- Full Description
This 3rd edition takes off where the 2nd ended to examine ethical, social, and policy challenges steaming from the emergence of cyberspace and the convergence of telecommunication and computing technologies, and the miniaturalization of computing, telecommunication, and information enabling devices. New topics and features include: Provides fundamental discussion of computer network security system design and operation to reveal vulnerable areas in the computer network infrastructure; introduces and explores techniques in electronic crime investigation; explores biometric techniques to system access control. This book provides an updated discussion of the ethical and social issues that continue to evolve as computing and information technologies proliferate. Students, practitioners, and professionals who need to know about computer ethics, the legal aspects of computing, network security, computer crime investigation, and biometrics will find this an invaluable resource that addresses the latest in computer and information security.
- Table of Contents
Table of Contents
- Introduction to Social and Ethical Computing.
- Morality and the Law.
- Ethics, Technology and Value, Ethics and the Professions.
- Anonymity, Security, Privacy and Civil Liberties.
- Intellectual Property Rights and Computer Technology.
- Social Context of Computing.
- Software Issues: Risks and Liabilities.
- Computer Crimes.
- New Frontiers for Computer Ethics: Artificial Intelligence, Cyberspace and Virtual Reality.
- Cyberspace and Cyberethics.
- Computer Networks Crimes.
- Computer Crime Investigations – Computer Forensics.
- Appendix A: The Digital Millennium Copyright Act.
- Appendix B: The Federal False Claims Act.
- Appendix C.
If you think that you've found an error in this book, please let us know by emailing to email@example.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed. No errata are currently published