Foreword |
|
xvii | |
|
|
1 | (12) |
|
Repeating Concepts, Observations and Insights |
|
|
1 | (9) |
|
|
10 | (3) |
|
|
|
2 Cyberspace: The Ethical Frontier [ 1995] |
|
|
13 | (4) |
|
3 But IS IT Ethical? [ 1995] |
|
|
17 | (6) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
An Ethical Focus for IS/IT |
|
|
19 | (1) |
|
|
19 | (2) |
|
|
21 | (2) |
|
4 Information Ethics: The Second Generation [ 1996] |
|
|
23 | (10) |
|
|
23 | (1) |
|
Computer Ethics: The First Generation |
|
|
24 | (1) |
|
The Scope of Computer Ethics |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
The Application Dimension |
|
|
26 | (3) |
|
|
29 | (1) |
|
Information Ethics not Computer Ethics |
|
|
29 | (1) |
|
|
30 | (3) |
|
5 A Review of Information Ethics [ 2010] |
|
|
33 | (14) |
|
|
33 | (1) |
|
The Beginning of Information Ethics |
|
|
34 | (1) |
|
Definitions of Information Ethics |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
A Definition for Organisational ICT |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
43 | (4) |
|
6 Towards a Chronological Taxonomy of Tourism Technology: An Ethical Perspective [ 2018] |
|
|
47 | (16) |
|
|
47 | (1) |
|
|
48 | (1) |
|
Thomas Cook and Technology |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
Early Computational and Computer Technology |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
One Further Ethical Concern |
|
|
52 | (1) |
|
|
53 | (3) |
|
|
56 | (1) |
|
Addendum (17 December 2020) |
|
|
57 | (1) |
|
Thomas Cook Archive Preservation -- Statement to the Business Archives Council by Professor Simon Rogerson (29 September 2019) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (5) |
|
|
|
7 The Ethics of Software Development Project Management [ 1996] |
|
|
63 | (8) |
|
|
63 | (1) |
|
The Target Project Management Approach |
|
|
63 | (2) |
|
|
65 | (1) |
|
Ethical Project Management |
|
|
66 | (1) |
|
Step 1: Visualise What the Goal Is |
|
|
67 | (1) |
|
Step 8: Tell People What Is Going On |
|
|
67 | (1) |
|
|
68 | (1) |
|
The Primary Ethical Hotspots of Project Management |
|
|
68 | (1) |
|
|
68 | (1) |
|
Information Dissemination to the Client |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (2) |
|
8 An Ethical Review of Information Systems Development: The Australian Computer Society's Code of Ethics and SSADM [ 2000] |
|
|
71 | (16) |
|
|
71 | (1) |
|
|
72 | (1) |
|
The ACS Code as an Analytical Tool |
|
|
73 | (1) |
|
An Overview of SSADM Version 4 |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (2) |
|
|
82 | (1) |
|
|
82 | (1) |
|
Appendix 8 A: The Australian Computer Society Code of Ethics |
|
|
83 | (4) |
|
9 A Practical Perspective of Information Ethics [ 2001] |
|
|
87 | (12) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
Activity 1: Defining the Scope of the SISP Exercise |
|
|
90 | (1) |
|
Activity 5: Presenting the Final Output to the Client |
|
|
91 | (1) |
|
|
91 | (2) |
|
|
93 | (1) |
|
The Software Development Impact Statement |
|
|
93 | (1) |
|
Information Systems Development |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
97 | (2) |
|
10 Responsible Risk Assessment with Software Development: Creating the Software Development: Impact Statement [ 2005] |
|
|
99 | (20) |
|
|
99 | (3) |
|
Addressing the Risk Analysis Problems |
|
|
102 | (1) |
|
|
102 | (1) |
|
Categorising Projects to Aid Risk Identification |
|
|
103 | (1) |
|
|
104 | (1) |
|
Quantitative versus Qualitative Approaches to Risk |
|
|
105 | (2) |
|
Towards Expanded Risk Analysis |
|
|
107 | (1) |
|
|
108 | (2) |
|
Stage 1 Define Project and Identify Stakeholders |
|
|
110 | (1) |
|
Project Type Identification (1A) |
|
|
110 | (2) |
|
|
112 | (1) |
|
Stakeholder Instances (1C) |
|
|
112 | (1) |
|
Stage 2 Generate the Task List |
|
|
113 | (1) |
|
Stage 3 Identifying Risks |
|
|
113 | (1) |
|
Stage 4 Identification and Articulation of Solution and Generation of the SoDIS |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (3) |
|
11 Information Systems Ethics -- Challenges and Opportunities [ 2019] |
|
|
119 | (12) |
|
|
119 | (1) |
|
|
120 | (3) |
|
Addressing the Ethical Dimension |
|
|
123 | (1) |
|
An Ethical Review of Current IS Practice |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (5) |
|
|
|
12 The Social Impact of Smart Card Technology [ 1998] |
|
|
131 | (10) |
|
|
131 | (1) |
|
The Nature of Smart Cards |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
Social Benefits and Costs |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (3) |
|
13 A Moral Approach to Electronic Patient Records [ 2001] |
|
|
141 | (16) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Other Research into the Problem |
|
|
143 | (1) |
|
|
143 | (2) |
|
The Fair Information Principles |
|
|
145 | (2) |
|
|
147 | (1) |
|
Tensions between and within Principles |
|
|
147 | (2) |
|
|
149 | (2) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (3) |
|
14 Internet Voting -- Well at Least It's "Modern" [ 2003] |
|
|
157 | (12) |
|
|
157 | (1) |
|
If You Can Bank on the Internet |
|
|
157 | (1) |
|
|
158 | (2) |
|
|
160 | (1) |
|
Denial of Service Attacks |
|
|
160 | (1) |
|
Virus and Malware Attacks |
|
|
161 | (1) |
|
|
162 | (1) |
|
Conclusion on Vulnerabilities |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (3) |
|
15 Digital Existence -- The Modern Way to Be [ 2018] |
|
|
169 | (14) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
The Online World Continuum |
|
|
173 | (1) |
|
|
173 | (2) |
|
|
175 | (4) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (3) |
|
16 Is Professional Practice at Risk Following the Volkswagen and Tesla Revelations? [ 2017] |
|
|
183 | (14) |
|
|
183 | (1) |
|
The Volkswagen Case Study |
|
|
184 | (2) |
|
Professional Standards Analysis |
|
|
186 | (1) |
|
|
187 | (3) |
|
Professional Standards Analysis |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (2) |
|
|
193 | (1) |
|
|
194 | (3) |
|
17 The Dangers of Dual-Use Technology: A Thought Experiment Expose [ 2019] |
|
|
197 | (8) |
|
|
197 | (1) |
|
The Reality in Nazi Germany |
|
|
198 | (1) |
|
First Thought Experiment 2006 |
|
|
199 | (1) |
|
Inbound Logistics: The Receiving and Warehousing of Raw Materials and Their Distribution to the Industrial Process as They are Required |
|
|
199 | (1) |
|
Operations: The Processes of Transforming Inputs into Finished Products and Services |
|
|
200 | (1) |
|
Outbound Logistics: The Warehousing and Distribution of Finished Goods |
|
|
200 | (1) |
|
The Infrastructure: Organisational Structure and Control Systems |
|
|
200 | (1) |
|
Second Thought Experiment 2018 |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
203 | (2) |
|
18 Grey Digital Outcasts and COVID-19 [ 2020] |
|
|
205 | (18) |
|
|
205 | (1) |
|
|
206 | (1) |
|
Digital Technology Players |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (2) |
|
Perspectives from Other Countries |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
Commonalities and the Way Forward |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (2) |
|
|
218 | (5) |
|
|
|
19 E.Society -- Panacea or Apocalypse? [ 1998] |
|
|
223 | (6) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
Demands of the Information Age |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
227 | (2) |
|
20 The Virtual World A Tension between Global Reach and Local Sensitivity [ 2004] |
|
|
229 | (8) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
Fit for Purpose Technology |
|
|
233 | (1) |
|
Law, Regulation and Ethics |
|
|
233 | (2) |
|
|
235 | (1) |
|
|
235 | (2) |
|
|
237 | (16) |
|
|
237 | (2) |
|
An Ethics Progress Litmus Test |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
Linking Research and Practice |
|
|
243 | (2) |
|
Educating Future Generations |
|
|
245 | (1) |
|
Future Vision and Conclusions |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (5) |
|
|
|
22 Preparing to Handle Dilemmas in the Computing Profession [ 1996] |
|
|
253 | (4) |
|
|
255 | (2) |
|
23 Preparing IT Professionals of the Future [ 2014] |
|
|
257 | (12) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
Toolset for Practical IT Ethics |
|
|
261 | (2) |
|
Experiential Learning for Computer Science and Software Engineering Undergraduates |
|
|
263 | (1) |
|
Exercise Using Product-Product |
|
|
263 | (1) |
|
SoDIS Project Auditor Laboratory |
|
|
264 | (1) |
|
Exercise Using the Software Engineering Code of Ethics and Professional Practice |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (3) |
|
24 Using Technology to Incorporate Students' Work-Based Experiences into a Blended Learning Environment [ 2008] |
|
|
269 | (10) |
|
|
269 | (2) |
|
The Experiential Learning Pedagogy |
|
|
271 | (1) |
|
|
271 | (2) |
|
|
273 | (2) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
277 | (2) |
|
25 Poetical Potentials The Value of Poems in Social Impact Education [ 2020] |
|
|
279 | (6) |
|
|
279 | (1) |
|
|
280 | (1) |
|
Extract from the Nature of Information |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
Machine -- The Final Chapter |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (2) |
|
26 Start a Revolution in Your Head! The Rebirth of ICT Ethics Education [ 2020] |
|
|
285 | (14) |
|
|
285 | (1) |
|
Avenue 1 Science and Technology Museums |
|
|
286 | (2) |
|
Avenue 2 Learning from History |
|
|
288 | (1) |
|
Avenue 3 Thought Experiments (See Chapter 17) |
|
|
289 | (2) |
|
Avenue 4 Poetry (See Chapter 25) |
|
|
291 | (1) |
|
Beyond STEM Both Formally and Informally |
|
|
292 | (2) |
|
|
294 | (1) |
|
|
294 | (5) |
|
|
|
27 Landscape for the Future |
|
|
299 | (14) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
A Plea for Interdisciplinarity |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
The Complexity of Emerging Smart Technologies and the Future of Interdisciplinarity |
|
|
307 | (1) |
|
Mundane Ethics and the Focus on Everyday Interactions |
|
|
307 | (1) |
|
Creating Responsible Technologies by Design |
|
|
307 | (1) |
|
Responsibility across the Technology Life Cycle |
|
|
308 | (1) |
|
|
308 | (2) |
|
|
310 | (1) |
|
|
311 | (2) |
Index |
|
313 | |