- Table View
- List View
Ethereum for Web Developers: Learn to Build Web Applications on top of the Ethereum Blockchain
by Santiago PalladinoTechnology is constantly evolving, and blockchain is taking development to new places, as mobile did a decade ago – and Ethereum is the leading platform for creating this new wave of applications. This book reveals everything you need to create a robust decentralized application (more commonly known as DApp). Unlike other books on the topic, this one focuses on the web application layer, and guides you in creating great experiences on top of the Ethereum blockchain. You’ll review the challenges and differences involved in developing DApps as opposed to traditional web applications. After a brief introduction to blockchain history and Ethereum in particular, you’ll jump directly into building a sample decentralized application, to familiarize yourself with all the moving pieces. This book offers specific chapters on querying and rendering data from the blockchain, reacting to events, interacting with user accounts, sending transactions, managing gas, handling confirmations and reorganizations, and more. You will also find a chapter dedicated to Solidity that will give you the necessary means to understand and even build your own smart contracts. Other important topics covered include building backend servers that act as indexing layers, and managing storage efficiently with solutions like the interplanetary file system, or IPFS. Last but not least, you will find chapters that examine the biggest problems on Ethereum today: onboarding and scalability. These include the state of the art of the available strategies to tackle them, such as meta-transactions, smart accounts, ENS, state channels, sidechains, and more. What You'll Learn Connect to the blockchain from the browser and send transactions from client-sideBuild a web app that provides a read-only interface to a blockchain contract Create a wallet interface for arbitrary fungible tokens, displaying the user’s balance and allowing for simple transfers to other addressesDevelop a web app that stores large blobs of data off-chain, and keeps a reference to it on-chain (e.g. avatars, long text descriptions) Produce a web app that relies on a centralized server for indexing on-chain information to be presented to the user Who This Book Is ForWeb developers focused on client-side applications, with knowledge of JavaScript and HTML/CSS. You do not need any prior knowledge of Blockchain, Ethereum, or cryptocurrency.
Ethereum: Tools & Skills
by Bruno Skvorc Ahmed Bouchefra Mislav Javor Tonino JankovAs the Ethereum platform has grown, so has the ecosystem of tools that support it. In this book, we'll examine some of the most popular Ethereum tools, and walk you through how to use them when building your own Ethereum-based apps. It contains: Remix: Develop Smart Contracts for the Ethereum Blockchain by Ahmed BouchefraAn Introduction to Geth and Running Ethereum Nodes by Mislav JavorIntroducing Mist, a Human-friendly Geth Interface by Mislav JavorIntroducing Truffle, a Blockchain Smart Contract Suite by Mislav JavorQuality Solidity Code with OpenZeppelin and Friends by Tonino JankovTruffle: Testing Smart Contracts by Mislav JavorTruffle Migrations Explained by Mislav JavorFlattening Contracts and Debugging with Remix by Ahmed BouchefraDebugging with Truffle CLI by Mislav JavorUsing Puppeth, the Ethereum Private Network Manager by Bruno Skvorc This book is for anyone interested in using the Ethereum platform for development. It's advised that you read The Developer's Guide to Ethereum before reading this book if you are not familiar with blockchain technology.
Ethernet Switches: An Introduction to Network Design with Switches
by Joann Zimmerman Charles E. SpurgeonIf you’re ready to build a large network system, this handy excerpt from Ethernet: The Definitive Guide, Second Edition gets you up to speed on a basic building block: Ethernet switches. Whether you’re working on an enterprise or campus network, data center, or Internet service provider network, you’ll learn how Ethernet switches function and how they’re used in network designs.This brief tutorial also provides an overview of the most important features found in switches, from the basics to more advanced features found in higher-cost and specialized switches.Get an overview of basic switch operation, the spanning tree protocol, and switch performance issuesLearn about switch management and some of the most widely used switch featuresDiscover how a hierarchical design can help maintain stable network operationsDelve into special-purpose switches, such as multi-layer, access, stacking, and wireless access-point switchesLearn about advanced switch features designed for specific networking environmentsDive deeper into switches, with a list of protocol and package documentation
Ethernet. Biblia administratora
by Joann Zimmerman Charles E. SpurgeonKompendium wiedzy o sieciach Ethernet! Biblia administratora sieci Ethernet!Standard Ethernet powsta? w 1976 roku w o?rodku badawczym firmy Xerox. Wykorzystywany do budowy sieci lokalnych, znajduje zastosowanie praktycznie w ka?dym miejscu. Sieci Ethernet spotkasz zarówno w mieszkaniach czy domach, jak i w biurach czy centrach danych. W zale?no?ci od bud?etu, jakim dysponujesz, mo?esz zbudowa? sie? dostosowan? do w?asnych potrzeb. Nowoczesne sieci Ethernet pozwalaj? na niezawodne przesy?anie danych z ogromnymi pr?dko?ciami.W Twoje r?ce oddajemy bibli? wiedzy o sieciach Ethernet, która odpowie na wszystkie nurtuj?ce Ci? pytania oraz zaprezentuje nowoczesne techniki wykorzystania tych sieci. Przekonasz si?, jak wygl?da proces automatycznej negocjacji oraz jak zasila? urz?dzenia za pomoc? Ethernetu. W kolejnych rozdzia?ach znajdziesz charakterystyczne elementy popularnych sieci 10, 100 i 1000 Mb/s oraz niezwykle wydajnych sieci o pr?dko?ci dochodz?cej do 400 Gb/s. Trzecia cz??? tej ksi??ki zosta?a po?wi?cona budowie systemu Ethernet. Poznasz tu systemy okablowania strukturalnego, dost?pne kable, z??cza oraz prze??czniki. Ksi??ka ta jest obowi?zkow? pozycj? na pó?ce ka?dego administratora, który chce pozna? swoj? sie? od podszewki.Dzi?ki tej ksi??ce: poznasz histori? standardu Ethernet zrozumiesz zasad? jego dzia?ania zobaczysz, jaki potencja? kryj? sieci Ethernet nauczysz si? projektowa? wydajne rozwi?zania poznasz tajniki dzia?ania Twojej sieciCharles Spurgeon jest starszy architektem technologii na Uniwersytecie Stanu Texas w Austin, gdzie pracuje z systemem sieci kampusu obs?uguj?cej ponad 70 000 u?ytkowników w 200 budynkach. Pomaga? budowa? prototyp routerów ethernetowych, które sta?y si? podstaw? dla technologii urz?dze? produkowanych przez Cisco Systems.Joann Zimmerman jest in?ynierem oprogramowania. Jest twórczyni? i autork? dokumentacji kompilatorów, narz?dzi wytwarzania oprogramowania i oprogramowania do monitorowania sieci. Bra?a równie? udzia? w tworzeniu procesu zarz?dzania konfiguracj? i kompilacj? w kilku firmach.
Ethernet: Designing and Managing Local Area Networks
by Joann Zimmerman Charles E. SpurgeonGet up to speed on the latest Ethernet capabilities for building and maintaining networks for everything from homes and offices to data centers and server machine rooms. This thoroughly revised, comprehensive guide covers a wide range of Ethernet technologies, from basic operation to network management, based on the authors’ many years of field experience.When should you upgrade to higher speed Ethernet? How do you use switches to build larger networks? How do you troubleshoot the system? This book provides the answers. If you’re looking to build a scalable network with Ethernet to satisfy greater bandwidth and market requirements, this book is indeed the definitive guide.Examine the most widely used media systems, as well as advanced 40 and 100 gigabit EthernetLearn about Ethernet’s four basic elements and the IEEE standardsExplore full-duplex Ethernet, Power over Ethernet, and Energy Efficient EthernetUnderstand structured cabling systems and the components you need to build your Ethernet systemUse Ethernet switches to expand and improve network designDelve into Ethernet performance, from specific channels to the entire networkGet troubleshooting techniques for problems common to twisted-pair and fiber optic systems
Ethernet: The Definitive Guide
by Charles E. SpurgeonEthernet has been the flavor of choice for networking administrators since the early 1980s. Written by one of the foremost experts on Ethernet standards and configuration, Ethernet: The Definitive Guidehas all the information you need to set up and maintain a scalable local area network (LAN) using Ethernet. The book includes an introduction to Ethernet and sections on media systems, how to build your Ethernet system, performance analysis, and troubleshooting.
Ethernet: The Definitive Guide
by Charles SpurgeonEthernet is a core networking technology used by every high tech business. While the basic protocols have changed little, new options such as Fast Ethernet and Gigabit Ethernet have increased the complexity of the topic. Ethernet has been the flavor of choice for networking administrators since the early 1980s because of its ease of use and scalability. Written by one of the foremost experts on Ethernet standards and configuration, Charles E. Spurgeon, Ethernet: The Definitive Guide includes everything you need to know to set up and maintain an Ethernet network. Ethernet: The Definitive Guide teaches you everything you need to know about the IEEE 802.3 Ethernet standard and its protocols. The book is logically separated into five parts: Introduction to Ethernet provides a tour of basic Ethernet theory and operation, including a description of Ethernet frames, operation of the Media Access Control (MAC) protocol, full-duplex mode and auto-negotiation. Ethernet Media Systems is the heart of the book. This sectionof Ethernet: The Definitive Guide shows you how to build media-specific Ethernet networks, from a basic 10BASE-T Ethernet offering 10 Mbps over twisted-pair cables, to an advanced 1000BASE-X Gigabit Ethernet, providing up to 1 Gbps of data transfer over fiber optic cables. Building Your Ethernet System teaches you how to build twisted-pair and fiber optic media segments, as well as how to build your Ethernet using repeaters and hubs. Performance and Troubleshooting is divided into two chapters. The first describes both the performance of a given Ethernet channel, as well as the performance of the entire network system. The second includes a tutorial on troubleshooting techniques and describes the kinds of problems network administrators are likely to encounter. The last part of the book includes a complete glossary of terms used throughout the book, a resource list, descriptions of thick and thin coax-based Ethernet systems, a guide to AUI equipment installation and configuration, and a listing of troubleshooting numbers. This book is the definitive guide for anyone wanting to build a scalable local area network (LAN) using Ethernet.
Ethical Artificial Intelligence from Popular to Cognitive Science: Trust in the Age of Entanglement
by Jordan Richard SchoenherrThis book offers a unique interdisciplinary perspective on the ethics of 'artificial intelligence' – autonomous, intelligent, (and connected) systems, or AISs, applying principles of social cognition to understand the social and ethical issues associated with the creation, adoption, and implementation of AISs. As humans become entangled in sociotechnical systems defined by human and artificial agents, there is a pressing need to understand how trust is created, used, and abused. Compounding the difficulty in answering these questions, stakeholders directly or indirectly affected by these systems differ in their motivations, understanding, and values. This volume provides a comprehensive resource to help stakeholders understand ethical issues of designing and implementing AISs using an ethical sensemaking approach. Starting with the general technical affordances of AIS, Dr. Jordan Richard Schoenherr considers the features of system design relating data integrity, selection and interpretation of algorithms, and the evolution processes that drive AISs innovation as a sociotechnological system. The poles of technophobia (algorithmic aversion) and technophilia (algorithmic preference) in the public perception of AISs are then described and considered against existing evidence, including issues ranging from the displacement and re-education needs of the human workforce, the impact of use of technology on interpersonal accord, and surveillance and cybersecurity. Ethical frameworks that provide tools for evaluating the values and outcomes of AISs are then reviewed, and how they can be aligned with ethical sensemaking processes identified by psychological science is explored. Finally, these disparate threads are brought together in a design framework. Also including sections on policies and guideline, gaming and social media, and Eastern philosophical frameworks, this is fascinating reading for students and academics in psychology, computer science, philosophy, and related areas, as well as professionals such as policy makers and those working with AI systems.
Ethical Artificial Intelligence from Popular to Cognitive Science: Trust in the Age of Entanglement
by Jordan Richard SchoenherrThis book offers a unique interdisciplinary perspective on the ethics of 'artificial intelligence' – autonomous, intelligent, (and connected) systems, or AISs, applying principles of social cognition to understand the social and ethical issues associated with the creation, adoption, and implementation of AISs.As humans become entangled in sociotechnical systems defined by human and artificial agents, there is a pressing need to understand how trust is created, used, and abused. Compounding the difficulty in answering these questions, stakeholders directly or indirectly affected by these systems differ in their motivations, understanding, and values. This volume provides a comprehensive resource to help stakeholders understand ethical issues of designing and implementing AISs using an ethical sensemaking approach. Starting with the general technical affordances of AIS, Dr. Jordan Richard Schoenherr considers the features of system design relating data integrity, selection and interpretation of algorithms, and the evolution processes that drive AISs innovation as a sociotechnological system. The poles of technophobia (algorithmic aversion) and technophilia (algorithmic preference) in the public perception of AISs are then described and considered against existing evidence, including issues ranging from the displacement and re-education needs of the human workforce, the impact of use of technology on interpersonal accord, and surveillance and cybersecurity. Ethical frameworks that provide tools for evaluating the values and outcomes of AISs are then reviewed, and how they can be aligned with ethical sensemaking processes identified by psychological science is explored. Finally, these disparate threads are brought together in a design framework.Also including sections on policies and guideline, gaming and social media, and Eastern philosophical frameworks, this is fascinating reading for students and academics in psychology, computer science, philosophy, and related areas, as well as professionals such as policy makers and those working with AI systems.
Ethical Artificial Intelligence in Power Electronics
by Keshav Kaushik Mariya Ouaissa Inam Ullah Khan Salma El Hajjami Tarandeep Kaur Bhatia Gayo DialloThis book focuses on the techniques of artificial intelligence that are mainly used in the power electronics field for the optimization of lost vehicle power. With the intention of optimizing the powerful energy of the vehicles and producing reliable energy, the most efficient methods, algorithms, and strategies of ethical artificial intelligence (AI) are being applied. By employing machine learning methods, the optimization of power energy in vehicles can be quickly recovered and managed efficiently. In today’s bustling world, power energy is indispensable for progress, yet in congested Vehicular Ad-hoc Networks (VANETs), vehicles often face power depletion and decreased efficiency. This book explores these challenges, encompassing not only power but also other critical power electronics within vehicles. We aim to introduce innovative approaches, leveraging ethical AI methods, to optimize energy performance in the face of these difficulties. Through this exploration, we seek to provide practical insights into navigating congested VANET environments while upholding ethical principles in technological advancements. Our book will discuss the current power energy concerns faced by vehicles and also contribute a novel strategy to overcome those concerns. The employment of ethical AI in vehicular power energy will undoubtedly improve the effectiveness and production of vehicles.
Ethical Assemblages of Artificial Intelligence: Controversies, Uncertainties, and Networks
by Helena Machado Susana SilvaThis book critically examines the ethical challenges of Artificial Intelligence (AI), focusing on facial recognition and AI-assisted reproductive technologies. It explores how these issues intertwine with social and political processes and power dynamics in digital societies. What defines ethical versus unethical in the realm of AI? Why do some ethical debates dominate, while others are overlooked? Which actors and institutions align or diverge in these discussions? To address these questions, the authors introduce the concept of "ethical assemblages," offering fresh perspectives on the complexities of AI ethics and their impact on socio-technoscientific structures.
Ethical Considerations of Virtual Reality in the College Classroom: Cross-Disciplinary Case Studies of Immersive Technology Implementation
by Melody Bowdon Kevin Yee William DornerEthical Considerations of Virtual Reality in the College Classroom collects case studies that address both pedagogical and ethical foundations of extended reality tools in postsecondary learning environments across disciplines. With today’s institutional programs and faculty leveraging cutting-edge virtual, augmented, and mixed reality opportunities to teach and promote achievement goals, it is imperative that new research into these technologies speaks directly to their challenges and affordances within broad academic settings. This book showcases real-world examples of faculty members who chronicle and develop their use of VR tools across learning contexts and student populations by creating their own digital experiences, adapting open-source tools, integrating commercial products, amplifying crucial course content, analyzing outcomes data, and more. Nontechnical readers will come away with a new understanding of key terms and concepts associated with virtual reality and essential heuristics for evaluating the ethical implications of immersive approaches.
Ethical Data and Information Management: Concepts, Tools and Methods
by Katherine O'Keefe Daragh O BrienInformation and how we manage, process and govern it is becoming increasingly important as organizations ride the wave of the big data revolution. Ethical Data and Information Management offers a practical guide for people in organizations who are tasked with implementing information management projects. It sets out, in a clear and structured way, the fundamentals of ethics, and provides practical and pragmatic methods for organizations to embed ethical principles and practices into their management and governance of information. Written by global experts in the field, Ethical Data and Information Management is an important book addressing a topic high on the information management agenda. Key coverage includes how to build ethical checks and balances into data governance decision making; using quality management methods to assess and evaluate the ethical nature of processing during design; change methods to communicate ethical values; how to avoid common problems that affect ethical action; and how to make the business case for ethical behaviours.
Ethical Digital Technology in Practice
by Simon RogersonThis is an important book. Ethics is not an easy topic, and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . . . Use this book as a practical resource, an informative and educational source of material in developing expertise, but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady, President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan, develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines, professional journals and online blogs. These are synthesised into a blueprint which addresses, in a practical manner, the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology, which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15, became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners, academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world, of what has happened and what might happen as digital technology continues to pervade.
Ethical Hacking And Countermeasures: Secure Network Operating Systems and Infrastructures (Second Edition)
by EC-CouncilThe EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C|EH certification exam from EC-Council.
Ethical Hacking and Countermeasures: Web Applications and Data Servers (Book #3)
by EC-Council StaffThe EC-Council - Press Ethical Hacking and Countermeasures series is intended for those studying to become security officers, auditors, security professionals, site administrators, and anyone who is concerned about or responsible for the integrity of the network infrastructure. The series includes a broad base of topics in offensive network security, ethical hacking, as well as network defense and countermeasures. Web Applications and Data Servers provides an overview of session hijacking, how to hack Web servers and database servers, as well as password-cracking techniques and Web application vulnerabilities.
Ethical Hacking and Penetration Testing Guide
by Rafay BalochRequiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
Ethical Hacking: A Hands-on Introduction to Breaking In
by Daniel G. GrahamA hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you&’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You&’ll begin with the basics: capturing a victim&’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you&’ll deploy reverse shells that let you remotely run commands on a victim&’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you&’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you&’ll use to traverse a private network. You&’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like: • Deploying the Metasploit framework&’s reverse shells and embedding them in innocent-seeming files • Capturing passwords in a corporate Windows network using Mimikatz • Scanning (almost) every device on the internet to find potential victims • Installing Linux rootkits that modify a victim&’s operating system • Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you&’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you&’ll be able to think like an ethical hacker: someone who can carefully analyze systems and creatively gain access to them.
Ethical Hacking: Techniques, Tools, and Countermeasures
by Michael G. Solomon Sean-Philip OriyanoEthical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices.
Ethical IT Innovation: A Value-Based System Design Approach
by Sarah SpiekermannExplaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains.The book explores the latest thinking on computer ethics, inc
Ethical Programs: Hospitality And The Rhetorics Of Software
by James J. BrownLiving in a networked world means never really getting to decide in any thoroughgoing way who or what enters your "space" (your laptop, your iPhone, your thermostat . . . your home). With this as a basic frame-of-reference, James J. Brown's Ethical Programs examines and explores the rhetorical potential and problems of a hospitality ethos suited to a new era of hosts and guests. Brown reads a range of computational strategies and actors, from the general principles underwriting the Transmission Control Protocol (TCP), which determines how packets of information can travel through the internet, to the Obama election campaign's use of the power of protocols to reach voters, harvest their data, incentivize and, ultimately, shape their participation in the campaign. In demonstrating the kind of rhetorical spaces networked software establishes and the access it permits, prevents, and molds, Brown makes a significant contribution to the emergent discourse of software studies as a major component of efforts in broad fields including media studies, rhetorical studies, and cultural studies.
Ethical Reasoning in Big Data
by Jeff Collmann Sorin Adam MateiThis book springs from a multidisciplinary, multi-organizational, and multi-sector conversation about the privacy and ethical implications of research in human affairs using big data. The need to cultivate and enlist the public's trust in the abilities of particular scientists and scientific institutions constitutes one of this book's major themes. The advent of the Internet, the mass digitization of research information, and social media brought about, among many other things, the ability to harvest - sometimes implicitly - a wealth of human genomic, biological, behavioral, economic, political, and social data for the purposes of scientific research as well as commerce, government affairs, and social interaction. What type of ethical dilemmas did such changes generate? How should scientists collect, manipulate, and disseminate this information? The effects of this revolution and its ethical implications are wide-ranging. This book includes the opinions of myriad investigators, practitioners, and stakeholders in big data on human beings who also routinely reflect on the privacy and ethical issues of this phenomenon. Dedicated to the practice of ethical reasoning and reflection in action, the book offers a range of observations, lessons learned, reasoning tools, and suggestions for institutional practice to promote responsible big data research on human affairs. It caters to a broad audience of educators, researchers, and practitioners. Educators can use the volume in courses related to big data handling and processing. Researchers can use it for designing new methods of collecting, processing, and disseminating big data, whether in raw form or as analysis results. Lastly, practitioners can use it to steer future tools or procedures for handling big data. As this topic represents an area of great interest that still remains largely undeveloped, this book is sure to attract significant interest by filling an obvious gap in currently available literature.
Ethical Tech Startup Guide (Synthesis Lectures on Professionalism and Career Advancement for Scientists and Engineers)
by Ron BaeckerThis book draws on almost five decades of entrepreneurial experience and innovation and offers a broad perspective on ethical tech startups. It approaches the subject on two fronts by considering both the business of ethical technology as well as the challenges of tech startups with an imperative to behave ethically. The book provides readers with the tools to ethically frame and construct their startup ventures whether or not their core business is rooted in a technology meant to serve a social good. Incorporating ethical business practices both in knowledge and action, this book leads readers through the process of shaping an incipient startup idea all the way through the long-term operating stages. Using real-world case studies, the book explores key factors in successfully planning, framing, launching, leading, managing, and financing startups. This book is essential reading for researchers, academics, and students as well as industry professionals who have an idea or technology they want to get out into the world. Whether readers are seasoned in the field, employees of existing startups looking for better approaches, or new idealistic innovators who want to learn where to start, this guidebook explains and explores the road to launching the next great ethical tech startup.
Ethical and Legal Aspects of Computing: A Professional Perspective from Software Engineering (Undergraduate Topics in Computer Science)
by Gerard O'ReganThis textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering. The author gained exposure to these aspects of computing while working as a software engineer at Motorola in Ireland, where he coordinated the patent programme and worked with several software suppliers. Topics and features: Presents a broad overview of ethics and the lawIncludes key learning topics, summaries, and review questions in each chapter, together with a useful glossaryDiscusses the professional responsibility of computer professionalsExplores ethics in various civilisations and religious traditionsDiscusses ethical software engineering and ethical outsourcingConsiders what is fair and ethical in data scienceDescribes ethical challenges that arise in social media and the AI fieldReviews intellectual property including patents, copyright and trademarks This practical and easy-to-follow textbook/reference is ideal for computer science students seeking to understand legal and ethical aspects of computing. The text also serves as a concise self-study primer for software engineers and software managers.
Ethical and Philosophical Issues in Medical Imaging, Multimodal Learning and Fusion Across Scales for Clinical Decision Support, and Topological Data Analysis for Biomedical Imaging: 1st International Workshop, EPIMI 2022, 12th International Workshop, ML-CDS 2022, 2nd International Workshop, TDA4BiomedicalImaging, Held in Conjunction with MICCAI 2022, Singapore, September 18–22, 2022, Proceedings (Lecture Notes in Computer Science #13755)
by Hongzhi Wang Tanveer Syeda-Mahmood Islem Rekik Luping Zhou Mustafa Hajij John S. H. Baxter Roy EaglesonThis book constitutes the refereed joint proceedings of the 1st International Workshop on Ethical & Philosophical Issues in Medical Imaging (EPIMI 2022); the 12th International Workshop on Multimodal Learning and Fusion Across Scales for Clinical Decision Support (ML-CDS 2022) and the 2nd International Workshop on Topological Data Analysis for Biomedical Imaging (TDA4BiomedicalImaging 2022), held in conjunction with the 25th International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2022, in Singapore, in September 2022.EPIMI includes five short papers about various humanistic aspects of medical image computing and computer-assisted interventions. The ML-CDS papers discuss machine learning on multimodal data sets for clinical decision support and treatment planning. The TDA papers focus on Topological Data Analysis: a collection of techniques and tools that have matured from an increasing interest in the role topology plays in machine learning and data science.