Skip to main content

2010 | Buch

Ethical and Social Issues in the Information Age

insite
SUCHEN

Über dieses Buch

The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual’s social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations’ strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.

Inhaltsverzeichnis

Frontmatter
Chapter 1. History of Computing
Abstract
After reading this chapter, the reader should be able to: 1. Learn about the contributions of several pioneers in the computing field. 2. Compare life before and after the advent of personal computers and the Internet. 3. Identify significant continuing trends in the history of the computing field.
Joseph Migga Kizza
Chapter 2. Morality and the Law
Abstract
After reading this chapter, the reader should be able to: 1. Learn to make sound moral reasoning. 2. Learn about moral values and ideals in a person’s life. 3. Learn about the relationship between morality and religion. 4. Distinguish between morality and etiquette, law, and professional code of conduct. 5. Learn what it means to have moral principles, the nature of conscience, and the relationship between morality and self-interest. 6. Learn the values and ideals in a person’s life.
Joseph Migga Kizza
Chapter 3. Ethics and Ethical Analysis
Abstract
After reading this chapter, the reader should be able to: 1. Analyze an argument to identify premises and conclusion. 2. Illustrate the use of ethical argument. 3. Detect basic logical fallacies in an argument. 4. Identify stakeholders in an issue and our obligations to them. 5. Articulate the ethical tradeoffs in a technical decision. 6. Evaluate the professional codes of ethics from the ACM and other organizations.
Joseph Migga Kizza
Chapter 4. Ethics and the Professions
Abstract
After reading this chapter, the reader should be able to: 1. Identify ethical issues that arise in professional decision making and determine how to address them. 2. Analyze global computing issues that influence professional decision making. 3. Describe the mechanisms that typically exist for day-to-day ethical decision making. 4. Identify progressive stages in a whistle-blowing incident. 5. Specify the strengths and weaknesses of relevant professional codes as expressions of professionalism and guides to decision making.
Joseph Migga Kizza
Chapter 5. Anonymity, Security, Privacy, and Civil Liberties
Abstract
After reading this chapter, the reader should be able to: 1. Summarize the legal bases for the right to privacy and freedom of expression in one’s own nation and how those concepts vary from country to country. 2. Analyze stated security procedures for “weak points” that an attacker could exploit and explain how they could (or will) fail. 3. Propose appropriate security measures for different situations. 4. Describe current computer-based threats to privacy. 5. Explain how the Internet may change the historical balance in protecting freedom of expression. 6. Describe trends in privacy protection as exemplified in technology.
Joseph Migga Kizza
Chapter 6. Intellectual Property Rights and Computer Technology
Abstract
After reading this chapter, the reader should be able to: 1. Distinguish among patent, copyright, and trade secret protection. 2. Discuss the legal background of copyright in national and international law. 3. Explain how patent and copyright laws may vary internationally. 4. Outline the historical development of software patents. 5. Discuss the consequences of software piracy on software developers and the role of relevant enforcement organizations.
Joseph Migga Kizza
Chapter 7. Social Context of Computing
Abstract
After reading this chapter, the reader should be able to: 1. Interpret the social context of a particular software/hardware implementation. 2. Identify assumptions and values embedded in a particular computer product design including those of a cultural nature. 3. Evaluate a particular computing tool implementation through the use of empirical data. 4. Describe positive and negative ways in which computing alters the modes of interaction between people. 5. Explain why computing/network access is restricted in some countries. 6. Learn the impact of the digital divide. 7. Understand how income, geography, race, and culture influence access to information technology and technology in general. 8. Analyze the role and risks of computing in the implementation of public policy and government. 9. Articulate the impact of the input deficit from diverse populations in the computing profession.
Joseph Migga Kizza
Chapter 8. Software Issues: Risks and Liabilities
Abstract
After reading this chapter, the reader should be able to: 1. Explain the limitations of software testing as a means to ensure correctness. 2. Describe the differences between correctness, reliability, and safety. 3. Discuss the potential for hidden problems in reuse of existing software components. 4. Describe current approaches to manage risk and characterize the strengths and shortcomings of each. 5. Outline the role of risk management in software systems design and construction.
Joseph Migga Kizza
Chapter 9. Computer Crimes
Abstract
After reading this chapter, the reader should be able to: 1.Describe trends in computer crimes and protection against viruses and denial-of-service attacks. 2.Enumerate techniques to combat “cracker” attacks. 3.Discuss the history of computer crimes. 4.Describe several different cyber-attacker approaches and motivations. 5.Identify the professional’s role in security and the tradeoffs involved. 6. Develop measures to be taken both by individuals themselves and by organizations (including government) to prevent identity theft.
Joseph Migga Kizza
Chapter 10. New Frontiers for Computer Ethics
Artificial Intelligence, Cyberspace, and Virtual Reality
Abstract
After reading this chapter, the reader should be able to: 1. Understand the value of ethics in automated decision making. 2. Identify and discuss the different forms of automated decision making. 3. Recognize the role ethics plays in artificial environments. 4. Identify and discuss credible safeguards to ensure privacy concerns and prevent run-away computation resulting from autonomous agents. 5. Understand the role of autonomous agents in our daily lives. 6. Recognize and discuss the responsibilities of users of virtual environments.
Joseph Migga Kizza
Chapter 11. Cyberspace, Cyberethics, and Social Networking
Abstract
Learning Objectives
After reading this chapter, the reader should be able to:
1.
Understand cyberspace.
 
2.
Learn how to safeguard cyberspace.
 
3.
Understand the issues of cyberspace.
 
4.
Learn the complexity of cyberspace issues.
 
5.
Acquire knowledge and understand where in cyberspace ethics is essential.
 
6.
Learn the ethical framework of cyberspace.
 
7.
Learn how languages and culture are influenced by cyberspace.
 
Joseph Migga Kizza
Chapter 12. Computer Networks and Online Crimes
Abstract
Learning Objectives
After reading this chapter, the reader should be able to:
1.
Describe the evolution and types of computer networks.
 
2.
Understand networking fundamentals, including network services and transmission media.
 
3.
Understand network software and hardware, including media access control, network topologies, and protocols, as well as connectivity hardware for both local area and wide area networks.
 
4.
Understand how the network infrastructure helps to perpetuate online crimes.
 
5.
Recognize the difficulties faced in fighting online crime.
 
Joseph Migga Kizza
Chapter 13. Computer Crime Investigations – Computer Forensics
Abstract
Learning Objectives
After reading this chapter, the reader should be able to:
1.
Understand the science of digital crime investigation.
 
2.
Understand the fundamental steps in digital crime investigation.
 
3.
Understand digital evidence.
 
4.
Learn to handle digital evidence.
 
5.
Acquire the techniques required in digital crime investigation.
 
6.
Recognize the difficulties encountered during digital crime investigation.
 
Joseph Migga Kizza
Chapter 14. Biometrics
Abstract
After reading this chapter, the reader should be able to: 1. Understand biometric science. 2. Learn to use biometric data in access control. 3. Understand how biometric data are used to fight crimes. 4. Learn where and when biometric data can be used. 5. Acquire the techniques required in biometric data acquisition. 6. Recognize the difficulties encountered in handling some biometric data in access control.
Joseph Migga Kizza
Backmatter
Metadaten
Titel
Ethical and Social Issues in the Information Age
verfasst von
Joseph Migga Kizza
Copyright-Jahr
2010
Verlag
Springer London
Electronic ISBN
978-1-84996-038-0
Print ISBN
978-1-84996-037-3
DOI
https://doi.org/10.1007/978-1-84996-038-0