Ethical and Social Issues in the Information Age

The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences.

Author: Joseph Migga Kizza

Publisher: Springer Science & Business Media

ISBN: 9781849960380

Category: Social Science

Page: 335

View: 889

Download →

The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual’s social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations’ strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.
Posted in:

Ethical and Social Issues in the Information Age

In addition, the book explores techniques in electronic crime investigation. This new edition features three new chapters that cover computer network crimes, computer crime investigations, and biometrics.

Author: Joseph Migga Kizza

Publisher: Springer Science & Business Media

ISBN: 9781846286582

Category: Computers

Page: 432

View: 140

Download →

This new edition provides an updated discussion on the ethical and social issues that continue to evolve as computing and information technologies proliferate. It surveys thought-provoking questions about the impact of technology. It shows how changes in information technology influence morality and the law and is a cogent analysis of civil liberties, harassment, and discrimination. In addition, the book explores techniques in electronic crime investigation. This new edition features three new chapters that cover computer network crimes, computer crime investigations, and biometrics.
Posted in:

Computers at Risk

The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced ...

Author: National Research Council

Publisher: National Academies Press

ISBN: 9780309043885

Category: Computers

Page: 320

View: 557

Download →

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Posted in:

Ethics in Computing

Topics and features: Introduces the philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres Describes the impact of computer technology on issues of security, privacy, ...

Author: Joseph Migga Kizza

Publisher: Springer

ISBN: 9783319291062

Category: Computers

Page: 276

View: 367

Download →

This textbook raises thought-provoking questions regarding our rapidly-evolving computing technologies, highlighting the need for a strong ethical framework in our computer science education. Ethics in Computing offers a concise introduction to this topic, distilled from the more expansive Ethical and Social Issues in the Information Age. Features: introduces the philosophical framework for analyzing computer ethics; describes the impact of computer technology on issues of security, privacy and anonymity; examines intellectual property rights in the context of computing; discusses such issues as the digital divide, employee monitoring in the workplace, and health risks; reviews the history of computer crimes and the threat of cyberbullying; provides coverage of the ethics of AI, virtualization technologies, virtual reality, and the Internet; considers the social, moral and ethical challenges arising from social networks and mobile communication technologies; includes discussion questions and exercises.
Posted in:

Computing in the Information Age

The objective of this book is to explain computing today in a clear and meaningful way and to focus on those concepts likely to have the greatest impact as we approach the next century and the next phase of the information revolution.

Author: Nancy B. Stern

Publisher: Wiley

ISBN: 0471110612

Category: Business & Economics

Page: 528

View: 876

Download →

Computing in the Information Age 2E is written for people with little or no background in Computing. The objective of this book is to explain computing today in a clear and meaningful way and to focus on those concepts likely to have the greatest impact as we approach the next century and the next phase of the information revolution. The unique applicability of computers to business and to life is demonstrated, the advantage gained by knowing how and when to use computers, and the potential of computers to enrich our life.
Posted in:

Computing in the Information Age Study Guide

The objective of this book is to explain computing today in a clear and meaningful way and to focus on those concepts likely to have the greatest impact as we approach the next century and the next phase of the information revolution.

Author: Nancy B. Stern

Publisher: Wiley

ISBN: 0471141267

Category: Computers

Page: 272

View: 470

Download →

Computing in the Information Age 2E is written for people with little or no background in Computing. The objective of this book is to explain computing today in a clear and meaningful way and to focus on those concepts likely to have the greatest impact as we approach the next century and the next phase of the information revolution. The unique applicability of computers to business and to life is demonstrated, the advantage gained by knowing how and when to use computers, and the potential of computers to enrich our life.
Posted in:

Disconnected

These two men happen to live in Windhoek, Namibia, but this is not a story about Africa--it is a story that could be repeated almost anywhere in the world, even next door.

Author: William Wresch

Publisher: Rutgers University Press

ISBN: 0813523702

Category: Computers

Page: 268

View: 269

Download →

In the Information Age, information is power. Who produces all that information, how does it move around, who uses it, to what ends, and under what constraints? Who gets that power? And what happens to the people who have no access to it? Disconnected begins with a striking vignette of two men: One is the thriving manager of a company selling personal computers and computer services. The other is just one among thousands of starving laborers. He has no way to find the information that might help him find a job, he cannot afford newspapers, rarely sees television, cannot understand the dialect of local radio broadcasts, will probably never touch a computer. These two men happen to live in Windhoek, Namibia, but this is not a story about Africa--it is a story that could be repeated almost anywhere in the world, even next door. With vivid anecdotes and data, William Wresch contrasts the opportunities of the information-rich with the limited prospects of the information-poor. Surveying the range of information--personal, public, organizational, commercial­--that has become the currency of exchange in today's world, he shows how each represents a form of power. He analyzes the barriers that keep people information-poor: geography, tyranny, illiteracy, psychological blinders, "noise," crime. Technology alone, he demonstrates, is not the answer. Even the technology-rich do not always get access to important information--or recognize its value. Wresch spells out the grim consequences of information inequity for individuals and society. Yet he ends with reasons for optimism and stories of people who are working to pull down the impediments to the flow of information.
Posted in:

Pandora s Box

Dealing with the implications of this is a major challenge, and one that can impact upon us, both personally and professionally. As a consequence, it is vital that all in the computing industry make wise decisions regarding their conduct.

Author: Andrew A. Adams

Publisher: John Wiley & Sons

ISBN: 9780470065532

Category: Computers

Page: 664

View: 918

Download →

Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to healthcare to war. Dealing with the implications of this is a major challenge, and one that can impact upon us, both personally and professionally. As a consequence, it is vital that all in the computing industry make wise decisions regarding their conduct. Using case studies and discussion topics drawn from entertaining real world examples, Pandora’s Box examines the background of a wide range of vital contemporary issues, encouraging readers to examine the social, legal and ethical challenges they will face in their own careers. Written in an engaging style and packed with international examples, this book addresses topics which have come to the forefront of public consciousness in recent years, such as online crime, piracy and peer to peer file sharing. Comprehensive coverage is provided of digital entertainment, censorship and privacy issues, presenting a rich source of context in which to consider ethical matters. Suitable for students on computer science degree programmes, as well as those taking IT related modules on other courses which consider the impact of technology on 21st century living, Pandora’s Box is an essential read and a unique and timely textbook.
Posted in:

Computers at Risk

The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced ...

Author: National Research Council

Publisher: National Academies Press

ISBN: 0309074819

Category: Computers

Page: 320

View: 235

Download →

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Posted in:

Ethics for the Information Age

In the Seventh Edition, Quinn provides an impartial look at the problems technology both solves and creates.

Author: Michael J. Quinn

Publisher: Pearson

ISBN: 0134296540

Category:

Page: 544

View: 100

Download →

Posted in:

Grace Hopper and the Invention of the Information Age

In Grace Hopper and the Invention of the Information Age, Kurt Beyer reveals a more authentic Hopper, a vibrant and complex woman whose career paralleled the meteoric trajectory of the postwar computer industry.

Author: Kurt W. Beyer

Publisher: MIT Press

ISBN: 9780262517263

Category: Biography & Autobiography

Page: 404

View: 629

Download →

The career of computer visionary Grace Murray Hopper, whose innovative work in programming laid the foundations for the user-friendliness of today's personal computers that sparked the information age. A Hollywood biopic about the life of computer pioneer Grace Murray Hopper (1906–1992) would go like this: a young professor abandons the ivy-covered walls of academia to serve her country in the Navy after Pearl Harbor and finds herself on the front lines of the computer revolution. She works hard to succeed in the all-male computer industry, is almost brought down by personal problems but survives them, and ends her career as a celebrated elder stateswoman of computing, a heroine to thousands, hailed as the inventor of computer programming. Throughout Hopper's later years, the popular media told this simplified version of her life story. In Grace Hopper and the Invention of the Information Age, Kurt Beyer reveals a more authentic Hopper, a vibrant and complex woman whose career paralleled the meteoric trajectory of the postwar computer industry. Both rebellious and collaborative, Hopper was influential in male-dominated military and business organizations at a time when women were encouraged to devote themselves to housework and childbearing. Hopper's greatest technical achievement was to create the tools that would allow humans to communicate with computers in terms other than ones and zeroes. This advance influenced all future programming and software design and laid the foundation for the development of user-friendly personal computers.
Posted in:

Computing in the Information Age

The objective of this book is to explain computing today in a clear and meaningful way and to focus on those concepts likely to have the greatest impact as we approach the next century and the next phase of the information revolution.

Author: Nancy Stern

Publisher:

ISBN: 0471155403

Category:

Page: 900

View: 809

Download →

Computing in the Information Age 2E is written for people with little or no background in Computing. The objective of this book is to explain computing today in a clear and meaningful way and to focus on those concepts likely to have the greatest impact as we approach the next century and the next phase of the information revolution. The unique applicability of computers to business and to life is demonstrated, the advantage gained by knowing how and when to use computers, and the potential of computers to enrich our life.
Posted in:

Computers Information Systems

Updates information on computer graphics, AI, expert systems, Macintosh, and integrates information on PCs throughout the book.

Author: H. L. Capron

Publisher: Prentice Hall

ISBN: UCSC:32106016966084

Category: Computers

Page: 608

View: 744

Download →

This revision of a bestselling introductory computing book is an excellent introduction for training non-technical personnel in computers. Written in simple non-technical language, the book gives a thorough treatment of the concepts of computers and computing. Updates information on computer graphics, AI, expert systems, Macintosh, and integrates information on PCs throughout the book.
Posted in: