Description |
1 online resource (1 volume (various pagings)) : illustrations |
Contents |
3D Avatars and collaborative virtual environments / KoonYing Raymond Li, James Sofra, Mark Power -- Access control model for healthcare system / Yifeng Shen -- Advertising in the networked environment / Savvas Papagiannidis, Michael Bourlakis -- Anonymous Peer-to-Peer Systems / Wenbing Zhao -- Argumentation and Computing / Ephraim Nissan -- Argumentation with Wigmore Charts and Computing / Ephraim Nissan -- Artificial Intelligence tools for Handling Legal Evidence / Ephraim Nissan -- Barriers facing African American women in technology / Jianxia Du [and others] -- B-POS secure mobile payment system / Gianluigi Me, Antonio Grillo -- Building Secure and Dependable Information Systems / Wenbing Zhao -- Classifying articles in information ethics and security / Zack Jourdan, R. Kelly Rainer, Jr., Thomas E Marshall -- Computational Ethics / Alicia I. Ruvinsky -- Computer ethics and intelligent technologies / Yefim Kats -- Computer Worms Detection and Defense / Robert J. Cole, Chao-Hsien Chu -- Conflicting value of digital music piracy / Matthew Butler -- Content filtering methods for internet pornography / Jengchung V. Chen, ShaoYu F. Huang -- Cyber-Terrorism in Australia / Christopher Beggs -- Data Security and Chase / Zbigniew W. Ras, Seunghyun Im -- Defending against distributed denial of service / Yang Xiang, Wanlei Zhou -- Digital Divide Implications and Trends / Terry T. Kidd, Irene Chen -- Digital Rights Management Metadata and Standards / Eun G. Park, Jo Anne Cote -- Dilemmas of online identity theft / Omer Mahmood -- Document Security in the Ancient World / Christopher H. Walker -- DRM Practices in ePublication Industry / Bong Wee Kiau, Norshuhada Shiratuddin -- Educational Technology Practitioner Research Ethics / Kathleen Gray -- E-health and quality assurance / Prajesh Chhanabhai, Alec Holt -- Electronic Signatures and Ethics / A. Srivastava, B. Thomson -- Engineering multiagent systems / Tagelsir Mohamed Gasmelseid -- Ethical approach to gathering survey data online / Sophie Nicho, Kathy Blashki -- Ethical Behaviour in Technology Mediated Communication / Sutirtha Chatterjee -- Ethical concerns in computer science projects / Alastair Irons -- Ethical Debate Surrounding RFID / Stephanie Etter [and others] -- Ethical Dilemmas in Data Mining and Warehousing / Joseph A. Cazier, Ryan C. LaBrie -- Ethical Erosion at Enron / John Wang / James Yao / Richard Peterson, Zu-Hsu Lee -- Ethical usability testing with children / Kirsten Ellis, Marian Quigley -- Ethics and Access to Technology for Persons with Disabilities / Belinda Davis Lazarus -- Ethics and Perceptions in Online Learning Environments / Michelle M. Ramim -- Ethics and Security under the Sarbanes-Oxley Act / Thomas J. Tribunella, Heidi R. Tribunella -- Ethics Education for the Online Environment / Lori N.K. Leonard, Tracy S. Manly -- Ethics in Software Engineering / Pankaj Kamthan -- Ethics in the Security of Organizational Information Systems / Sushma Mishra, Amita Goyal Chin -- Ethics of AI / Kevin B. Korb -- Fair Use / Pasi Tyrväinen -- Federal Information Security Law / Charles R. Crowell -- Formulating a Code of Cyberethics for a Municipality / Udo Richard Averweg -- Hackers and Cyber Terrorists / M.J. Warren, S. Leitch -- Homo electricus and the continued speciation of humans / Katina Michael, M.G. Michael -- I.T. Security Culture Transition Process / Leanne Ngo -- ICT Leapfrogging policy and development in the third world / Amanda Third, Kaiti Kao -- Identity Verification Using Resting State Brain Signals / Ramaswamy Palaniappan, Lalit M. Patnaik -- Individual & Institutional Responses to Staff Plagiarism / Carmel McNaught -- Information Ethics as Ideology / Bernd Carsten Stahl -- Information Ethics from an Islamic Perspective / Salam Abdallah -- Information Security and the "Privacy Broker" / Michael Douma, Eduard J. Gamito -- Information Security Policies for Networkable Devices / Julia Kotlarsky, Ilan Oshri, Corey Hirsch -- Information Security Policy Research Agenda / Heather Fulford, Neil Doherty -- Internet and suicide / Dianne Currie -- Internet Piracy and copyright debates / Paul Thomas Sugden -- Internet Research Ethics Questions and Considerations / Elizabeth A. Buchanan -- Interviews with Young People using Online Chat / Elza Dunkels / AnnBritt Enochsson -- Intrusion Detection & Information Security Audits / Terry T. Kidd / Robert K. Hiltbrand -- Investigation strategy for the small paedophiles world / Gianluigi Me -- Managed Services and Changing Workplace Ethics / Alan Sixsmith -- Managing The Environmental Impact of Information Technology / Laurel Evelyn Dyson -- Measuring Ethical Reasoning of IT Professional and Students / Jane Fedorowicz, Mohammad Abdolmohammadi -- Meta View of Information Ethics / Charles R. Crowell, Robert N. Barger -- Mitigation of Identity Theft in the Information Age / Mark B. Schmidt, Reggie Becker, Allen C. Johnston -- Mobile Agents and Security / Fei Xue -- Modelling Context-Aware Security for Electronic Health Records / Pravin Shetty, Seng Loke -- Moral Rights in the Australian Public Sector / Lynley Hocking -- Multimodal Biometric System / Ajita Rattani, Hunny Mehrotra Phalguni Gupta -- Objective Ethics for Managing Information Technology / John R. Drake -- Parental Rights to Monitor Internet Usage / Benjamin J. Halpert -- Patient Centric Healthcare Information Systems in the US / Nilmini Wickramasinghe -- Pedagogical Framework for Ethical Development / Melissa Dark [and others] -- Personal Information Ethics / Sabah S. AlFedaghi -- Pharming Attack Designs / Manish Gupta, Raj Sharman -- Port Scans / Jalal Kawash -- Privacy and Access to Electronic Health Records / Richard Whiddett [and others] -- Privacy and Online Data Collection / Calin Gurau -- Privacy in Data Mining Textbooks / James Lawler, John C. Molluzzo -- Protection of Mobile Agent Data / Steven Sheng-Ue Guan -- Rule Based Policies for Secured Defence Meetings / Pravin Shetty, Seng Loke -- Secure Agent Roaming under M-Commerce / Steven Sheng-Ue Guan -- Secure Automated Clearing House Transactions / Mark B. Schmidt, Jan Skalicky Hanson -- Security Dilemmas for Canada's New Government / Jeffrey Roy -- Security Model for Educational Satellite Networks / Ramesh C. Sharma, Sanjay Jasola -- Security of Communication and Quantum Technology / Greg Paperin -- Security Protection for Critical Infrastructure / M.J. Warren, T.B. Busuttil -- Spyware / Thomas F. Stafford -- Sustainable Information Society / Ralf Isenmann -- Taxonomy of Computer and Information Ethics / Sabah S. Al-Fedaghi -- Tools for Representing and Processing Narratives / Ephraim Nissan -- Traditional Knowledge and Intellectual property / Ulia Popova-Gosart -- Universal Internet Access Under an Ethical Lens / Alessandro Arbore |
Summary |
"This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher |
Bibliography |
Includes bibliographical references and indexes |
Notes |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
|
Print version record |
|
digitized 2011 HathiTrust Digital Library committed to preserve pda MiAaHDL |
Subject |
Information technology -- Social aspects
|
|
Information technology -- Moral and ethical aspects.
|
|
Computer crimes.
|
|
Computer security
|
|
Information networks -- Security measures
|
|
Computer crimes -- Encyclopedias
|
|
Computer security -- Encyclopedias
|
|
Computer Security
|
|
BUSINESS & ECONOMICS -- Business Ethics.
|
|
Computer crimes.
|
|
Computer security.
|
|
Information networks -- Security measures.
|
|
Information technology -- Moral and ethical aspects.
|
|
Information technology -- Social aspects.
|
|
Informationstechnik
|
|
Computersicherheit
|
|
Ethik
|
Genre/Form |
Encyclopedias.
|
|
Encyclopedias.
|
Form |
Electronic book
|
Author |
Quigley, Marian.
|
ISBN |
9781591409885 |
|
1591409888 |
|
9786610919314 |
|
6610919313 |
|