERSPACE 236 11.6.1
PRIVACY PROTECTION 238 11.7 ONLINE SOCIAL NETWORKS 238 11.7.1 THE GROWTH
OF ONLINE SOCIAL NETWORKS 238 11.7.2 SOCIAL NETWORKING TYPES 238 11.7.3
SECURITY AND PRIVACY IN SOCIAL NETWORKS 239 11.8 GLOBAL CYBERETHICS 241
11.9 CYBERSPACE LINGUA FRANCA 242 11.10 GLOBAL CYBER CULTURE 243
REFERENCES 245 FURTHER READINGS 246 12 COMPUTER NETWORKS AND ONLINE
CRIMES 247 12.1 INTRODUCTION TO COMPUTER NETWORKS 247 12.1.1 COMPUTER
NETWORK MODELS 247 12.1.2 COMPUTER NETWORK TYPES 249 12.2 ONLINE CRIMES
251 12.2.1 BEWARE OF WAYS TO PERPETUATE ONLINE CRIMES 252 12.3 DEFENSE
AGAINST ONLINE CRIMES 254 12.3.1 PREVENTION 254 12.4 PROVEN SECURITY
PROTOCOLS AND BEST PRACTICES 259 12.4.1 AUTHENTICATION 259 12.4.2 ACCESS
CONTROL 260 12.4.3 LEGISLATION 260 12.4.4 SELF-REGULATION 260 12.4.5
DETECTION 261 12.4.6 RECOVERY 261 REFERENCES 261 13 COMPUTER CRIME
INVESTIGATIONS - COMPUTER FORENSICS 263 13.1 INTRODUCTION 263 13.2
DIGITAL EVIDENCE 264 13.2.1 LOOKING FOR DIGITAL EVIDENCE 264 13.2.2
DIGITAL EVIDENCE: PREVIEWING AND ACQUISITION 265 13.3 PRESERVING
EVIDENCE 267 13.4 ANALYSIS OF DIGITAL EVIDENCE 268 13.4.1 ANALYZING DATA
FILES 269 13.4.2 ANALYSIS BASED ON OPERATING SYSTEMS 270 13.4.3 ANALYSIS
BASED ON DIGITAL MEDIA 271 13.5 RELEVANCE AND VALIDITY OF DIGITAL
EVIDENCE 274 13.6 WRITING INVESTIGATIVE REPORTS 274 REFERENCES 276 14
BIOMETRICS 277 14.1 INTRODUCTION AND DEFINITIONS 277 14.1.1 DEFINITIONS
278 14.2 THE BIOMETRICS AUTHENTICATION PROCESS 279 14.3 BIOMETRIC SYSTEM
COMPONENTS 280 14.3.1 DATA ACQUISITION 280 14.3.2 ENROLLMENTS 280 14.3.3
SIGNAL PROCESSING 281 14.3.4 DECISION POLICY 281 14.4 TYPES OF BIOMETRIC
TECHNOLOGIES 281 14.4.1 FINGER BIOMETRICS 281 14.4.2 HAND GEOMETRY 284
14.4.3 FACE BIOMETRICS 284 14.4.4 VOICE BIOMETRICS 285 14.4.5
HANDWRITING ANALYSIS 286 14.4.6 IRIS BIOMETRICS 286 14.4.7 RETINA 287
14.5 THE FUTURE OF BIOMETRICS 287 REFERENCES 289 APPENDICES 291 INDEX
329 |
any_adam_object | 1 |
author | Kizza, Joseph Migga 1950- |
author_GND | (DE-588)118069020 |
author_facet | Kizza, Joseph Migga 1950- |
author_role | aut |
author_sort | Kizza, Joseph Migga 1950- |
author_variant | j m k jm jmk |
building | Verbundindex |
bvnumber | BV025599970 |
classification_rvk | CC 7260 SR 850 |
ctrlnum | (OCoLC)699646791 (DE-599)BVBBV025599970 |
discipline | Informatik Philosophie |
edition | 4. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV025599970</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100818</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100417s2010 a||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">99743340X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849960373</subfield><subfield code="9">978-1-84996-037-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)699646791</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV025599970</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">CC 7260</subfield><subfield code="0">(DE-625)17677:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kizza, Joseph Migga</subfield><subfield code="d">1950-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)118069020</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical and social issues in the information age</subfield><subfield code="c">Joseph Migga Kizza</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 335 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Texts in Computer Science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020195509&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020195509</subfield></datafield></record></collection> |
id | DE-604.BV025599970 |
illustrated | Illustrated |
indexdate | 2024-09-23T14:14:17Z |
institution | BVB |
isbn | 9781849960373 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020195509 |
oclc_num | 699646791 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | XVII, 335 S. Ill. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series2 | Texts in Computer Science |
spelling | Kizza, Joseph Migga 1950- Verfasser (DE-588)118069020 aut Ethical and social issues in the information age Joseph Migga Kizza 4. ed. London Springer 2010 XVII, 335 S. Ill. txt rdacontent n rdamedia nc rdacarrier Texts in Computer Science Informationstechnik (DE-588)4026926-7 gnd rswk-swf Ethik (DE-588)4015602-3 gnd rswk-swf Soziologie (DE-588)4077624-4 gnd rswk-swf Informationstechnik (DE-588)4026926-7 s Soziologie (DE-588)4077624-4 s DE-604 Ethik (DE-588)4015602-3 s SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020195509&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kizza, Joseph Migga 1950- Ethical and social issues in the information age Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd Soziologie (DE-588)4077624-4 gnd |
subject_GND | (DE-588)4026926-7 (DE-588)4015602-3 (DE-588)4077624-4 |
title | Ethical and social issues in the information age |
title_auth | Ethical and social issues in the information age |
title_exact_search | Ethical and social issues in the information age |
title_full | Ethical and social issues in the information age Joseph Migga Kizza |
title_fullStr | Ethical and social issues in the information age Joseph Migga Kizza |
title_full_unstemmed | Ethical and social issues in the information age Joseph Migga Kizza |
title_short | Ethical and social issues in the information age |
title_sort | ethical and social issues in the information age |
topic | Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd Soziologie (DE-588)4077624-4 gnd |
topic_facet | Informationstechnik Ethik Soziologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020195509&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kizzajosephmigga ethicalandsocialissuesintheinformationage |