Atjaunināt sīkdatņu piekrišanu

E-grāmata: Ethical and Secure Computing: A Concise Module

  • Formāts - EPUB+DRM
  • Cena: 41,62 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of todays rapidly-evolving computing technologies and ever-changing communication ecosystems.

This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies.







Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties; examines intellectual property rights in the context of computing, including the risks and liabilities associated with software; discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health; reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination; considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies; includes learning objectives, discussion questions and exercises throughout the book.









This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, and offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks.
1 Morality and the Law
1(16)
1.1 Introduction
2(1)
1.2 Morality
3(6)
1.2.1 Moral Theories
4(1)
1.2.2 Moral Decision Making
4(1)
1.2.3 Moral Codes
5(3)
1.2.4 Moral Standards
8(1)
1.2.5 Guilt and Conscience
8(1)
1.2.6 Morality and Religion
9(1)
1.3 Law
9(3)
1.3.1 The Natural Law
10(1)
1.3.2 Conventional Law
11(1)
1.3.3 The Purpose of Law
11(1)
1.3.4 The Penal Code
12(1)
1.4 Morality and the Law
12(2)
1.5 Morality, Etiquettes, and Manners
14(3)
References
16(1)
2 Ethics and Ethical Analysis
17(18)
2.1 Traditional Definition
18(1)
2.2 Ethical Theories
19(3)
2.2.1 Consequentialism
19(1)
2.2.2 Deontology
20(1)
2.2.3 Human Nature
20(1)
2.2.4 Relativism
21(1)
2.2.5 Hedonism
21(1)
2.2.6 Emotivism
21(1)
2.3 Functional Definition of Ethics
22(2)
2.4 Ethical Reasoning and Decision Making
24(3)
2.4.1 A Framework for Ethical Decision Making
25(1)
2.4.2 Making and Evaluating Ethical Arguments
25(2)
2.5 Codes of Ethics
27(1)
2.5.1 2018 ACM Code of Ethics and Professional Conduct: Draft 1
27(1)
2.5.2 Objectives of Codes of Ethics
28(1)
2.6 Reflections on Computer Ethics
28(3)
2.6.1 New Wine in an Old Bottle
28(3)
2.7 Technology and Values
31(4)
References
33(2)
3 Ethics and the Professions
35(24)
3.1 Introduction
36(1)
3.2 Evolution of Professions
37(6)
3.2.1 Origins of Professions
37(1)
3.2.2 Requirements of a Professional
37(2)
3.2.3 Pillars of Professionalism
39(4)
3.3 The Making of an Ethical Professional: Education and Licensing
43(5)
3.3.1 Formal Education
43(2)
3.3.2 Licensing Authorities
45(1)
3.3.3 Professional Codes of Conduct
45(3)
3.4 Professional Decision Making and Ethics
48(4)
3.4.1 Professional Dilemmas in Decision Making
48(2)
3.4.2 Guilt and Making Ethical Decisions
50(2)
3.5 Professionalism and Ethical Responsibilities
52(7)
3.5.1 Whistle-Blowing
52(3)
3.5.2 Harassment and Discrimination
55(1)
3.5.3 Ethical and Moral Implications
55(2)
References
57(2)
4 Anonymity, Security, Privacy, and Civil Liberties
59(26)
4.1 Introduction
62(1)
4.2 Anonymity
63(2)
4.2.1 Anonymity and the Internet
63(1)
4.2.2 Advantages and Disadvantages of Anonymity
64(1)
4.2.3 Legal View of Anonymity
64(1)
4.3 Security
65(6)
4.3.1 Physical Security
65(1)
4.3.2 Physical Access Controls
66(1)
4.3.3 Information Security Controls
67(4)
4.3.4 Operational Security
71(1)
4.4 Privacy
71(9)
4.4.1 Definition
71(1)
4.4.2 Types of Privacy
71(2)
4.4.3 Value of Privacy
73(1)
4.4.4 Privacy Implications of the Database System
74(1)
4.4.5 Privacy Violations and Legal Implications
75(3)
4.4.6 Privacy Protection and Civil Liberties
78(2)
4.5 Ethical and Legal Framework for Information
80(5)
4.5.1 Ethics and Privacy
80(1)
4.5.2 Ethical and Legal Basis for Privacy Protection
81(1)
References
82(3)
5 Intellectual Property Rights and Computer Technology
85(28)
5.1 Definitions
86(1)
5.2 Computer Products and Services
86(3)
5.3 Foundations of Intellectual Property
89(9)
5.3.1 Copyrights
89(3)
5.3.2 Patents
92(1)
5.3.3 Trade Secrets
93(2)
5.3.4 Trademarks
95(2)
5.3.5 Personal Identity
97(1)
5.4 Ownership
98(2)
5.4.1 The Politics of Ownership
99(1)
5.4.2 The Psychology of Ownership
99(1)
5.5 Intellectual Property Crimes
100(2)
5.5.1 Infringement
100(2)
5.5.2 The First-Sale Doctrine
102(1)
5.5.3 The Fair Use Doctrine
102(1)
5.6 Protection of Ownership Rights
102(3)
5.6.1 Domain of Protection
103(1)
5.6.2 Source and Types of Protection
103(1)
5.6.3 Duration of Protection
104(1)
5.6.4 Strategies of Protection
104(1)
5.7 Protecting Computer Software Under the IP
105(3)
5.7.1 Software Piracy
105(1)
5.7.2 Protection of Software Under Copyright Laws
106(1)
5.7.3 Protection of Software Under Patent Laws
107(1)
5.7.4 Protection of Software Under Trademarks
107(1)
5.7.5 Protection of Software Under Trade Secrets
108(1)
5.8 Transnational Issues and Intellectual Property
108(5)
References
110(3)
6 Social Context of Computing
113(36)
6.1 Introduction
114(1)
6.2 The Digital Divide
115(13)
6.2.1 Access
116(7)
6.2.2 Technology
123(3)
6.2.3 Humanware (Human Capacity)
126(1)
6.2.4 Infrastructure
127(1)
6.2.5 Enabling Environments
127(1)
6.3 Obstacles to Overcoming the Digital Divide
128(1)
6.4 ICT in the Workplace
129(7)
6.4.1 The Electronic Office
129(1)
6.4.2 Office on Wheels and Wings
130(1)
6.4.3 The Virtual Workplace
130(1)
6.4.4 The Quiet Revolution: The Growth of Telecommuting
131(4)
6.4.5 Employee Social and Ethical Issues
135(1)
6.5 Employee Monitoring
136(6)
6.5.1 Workplace Privacy and Surveillance
137(2)
6.5.2 Electronic Monitoring
139(3)
6.6 Employee Health and Productivity in the Workplace
142(7)
6.6.1 Ergonomics
143(3)
References
146(3)
7 Software Issues: Risks and Liabilities
149(28)
7.1 Definitions
150(4)
7.1.1 Standards
150(1)
7.1.2 Reliability
151(1)
7.1.3 Security
152(1)
7.1.4 Safety
153(1)
7.1.5 Quality
154(1)
7.1.6 Quality of Service
154(1)
7.2 Causes of Software Failures
154(2)
7.2.1 Human Factors
155(1)
7.2.2 Nature of Software: Complexity
155(1)
7.3 Risk
156(9)
7.3.1 Risk Assessment and Management
157(1)
7.3.2 Risks and Hazards in Workplace Systems
158(1)
7.3.3 Historic Examples of Software Risks
159(6)
7.4 Consumer Protection
165(8)
7.4.1 Buyers' Rights
165(2)
7.4.2 Classification of Computer Software
167(2)
7.4.3 The Contract Option
169(2)
7.4.4 The Tort Option
171(2)
7.5 Improving Software Quality
173(1)
7.5.1 Techniques for Improving Software Quality
173(1)
7.6 Producer Protection
174(3)
References
175(2)
8 Computer Crimes
177(20)
8.1 Introduction
178(1)
8.2 History of Computer Crimes
179(2)
8.3 Types of Computer Systems Attacks
181(2)
8.3.1 Penetration
181(2)
8.3.2 Denial of Service
183(1)
8.4 Motives of Computer Crimes
183(2)
8.5 Costs and Social Consequences
185(5)
8.5.1 Lack of Cost Estimate Model For Cyberspace Attacks
188(1)
8.5.2 Social and Ethical Consequences
189(1)
8.6 Computer Crime Prevention Strategies
190(7)
8.6.1 Protecting Your Computer
190(2)
8.6.2 The Computer Criminal
192(1)
8.6.3 The Innocent Victim
192(2)
References
194(3)
9 Cyberbullying
197(12)
9.1 Definition
197(2)
9.1.1 Legal Definition
198(1)
9.1.2 Cyberstalking
199(1)
9.1.3 Cyberharassment
199(1)
9.2 Types of Cyberbullying
199(1)
9.2.1 Harassment
199(1)
9.2.2 Flaming
200(1)
9.2.3 Exclusion
200(1)
9.2.4 Outing
200(1)
9.2.5 Masquerading
200(1)
9.3 Areas of Society Most Affected by Cyberbullying
200(2)
9.3.1 Schools
201(1)
9.3.2 Cyberbullying in the Workplace
201(1)
9.4 Legislation Against Cyberbullying
202(1)
9.4.1 Federal Laws
202(1)
9.4.2 State Laws
202(1)
9.4.3 International Laws
203(1)
9.5 Effects of Cyberbullying
203(1)
9.6 Dealing with Cyberbullying
204(1)
9.6.1 Awareness
204(1)
9.6.2 Legislation
205(1)
9.6.3 Community Support
205(1)
9.7 Resources
205(4)
References
207(2)
10 Evolving Realities: Ethical and Secure Computing in the New Technological Spaces
209(20)
10.1 Introduction
211(1)
10.2 Artificial Intelligence
212(3)
10.2.1 Advances in Artificial Intelligence
212(1)
10.2.2 Artificial Intelligence and Ethics
213(2)
10.3 Virtualization
215(6)
10.3.1 Simulated Computing Environments
216(1)
10.3.2 Virtual Reality
216(1)
10.3.3 Different Types of Virtual Reality
217(1)
10.3.4 Virtualization and Ethics
218(3)
10.4 Cyberspace and the Concept of Telepresence
221(8)
10.4.1 Securing Cyberspace
222(1)
10.4.2 Social Issues in Cyberspace
222(2)
10.4.3 Privacy in Cyberspace
224(3)
References
227(2)
11 Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems
229(30)
11.1 Introduction
229(1)
11.2 Introduction to Computer Networks
230(3)
11.2.1 Computer Network Models
230(2)
11.2.2 Computer Network Types
232(1)
11.3 Social Networks (SNs)
233(1)
11.4 Online Social Networks (OSNs)
234(5)
11.4.1 Types of Online Social Networks
235(2)
11.4.2 Online Social Networking Services
237(1)
11.4.3 The Growth of Online Social Networks
238(1)
11.5 Ethical and Privacy Issues in Online Social Networks
239(8)
11.5.1 Privacy Issues in OSNs
240(3)
11.5.2 Strengthening Privacy in OSNs
243(1)
11.5.3 Ethical Issues in Online Social Networks
243(4)
11.6 Security and Crimes in Online Social Networks
247(6)
11.6.1 Beware of Ways to Perpetrate Crimes in Online Social Networks
248(2)
11.6.2 Defense Against Crimes in Online Social Networks
250(3)
11.7 Proven Security Protocols and Best Practices in Online Social Networks
253(6)
11.7.1 Authentication
254(1)
11.7.2 Access Control
254(1)
11.7.3 Legislation
255(1)
11.7.4 Self-regulation
255(1)
11.7.5 Detection
255(1)
11.7.6 Recovery
255(1)
References
256(3)
12 Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies
259(22)
12.1 Introduction
260(1)
12.2 Fifth-Generation (5G) Technology (G5)
260(4)
12.2.1 Overview of 5G Wireless Communications
260(1)
12.2.2 5G Network Architecture and Protocol Stack Perspectives
261(1)
12.2.3 Technical Challenges of 5G Technology
262(2)
12.3 The Internet of Things (IoT)
264(12)
12.3.1 Overview and Growth of Internet of Things
265(2)
12.3.2 Architecture and Networking of IoT
267(3)
12.3.3 Challenges of Using TCP/IP Architecture Over the IoT
270(2)
12.3.4 IoT Governance, Privacy, and Security Challenges
272(1)
12.3.5 Governance and Privacy Concerns
273(1)
12.3.6 Security Challenges
273(1)
12.3.7 Autonomy
274(1)
12.3.8 Computational Constraints
275(1)
12.3.9 Discovery
275(1)
12.3.10 Trust Relationships
276(1)
12.4 Ethical, Social, and Legal Impacts of 5G and IoT
276(2)
12.4.1 Environment
277(1)
12.4.2 E-Waste
277(1)
12.4.3 Conflict Minerals
277(1)
12.4.4 Healthy Issues Emanating from 5G and IoT Technologies
277(1)
12.4.5 Ethics
277(1)
12.5 Exercises
278(1)
12.6 Advanced Exercises
278(3)
References
279(2)
Index 281
Dr. Joseph Migga Kizza is Professor and Associate Dean of the College of Engineering and Computer Science, and former Director of the Center for Information Security and Assurance, at the University of Tennessee at Chattanooga, USA. He is also the author of the successful Springer titles Ethical and Social Issues in the Information Age and Guide to Computer Network Security.