Limit search to available items
Book Cover
Book
Author Quinn, Michael J. (Michael Jay)

Title Ethics for the information age / Michael J. Quinn
Edition First edition
Published Boston : Pearson/Addison-Wesley, [2005]
©2005

Copies

Location Call no. Vol. Availability
 MELB  174.9004 Qui/Eft  AVAILABLE
 MELB  174.9004 Qui/Eft  AVAILABLE
 MELB  174.9004 Qui/Eft  AVAILABLE
 MELB  174.9004 Qui/Eft  AVAILABLE
 MELB  174.9004 Qui/Eft  AVAILABLE
 MELB  174.9004 Qui/Eft  AVAILABLE
 W'PONDS  174.9004 Qui/Eft  AVAILABLE
Description xxiii, 424 pages : illustrations ; 24 cm
Contents 1. Catalysts for change -- 1.1. Introduction -- 1.2. Milestones in computing -- 1.3. Milestones in networking -- 1.4. Milestones in information storage and retrieval -- 1.5. Information technology issues -- 2. Introduction to ethics -- 2.1. Introduction -- 2.2. Subjective relativism -- 2.3. Cultural relativism -- 2.4. Divine command theory -- 2.5. Kantianism -- 2.6. Act utilitarianism -- 2.7. Rule utilitarianism -- 2.8. Social contract theory -- 2.9. Comparing workable ethical theories -- 3. Networking -- 3.1. Introduction -- 3.2. Email and spam -- 3.3. Fighting spam -- 3.4. The world wide web -- 3.5. Ethical perspectives on pornography -- 3.6. Censorship -- 3.7. Freedom of expression -- 3.8. Children and the web -- 3.9. Breaking trust on the Internet -- 4. Intellectual property -- 4.1. Introduction -- 4.2. Intellectual property rights -- 4.3. Protecting intellectual property -- 4.4. Fair use -- 4.5. New restrictions on use -- 4.6. Peer-to-peer networks -- 4.7. Protections for software -- 4.8. Open-source software -- 4.9. Morality of intellectual property protection for software -- 4.10. Morality of copying proprietary software -- 4.11. Creative commons -- 5. Privacy -- 5.1. Introduction -- 5.2. Perspectives on privacy -- 5.3. Disclosing information -- 5.4. Public information -- 5.5. U.S. legislation -- 5.6. Public records -- 5.7. Covert government surveillance -- 5.8. U.S. legislation authorizing wiretapping -- 5.9. Data mining -- 5.10. Identity theft -- 5.11. Encryption -- 6. Computer and network security -- 6.1. Introduction -- 6.2. Viruses, worms, and Trojan horses -- 6.3. Phreaks and hackers -- 6.4. Denial-of-service attacks -- 6.5. Online voting -- 7. Computer reliability -- 7.1. Introduction -- 7.2. Data-entry or data-retrieval errors -- 7.3. Software and billing errors -- 7.4. Notable software system failures -- 7.5. Therac-25 -- 7.6. Computer simulations -- 7.7. Software engineering -- 7.8. Software warranties -- 8. Work and wealth -- 8.1. Introduction -- 8.2. Automation and unemployment -- 8.3. Workplace changes -- 8.4. Globalization -- 8.5. The digital divide -- 8.6. The "winner-take-all society" -- 8.7. Access to public colleges -- 9. Professional ethics -- 9.1. Introduction -- 9.2. Is software engineering a profession? -- 9.3. Software engineering code of ethics -- 9.4. Analysis of the code -- 9.5. Case studies -- 9.6. Whistleblowing
Summary "Ethics for the Information Age provides a balanced, impartial, and modern treatment of computer ethics. Ethical theories are introduced early and used throughout the book to evaluate moral problems related to information technology, issues are examined from the point of view of multiple ethical theories to expose readers to various perspectives. Readers are encouraged to contemplate the ethical implications of decisions related to information technology and each their own conclusions."--BOOK JACKET
Bibliography Includes bibliographical references and index
Subject Information technology -- Moral and ethical aspects.
Computer networks -- Moral and ethical aspects.
Computers and civilization.
Electronic data processing -- Moral and ethical aspects.
LC no. 2004008215
ISBN 0321194349