Ethical and Social Issues in the Information Age:
Since the publication of the ?rst edition in 1997, there have been tremendous changes in the ?elds of computer science and information sciences. During this period, we have become more dependent than ever before on computer and telecommunication technology. As we, both individually and as nations, b...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer New York
2003
|
Ausgabe: | 2nd ed. 2003 |
Schriftenreihe: | Texts in Computer Science
|
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Since the publication of the ?rst edition in 1997, there have been tremendous changes in the ?elds of computer science and information sciences. During this period, we have become more dependent than ever before on computer and telecommunication technology. As we, both individually and as nations, become more dependent on cyberspace technology, it has itself become a cr- ical component of individual nation’s security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of - tional communication, including emergency services. The recent rise in cyber attacks—many of them with lightning speed, - fecting millions of computers worldwide, and causing billions of dollars in losses both to individuals and businesses—is an indication of how unprepared we are to handle such attacks not only today but also in the future. Such - tacks are a mark of the poor state of our cyberspace security policies. The facts that there are no signs to indicate there is going to be a slowdown in such - tacks, and that nations are not doing anything worth calling preventive, has heightened the need for an effective strategy to produce responsible prof- sionals who can play an active role in the ?ght against computer and cyber - tacks and vandalism |
Beschreibung: | 1 Online-Ressource (XXIII, 375 p) |
ISBN: | 9780387224664 |
DOI: | 10.1007/b98842 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064007 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2003 |||| o||u| ||||||eng d | ||
020 | |a 9780387224664 |9 978-0-387-22466-4 | ||
024 | 7 | |a 10.1007/b98842 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-22466-4 | ||
035 | |a (OCoLC)1227477176 | ||
035 | |a (DE-599)BVBBV047064007 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004 |2 23 | |
084 | |a AP 12900 |0 (DE-625)6873: |2 rvk | ||
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
100 | 1 | |a Kizza, Joseph M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Ethical and Social Issues in the Information Age |c by Joseph M. Kizza |
250 | |a 2nd ed. 2003 | ||
264 | 1 | |a New York, NY |b Springer New York |c 2003 | |
300 | |a 1 Online-Ressource (XXIII, 375 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Texts in Computer Science | |
520 | |a Since the publication of the ?rst edition in 1997, there have been tremendous changes in the ?elds of computer science and information sciences. During this period, we have become more dependent than ever before on computer and telecommunication technology. As we, both individually and as nations, become more dependent on cyberspace technology, it has itself become a cr- ical component of individual nation’s security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of - tional communication, including emergency services. The recent rise in cyber attacks—many of them with lightning speed, - fecting millions of computers worldwide, and causing billions of dollars in losses both to individuals and businesses—is an indication of how unprepared we are to handle such attacks not only today but also in the future. Such - tacks are a mark of the poor state of our cyberspace security policies. The facts that there are no signs to indicate there is going to be a slowdown in such - tacks, and that nations are not doing anything worth calling preventive, has heightened the need for an effective strategy to produce responsible prof- sionals who can play an active role in the ?ght against computer and cyber - tacks and vandalism | ||
650 | 4 | |a Computers and Society | |
650 | 4 | |a Ethics | |
650 | 4 | |a User Interfaces and Human Computer Interaction | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Ethics | |
650 | 4 | |a User interfaces (Computer systems) | |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ethik |0 (DE-588)4015602-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziologie |0 (DE-588)4077624-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 1 | 1 | |a Soziologie |0 (DE-588)4077624-4 |D s |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475778939 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387954219 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475778922 |
856 | 4 | 0 | |u https://doi.org/10.1007/b98842 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471119 | ||
966 | e | |u https://doi.org/10.1007/b98842 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182061470187520 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Kizza, Joseph M. |
author_facet | Kizza, Joseph M. |
author_role | aut |
author_sort | Kizza, Joseph M. |
author_variant | j m k jm jmk |
building | Verbundindex |
bvnumber | BV047064007 |
classification_rvk | AP 12900 SR 850 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-387-22466-4 (OCoLC)1227477176 (DE-599)BVBBV047064007 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Allgemeines Informatik |
discipline_str_mv | Allgemeines Informatik |
doi_str_mv | 10.1007/b98842 |
edition | 2nd ed. 2003 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03478nmm a2200613zc 4500</leader><controlfield tag="001">BV047064007</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387224664</subfield><subfield code="9">978-0-387-22466-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b98842</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-22466-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227477176</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064007</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 12900</subfield><subfield code="0">(DE-625)6873:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kizza, Joseph M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical and Social Issues in the Information Age</subfield><subfield code="c">by Joseph M. Kizza</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed. 2003</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer New York</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIII, 375 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Texts in Computer Science</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Since the publication of the ?rst edition in 1997, there have been tremendous changes in the ?elds of computer science and information sciences. During this period, we have become more dependent than ever before on computer and telecommunication technology. As we, both individually and as nations, become more dependent on cyberspace technology, it has itself become a cr- ical component of individual nation’s security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of - tional communication, including emergency services. The recent rise in cyber attacks—many of them with lightning speed, - fecting millions of computers worldwide, and causing billions of dollars in losses both to individuals and businesses—is an indication of how unprepared we are to handle such attacks not only today but also in the future. Such - tacks are a mark of the poor state of our cyberspace security policies. The facts that there are no signs to indicate there is going to be a slowdown in such - tacks, and that nations are not doing anything worth calling preventive, has heightened the need for an effective strategy to produce responsible prof- sionals who can play an active role in the ?ght against computer and cyber - tacks and vandalism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">User Interfaces and Human Computer Interaction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">User interfaces (Computer systems)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475778939</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387954219</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475778922</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b98842</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471119</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b98842</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064007 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:21Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9780387224664 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471119 |
oclc_num | 1227477176 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XXIII, 375 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer New York |
record_format | marc |
series2 | Texts in Computer Science |
spelling | Kizza, Joseph M. Verfasser aut Ethical and Social Issues in the Information Age by Joseph M. Kizza 2nd ed. 2003 New York, NY Springer New York 2003 1 Online-Ressource (XXIII, 375 p) txt rdacontent c rdamedia cr rdacarrier Texts in Computer Science Since the publication of the ?rst edition in 1997, there have been tremendous changes in the ?elds of computer science and information sciences. During this period, we have become more dependent than ever before on computer and telecommunication technology. As we, both individually and as nations, become more dependent on cyberspace technology, it has itself become a cr- ical component of individual nation’s security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of - tional communication, including emergency services. The recent rise in cyber attacks—many of them with lightning speed, - fecting millions of computers worldwide, and causing billions of dollars in losses both to individuals and businesses—is an indication of how unprepared we are to handle such attacks not only today but also in the future. Such - tacks are a mark of the poor state of our cyberspace security policies. The facts that there are no signs to indicate there is going to be a slowdown in such - tacks, and that nations are not doing anything worth calling preventive, has heightened the need for an effective strategy to produce responsible prof- sionals who can play an active role in the ?ght against computer and cyber - tacks and vandalism Computers and Society Ethics User Interfaces and Human Computer Interaction Computers and civilization User interfaces (Computer systems) Informationstechnik (DE-588)4026926-7 gnd rswk-swf Ethik (DE-588)4015602-3 gnd rswk-swf Soziologie (DE-588)4077624-4 gnd rswk-swf Informationstechnik (DE-588)4026926-7 s Ethik (DE-588)4015602-3 s DE-604 Soziologie (DE-588)4077624-4 s Erscheint auch als Druck-Ausgabe 9781475778939 Erscheint auch als Druck-Ausgabe 9780387954219 Erscheint auch als Druck-Ausgabe 9781475778922 https://doi.org/10.1007/b98842 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Kizza, Joseph M. Ethical and Social Issues in the Information Age Computers and Society Ethics User Interfaces and Human Computer Interaction Computers and civilization User interfaces (Computer systems) Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd Soziologie (DE-588)4077624-4 gnd |
subject_GND | (DE-588)4026926-7 (DE-588)4015602-3 (DE-588)4077624-4 |
title | Ethical and Social Issues in the Information Age |
title_auth | Ethical and Social Issues in the Information Age |
title_exact_search | Ethical and Social Issues in the Information Age |
title_exact_search_txtP | Ethical and Social Issues in the Information Age |
title_full | Ethical and Social Issues in the Information Age by Joseph M. Kizza |
title_fullStr | Ethical and Social Issues in the Information Age by Joseph M. Kizza |
title_full_unstemmed | Ethical and Social Issues in the Information Age by Joseph M. Kizza |
title_short | Ethical and Social Issues in the Information Age |
title_sort | ethical and social issues in the information age |
topic | Computers and Society Ethics User Interfaces and Human Computer Interaction Computers and civilization User interfaces (Computer systems) Informationstechnik (DE-588)4026926-7 gnd Ethik (DE-588)4015602-3 gnd Soziologie (DE-588)4077624-4 gnd |
topic_facet | Computers and Society Ethics User Interfaces and Human Computer Interaction Computers and civilization User interfaces (Computer systems) Informationstechnik Ethik Soziologie |
url | https://doi.org/10.1007/b98842 |
work_keys_str_mv | AT kizzajosephm ethicalandsocialissuesintheinformationage |