Author: Andrew A. Adams
Publisher: John Wiley & Sons
Release Date: 2008-02-15
Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to healthcare to war. Dealing with the implications of this is a major challenge, and one that can impact upon us, both personally and professionally. As a consequence, it is vital that all in the computing industry make wise decisions regarding their conduct. Using case studies and discussion topics drawn from entertaining real world examples, Pandora’s Box examines the background of a wide range of vital contemporary issues, encouraging readers to examine the social, legal and ethical challenges they will face in their own careers. Written in an engaging style and packed with international examples, this book addresses topics which have come to the forefront of public consciousness in recent years, such as online crime, piracy and peer to peer file sharing. Comprehensive coverage is provided of digital entertainment, censorship and privacy issues, presenting a rich source of context in which to consider ethical matters. Suitable for students on computer science degree programmes, as well as those taking IT related modules on other courses which consider the impact of technology on 21st century living, Pandora’s Box is an essential read and a unique and timely textbook.
This textbook raises thought-provoking questions regarding our rapidly-evolving computing technologies, highlighting the need for a strong ethical framework in our computer science education. Ethics in Computing offers a concise introduction to this topic, distilled from the more expansive Ethical and Social Issues in the Information Age. Features: introduces the philosophical framework for analyzing computer ethics; describes the impact of computer technology on issues of security, privacy and anonymity; examines intellectual property rights in the context of computing; discusses such issues as the digital divide, employee monitoring in the workplace, and health risks; reviews the history of computer crimes and the threat of cyberbullying; provides coverage of the ethics of AI, virtualization technologies, virtual reality, and the Internet; considers the social, moral and ethical challenges arising from social networks and mobile communication technologies; includes discussion questions and exercises.
Author: Joseph Migga Kizza
Publisher: Springer Science & Business Media
Release Date: 2003
This textbook provides an introduction to the social and policy issues which have arisen as a result of information technology. Whilst it assumes a modest familiarity with computers, its aim is to provide a guide to the issues suitable for undergraduates. In doing so, the author prompts the students to consider questions such as: how do morality and the law relate to each other?; what should be covered in a professional Code of Conduct for Information Technology professionals?; what are the ethical issues relating to copying software?; is electronic monitoring of employees wrong?; and what are the moral codes of cyberspace? Throughout, the book shows how in many ways the technological development is outpacing the ability of our legal systems to keep up, and how different paradigms applied to ethical questions may often offer conflicting conclusions.
Author: Sharma, Ravi S.
Publisher: IGI Global
Release Date: 2011-10-31
Increasingly, multimedia contentfrom music, movies, games, news, books, and digital art to sharable educational material, e-government services, and e-health servicesis delivered over broadband networks. With technological advances, cloud computing applications, and social networking approaches, many exciting applications are emerging to deliver this content as Interactive Digital Media (IDM). Understanding the Interactive Digital Media Marketplace: Frameworks, Platforms, Communities and Issues presents the results of a large, industry-oriented, multi-national research program. This research seeks to discover usable business models, technology platforms, market strategies and policy frameworks for the emerging global digital economy, particularly for digital media researchers and industry entrepreneurs who wish to reach users around the world.
This book introduces ongoing reflections within the research community on established information systems development topics and emerging concepts, approaches and ideas in the field of healthcare information systems. By promoting research on theoretical and methodological issues related to both information systems development in general and healthcare information systems in particular, it presents current research in order to promote improved practice. It comprises a selection of the best papers presented at the 24th International Conference on Information Systems Development (ISD) held in Harbin, China, August 25 – 27, 2015.
Author: Joseph Savirimuthu
Release Date: 2016-12-05
During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and surveillance. This level of engagement is both welcome and timely, particularly in a climate of growing public mistrust of State surveillance activities and business predisposition to monetize information relating to the online activities of users. This volume is informed by the range of discussions currently conducted at scholarly and policy levels. The essays illustrate the value of viewing privacy concerns not only in terms of the means by which information is communicated but also in terms of the political processes that are inevitably engaged and the institutional, regulatory and cultural contexts within which meanings regarding identity and security are constituted.
Author: Director Surgical Pathology and Associate Professor School of Medicine and Public Health University of Wisconsin-Madison Agnes G Loeffler
Publisher: Jones & Bartlett Publishers
Release Date: 2015-01-01
Author: Myriam Dunn Cavelty
Release Date: 2007-11-28
Genre: Political Science
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.
Author: Andrew T. Adams
Publisher: John Wiley & Sons
Release Date: 2003-07-01
Genre: Business & Economics
Investment Mathematics provides an introductory analysis of investments from a quantitative viewpoint, drawing together many of the tools and techniques required by investment professionals. Using these techniques, the authors provide simple analyses of a number of securities including fixed interest bonds, equities, index-linked bonds, foreign currency and derivatives. The book concludes with coverage of other applications, including modern portfolio theory, portfolio performance measurement and stochastic investment models.
This engaging text presents the fundamental mathematics and modelling techniques for computing systems in a novel and light-hearted way, which can be easily followed by students at the very beginning of their university education. Key concepts are taught through a large collection of challenging yet fun mathematical games and logical puzzles that require no prior knowledge about computers. The text begins with intuition and examples as a basis from which precise concepts are then developed; demonstrating how, by working within the confines of a precise structured method, the occurrence of errors in the system can be drastically reduced. Features: demonstrates how game theory provides a paradigm for an intuitive understanding of the nature of computation; contains more than 400 exercises throughout the text, with detailed solutions to half of these presented at the end of the book, together with numerous theorems, definitions and examples; describes a modelling approach based on state transition systems.
Author: Sara Baase
Publisher: Pearson Higher Ed
Release Date: 2012-07-12
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology, 4e is ideal for courses in Computer Ethics and Computers and Society. It is also a useful reference for computer science professionals or anyone interested in learning more about computing technology and its overarching impact. Sara Baase explores the social, legal, philosophical, ethical, political, constitutional, and economic implications of computing and the controversies they raise. With a computer scientist's perspective, and with historical context for many issues, she covers the issues students will face both as members of a technological society and as professionals in computer-related fields. A primary goal is to develop computer professionals who understand the implications of what they create and how it fits into society at large.
Author: G. Nigel Gilbert
Publisher: CUP Archive
Release Date: 1984-02-23
Genre: Social Science
This book proposes a fresh approach to sociological analysis and, in particular, to the analysis of scientific culture. It moves away from previous studies, which have tended to focus on scientists' actions and beliefs to show that analysis of scientific discourse can be productive and revealing. The book demonstrates that scientists produce varying accounts of their actions and beliefs in different social situations. Rather than attempting to extract one coherent interpretation from these diverse accounts, the study identifies two basic scientific repertoires and shows how scientists use them to create their discourse. This provides a point of departure for more complex analytical topics. Discourse analysis is applied to show how different degrees of 'consensus' can be ascribed to the same group of scientists at a given moment in time through the application of standard interpretive techniques. Finally, discourse analysis is used to explore scientists' humour, a neglected topic that is shown to provide important insights into the normally hidden interpretive regularities which underlie the cultural diversity of science.