Gift of Fire, A
Social, Legal, and Ethical Issues for Computing Technology
Häftad, Engelska, 2017
3 469 kr
For courses in Computer Ethics and Computers and Society. An objective study of technology ethics that inspires critical thinking and debate In Gift of Fire, A: Social, Legal, and Ethical Issues for Computing Technology, Sara Baase presents a balanced exploration of the social, legal, philosophical, ethical, political, constitutional, and economic implications of computing and the controversies they raise. With an objective computer scientist's perspective, and with historical context for many issues, Baase covers the issues readers will face both as members of a technological society and as professionals in computer-related fields. A primary goal is to develop computer professionals who understand the implications of what they create and how it fits into society at large. This text encourages readers to think about the ethics and philosophical direction behind topics but doesn’t them lead students to conclusions. The 5th Edition contains updated material on new topics and examples, outdated material has been removed, and several topics have been reorganized. New material appears throughout, including material on current trending topics such as drones and autonomous cars.
Produktinformation
- Utgivningsdatum2017-07-12
 - Mått0 x 0 x 0 mm
 - Vikt0 g
 - FormatHäftad
 - SpråkEngelska
 - Antal sidor560
 - Upplaga5
 - FörlagPearson Education
 - ISBN9780134615271
 
Tillhör följande kategorier
Sara Baase is Professor Emeritus with the Department of Computer Science, San Diego State University, where she won awards for outstanding teaching. Her textbooks in computer science have been translated into several languages. Dr. Baase received her doctoral degree from the University of California, Berkeley.Timothy M. Henry has a Bachelor of Science Degree in Mathematics from the U.S. Coast Guard Academy, a Master of Science Degree in Computer Science from Old Dominion University, and was awarded a PhD in Applied Math Sciences from the University of Rhode Island. He began his IT career as an officer in the U.S. Coast Guard, and among his early tours, he was the Information Resources Manager (what is today a CIO) at the Coast Guard's training center in Yorktown, VA. Dr. Henry then switched over to education and taught mathematics and computer science courses at the U. S. Coast Guard Academy. As his time there ended, he was offered a great opportunity to work with 'bleeding-edge' technology in a research and development environment and oversaw projects for law enforcement, first responders, healthcare, and education. For the next decade he continued to work as a project manager on large corporate- or state-wide information systems. During that time, he obtained his Project Management Professional (PMP) certification.He then returned to a university setting where he has been teaching ethics, programming, cybersecurity, and project management for over 15 years. He now serves as IT Graduate Director at the New England Institute of Technology.In addition to co-authoring A Gift of Fire: Social, Legal and Ethical Issues for Computing Technology with Sara Baase, he has co-authored two data structure textbooks with Frank Carrano, Data Structures and Abstractions with Java and Data Abstractions and Problem Solving in C++: Walls & Mirrors, which won the 2016 McGuffey Longevity Award from the Textbook and Academy Authors Association.
- Table of Contents Unwrapping the Gift 1.1 The Pace of Change1.2 Change and Unexpected Developments 1.2.1 Self-Driving Vehicles1.2.2 Connections: Mobile Phones, Social Networking, and the Internet of Things1.2.3 E-commerce and Free Stuff1.2.4 Artificial Intelligence, Robotics, Sensors, and Motion1.2.5 Tools for Disabled People1.3 Themes1.4 Ethics 1.4.1 What is Ethics, Anyway?1.4.2 A Variety of Ethical Views1.4.3 Some Important DistinctionsPrivacy 2.1 Privacy Risks and Principles 2.1.1 What Is Privacy?2.1.2 New Technology, New Risks2.1.3 Terminology and Principles for Managing Personal Data2.2 The Business and Social Sectors 2.2.1 Marketing and Personalization2.2.2 Our Social and Personal Activity2.2.3 Location Tracking2.2.4 A Right to Be Forgotten2.3 The Fourth Amendment and Changing Technology 2.3.1 The Fourth Amendment2.3.2 Background, Law, and Court Decisions2.3.3 Applying the Fourth Amendment in New Areas2.4 Government Systems 2.4.1 Video Surveillance and Face Recognition2.4.2 Databases2.4.3 Public Records: Access versus Privacy2.4.4 National ID Systems2.4.5 The NSA and Secret Intelligence Gathering2.5 Protecting Privacy: Technology and Markets 2.5.1 Developing Privacy Tools2.5.2 Encryption2.5.3 Blocking Ads2.5.4 Policies for Protecting Personal Data2.6 Protecting Privacy: Theory, Rights, and Laws 2.6.1 A Right to Privacy2.6.2 Law and Regulation2.6.3 Contrasting Viewpoints2.7 Privacy Regulations in the European UnionFreedom of Speech 3.1 The First Amendment and Communications Paradigms 3.1.1 Free Speech Principles3.1.2 Regulating Communications Media3.2 Controlling Speech in Cyberspace 3.2.1 What Is O ensive Speech? What Is Illegal?3.2.2 Censorship Laws and Alternatives3.2.3 Child Pornography and Sexting3.2.4 Spam3.2.5 Challenging Old Regulatory Structures and Special Interests3.3 Decisions about Legal but Objectionable Content3.4 Leaking Sensitive Material3.5 Anonymity3.6 The Global Net: Censorship and Political Freedom 3.6.1 Tools for Communication, Tools for Oppression3.6.2 Aiding Foreign Censors and Repressive Regimes3.6.3 Shutting Down Communications in Free Countries3.7 Net Neutrality: Regulations or the Market?Intellectual Property 4.1 Principles and Laws 4.1.1 What Is Intellectual Property?4.1.2 Challenges of New Technologies4.1.3 A Bit of History4.1.4 The Fair Use Doctrine4.1.5 Ethical Arguments About Copying4.2 Signi cant Fair Use Cases and Precedents 4.2.1 Sony v. Universal City Studios (1984)4.2.2 Reverse Engineering: Game Machines4.2.3 Sharing Music: The Napster and Grokster Cases4.2.4 User and Programmer Interfaces4.3 Responses to Copyright Infringement 4.3.1 Defensive and Aggressive Responses from the Content Industries4.3.2 The Digital Millennium Copyright Act: Anti Circumvention4.3.3 The Digital Millennium Copyright Act: Safe Harbor4.3.4 Evolving Business Models4.4 Search Engines and Online Libraries4.5 Free Software 4.5.1 What Is Free Software?4.5.2 Should All Software Be Free?4.6 Patents for Software Inventions 4.6.1 Patent Trends, Confusion, and Controversies4.6.2 To Patent or Not?Crime and Security 5.1 Introduction5.2 What is Hacking? 5.2.1 The Evolution of Hacking5.2.2 Hacker Tools5.2.3 Is “Harmless” Hacking Harmless?5.3 Some Speci c Applications of Hacking 5.3.1 Identity Theft5.3.2 Case Study: The Target Breach5.3.3 Hacktivism, or Political Hacking5.3.4 Hacking by Governments5.4 Why Is the Digital World So Vulnerable? 5.4.1 Vulnerability of Operating Systems and the Internet5.4.2 Human Nature, Markets, and Vulnerability of the Internet of Things5.5 Security 5.5.1 Tools to Help Protect the Digital World5.5.2 People Who Can Help Protect the Digital World5.5.3 Hacking to Improve Security5.5.4 Backdoors for Law Enforcement5.6 The Law 5.6.1 The Computer Fraud and Abuse Act5.6.2 Criminalize Virus Writing and Hacker Tools?5.6.3 Penalties for Young Hackers5.7 Whose Laws Rule the Web? 5.7.1 A Crime in One Country but Not Another5.7.2 Libel and Freedom of Speech5.7.3 Culture, Law, and Ethics5.7.4 Potential SolutionsWork 6.1 Fears and Questions6.2 Impacts on Employment 6.2.1 Job Destruction and Creation6.2.2 Changing Skills and Skill Levels6.2.3 Are We Earning Less and Working More?6.3 Changing Work Patterns: From Telecommuting to Gigs 6.3.1 Telecommuting6.3.2 The Sharing Economy, On-Demand Services, and GIG Work6.4 A Global Workforce6.5 Employee Communication and Monitoring by Employers 6.5.1 Social Media Content6.5.2 Separating–or Merging–Work and Personal Systems6.5.3 Monitoring Employer Systems and Tracking EmployeesEvaluating and Controlling Technology 7.1 Evaluating Information 7.1.1 The Need for Responsible Judgment7.1.2 Computer Models7.2 Neo-Luddite Views of Computers, Technology, and Quality of Life 7.2.1 Criticisms of Computing Technologies7.2.2 Views of Economics, Nature, and Human Needs7.3 Digital Divides 7.3.1 Trends in Access in the United States7.3.2 Reaching the Next Billion Users7.4 Control of Our Devices and Data 7.4.1 Remote Deletion of Software and Data7.4.2 Automatic Software Upgrades7.5 Making Decisions About Technology 7.5.1 Questions7.5.2 The Di culty of Prediction7.5.3 Intelligent Machines and Super-intelligent Humans–Or the End of the Human Race?7.5.4 A Few ObservationsErrors, Failures, and Risks 8.1 Failures and Errors in Computer Systems 8.1.1 An Overview8.1.2 Problems For Individuals8.1.3 System Failures8.1.4 Example: Stalled Airports at Denver, Hong Kong, and Malaysia8.1.5 Example: HealthCare.gov8.1.6 What Goes Wrong?8.1.7 Problems For Individuals8.2 Case Study:The Therac-25 8.2.1 Therac-25 Radiation Overdoses8.2.2 Software and Design Problems8.2.3 Why So Many Incidents?8.2.4 Observations and Perspective8.3 Increasing Reliability and Safety 8.3.1 Professional Techniques8.3.2 Trust the Human or the Computer System?8.3.3 Law, Regulation, and Markets8.4 Dependence, Risk, and Progress 8.4.1 Are We Too Dependent on Computers?8.4.2 Risk and ProgressProfessional Ethics and Responsibilities 9.1 What Is “Professional Ethics”?9.2 Ethical Guidelines for Computer Professionals 9.2.1 Special Aspects of Professional Ethics9.2.2 Professional Codes of Ethics9.2.3 Guidelines and Professional Responsibilities9.3 Scenarios 9.3.1 Introduction and Methodology9.3.2 Protecting Personal Data9.3.3 Designing an Application with Targeted Ads9.3.4 Webcams in School Laptops9.3.5 Publishing Security Vulnerabilities9.3.6 Specifications9.3.7 Schedule Pressures9.3.8 Software License Violation9.3.9 Going Public with Safety Concerns9.3.10 Release of Personal Information9.3.11 Conflict of Interest9.3.12 Kickbacks and Disclosure9.3.13 A Test Plan9.3.14 Artificial Intelligence and Sentencing Criminals9.3.15 A Gracious HostEpilogue The Software Engineering Code and the ACM Code A.1. Software Engineering Code of Ethics and Professional Practice A.2. ACM Code of Ethics and Professional Conduct Index
 
Mer från samma författare
Du kanske också är intresserad av
Critical Care Obstetrics
Jeffrey P. Phelan, Torre L. Halscott, Leslie A. Moroz, Arthur J. Vaught, Antonio F. Saad, Amir A. Shamshirsaz, CA) Phelan, Jeffrey P. (Citrus Valley Medical Center, West Covina, Torre L. (Johns Hopkins University School of Medcine) Halscott, Leslie A. (Yale School of Medicine) Moroz, MD) Vaught, Arthur J. (John Hopkins University, TX) Saad, Antonio F. (University of Texas Medical Branch, Amir A. (Texas Children's Hospital/Pavillion for Women and Baylor St Lukes Medical Center) Shamshirsaz, Jeffrey P Phelan, Torre L Halscott, Leslie A Moroz, Arthur J Vaught, Antonio F Saad, Amir A Shamshirsaz
3 469 kr