- Table View
- List View
Ethernet: Designing and Managing Local Area Networks
by Joann Zimmerman Charles E. SpurgeonGet up to speed on the latest Ethernet capabilities for building and maintaining networks for everything from homes and offices to data centers and server machine rooms. This thoroughly revised, comprehensive guide covers a wide range of Ethernet technologies, from basic operation to network management, based on the authors’ many years of field experience.When should you upgrade to higher speed Ethernet? How do you use switches to build larger networks? How do you troubleshoot the system? This book provides the answers. If you’re looking to build a scalable network with Ethernet to satisfy greater bandwidth and market requirements, this book is indeed the definitive guide.Examine the most widely used media systems, as well as advanced 40 and 100 gigabit EthernetLearn about Ethernet’s four basic elements and the IEEE standardsExplore full-duplex Ethernet, Power over Ethernet, and Energy Efficient EthernetUnderstand structured cabling systems and the components you need to build your Ethernet systemUse Ethernet switches to expand and improve network designDelve into Ethernet performance, from specific channels to the entire networkGet troubleshooting techniques for problems common to twisted-pair and fiber optic systems
Ethernet: The Definitive Guide
by Charles E. SpurgeonEthernet has been the flavor of choice for networking administrators since the early 1980s. Written by one of the foremost experts on Ethernet standards and configuration, Ethernet: The Definitive Guidehas all the information you need to set up and maintain a scalable local area network (LAN) using Ethernet. The book includes an introduction to Ethernet and sections on media systems, how to build your Ethernet system, performance analysis, and troubleshooting.
Ethernet: The Definitive Guide
by Charles SpurgeonEthernet is a core networking technology used by every high tech business. While the basic protocols have changed little, new options such as Fast Ethernet and Gigabit Ethernet have increased the complexity of the topic. Ethernet has been the flavor of choice for networking administrators since the early 1980s because of its ease of use and scalability. Written by one of the foremost experts on Ethernet standards and configuration, Charles E. Spurgeon, Ethernet: The Definitive Guide includes everything you need to know to set up and maintain an Ethernet network. Ethernet: The Definitive Guide teaches you everything you need to know about the IEEE 802.3 Ethernet standard and its protocols. The book is logically separated into five parts: Introduction to Ethernet provides a tour of basic Ethernet theory and operation, including a description of Ethernet frames, operation of the Media Access Control (MAC) protocol, full-duplex mode and auto-negotiation. Ethernet Media Systems is the heart of the book. This sectionof Ethernet: The Definitive Guide shows you how to build media-specific Ethernet networks, from a basic 10BASE-T Ethernet offering 10 Mbps over twisted-pair cables, to an advanced 1000BASE-X Gigabit Ethernet, providing up to 1 Gbps of data transfer over fiber optic cables. Building Your Ethernet System teaches you how to build twisted-pair and fiber optic media segments, as well as how to build your Ethernet using repeaters and hubs. Performance and Troubleshooting is divided into two chapters. The first describes both the performance of a given Ethernet channel, as well as the performance of the entire network system. The second includes a tutorial on troubleshooting techniques and describes the kinds of problems network administrators are likely to encounter. The last part of the book includes a complete glossary of terms used throughout the book, a resource list, descriptions of thick and thin coax-based Ethernet systems, a guide to AUI equipment installation and configuration, and a listing of troubleshooting numbers. This book is the definitive guide for anyone wanting to build a scalable local area network (LAN) using Ethernet.
Ethical Artificial Intelligence from Popular to Cognitive Science: Trust in the Age of Entanglement
by Jordan Richard SchoenherrThis book offers a unique interdisciplinary perspective on the ethics of 'artificial intelligence' – autonomous, intelligent, (and connected) systems, or AISs, applying principles of social cognition to understand the social and ethical issues associated with the creation, adoption, and implementation of AISs. As humans become entangled in sociotechnical systems defined by human and artificial agents, there is a pressing need to understand how trust is created, used, and abused. Compounding the difficulty in answering these questions, stakeholders directly or indirectly affected by these systems differ in their motivations, understanding, and values. This volume provides a comprehensive resource to help stakeholders understand ethical issues of designing and implementing AISs using an ethical sensemaking approach. Starting with the general technical affordances of AIS, Dr. Jordan Richard Schoenherr considers the features of system design relating data integrity, selection and interpretation of algorithms, and the evolution processes that drive AISs innovation as a sociotechnological system. The poles of technophobia (algorithmic aversion) and technophilia (algorithmic preference) in the public perception of AISs are then described and considered against existing evidence, including issues ranging from the displacement and re-education needs of the human workforce, the impact of use of technology on interpersonal accord, and surveillance and cybersecurity. Ethical frameworks that provide tools for evaluating the values and outcomes of AISs are then reviewed, and how they can be aligned with ethical sensemaking processes identified by psychological science is explored. Finally, these disparate threads are brought together in a design framework. Also including sections on policies and guideline, gaming and social media, and Eastern philosophical frameworks, this is fascinating reading for students and academics in psychology, computer science, philosophy, and related areas, as well as professionals such as policy makers and those working with AI systems.
Ethical Artificial Intelligence from Popular to Cognitive Science: Trust in the Age of Entanglement
by Jordan Richard SchoenherrThis book offers a unique interdisciplinary perspective on the ethics of 'artificial intelligence' – autonomous, intelligent, (and connected) systems, or AISs, applying principles of social cognition to understand the social and ethical issues associated with the creation, adoption, and implementation of AISs.As humans become entangled in sociotechnical systems defined by human and artificial agents, there is a pressing need to understand how trust is created, used, and abused. Compounding the difficulty in answering these questions, stakeholders directly or indirectly affected by these systems differ in their motivations, understanding, and values. This volume provides a comprehensive resource to help stakeholders understand ethical issues of designing and implementing AISs using an ethical sensemaking approach. Starting with the general technical affordances of AIS, Dr. Jordan Richard Schoenherr considers the features of system design relating data integrity, selection and interpretation of algorithms, and the evolution processes that drive AISs innovation as a sociotechnological system. The poles of technophobia (algorithmic aversion) and technophilia (algorithmic preference) in the public perception of AISs are then described and considered against existing evidence, including issues ranging from the displacement and re-education needs of the human workforce, the impact of use of technology on interpersonal accord, and surveillance and cybersecurity. Ethical frameworks that provide tools for evaluating the values and outcomes of AISs are then reviewed, and how they can be aligned with ethical sensemaking processes identified by psychological science is explored. Finally, these disparate threads are brought together in a design framework.Also including sections on policies and guideline, gaming and social media, and Eastern philosophical frameworks, this is fascinating reading for students and academics in psychology, computer science, philosophy, and related areas, as well as professionals such as policy makers and those working with AI systems.
Ethical Artificial Intelligence in Power Electronics
by Keshav Kaushik Mariya Ouaissa Inam Ullah Khan Salma El Hajjami Tarandeep Kaur Bhatia Gayo DialloThis book focuses on the techniques of artificial intelligence that are mainly used in the power electronics field for the optimization of lost vehicle power. With the intention of optimizing the powerful energy of the vehicles and producing reliable energy, the most efficient methods, algorithms, and strategies of ethical artificial intelligence (AI) are being applied. By employing machine learning methods, the optimization of power energy in vehicles can be quickly recovered and managed efficiently. In today’s bustling world, power energy is indispensable for progress, yet in congested Vehicular Ad-hoc Networks (VANETs), vehicles often face power depletion and decreased efficiency. This book explores these challenges, encompassing not only power but also other critical power electronics within vehicles. We aim to introduce innovative approaches, leveraging ethical AI methods, to optimize energy performance in the face of these difficulties. Through this exploration, we seek to provide practical insights into navigating congested VANET environments while upholding ethical principles in technological advancements. Our book will discuss the current power energy concerns faced by vehicles and also contribute a novel strategy to overcome those concerns. The employment of ethical AI in vehicular power energy will undoubtedly improve the effectiveness and production of vehicles.
Ethical Assemblages of Artificial Intelligence: Controversies, Uncertainties, and Networks
by Helena Machado Susana SilvaThis book critically examines the ethical challenges of Artificial Intelligence (AI), focusing on facial recognition and AI-assisted reproductive technologies. It explores how these issues intertwine with social and political processes and power dynamics in digital societies. What defines ethical versus unethical in the realm of AI? Why do some ethical debates dominate, while others are overlooked? Which actors and institutions align or diverge in these discussions? To address these questions, the authors introduce the concept of "ethical assemblages," offering fresh perspectives on the complexities of AI ethics and their impact on socio-technoscientific structures.
Ethical Considerations of Virtual Reality in the College Classroom: Cross-Disciplinary Case Studies of Immersive Technology Implementation
by Melody Bowdon Kevin Yee William DornerEthical Considerations of Virtual Reality in the College Classroom collects case studies that address both pedagogical and ethical foundations of extended reality tools in postsecondary learning environments across disciplines. With today’s institutional programs and faculty leveraging cutting-edge virtual, augmented, and mixed reality opportunities to teach and promote achievement goals, it is imperative that new research into these technologies speaks directly to their challenges and affordances within broad academic settings. This book showcases real-world examples of faculty members who chronicle and develop their use of VR tools across learning contexts and student populations by creating their own digital experiences, adapting open-source tools, integrating commercial products, amplifying crucial course content, analyzing outcomes data, and more. Nontechnical readers will come away with a new understanding of key terms and concepts associated with virtual reality and essential heuristics for evaluating the ethical implications of immersive approaches.
Ethical Data and Information Management: Concepts, Tools and Methods
by Katherine O'Keefe Daragh O BrienInformation and how we manage, process and govern it is becoming increasingly important as organizations ride the wave of the big data revolution. Ethical Data and Information Management offers a practical guide for people in organizations who are tasked with implementing information management projects. It sets out, in a clear and structured way, the fundamentals of ethics, and provides practical and pragmatic methods for organizations to embed ethical principles and practices into their management and governance of information. Written by global experts in the field, Ethical Data and Information Management is an important book addressing a topic high on the information management agenda. Key coverage includes how to build ethical checks and balances into data governance decision making; using quality management methods to assess and evaluate the ethical nature of processing during design; change methods to communicate ethical values; how to avoid common problems that affect ethical action; and how to make the business case for ethical behaviours.
Ethical Digital Technology in Practice
by Simon RogersonThis is an important book. Ethics is not an easy topic, and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . . . Use this book as a practical resource, an informative and educational source of material in developing expertise, but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady, President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan, develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines, professional journals and online blogs. These are synthesised into a blueprint which addresses, in a practical manner, the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology, which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15, became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners, academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world, of what has happened and what might happen as digital technology continues to pervade.
Ethical Hacking And Countermeasures: Secure Network Operating Systems and Infrastructures (Second Edition)
by EC-CouncilThe EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C|EH certification exam from EC-Council.
Ethical Hacking and Countermeasures: Web Applications and Data Servers (Book #3)
by EC-Council StaffThe EC-Council - Press Ethical Hacking and Countermeasures series is intended for those studying to become security officers, auditors, security professionals, site administrators, and anyone who is concerned about or responsible for the integrity of the network infrastructure. The series includes a broad base of topics in offensive network security, ethical hacking, as well as network defense and countermeasures. Web Applications and Data Servers provides an overview of session hijacking, how to hack Web servers and database servers, as well as password-cracking techniques and Web application vulnerabilities.
Ethical Hacking and Penetration Testing Guide
by Rafay BalochRequiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
Ethical Hacking: A Hands-on Introduction to Breaking In
by Daniel G. GrahamA hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you&’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You&’ll begin with the basics: capturing a victim&’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you&’ll deploy reverse shells that let you remotely run commands on a victim&’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you&’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you&’ll use to traverse a private network. You&’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like: • Deploying the Metasploit framework&’s reverse shells and embedding them in innocent-seeming files • Capturing passwords in a corporate Windows network using Mimikatz • Scanning (almost) every device on the internet to find potential victims • Installing Linux rootkits that modify a victim&’s operating system • Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you&’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you&’ll be able to think like an ethical hacker: someone who can carefully analyze systems and creatively gain access to them.
Ethical Hacking: Techniques, Tools, and Countermeasures
by Michael G. Solomon Sean-Philip OriyanoEthical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices.
Ethical IT Innovation: A Value-Based System Design Approach
by Sarah SpiekermannExplaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains.The book explores the latest thinking on computer ethics, inc
Ethical Programs: Hospitality And The Rhetorics Of Software
by James J. BrownLiving in a networked world means never really getting to decide in any thoroughgoing way who or what enters your "space" (your laptop, your iPhone, your thermostat . . . your home). With this as a basic frame-of-reference, James J. Brown's Ethical Programs examines and explores the rhetorical potential and problems of a hospitality ethos suited to a new era of hosts and guests. Brown reads a range of computational strategies and actors, from the general principles underwriting the Transmission Control Protocol (TCP), which determines how packets of information can travel through the internet, to the Obama election campaign's use of the power of protocols to reach voters, harvest their data, incentivize and, ultimately, shape their participation in the campaign. In demonstrating the kind of rhetorical spaces networked software establishes and the access it permits, prevents, and molds, Brown makes a significant contribution to the emergent discourse of software studies as a major component of efforts in broad fields including media studies, rhetorical studies, and cultural studies.
Ethical Reasoning in Big Data
by Jeff Collmann Sorin Adam MateiThis book springs from a multidisciplinary, multi-organizational, and multi-sector conversation about the privacy and ethical implications of research in human affairs using big data. The need to cultivate and enlist the public's trust in the abilities of particular scientists and scientific institutions constitutes one of this book's major themes. The advent of the Internet, the mass digitization of research information, and social media brought about, among many other things, the ability to harvest - sometimes implicitly - a wealth of human genomic, biological, behavioral, economic, political, and social data for the purposes of scientific research as well as commerce, government affairs, and social interaction. What type of ethical dilemmas did such changes generate? How should scientists collect, manipulate, and disseminate this information? The effects of this revolution and its ethical implications are wide-ranging. This book includes the opinions of myriad investigators, practitioners, and stakeholders in big data on human beings who also routinely reflect on the privacy and ethical issues of this phenomenon. Dedicated to the practice of ethical reasoning and reflection in action, the book offers a range of observations, lessons learned, reasoning tools, and suggestions for institutional practice to promote responsible big data research on human affairs. It caters to a broad audience of educators, researchers, and practitioners. Educators can use the volume in courses related to big data handling and processing. Researchers can use it for designing new methods of collecting, processing, and disseminating big data, whether in raw form or as analysis results. Lastly, practitioners can use it to steer future tools or procedures for handling big data. As this topic represents an area of great interest that still remains largely undeveloped, this book is sure to attract significant interest by filling an obvious gap in currently available literature.
Ethical Tech Startup Guide (Synthesis Lectures on Professionalism and Career Advancement for Scientists and Engineers)
by Ron BaeckerThis book draws on almost five decades of entrepreneurial experience and innovation and offers a broad perspective on ethical tech startups. It approaches the subject on two fronts by considering both the business of ethical technology as well as the challenges of tech startups with an imperative to behave ethically. The book provides readers with the tools to ethically frame and construct their startup ventures whether or not their core business is rooted in a technology meant to serve a social good. Incorporating ethical business practices both in knowledge and action, this book leads readers through the process of shaping an incipient startup idea all the way through the long-term operating stages. Using real-world case studies, the book explores key factors in successfully planning, framing, launching, leading, managing, and financing startups. This book is essential reading for researchers, academics, and students as well as industry professionals who have an idea or technology they want to get out into the world. Whether readers are seasoned in the field, employees of existing startups looking for better approaches, or new idealistic innovators who want to learn where to start, this guidebook explains and explores the road to launching the next great ethical tech startup.
Ethical and Legal Aspects of Computing: A Professional Perspective from Software Engineering (Undergraduate Topics in Computer Science)
by Gerard O'ReganThis textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering. The author gained exposure to these aspects of computing while working as a software engineer at Motorola in Ireland, where he coordinated the patent programme and worked with several software suppliers. Topics and features: Presents a broad overview of ethics and the lawIncludes key learning topics, summaries, and review questions in each chapter, together with a useful glossaryDiscusses the professional responsibility of computer professionalsExplores ethics in various civilisations and religious traditionsDiscusses ethical software engineering and ethical outsourcingConsiders what is fair and ethical in data scienceDescribes ethical challenges that arise in social media and the AI fieldReviews intellectual property including patents, copyright and trademarks This practical and easy-to-follow textbook/reference is ideal for computer science students seeking to understand legal and ethical aspects of computing. The text also serves as a concise self-study primer for software engineers and software managers.
Ethical and Philosophical Issues in Medical Imaging, Multimodal Learning and Fusion Across Scales for Clinical Decision Support, and Topological Data Analysis for Biomedical Imaging: 1st International Workshop, EPIMI 2022, 12th International Workshop, ML-CDS 2022, 2nd International Workshop, TDA4BiomedicalImaging, Held in Conjunction with MICCAI 2022, Singapore, September 18–22, 2022, Proceedings (Lecture Notes in Computer Science #13755)
by Hongzhi Wang Tanveer Syeda-Mahmood Islem Rekik Luping Zhou Mustafa Hajij John S. H. Baxter Roy EaglesonThis book constitutes the refereed joint proceedings of the 1st International Workshop on Ethical & Philosophical Issues in Medical Imaging (EPIMI 2022); the 12th International Workshop on Multimodal Learning and Fusion Across Scales for Clinical Decision Support (ML-CDS 2022) and the 2nd International Workshop on Topological Data Analysis for Biomedical Imaging (TDA4BiomedicalImaging 2022), held in conjunction with the 25th International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2022, in Singapore, in September 2022.EPIMI includes five short papers about various humanistic aspects of medical image computing and computer-assisted interventions. The ML-CDS papers discuss machine learning on multimodal data sets for clinical decision support and treatment planning. The TDA papers focus on Topological Data Analysis: a collection of techniques and tools that have matured from an increasing interest in the role topology plays in machine learning and data science.
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
by Joseph Migga KizzaThis engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing technologies and ever-changing communication ecosystems. This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties; examines intellectual property rights in the context of computing, including the risks and liabilities associated with software; discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health; reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination; considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies; includes learning objectives, discussion questions and exercises throughout the book. This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, and offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks.
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
by Joseph Migga KizzaThis textbook highlights the essential need for a strong ethical framework in our approach to teaching of and working in computer, information and engineering sciences.Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly evolving computing technologies and ever-changing communication ecosystems.This thoroughly revised and updated third edition features revised chapters with new and updated content and hardened the ethical framework. To cope with the rapidly changing computing and telecommunication ecosystem, a new chapter, Ethics and Social Responsibility in the Metaverse, has been added. The interface between our current universe and the evolving metaverse presents a security quagmire. The discussion throughout the book is candid and intended to ignite students’ and professionals’ interest and active participation in discussions of the issues we are facing now and those likely to emerge in the near future. Topics and features—including fully updated content:Introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheresDescribes the impact of computer technology on issues of security, privacy, anonymity, and civil libertiesDiscusses the security and ethical quagmire in the platforms of the developing metaverse (NEW chapter)Examines intellectual property rights in the context of computing, including the risks and liabilities associated with softwareDiscusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental healthReviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discriminationConsiders the ethical challenges arising from online social networks, mobile telecommunication technologies, virtual reality, the Internet of Things and 5G technologiesIncludes learning objectives, discussion questions and exercises throughoutThis concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, as well as offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks.
Ethical and Social Issues in the Information Age
by Joseph Migga KizzaThe frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual's social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations' strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.
Ethical and Social Issues in the Information Age (Texts in Computer Science)
by Joseph Migga KizzaThis textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology—ranging from the Internet, over to the cross-platforms consisting of ubiquitous portable and wearable devices to the eagerly anticipated metaverse—and how we can responsibly access and use these spaces. The text emphasizes the need for a strong ethical framework for all applications of computer science and engineering in our professional and personal life.This comprehensive seventh edition features thoroughly revised chapters with new and updated content, hardened by the bedrock ethical and moral values. Because of the rapidly changing computing and telecommunication ecosystem, a new chapter on Ethics and Social Responsibility in the Metaverse has been added. The interface between our current universe and the evolving metaverse presents a security quagmire. The discussion throughout the book is candid and intended to ignite students' interest and participation in class discussions and beyond. Topics and features:Establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativismOffers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discriminationDiscusses the security and ethical quagmire in the platforms of the developing metaverseProvides exercises, objectives, and issues for discussion with every chapterExamines the ethical, cultural and economic realities of mobile telecommunications, computer social network ecosystems, and virtualization technologyReviews issues of property rights, responsibility and accountability relating to information technology and softwareExplores the evolution of electronic crime, network security, and computer forensicsIntroduces the new frontiers of ethics: virtual reality, artificial intelligence, and the InternetThis extensive textbook/reference addresses the latest curricula requirements for understanding the cultural, social, legal, and ethical issues in computer science and related fields, and offers invaluable advice for industry professionals wishing to put such principles into practice.