Skip to main content
Erschienen in: Ethics and Information Technology 4/2010

01.12.2010

Giannis Stamatellos: Computer ethics—A global perspective

Jones and Bartlett Publishers, Sudbury, MA, 2007, 141 pp, ISBN: -13: 978-0-7637-4084-9, -10: 0-7637-4084-5

verfasst von: Mark H. Rosenbaum

Erschienen in: Ethics and Information Technology | Ausgabe 4/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Excerpt

In part, and because of the many scandalous business practices of the 1990s and early twenty-first century (e.g., Enron, WorldCom, Tyco Int’l., and Halliburton), applied ethics in general, and business and computer ethics in particular has gained a greater social awareness. Addressing this awareness is Computer Ethics: A Global Perspective by Giannis Stamatellos. The author asserts that the aim of the book is: “(1) to provide a short introduction to computer ethics; (2) to engage students and non-expert in a philosophical enquiry on the social impact of computers in the information society; and (3) to discuss the ethical issues that emerge from widespread use of information technology at the local and global level” (p. IX). The preface also explains that the book aims to “offer a compact guide to the ethical and social issues discussed in an undergraduate course, and to serve as a source of for the students in that course” (p. X). To his credit, given the breadth and depth of computer ethics, Stamatellos not only addresses the vast ethical issues, but also many of the social impacts in a mere 140 pages. Stamatellos structures the book into four sections. In the first chapter he very briefly introduces the reader to what computer ethics is, its short history, and its philosophical foundations. The remainder of the book is laid out into Part A (Ethical Issues) which comprises Chaps. 2–5, and Part B (Social Impact) which comprises Chaps. 6–11. The last section of the book includes Appendices A–D; these are the codes of ethics from four main IS/IT associations. …

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Barger, R. N. (2008). Computer ethics: A case-based approach. New York, NY: Cambridge University Press. Barger, R. N. (2008). Computer ethics: A case-based approach. New York, NY: Cambridge University Press.
Zurück zum Zitat Bratus, S. (2007). What hackers learn that the rest of us don’t: Note on hacker curriculum. Security and Privacy, 5(4), 72–75.CrossRef Bratus, S. (2007). What hackers learn that the rest of us don’t: Note on hacker curriculum. Security and Privacy, 5(4), 72–75.CrossRef
Zurück zum Zitat Johnson, D. G., & Miller, K. W. (2009). Computer ethics: Analyzing information technology (4th ed.). Upper Saddle River, NJ: Prentice Hall–Pearson Education, Inc. Johnson, D. G., & Miller, K. W. (2009). Computer ethics: Analyzing information technology (4th ed.). Upper Saddle River, NJ: Prentice Hall–Pearson Education, Inc.
Zurück zum Zitat Kaminsky, D. (2006). Explorations in namespace: White-hat hacking across the domain name system. Communications of the ACM, 49(6), 62–68.CrossRef Kaminsky, D. (2006). Explorations in namespace: White-hat hacking across the domain name system. Communications of the ACM, 49(6), 62–68.CrossRef
Zurück zum Zitat Kimppa, K. K. (2008). Review of computer ethics: A global perspective. Journal of Information Communication and Ethics in Society, 6(1), 90–92. Kimppa, K. K. (2008). Review of computer ethics: A global perspective. Journal of Information Communication and Ethics in Society, 6(1), 90–92.
Zurück zum Zitat Moore, A. D. (Ed.). (2005). Information ethics: Privacy, property, and power. Seattle, WA: University of Washington Press. Moore, A. D. (Ed.). (2005). Information ethics: Privacy, property, and power. Seattle, WA: University of Washington Press.
Zurück zum Zitat Rosco, R. D., Rogers, M. K., & Liles, S. (2007). Breaking down stereotypes: A call for an ontological model. Proceedings of the 40th Hawaii international conference on system sciences, Hawaii, pp. 271–279. Rosco, R. D., Rogers, M. K., & Liles, S. (2007). Breaking down stereotypes: A call for an ontological model. Proceedings of the 40th Hawaii international conference on system sciences, Hawaii, pp. 271–279.
Zurück zum Zitat Russell, D., & Gangemi, G. T. (1991). Computer security basics. Sebastopol, CA: O’Reilly Media Inc. Russell, D., & Gangemi, G. T. (1991). Computer security basics. Sebastopol, CA: O’Reilly Media Inc.
Zurück zum Zitat Spinello, R. A. (2003). Case studies in information technology ethics (2nd ed.). Upper Saddle River, NJ: Prentice Hall-Pearson Education, Inc. Spinello, R. A. (2003). Case studies in information technology ethics (2nd ed.). Upper Saddle River, NJ: Prentice Hall-Pearson Education, Inc.
Zurück zum Zitat Tavani, H. T. (2007). Ethics & technology: Ethical issues in an age of information and communication technology (2nd ed.). Hoboken, NJ: Wiley. Tavani, H. T. (2007). Ethics & technology: Ethical issues in an age of information and communication technology (2nd ed.). Hoboken, NJ: Wiley.
Zurück zum Zitat Wong, M. W. S. (2007). Cyber-trespass and ‘unauthorized access’ as legal mechanisms of access control: Lessons from the US experience. International Journal of Law and Information Technology, 15(1), 90–128.CrossRef Wong, M. W. S. (2007). Cyber-trespass and ‘unauthorized access’ as legal mechanisms of access control: Lessons from the US experience. International Journal of Law and Information Technology, 15(1), 90–128.CrossRef
Metadaten
Titel
Giannis Stamatellos: Computer ethics—A global perspective
Jones and Bartlett Publishers, Sudbury, MA, 2007, 141 pp, ISBN: -13: 978-0-7637-4084-9, -10: 0-7637-4084-5
verfasst von
Mark H. Rosenbaum
Publikationsdatum
01.12.2010
Verlag
Springer Netherlands
Erschienen in
Ethics and Information Technology / Ausgabe 4/2010
Print ISSN: 1388-1957
Elektronische ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-010-9246-2

Weitere Artikel der Ausgabe 4/2010

Ethics and Information Technology 4/2010 Zur Ausgabe

Premium Partner