Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cybersins and Digital Good Deeds: A Book About Technology and Ethics [Taylor & Francis e-book]

, , (Sam Houston State University, Huntsville, TX, USA)
  • Formāts: 206 pages
  • Izdošanas datums: 15-Nov-2006
  • Izdevniecība: Haworth Press Inc
  • ISBN-13: 9781003573302
  • Taylor & Francis e-book
  • Cena: 78,26 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standarta cena: 111,79 €
  • Ietaupiet 30%
  • Formāts: 206 pages
  • Izdošanas datums: 15-Nov-2006
  • Izdevniecība: Haworth Press Inc
  • ISBN-13: 9781003573302
The A-to-Z source on cyberethics?the responsible use of technology!What is safe and responsible behavior for using the Internet? Cybersins and Digital Good Deeds: A Book About Technology and Ethics provides a comprehensive look at the innovative?and sometimes unscrupulous?world of rapidly evolving technology and the people who use it. This encyclopedic source helps even the most technology-challenged understand various facets relating to the use and misuse of technology in today’s society. Topics are organized A-to-Z for easy reference, with selections chosen because of historical importance, present relevance, and the likelihood of future impact. Privacy, security, censorship, and much, much more are discussed in detail to reveal the ethical complexities of each issue. Harmful and illegal cyber behavior can manifest quickly in several ways in today’s digital world. Keeping up with the shifts and advances in technology, its applications, and how it affects you can be difficult. Cybersins and Digital Good Deeds reviews the latest trends in computer technology and the impact it has on the way we live. This extensive book provides easy-to-understand explanations of tech terms, while clearly examining the current ethical issues surrounding different aspects of technology and its use in positive or destructive actions. Discussions include issues concerning general use, business, entertainment, multimedia development, and education.The broad range of ethical topics in Cybersins and Digital Good Deeds includes: advertising in school the Americans with Disabilities Act (ADA) and its impact upon technology in schools blogging and free speech bride scams video voyeurism censorship and filtering cheating in school using technology Child Online Protection Act Child Pornography Prevention Act (CPPA) computer addiction crackers, lamers, and phreaks cyberbullying cyberchondriacs disinhibition domain hijacking Online auction fraud elder care and technology Google Bombing identity theft pornography media and cognitive development movie duplication sharing audio files online gambling pyramid schemes the Patriot Act phishing podcasting Project Gutenberg RFID tracking spyware technolust Trojan horses and viruses much, much more!Cybersins and Digital Good Deeds is a perfect at-your-fingertips source for questions you may have on the jargon and the ethical use or misuse of technology. This book is perfect for business people; high school, public, and academic librarians; library science professors, education professors, students, or anyone needing clarification of issues related to technology and information ethics.
Introduction xi
Absent Presence 1(2)
Advertising at School 3(4)
AMBER Alert 7(1)
Americans with Disabilities Act (ADA) and Its Impact upon Technology in Schools 8(3)
Blogging—A Tool for Education and Free Speech 11(2)
Bride Scams 13(2)
Camcorders, Surveillance, and Video Voyeurism 15(2)
Cell Phone Rage 17(2)
Cell Phones and Driving 19(2)
Cell Yell 21(2)
Censorship and Filtering 23(2)
Cheating at School Using Cell Phone Cameras 25(2)
Child Online Protection Act and Children's Online Privacy Protection Act 27(2)
Child Pornography Prevention Act 29(1)
Children's Internet Protection Act 30(1)
Computer Addiction 31(2)
Computer Security 33(2)
Crackers, Lamers, and Phreaks 35(1)
Creating an Identity in a Chat Room 36(2)
Cyberbullying 38(2)
Cyberchondriacs 40(1)
Disinformation 41(2)
Disinhibition 43(2)
Distance Learning Content Sharing 45(2)
Distributed Computing 47(1)
Doctor-Patient Relationships 48(3)
Domain Hijacking 51(2)
DRM 53(2)
eBay and Online Auction Fraud 55(2)
Elder Care and Technology 57(2)
E-Mail Addresses and Privacy 59(2)
Encryption 61(1)
E-Waste 62(3)
File Swapping 65(2)
Firewall 67(1)
Flame Wars 68(2)
Flash Mobs 70(1)
Google Bombing 71(1)
Google Book Search 72(2)
Google Stalking 74(2)
GPS and Privacy 76(3)
Hackers, Crackers, and Hacking 79(2)
Hacktivism 81(1)
Hoaxes 82(3)
Identity Theft and the Internet 85(2)
Internet Pornography 87(1)
Internet User Agreement and the Library 88(3)
Keystroke Logging 91(2)
Logging On As an Administrator 93(2)
Logo Abuse 95(2)
Marketing to Children 97(4)
Media and Cognitive Development 101(2)
Modern Luddites 103(1)
Monitoring Employees' Internet Use 104(2)
Movie Duplication 106(2)
Multimedia Manipulation 108(3)
Napster 111(2)
Network Ubiquity 113(2)
$100 MIT Laptop 115(1)
Online Gambling 116(2)
Online Protests 118(2)
Online Pyramid Schemes 120(1)
Patriot Act 121(3)
Phishing 124(1)
Phreaking 125(1)
Plagiarism 126(2)
Podcasting 128(1)
Privacy and the Internet 129(2)
Project Gutenberg 131(2)
RFID 133(2)
Scare Chains 135(2)
Script Kiddies 137(2)
Slander, Libel, and Technology 139(2)
Social Engineering 141(3)
Spam 144(2)
Splogs 146(1)
Spoofing 147(2)
Spyware or Adware 149(2)
Steganography 151(2)
Surfer's Voice 153(1)
Sympathy Hoaxes 154(3)
Technology and Knowledge Management 157(2)
Technolust 159(2)
Trojan Horses 161(2)
Turnitin.com 163(1)
Typosquatting 164(3)
Virtual Offices 167(2)
Viruses and Virus Protection 169(2)
Warchalking 171(1)
Watching Over Children with High-Tech Tools 172(3)
WebXACT 175(1)
Wiki 176(2)
Wireless Computers and Security 178(2)
Worm 180(1)
Index 181


James Van Roekel, MaryAnn Bell, Bobby Ezell