You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Technology and Values provides a highly useful collection of essays organized around issues related to science, technology, public health, economics, the environment, and ethical theory. The editors present effective introductions that provide background information as well as philosophical tools and case studies to facilitate understanding of the variety of issues emanating from the most significant developments in technology, including the effects on privacy of the widespread use of computers to store and retrieve personal information and the ethical considerations of genetic engineering.
Intended for science and technology students, philosophy students interested in applied ethics, and others who must deal with computers and the impact they have on our society.
Surveying the major facts, concepts, theories, and speculations that infuse our present comprehension of time, the Encyclopedia of Time: Science, Philosophy, Theology, and Culture explores the contributions of scientists, philosophers, theologians, and creative artists from ancient times to the present. By drawing together into one collection ideas from scholars around the globe and in a wide range of disciplines, this Encyclopedia will provide readers with a greater understanding of and appreciation for the elusive phenomenon experienced as time. Features ยท Surveys historical thought about time, including those that emerged in ancient Greece, early Christianity, the Italian Renaissance, th...
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization. Add to that the spending restraints of a down economy, and IT managers find themselves in need of a thoughtful, rea
Dr Marian Quigley, HDTS (Art and Craft) Melbourne State College, BA Chisholm Inst., PhD, Monash University is Senior Lecturer and Director of Research and Postgraduate Studies in the School of Multimedia Systems, Faculty of Information Technology, Monash University, Australia. Marian has published several articles and presented a number of papers relating to social and ethical issues in Information Technology, particularly in relation to youth. She is currently completing a book on the effects of computer technology on Australian animators.
This book of readings is a flexible resource for undergraduate and graduate courses in the evolving fields of computer and Internet ethics. Each selection has been carefully chosen for its timeliness and analytical depth and is written by a well-known expert in the field. The readings are organized to take students from a discussion on ethical frameworks and regulatory issues to a substantial treatment of the four fundamental, interrelated issues of cyberethics: speech, property, privacy, and security. A chapter on professionalism rounds out the selection. This book makes an excellent companion to CyberEthics: Morality and Law in Cyberspace, Third Edition by providing articles that present both sides of key issues in cyberethics.
Over the last few decades information and communication technology has come to play an increasingly prominent role in our dealings with other people. Computers, in particular, have made available a host of new ways of interacting, which we have increasingly made use of. In the wake of this development a number of ethical questions have been raised and debated. Ethics in Cyberspace focuses on the consequences for ethical agency of mediating interaction by means of computers, seeking to clarify how the conditions of certain kinds of interaction in cyberspace (for example, in chat-rooms and virtual worlds) differ from the conditions of interaction face-to-face and how these differences may come to affect the behaviour of interacting agents in terms of ethics.
Computer Science
Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including: -Curriculum design; -Laboratory systems and exercises; -Security education program assessment; -Distance learning and web-based teaching of security; -Teaching computer forensics; -Laboratory-based system defense games; -Security education tools; -Education in security policies, management and system certification; -Case studies.