Ethical and social issues in the information age:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
Springer
2013
|
Ausgabe: | 5. ed. |
Schriftenreihe: | Texts in Computer Science
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVIII, 372 S. Ill., graph. Darst. |
ISBN: | 9781447149897 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041203118 | ||
003 | DE-604 | ||
005 | 20151109 | ||
007 | t | ||
008 | 130805s2013 ad|| |||| 00||| eng d | ||
020 | |a 9781447149897 |9 978-1-447-14989-7 | ||
035 | |a (OCoLC)846999001 | ||
035 | |a (DE-599)BSZ382021053 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-M382 |a DE-355 | ||
084 | |a AP 12900 |0 (DE-625)6873: |2 rvk | ||
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
100 | 1 | |a Kizza, Joseph Migga |d 1950- |e Verfasser |0 (DE-588)118069020 |4 aut | |
245 | 1 | 0 | |a Ethical and social issues in the information age |c Joseph Migga Kizza |
250 | |a 5. ed. | ||
264 | 1 | |a London |b Springer |c 2013 | |
300 | |a XVIII, 372 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Texts in Computer Science | |
650 | 4 | |a Informatik | |
650 | 4 | |a Philosophie | |
650 | 4 | |a Sozialwissenschaften | |
650 | 4 | |a Computer science | |
650 | 4 | |a Technology / Philosophy | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Social sciences | |
650 | 4 | |a Computer Science | |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziologie |0 (DE-588)4077624-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ethik |0 (DE-588)4015602-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Soziologie |0 (DE-588)4077624-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 1 | 1 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Ethical and Social Issues in the Information Age |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026177965&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026177965 |
Datensatz im Suchindex
_version_ | 1804150630664634368 |
---|---|
adam_text | 1 History of Computing............................................... 1
1.1 Historical Development of Computing and Information
Technology.................................................... 1
1.1.1 Before AD 1900..................................... 1
1.1.2 After AD 1900...................................... 2
1.1.3 The Development of the Microprocessor.................. 5
1.1.4 Historical Development of Computer Software
and the Personal Computer (PC)......................... 5
1.2 Development of the Internet................................ 6
1.3 Development of the World Wide Web.......................... 7
1.4 The Emergence of Social and Ethical Problems in Computing. 8
1.4.1 The Emergence of Computer Crimes..................... 8
1.4.2 The Present Status: An Uneasy Cyberspace............. 9
1.5 The Case for Computer Ethics Education.................... 10
1.5.1 What Is Computer Ethics?............................ 10
1.5.2 Why You Should Study Computer Ethics................ 10
References...................................................... 12
2 Morality and the Law............................................ 13
2.1 Introduction.............................................. 14
2.2 Morality......................*........................... 15
2.2.1 Moral Theories.............................—........ 16
2.2.2 Moral Decision Making............................... 16
2.2.3 Moral Codes.......................................... 17
2.2.4 Moral Standards..................................... 19
2.2.5 Guilt and Conscience.............................. 19
2.2.6 Morality and Religion.............................. 21
2.3 Law....................................................... 21
2.3.1 The Natural Law................................... 21
2.3.2 Conventional Law................................. 22
2.3.3 The Purpose of Law.................................... 23
2.3.4 The Penal Code.................................. 23
2.3.5 Morality and the Law................................ 23
2.3.6 Issues for Discussion............................. 25
xi
xii Contents
2.4 Morality, Etiquettes, and Manners............................. 25
2.4.1 Issues for Discussion ................................ 26
References......................................................... 27
Further Reading.................................................... 27
3 Ethics and Ethical Analysis........................................ 29
3.1 Traditional Definition........................................... 30
3.2 Ethical Theories.............................................. 31
3.2.1 Consequentialism...................................... 31
3.2.2 Deontology............................................... 32
3.2.3 Human Nature............................................. 32
3.2.4 Relativism............................................ 33
3.2.5 Hedonism.............................................. 33
3.2.6 Emotivism.............................................. 33
3.3 Functional Definition of Ethics.................................. 34
3.4 Ethical Reasoning and Decision Making............................ 36
3.4.1 A Framework for Ethical Decision Making.................. 36
3.4.2 Making and Evaluating Ethical Arguments.................. 37
3.5 Codes of Ethics............................................... 38
3.5.1 Preamble............................................... 39
3.5.2 Objectives of Codes of Ethics.......................... 46
3.6 Reflections on Computer Ethics................................. 47
3.6.1 New Wine in an Old Bottle............................ 47
3.7 Technology and Values ........................................... 49
References......................................................... 51
Further Reading ................................................... 51
4 Ethics and the Professions............................................ 53
4.1 Introduction............................................. 54
4.2 Evolution of Professions......................................... 54
4.2.1 Origins of Professions.................................. 54
4.2.2 Requirements of a Professional......................... 55
4.2.3 Pillars of Professionalism............................... 57
4.3 The Making of an Ethical Professional: Education
and Licensing............................................. 60
4.3.1 Formal Education...................................... 61
4.3.2 Licensing Authorities.................................. 62
4.3.3 Professional Codes of Conduct............................ 63
4.4 Professional Decision Making and Ethics.......................... 65
4.4.1 Professional Dilemma in Decision Making.................. 65
4.4.2 Guilt and Making Ethical Decisions....................... 67
4.5 Professionalism and Ethical Responsibilities.................. 68
4.5.1 Whistle-Blowing..................................... 69
4.5.2 Harassment and Discrimination.......................... 71
4.5.3 Ethical and Moral Implications........................... 72
References....................................................... 73
Further Reading................................................... 74
Contents
xiii
5 Anonymity, Security, Privacy, and Civil Liberties................... 75
5.1 Introduction.................,................................ 77
5.2 Anonymity..................................................... 78
5.2.1 Anonymity and the Internet................................ 78
5.2.2 Advantages and Disadvantages of Anonymity................. 79
5.2.3 Legal View of Anonymity................................... 79
5.3 Security....................................................... 80
5.3.1 Physical Security..................................... 80
5.3.2 Physical Access Controls.................................. 81
5.3.3 Information Security Controls......................... 82
5.3.4 Operational Security.................................... 85
5.4 Privacy........................................................ 85
5.4.1 Definition......................................... 85
5.4.2 Types of Privacy.................................... 86
5.4.3 Value of Privacy.......................................... 87
5.4.4 Privacy Implications of Database System................... 88
5.4.5 Privacy Violations and Legal Implications................. 89
5.4.6 Privacy Protection and Civil Liberties.................. 92
5.5 Ethical and Legal Framework for Information...................... 94
5.5.1 Ethics and Privacy....................................... 94
5.5.2 Ethical and Legal Basis lor Privacy
Protection................................................ 95
References......................................................... 96
Further Reading.................................................... 96
6 Intellectual Property Rights and Computer Technology................ 97
6.1 Definitions.................................................. 98
6.2 Computer Products and Services................................... 98
6.3 Foundations of Intellectual Property.......................... 100
6.3.1 Copyrights............................................. 101
6.3.2 Patents.............................................. 103
6.3.3 Trade Secrets........................................ 105
6.3.4 Trademarks............................................. 106
6.3.5 Personal Identity........................................ 108
6.4 Ownership.................................................... 109
6.4.1 The Politics of Ownership.............................. 110
6.4.2 The Psychology of Ownership............................ 1 11
6.5 Intellectual Property Crimes.................................. 111
6.5.1 Infringement....................................... Ill
6.5.2 The First Sale Doctrine............................. 113
6.5.3 The Fair Use Doctrine.................................. 113
6.6 Protection of Ownership Rights................................ 113
6.6.1 Domain of Protection................................... 114
6.6.2 Source and Types of Protection......................... 1 14
6.6.3 Duration of Protection............................... 115
6.6.4 Strategies of Protection............................... 115
XIV
Contents
6.7 Protecting Computer Software Under the IP .................... 115
6.7.1 Software Piracy.......................................... 116
6.7.2 Protection of Software Under Copyright Laws............ 116
6.7.3 Protection of Software Under Patent Laws............... 117
6.7.4 Protection of Software Under Trademarks................ 118
6.7.5 Protection of Software Under Trade Secrets............. 118
6.8 Transnational Issues and Intellectual Property................. 119
References......................................................... 120
Further Reading.................................................... 121
7 Social Context of Computing.......................................... 123
7.1 Introduction................................................. 124
7.2 The Digital Divide............................................ 124
7.2.1 Access................................................. 125
7.2.2 Technology.............................................. 133
7.2.3 Humanware (Human Capacity)............................. 135
7.2.4 Infrastructure......................................... 136
7.2.5 Enabling Environments................................... 136
7.3 Obstacles to Overcoming the Digital Divide ................... 137
7.4 ICT in the Workplace.......................................... 138
7.4.1 The Electronic Office.................................. 138
7.4.2 Office on Wheels and Wings............................... 139
7.4.3 The Virtual Workplace.............................. 139
7.4.4 The Quiet Revolution: The Growth of Telecommuting...... 140
7.4.5 Employee Social and Ethical Issues..................... 144
7.5 Employee Monitoring............................................. 145
7.5.1 Workplace Privacy and Surveillance..................... 146
7.5.2 Electronic Monitoring.................................... 148
7.6 Workplace, Employee, Health, and Productivity................. 151
7.6.1 Ergonomics............................................. 152
References..................................................... 154
Further Reading.................................................... 156
8 Software Issues: Risks and Liabilities............................. 157
8.1 Definitions............................................... 158
8.1.1 Standards................................................ 158
8.1.2 Reliability.......................................... 159
8.1.3 Security............................................... 160
8.1.4 Safety........................................... 160
8.1.5 Quality.............................................. 161
8.1.6 Quality of Service.................................... 1.61
8.2 Causes of Software Failures.................................. 162
8.2.1 Human Factors.......................................... 162
8.2.2 Nature of Software: Complexity......................... 163
8.3 Risk......................................................... 163
8.3.1 Risk Assessment and Management......................... 164
Contents
XV
8.3.2 Risks and Hazards in Workplace Systems................ 165
8.3.3 Historic Examples of Software Risks................... 166
8.4 Consumer Protection........................................... 172
8.4.1 Buyers’Rights......................................... 173
8.4.2 Classification of Computer Software................... 174
8.4.3 The Contract Option.................................. 176
8.4.4 The Tort Option..................................... 178
8.5 Improving Software Quality................................... 180
8.5.1 Techniques for Improving Software Quality............. 180
8.6 Producer Protection......................................... 181
References........................................................ 182
Further Reading............................................... 182
9 Computer Crimes.................................................... 183
9.1 Introduction................................................. 184
9.2 History of Computer Crimes................................ 185
9.3 Types of Computer System Attacks.............................. 187
9.3.1 Penetration........................................... 187
9.3.2 Denial of Service................................... 188
9.4 Motives of Computer Crimes................................ 189
9.5 Costs and Social Consequences................................ 191
9.5.1 Lack of Cost Estimate Model for Cyberspace Attacks... 193
9.5.2 Social and Ethical Consequences....................... 194
9.6 Computer Crime Prevention Strategies.......................... 195
9.6.1 Protecting Your Computer............................. 195
9.6.2 The Computer Criminal................................. 197
9.6.3 The Innocent Victim.................................. 197
References...................................................... 198
Further Reading................................................. 199
10 New Frontiers for Computer Ethics:
Artificial Intelligence............................................ 201
10.1 Introduction................................................ 202
10.2 Artificial Intelligence....................................... 203
10.2.1 Advances in Artificial Intelligence................... 203
10.2.2 Artificial Intelligence and Ethics.................... 205
10.2.3 The Future Role of Autonomous Agents.................. 207
References...................................................... 209
Further Reading................................................... 210
11 New Frontiers for Computer Ethics:
Virtualization and Virtual Reality............................... 211
11.1 Virtualization...................................-........... 211
11.2 Different Aspects of Virtualization........................ 212
11.3 Virtualization of Computing Resources....................... 212
11.3.1 History of Computing Virtualization................. 213
XVI
Contents
11.3.2 Computing Virtualization Terminologies................ 213
11.3.3 Types of Computing System Virtualization............. 215
11.3.4 The Benefits of Computing Virtualization............. 218
11.4 Virtual Reality.............................................. 220
11.4.1 Different Types of Virtual Reality................... 222
11.4.2 Virtualization and Ethics............................ 223
11.5 Social and Ethical Implication of Virtualization.............. 225
11.6 Virtualization Security as an Ethical Imperative.............. 225
11.6.1 Hypervisor Security................................. 226
11.6.2 Securing Communications Between Desktop
and Virtual Environment............................... 226
11.6.3 Security of Communication Between Virtual
Environments.......................................... 227
11.6.4 Threats and Vulnerabilities Originating from
a Virtual Environment............................... 227
References.......................................................... 228
12 New Frontiers for Computer Ethics: Cyberspace...................... 231
12.1 Introduction................................................ 232
12.2 Cyberspace and the Concepts of Telepresence and Immersion... 233
12.3 Securing Cyberspace...................................... 234
12.3.1 Detecting Attacks in Cyberspace....................... 234
12.3.2 Cyberspace Systems Survivability...................... 236
12.4 Intellectual Property Rights in Cyberspace .................. 237
12.4.1 Copyrights......................................... 240
12.4.2 Patents............................................... 241
12.4.3 Trade Secrets........................................ 241
12.4.4 Trademarks.......................................... 242
12.4.5 Personal Identity..................................... 243
12.5 Regulating and Censoring Cyberspace.......................... 244
12.6 The Social Value of Cyberspace........................... 246
12.7 Privacy in Cyberspace........................................ 247
12.7.1 Privacy Protection................................. 248
12.8 Global Cyberethics......................................... 248
12.9 Cyberspace Lingua Franca..................................... 249
12.10 Global Cyber Culture....................................... 250
References........................................................ 252
Further Reading................................................... 253
13 Ethical, Privacy, and Security Issues in the Online
Social Network Ecosystems......................................... 255
13.1 Introduction............................................... 255
13.2 Introduction to Computer Networks........................ 256
13.2.1 Computer Network Models .............................. 256
13.2.2 Computer Network Types.............................. 258
13.3 Social Networks (SNs).................................. 259
13.4 Online Social Networks (OSNs).............................. 260
Contents xvii
13.4.1 Types of Online Social Networks..................... 261
13.4.2 Online Social Networking Services................... 262
13.4.3 The Growth of Online Social Networks................ 263
13.5 Ethical and Privacy Issues in Online Social Networks...... 264
13.5.1 Privacy Issues in OSNs.............................. 265
13.5.2 Strengthening Privacy in OSNs....................... 268
13.5.3 Ethical Issues in Online Social Networks............ 268
13.6 Security and Crimes in Online Social Networks............... 271
13.6.1 Beware of Ways to Perpetuate Crimes in Online
Social Networks..................................... 272
13.6.2 Defense Against Crimes in Online Social Networks.. 274
13.7 Proven Security Protocols and Best Practices in Online
Social Networks......................................... 277
13.7.1 Authentication.................................... 277
13.7.2 Access Control.................................. 278
13.7.3 Legislation..................................... 278
13.7.4 Self-Regulation................................... 278
13.7.5 Detection........................................... 279
13.7.6 Recovery............................................ 279
References................................................. 280
14 Mobile Systems and Their Intractable Social,
Ethical and Security Issues ................................... 281
14.1 Introduction............................................ 281
14.2 Role of Operating Systems in the Growth of the
Mobile Ecosystem............................................ 282
14.2.1 Android............................................. 283
14.2.2 iOS........................................... 283
14.2.3 Windows Phone 7.5................................... 284
14.2.4 Bada (Samsung).................................... 284
14.2.5 BlackBerry OS/RIM............................... 284
14.2.6 Symbian............................................ 285
14.3 Ethical and Privacy Issues in Mobile Ecosystems........... 285
14.4 Security Issues in Mobile Ecosystems...................... 287
14.4.1 Application-Based Threats...................... 288
14.4.2 Web-Based Threats................................. 288
14.4.3 Network Threats .................................. 289
14.4.4 Physical Threats.................................. 289
14.4.5 Operating System-Based Threats..................... 289
14.5 General Mobile Devices Attack Types...................... 290
14.6 Mitigation of Mobile Devices Attacks....................... 293
14.6.1 Mobile Device Encryption............................ 294
14.6.2 Mobile Remote Wiping.............................. 295
14.6.3 Mobile Passcode Policy........................... 295
14.7 Users’ Role in Securing Mobile Devices.................... 295
References...................................................... 296
хѵш
Contents
15 Computer Crime Investigations and Ethics.......................... 299
15Л Introduction.................................................. 299
15.2 Digital Evidence.............................................. 300
15.2.1 Looking for Digital Evidence......................... 300
15.2.2 Digital Evidence: Previewing and Acquisition......... 301
15.3 Preserving Evidence......................................... 303
15.4 Analysis of Digital Evidence.................................. 304
15.4.1 Analyzing Data Files............................. 304
15.4.2 Analysis Based on Operating Systems................ 305
15.4.3 Analysis Based on Digital Media..................... 307
15.5 Relevance and Validity of Digital Evidence.................. 309
15.6 Writing Investigative Reports................................ 309
15.7 Ethical Implications and Responsibilities in Computer
Forensic Investigations...................................... 310
References...................................................... 312
16 Biometric Technologies and Ethics................................. 313
16.1 Introduction and Definitions.................................. 314
16.1.1 Definitions.......................................... 315
16.2 The Biometric Authentication Process........................ 316
16.3 Biometric System Components................................. 316
16.3.1 Data Acquisition................................. 317
16.3.2 Enrollments...................................... 317
16.3.3 Signal Processing................................ 317
16.3.4 Decision Policy.................................. 317
16.4 Types of Biometric Technologies.......................... 317
16.4.1 Finger Biometrics............................... 318
16.4.2 Hand Geometry...................................... 320
16.4.3 Face Biometrics...................................... 320
16.4.4 Voice Biometrics................................... 321
16.4.5 Handwriting Analysis............................. 322
16.4.6 Iris Biometrics............................. 322
16.4.7 Retina............................................. 323
16.5 Ethical Implications of Biometric Technologies................ 323
16.6 The Future of Biometrics...................................... 324
References..................................................... 326
Appendices......................................................... 327
Index
365
|
any_adam_object | 1 |
author | Kizza, Joseph Migga 1950- |
author_GND | (DE-588)118069020 |
author_facet | Kizza, Joseph Migga 1950- |
author_role | aut |
author_sort | Kizza, Joseph Migga 1950- |
author_variant | j m k jm jmk |
building | Verbundindex |
bvnumber | BV041203118 |
classification_rvk | AP 12900 SR 850 |
ctrlnum | (OCoLC)846999001 (DE-599)BSZ382021053 |
discipline | Allgemeines Informatik |
edition | 5. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02024nam a2200529 c 4500</leader><controlfield tag="001">BV041203118</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151109 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130805s2013 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781447149897</subfield><subfield code="9">978-1-447-14989-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)846999001</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ382021053</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 12900</subfield><subfield code="0">(DE-625)6873:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kizza, Joseph Migga</subfield><subfield code="d">1950-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)118069020</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical and social issues in the information age</subfield><subfield code="c">Joseph Migga Kizza</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">5. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 372 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Texts in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Philosophie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sozialwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technology / Philosophy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Ethical and Social Issues in the Information Age</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026177965&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026177965</subfield></datafield></record></collection> |
id | DE-604.BV041203118 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:41:59Z |
institution | BVB |
isbn | 9781447149897 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026177965 |
oclc_num | 846999001 |
open_access_boolean | |
owner | DE-M382 DE-355 DE-BY-UBR |
owner_facet | DE-M382 DE-355 DE-BY-UBR |
physical | XVIII, 372 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series2 | Texts in Computer Science |
spelling | Kizza, Joseph Migga 1950- Verfasser (DE-588)118069020 aut Ethical and social issues in the information age Joseph Migga Kizza 5. ed. London Springer 2013 XVIII, 372 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Texts in Computer Science Informatik Philosophie Sozialwissenschaften Computer science Technology / Philosophy Data encryption (Computer science) Social sciences Computer Science Informationstechnik (DE-588)4026926-7 gnd rswk-swf Soziologie (DE-588)4077624-4 gnd rswk-swf Ethik (DE-588)4015602-3 gnd rswk-swf Informationstechnik (DE-588)4026926-7 s Soziologie (DE-588)4077624-4 s DE-604 Ethik (DE-588)4015602-3 s Erscheint auch als Online-Ausgabe Ethical and Social Issues in the Information Age Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026177965&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kizza, Joseph Migga 1950- Ethical and social issues in the information age Informatik Philosophie Sozialwissenschaften Computer science Technology / Philosophy Data encryption (Computer science) Social sciences Computer Science Informationstechnik (DE-588)4026926-7 gnd Soziologie (DE-588)4077624-4 gnd Ethik (DE-588)4015602-3 gnd |
subject_GND | (DE-588)4026926-7 (DE-588)4077624-4 (DE-588)4015602-3 |
title | Ethical and social issues in the information age |
title_auth | Ethical and social issues in the information age |
title_exact_search | Ethical and social issues in the information age |
title_full | Ethical and social issues in the information age Joseph Migga Kizza |
title_fullStr | Ethical and social issues in the information age Joseph Migga Kizza |
title_full_unstemmed | Ethical and social issues in the information age Joseph Migga Kizza |
title_short | Ethical and social issues in the information age |
title_sort | ethical and social issues in the information age |
topic | Informatik Philosophie Sozialwissenschaften Computer science Technology / Philosophy Data encryption (Computer science) Social sciences Computer Science Informationstechnik (DE-588)4026926-7 gnd Soziologie (DE-588)4077624-4 gnd Ethik (DE-588)4015602-3 gnd |
topic_facet | Informatik Philosophie Sozialwissenschaften Computer science Technology / Philosophy Data encryption (Computer science) Social sciences Computer Science Informationstechnik Soziologie Ethik |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026177965&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kizzajosephmigga ethicalandsocialissuesintheinformationage |