ICT ethics and security in the 21st century: new developments and applications
"This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a usefu...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA
Information Science Reference
2011
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher. |
Beschreibung: | "This book examines a range of major issues concerning ICT ethics and security in the 21st century and provides perspectives on contemporary ethical and security issues from leading international scholars"--Provided by publisher. Includes bibliographical references and index |
Beschreibung: | XX, 355 S. graph. Darst. |
ISBN: | 9781609605735 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV037488374 | ||
003 | DE-604 | ||
005 | 20111103 | ||
007 | t | ||
008 | 110622s2011 xxud||| |||| 00||| eng d | ||
010 | |a 2010040621 | ||
020 | |a 9781609605735 |9 978-1-60960-573-5 | ||
035 | |a (OCoLC)734088482 | ||
035 | |a (DE-599)BVBBV037488374 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a T58.5 | |
082 | 0 | |a 303.48/33 | |
245 | 1 | 0 | |a ICT ethics and security in the 21st century |b new developments and applications |c [ed. by ] Marian Quigley |
264 | 1 | |a Hershey, PA |b Information Science Reference |c 2011 | |
300 | |a XX, 355 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "This book examines a range of major issues concerning ICT ethics and security in the 21st century and provides perspectives on contemporary ethical and security issues from leading international scholars"--Provided by publisher. | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher. | |
650 | 4 | |a Ethik | |
650 | 4 | |a Gesellschaft | |
650 | 4 | |a Information technology |x Moral and ethical aspects | |
650 | 4 | |a Information technology |x Social aspects | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Ethik |0 (DE-588)4015602-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 1 | 1 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Quigley, Marian |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-60960-574-2 |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022639771&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-022639771 |
Datensatz im Suchindex
_version_ | 1804145802383196160 |
---|---|
adam_text | Titel: ICT ethics and security in the 21st century
Autor: Quigley, Marian
Jahr: 2011
Detailed Table of Contents
Foreword.............................................................................................................................................xiii
Preface..................................................................................................................................................xv
Acknowledgment.................................................................................................................................xx
Section 1
Online Ethics
The chapters in this section primarily focus on ethical issues concerning the use of the Internet. These
include: the establishment of trust in virtual communities, the education of students in using social
networking systems, and personal information and its security on these systems. The last chapter in this
section focuses on copyright issues concerning the digital media reporting of Australian sport.
Chapter 1
Understanding Trust in Virtual Communities: Revisited........................................................................1
Qing Zou, McGill University, Canada
Eun G. Park, McGill University, Canada
Trust is an essential component in interpersonal and commercial relationships. The anonymity and lack
of physical presence which characterize online communication within virtual communities may impede
or compromise the establishment of trust between parties. Consequently, the authors argue for the need
for increased research into the nature of trust and trust building.
Chapter 2
Social Networks and Students Ethical Behavior.................................................................................27
Lori N. K. Leonard, University of Tulsa, USA
Tracy S. Manly, University of Tulsa, USA
The impersonal nature of the Internet may alter young people s ethical behaviour, promoting their over
provision of personal information or their inappropriate behaviour or conversations. Focusing primarily
on college students, the authors emphasise the need for their education concerning the proper use of
social networking systems. They propose that such an education should be founded upon four classical
ethical theories: utilitarianism, distributive justice, rights theory, and virtue ethics.
Chapter 3
The Ethics of Security of Personal Information upon Facebook..........................................................46
Shona Leitch, Deakin University, Australia
Matthew Warren, Deakin University, Australia
With a particular focus on the social networking site, Facebook, this chapter examines the ethical issues
associated with personal information and its security. Following a discussion of a number of examples
of breaches of security, the authors propose a model that evaluates Facebook security and risks. They
conclude that the potential for identity theft and unethical behaviour on Facebook is often greater than
on other social networking sites.
Chapter 4
Copyright and Ethical Issues in Emerging Models for the Digital Media Reporting of Sports
News in Australia..................................................................................................................................66
Mary Wyburn, University of Sydney, Australia
This chapter is concerned with copyright and ethical issues arising from the digital media reporting of
sports news. Although the chapter focuses on the conflict between sports and media organization in
Australia, it has wider, international implications. Following on from issues raised at a 2009 Senate
enquiry, the author highlights the need for amendments to the copyright law or the establishment of an
industry code of conduct.
Section 2
Ethical Concerns in the Handling and Delivery of Health and Safety Information
This section focuses on the problems and possible solutions concerning the electronic management and
exchange of patient health information using ICT, as well as the difficulty of access to health information
by the public in underdeveloped countries. The last chapter in this section uses an Australian case
study to highlight the socio-ethical concerns regarding the use of mobile applications in emergency
management.
Chapter 5
The Protocols of Privileged Information Handling in an Ehealth Context: Australia..........................87
Juanita Fernando, Medicine, Nursing Health Sciences, Monash University, Australia
The author utilizes two case studies to highlight the problems associated with the implementation of
an e-health system in Australia. These include time-poor clinicians, the complexity of legal health
privacy frameworks, budgetary constraints, fragmentation, computer demands and disciplinary silos.
The author claims that the resulting avoidance techniques by e-health clinicians are linked to adverse
patient health outcomes.
Chapter 6
The Changing World of ICT and Health: Crossing the Digital Divide...............................................111
Prqjesh Chhanabhai, University qfOtago, New Zealand
Alec Holt, University ofOtago, New Zealand
The authors argue that whilst the heath consumer in developed nations have been empowered by the
growth of technology and the resulting increased access to health information, those in underdeveloped
countries may have become further disadvantaged. Consequently, the gap between information-rich and
information- poor may have widened. The chapter examines the range of communication techniques
used by developing countries, suggesting that mobile phones may offer a better solution than a sole
reliance on the Internet.
Chapter 7
The Socio-Ethical Considerations Surrounding Government Mandated Location-Based
Services during Emergencies: An Australian Case Study...................................................................129
Anas Aloudat, University of Wollongong, Australia
Katina Michael, University of Wollongong, Australia
This chapter focuses on the management of the 2009 Victorian bushfires in Australia. Despite the
Australian government s utilization of mobile applications including mobile alerts and location
services, 173 deaths resulted. The authors emphasise the potential for breaches in privacy, security
and trust inherent in the use of these technologies, arguing that these need to be addressed prior to the
widespread adoption of these services.
Section 3
Ethics and Security in Organisations
Chapters in this section deal with security methods for critical infrastructures and organizations and
the ethical nature of these security choices. Ethical codes of behaviour within organizations are also
examined.
Chapter 8
Monitoring Employee Actions in the Workplace: Good Business Practice or Unethical
Behaviour?..........................................................................................................................................156
Cliona McParland, Dublin City University, Ireland
Regina Connolly, Dublin City University, Ireland
The ethical impact of electronic monitoring in the workplace is examined in this chapter. Managers
motivations for undertaking surveillance of its employees are discussed and employees concerns about
privacy are examined. The authors note that while European laws favour the rights of the employee, no
hierarchy of privacy or ethical concerns has yet been established.
Chapter 9
Policy and Issues in Deploying Automated Plagiarism Detection Systems in Academic
Communities: A Case Study of VeriGuide..........................................................................................172
Chi Hong Cheong, The Chinese University of Hong Kong, Hong Kong
Tak Pang Lau, The Chinese University of Hong Kong, Hong Kong
Irwin King, The Chinese University of Hong Kong, Hong Kong
This chapter discusses the growing problem of student plagiarism within universities which has
accompanied the rise of the Internet. It examines the policy and issues encountered by the Chinese
University of Hong Kong in its implementation of the automated plagiarism detection system, Veriguide.
The authors conclude that student education should accompany any technological system adopted to
combat plagiarism.
Chapter 10
Security Technologies and Policies in Organisations ........................................................................196
NickolasJ. G. Falkner, The University of Adelaide, Australia
The author proposes a hybrid ethical approach to the establishment of a code of ethics for organizations.
Teleological, deontological and virtue-oriented aspects of the ethics associated with ICT security policy
are discussed in order to provide a theoretical basis for such a code. The chapter also provides a set of
case studies and general rules as an ethical basis for security policies.
Chapter 11
Critical Infrastructure Protection: An Ethical Choice.........................................................................214
Graeme Pye, Deakin University, Australia
Matthew Warren, Deakin University, Australia
William Hutchinson, Edith Cowan University, Australia
This chapter investigates the ethical choices associated with the management of threats to critical
infrastructure systems during times of disaster. It utilizes the example of the protection of the security
of a water supply infrastructure and the case study of an Australian community threatened by bushfire.
Chapter 12
Effective Infrastructure Protection through Virtualization.................................................................231
Dennis C. Guster, St. Cloud State University, USA
Olivia F.Lee, St. Cloud State University, USA
The chapter examines the protection of computer infrastructure in the face of a range of disasters
including natural disaster, equipment failure and security breaches. The authors argue that the
virtualization of hosts offers a better means of protection for computer infrastructure which, as well as
being easier to manage, can be easily restored following a natural disaster.
Chapter 13
Firewall Rulebase Management: Tools and Techniques.....................................................................254
Michael J. Chappie, University of Notre Dame, USA
Aaron Striegel, University of Notre Dame, USA
Charles R. Crowell, University of Notre Dame, USA
The authors focus on the firewall-one of the foundational network components for modern day computer
security-and the need to maintain its maximum security effectiveness in the face of changing security
threats and enterprise application needs. They provide a general model for the auditing and analysis of
installed firewalls and insight for the proactive identification of rules with a high likelihood of becoming
orphaned in the future.
Chapter 14
Integration of COBIT, Balanced Scorecard and SSE-CMM as an Organizational
Strategic Information Security Management (ISM) Framework........................................................277
James E. Goldman, Purdue University, USA
Suchit Ahuja, Purdue University, USA
The authors propose an organizational security strategy which involves the integration of a number of
popular approaches: COBIT, Balanced Scorecard and CMM. They argue that this will provide a more
comprehensive evaluation instrument that better aligns the business with its IT and information security
strategies.
Compilation of References...............................................................................................................310
About the Contributors....................................................................................................................343
Index...................................................................................................................................................350
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV037488374 |
callnumber-first | T - Technology |
callnumber-label | T58 |
callnumber-raw | T58.5 |
callnumber-search | T58.5 |
callnumber-sort | T 258.5 |
callnumber-subject | T - General Technology |
ctrlnum | (OCoLC)734088482 (DE-599)BVBBV037488374 |
dewey-full | 303.48/33 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.48/33 |
dewey-search | 303.48/33 |
dewey-sort | 3303.48 233 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02675nam a2200553zc 4500</leader><controlfield tag="001">BV037488374</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111103 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110622s2011 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2010040621</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781609605735</subfield><subfield code="9">978-1-60960-573-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)734088482</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV037488374</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T58.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.48/33</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">ICT ethics and security in the 21st century</subfield><subfield code="b">new developments and applications</subfield><subfield code="c">[ed. by ] Marian Quigley</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 355 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book examines a range of major issues concerning ICT ethics and security in the 21st century and provides perspectives on contemporary ethical and security issues from leading international scholars"--Provided by publisher.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gesellschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Social aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Quigley, Marian</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-60960-574-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022639771&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-022639771</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV037488374 |
illustrated | Illustrated |
indexdate | 2024-07-09T23:25:14Z |
institution | BVB |
isbn | 9781609605735 |
language | English |
lccn | 2010040621 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-022639771 |
oclc_num | 734088482 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XX, 355 S. graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Information Science Reference |
record_format | marc |
spelling | ICT ethics and security in the 21st century new developments and applications [ed. by ] Marian Quigley Hershey, PA Information Science Reference 2011 XX, 355 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier "This book examines a range of major issues concerning ICT ethics and security in the 21st century and provides perspectives on contemporary ethical and security issues from leading international scholars"--Provided by publisher. Includes bibliographical references and index "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher. Ethik Gesellschaft Information technology Moral and ethical aspects Information technology Social aspects Information technology Security measures Computer security Ethik (DE-588)4015602-3 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Informationstechnik (DE-588)4026926-7 s Computersicherheit (DE-588)4274324-2 s DE-604 Ethik (DE-588)4015602-3 s Quigley, Marian Sonstige oth Erscheint auch als Online-Ausgabe 978-1-60960-574-2 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022639771&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | ICT ethics and security in the 21st century new developments and applications Ethik Gesellschaft Information technology Moral and ethical aspects Information technology Social aspects Information technology Security measures Computer security Ethik (DE-588)4015602-3 gnd Informationstechnik (DE-588)4026926-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4015602-3 (DE-588)4026926-7 (DE-588)4274324-2 (DE-588)4143413-4 |
title | ICT ethics and security in the 21st century new developments and applications |
title_auth | ICT ethics and security in the 21st century new developments and applications |
title_exact_search | ICT ethics and security in the 21st century new developments and applications |
title_full | ICT ethics and security in the 21st century new developments and applications [ed. by ] Marian Quigley |
title_fullStr | ICT ethics and security in the 21st century new developments and applications [ed. by ] Marian Quigley |
title_full_unstemmed | ICT ethics and security in the 21st century new developments and applications [ed. by ] Marian Quigley |
title_short | ICT ethics and security in the 21st century |
title_sort | ict ethics and security in the 21st century new developments and applications |
title_sub | new developments and applications |
topic | Ethik Gesellschaft Information technology Moral and ethical aspects Information technology Social aspects Information technology Security measures Computer security Ethik (DE-588)4015602-3 gnd Informationstechnik (DE-588)4026926-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Ethik Gesellschaft Information technology Moral and ethical aspects Information technology Social aspects Information technology Security measures Computer security Informationstechnik Computersicherheit Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022639771&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT quigleymarian ictethicsandsecurityinthe21stcenturynewdevelopmentsandapplications |