|
|
1 | (16) |
|
|
2 | (1) |
|
|
3 | (6) |
|
|
4 | (1) |
|
1.2.2 Moral Decision Making |
|
|
4 | (1) |
|
|
5 | (3) |
|
|
8 | (1) |
|
1.2.5 Guilt and Conscience |
|
|
8 | (1) |
|
1.2.6 Morality and Religion |
|
|
9 | (1) |
|
|
9 | (3) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (2) |
|
1.5 Morality, Etiquettes, and Manners |
|
|
14 | (3) |
|
|
16 | (1) |
|
2 Ethics and Ethical Analysis |
|
|
17 | (18) |
|
2.1 Traditional Definition |
|
|
18 | (1) |
|
|
19 | (3) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
2.3 Functional Definition of Ethics |
|
|
22 | (2) |
|
2.4 Ethical Reasoning and Decision Making |
|
|
24 | (3) |
|
2.4.1 A Framework for Ethical Decision Making |
|
|
25 | (1) |
|
2.4.2 Making and Evaluating Ethical Arguments |
|
|
25 | (2) |
|
|
27 | (1) |
|
2.5.1 2018 ACM Code of Ethics and Professional Conduct: Draft 1 |
|
|
27 | (1) |
|
2.5.2 Objectives of Codes of Ethics |
|
|
28 | (1) |
|
2.6 Reflections on Computer Ethics |
|
|
28 | (3) |
|
2.6.1 New Wine in an Old Bottle |
|
|
28 | (3) |
|
2.7 Technology and Values |
|
|
31 | (4) |
|
|
33 | (2) |
|
3 Ethics and the Professions |
|
|
35 | (24) |
|
|
36 | (1) |
|
3.2 Evolution of Professions |
|
|
37 | (6) |
|
3.2.1 Origins of Professions |
|
|
37 | (1) |
|
3.2.2 Requirements of a Professional |
|
|
37 | (2) |
|
3.2.3 Pillars of Professionalism |
|
|
39 | (4) |
|
3.3 The Making of an Ethical Professional: Education and Licensing |
|
|
43 | (5) |
|
|
43 | (2) |
|
3.3.2 Licensing Authorities |
|
|
45 | (1) |
|
3.3.3 Professional Codes of Conduct |
|
|
45 | (3) |
|
3.4 Professional Decision Making and Ethics |
|
|
48 | (4) |
|
3.4.1 Professional Dilemmas in Decision Making |
|
|
48 | (2) |
|
3.4.2 Guilt and Making Ethical Decisions |
|
|
50 | (2) |
|
3.5 Professionalism and Ethical Responsibilities |
|
|
52 | (7) |
|
|
52 | (3) |
|
3.5.2 Harassment and Discrimination |
|
|
55 | (1) |
|
3.5.3 Ethical and Moral Implications |
|
|
55 | (2) |
|
|
57 | (2) |
|
4 Anonymity, Security, Privacy, and Civil Liberties |
|
|
59 | (26) |
|
|
62 | (1) |
|
|
63 | (2) |
|
4.2.1 Anonymity and the Internet |
|
|
63 | (1) |
|
4.2.2 Advantages and Disadvantages of Anonymity |
|
|
64 | (1) |
|
4.2.3 Legal View of Anonymity |
|
|
64 | (1) |
|
|
65 | (6) |
|
|
65 | (1) |
|
4.3.2 Physical Access Controls |
|
|
66 | (1) |
|
4.3.3 Information Security Controls |
|
|
67 | (4) |
|
4.3.4 Operational Security |
|
|
71 | (1) |
|
|
71 | (9) |
|
|
71 | (1) |
|
|
71 | (2) |
|
|
73 | (1) |
|
4.4.4 Privacy Implications of the Database System |
|
|
74 | (1) |
|
4.4.5 Privacy Violations and Legal Implications |
|
|
75 | (3) |
|
4.4.6 Privacy Protection and Civil Liberties |
|
|
78 | (2) |
|
4.5 Ethical and Legal Framework for Information |
|
|
80 | (5) |
|
|
80 | (1) |
|
4.5.2 Ethical and Legal Basis for Privacy Protection |
|
|
81 | (1) |
|
|
82 | (3) |
|
5 Intellectual Property Rights and Computer Technology |
|
|
85 | (28) |
|
|
86 | (1) |
|
5.2 Computer Products and Services |
|
|
86 | (3) |
|
5.3 Foundations of Intellectual Property |
|
|
89 | (9) |
|
|
89 | (3) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (2) |
|
5.4.1 The Politics of Ownership |
|
|
99 | (1) |
|
5.4.2 The Psychology of Ownership |
|
|
99 | (1) |
|
5.5 Intellectual Property Crimes |
|
|
100 | (2) |
|
|
100 | (2) |
|
5.5.2 The First-Sale Doctrine |
|
|
102 | (1) |
|
5.5.3 The Fair Use Doctrine |
|
|
102 | (1) |
|
5.6 Protection of Ownership Rights |
|
|
102 | (3) |
|
5.6.1 Domain of Protection |
|
|
103 | (1) |
|
5.6.2 Source and Types of Protection |
|
|
103 | (1) |
|
5.6.3 Duration of Protection |
|
|
104 | (1) |
|
5.6.4 Strategies of Protection |
|
|
104 | (1) |
|
5.7 Protecting Computer Software Under the IP |
|
|
105 | (3) |
|
|
105 | (1) |
|
5.7.2 Protection of Software Under Copyright Laws |
|
|
106 | (1) |
|
5.7.3 Protection of Software Under Patent Laws |
|
|
107 | (1) |
|
5.7.4 Protection of Software Under Trademarks |
|
|
107 | (1) |
|
5.7.5 Protection of Software Under Trade Secrets |
|
|
108 | (1) |
|
5.8 Transnational Issues and Intellectual Property |
|
|
108 | (5) |
|
|
110 | (3) |
|
6 Social Context of Computing |
|
|
113 | (36) |
|
|
114 | (1) |
|
|
115 | (13) |
|
|
116 | (7) |
|
|
123 | (3) |
|
6.2.3 Humanware (Human Capacity) |
|
|
126 | (1) |
|
|
127 | (1) |
|
6.2.5 Enabling Environments |
|
|
127 | (1) |
|
6.3 Obstacles to Overcoming the Digital Divide |
|
|
128 | (1) |
|
|
129 | (7) |
|
6.4.1 The Electronic Office |
|
|
129 | (1) |
|
6.4.2 Office on Wheels and Wings |
|
|
130 | (1) |
|
6.4.3 The Virtual Workplace |
|
|
130 | (1) |
|
6.4.4 The Quiet Revolution: The Growth of Telecommuting |
|
|
131 | (4) |
|
6.4.5 Employee Social and Ethical Issues |
|
|
135 | (1) |
|
|
136 | (6) |
|
6.5.1 Workplace Privacy and Surveillance |
|
|
137 | (2) |
|
6.5.2 Electronic Monitoring |
|
|
139 | (3) |
|
6.6 Employee Health and Productivity in the Workplace |
|
|
142 | (7) |
|
|
143 | (3) |
|
|
146 | (3) |
|
7 Software Issues: Risks and Liabilities |
|
|
149 | (28) |
|
|
150 | (4) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
7.2 Causes of Software Failures |
|
|
154 | (2) |
|
|
155 | (1) |
|
7.2.2 Nature of Software: Complexity |
|
|
155 | (1) |
|
|
156 | (9) |
|
7.3.1 Risk Assessment and Management |
|
|
157 | (1) |
|
7.3.2 Risks and Hazards in Workplace Systems |
|
|
158 | (1) |
|
7.3.3 Historic Examples of Software Risks |
|
|
159 | (6) |
|
|
165 | (8) |
|
|
165 | (2) |
|
7.4.2 Classification of Computer Software |
|
|
167 | (2) |
|
7.4.3 The Contract Option |
|
|
169 | (2) |
|
|
171 | (2) |
|
7.5 Improving Software Quality |
|
|
173 | (1) |
|
7.5.1 Techniques for Improving Software Quality |
|
|
173 | (1) |
|
|
174 | (3) |
|
|
175 | (2) |
|
|
177 | (20) |
|
|
178 | (1) |
|
8.2 History of Computer Crimes |
|
|
179 | (2) |
|
8.3 Types of Computer Systems Attacks |
|
|
181 | (2) |
|
|
181 | (2) |
|
|
183 | (1) |
|
8.4 Motives of Computer Crimes |
|
|
183 | (2) |
|
8.5 Costs and Social Consequences |
|
|
185 | (5) |
|
8.5.1 Lack of Cost Estimate Model For Cyberspace Attacks |
|
|
188 | (1) |
|
8.5.2 Social and Ethical Consequences |
|
|
189 | (1) |
|
8.6 Computer Crime Prevention Strategies |
|
|
190 | (7) |
|
8.6.1 Protecting Your Computer |
|
|
190 | (2) |
|
8.6.2 The Computer Criminal |
|
|
192 | (1) |
|
8.6.3 The Innocent Victim |
|
|
192 | (2) |
|
|
194 | (3) |
|
|
197 | (12) |
|
|
197 | (2) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
199 | (1) |
|
9.2 Types of Cyberbullying |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
9.3 Areas of Society Most Affected by Cyberbullying |
|
|
200 | (2) |
|
|
201 | (1) |
|
9.3.2 Cyberbullying in the Workplace |
|
|
201 | (1) |
|
9.4 Legislation Against Cyberbullying |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
9.5 Effects of Cyberbullying |
|
|
203 | (1) |
|
9.6 Dealing with Cyberbullying |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (4) |
|
|
207 | (2) |
|
10 Evolving Realities: Ethical and Secure Computing in the New Technological Spaces |
|
|
209 | (20) |
|
|
211 | (1) |
|
10.2 Artificial Intelligence |
|
|
212 | (3) |
|
10.2.1 Advances in Artificial Intelligence |
|
|
212 | (1) |
|
10.2.2 Artificial Intelligence and Ethics |
|
|
213 | (2) |
|
|
215 | (6) |
|
10.3.1 Simulated Computing Environments |
|
|
216 | (1) |
|
|
216 | (1) |
|
10.3.3 Different Types of Virtual Reality |
|
|
217 | (1) |
|
10.3.4 Virtualization and Ethics |
|
|
218 | (3) |
|
10.4 Cyberspace and the Concept of Telepresence |
|
|
221 | (8) |
|
10.4.1 Securing Cyberspace |
|
|
222 | (1) |
|
10.4.2 Social Issues in Cyberspace |
|
|
222 | (2) |
|
10.4.3 Privacy in Cyberspace |
|
|
224 | (3) |
|
|
227 | (2) |
|
11 Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems |
|
|
229 | (30) |
|
|
229 | (1) |
|
11.2 Introduction to Computer Networks |
|
|
230 | (3) |
|
11.2.1 Computer Network Models |
|
|
230 | (2) |
|
11.2.2 Computer Network Types |
|
|
232 | (1) |
|
11.3 Social Networks (SNs) |
|
|
233 | (1) |
|
11.4 Online Social Networks (OSNs) |
|
|
234 | (5) |
|
11.4.1 Types of Online Social Networks |
|
|
235 | (2) |
|
11.4.2 Online Social Networking Services |
|
|
237 | (1) |
|
11.4.3 The Growth of Online Social Networks |
|
|
238 | (1) |
|
11.5 Ethical and Privacy Issues in Online Social Networks |
|
|
239 | (8) |
|
11.5.1 Privacy Issues in OSNs |
|
|
240 | (3) |
|
11.5.2 Strengthening Privacy in OSNs |
|
|
243 | (1) |
|
11.5.3 Ethical Issues in Online Social Networks |
|
|
243 | (4) |
|
11.6 Security and Crimes in Online Social Networks |
|
|
247 | (6) |
|
11.6.1 Beware of Ways to Perpetrate Crimes in Online Social Networks |
|
|
248 | (2) |
|
11.6.2 Defense Against Crimes in Online Social Networks |
|
|
250 | (3) |
|
11.7 Proven Security Protocols and Best Practices in Online Social Networks |
|
|
253 | (6) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (3) |
|
12 Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies |
|
|
259 | (22) |
|
|
260 | (1) |
|
12.2 Fifth-Generation (5G) Technology (G5) |
|
|
260 | (4) |
|
12.2.1 Overview of 5G Wireless Communications |
|
|
260 | (1) |
|
12.2.2 5G Network Architecture and Protocol Stack Perspectives |
|
|
261 | (1) |
|
12.2.3 Technical Challenges of 5G Technology |
|
|
262 | (2) |
|
12.3 The Internet of Things (IoT) |
|
|
264 | (12) |
|
12.3.1 Overview and Growth of Internet of Things |
|
|
265 | (2) |
|
12.3.2 Architecture and Networking of IoT |
|
|
267 | (3) |
|
12.3.3 Challenges of Using TCP/IP Architecture Over the IoT |
|
|
270 | (2) |
|
12.3.4 IoT Governance, Privacy, and Security Challenges |
|
|
272 | (1) |
|
12.3.5 Governance and Privacy Concerns |
|
|
273 | (1) |
|
12.3.6 Security Challenges |
|
|
273 | (1) |
|
|
274 | (1) |
|
12.3.8 Computational Constraints |
|
|
275 | (1) |
|
|
275 | (1) |
|
12.3.10 Trust Relationships |
|
|
276 | (1) |
|
12.4 Ethical, Social, and Legal Impacts of 5G and IoT |
|
|
276 | (2) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
12.4.4 Healthy Issues Emanating from 5G and IoT Technologies |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (3) |
|
|
279 | (2) |
Index |
|
281 | |