Pandora's Box
Social and Professional Issues of the Information Age
Häftad, Engelska, 2007
Av Andrew A. Adams, Rachel J. McCrindle, Andrew A. (University of Reading) Adams, Rachel J. (University of Reading) McCrindle, Rachel McCrindle
909 kr
Produktinformation
- Utgivningsdatum2007-12-14
- Mått191 x 236 x 36 mm
- Vikt1 184 g
- FormatHäftad
- SpråkEngelska
- Antal sidor672
- FörlagJohn Wiley & Sons Inc
- ISBN9780470065532
Tillhör följande kategorier
Dr. Andrew Adams is a lecturer in the School of Systems Engineering at the University of Reading. Dr. Rachel McCrindle is a senior lecturer and Head of Ambient & Pervasive Intelligence Research Group in the School of Systems Engineering at the University of Reading. Both Dr. Adams and Dr. McCrindle teach on the third year undergraduate module "Social, Legal & Ethical Aspects of Computer Science, Information Technology & Electronic Engineering" and have published numerous articles in peer-reviewed journals within their subject area. www.wileyeurope.com/college/adams
- Foreword xxiPreface xxv1 Introduction 1Lessig’s Four Modalities Analysis 6Prophet and Loss: Failing to Foresee the Future 7Information System Partition 8The Law is an Ass 10Globalization 12The Digital Divide 13Servant or Master: Computers Making Decisions 15Discussion Topics 17Can Laws Be Immoral? 17Genetically Modified Food, Technologically Modified Humans 17The Haves and the Have-nots 18Related Reading 192 Emergence and Convergence of Technologies 21Introduction 21Emergence 23The Rise of Print Media 23The Rise of the Telegraph and the Telephone 24The Rise of Broadcast Media 28The Rise of the Computing Industry 31The Rise of the Content Industry 33The Rise of the Internet 35Convergence 39Content Producers and Distributors 39Platform Producers and Content Producers or Publishers 41Corporate Production vs Individual Creativity 43Market Sector Integration 44Digitization 48The Big Challenges Ahead 55Discussion Topics 56Fit for Purpose? 56E-Tax 56Competing with Free Beer 58Related Reading 603 Digital Entertainment 61Introduction 61The Effects of Digital Entertainment Technology 64Digital Entertainment—Friend or Foe? 64The Toy Town Divide 64Boys and Girls Come out to Play: Stereotyping 66Health-Related Issues 69Curse of the Couch-Potato Children 69Physical Problems 71Digital Equipment—Part of the Modern Family 72Does Television Cause Adverse Social Behaviour? 74Creating Monsters—Do Computer Games Make People Violent? 76Do Computer Games Fuel Addiction and Gambling? 80Power to the Player—Benefits of Computer Games 84Harnessing the Power of the Brain 84Education and Learning 86The Silver Gamers 88Game Development Grows up—the Hidden Agenda 88Discussion Points 91Should Computer Games Be Regulated? Rated? Censored? 91Couch-Potato Syndrome 92Online Gambling: Menace or Natural Progression? 93Related Reading 954 Censorship and Freedom of Speech 97Introduction 97Reasons for Censorship 100Censorship by States 101Censorship of Speakers by Governments 107Censorship of Listeners by Governments 109Censorship by Private Actors 111Censorship of Speakers by Private Actors 111Censorship of Listeners by Private Actors 113Technology for Expression 114Technological Developments with Expressive Power 114Censoring Internet Content 115Client–Server and Peer-to-Peer Architectures 124Conclusion 125Discussion Topics 126Yahoo! France Nazi Memorabilia 126ISP Liability for Content 127BT and the IWF 129Related Reading 1305 Sex and Technology 131Introduction 131The Nature of Sexual Material 132One Man’s Art. . . 132The Medium and the Message 133Use of Technology to (Re)Produce Sexual Material 133Techno-Sex 134Anonymity: Reality and Illusion 144Anon Servers 146Online Sex and Real Relationships 147The Future of Online Sex: TeleDildonics? 148Regulating Sex in Cyberspace 149Not in Front of the Children: Protecting Children from Sex Online 152Restricting Access to Broadcast Media 153Surfing to a Naked Beach 154‘Satisfy Her in Bed’: Sex Spam to Minors 157Online Friendships 159Child Pornography 161Types of Material 162Prohibition, Harm, Possession and Distribution 166Jurisdictional Anomalies and Conflicts 168Discovery, Defence and Mitigation 169Discussion Topics 171Freedom of Speech vs Censorship of Sexual Material 171The Toby Studabaker Case 172Related Reading 1736 Governance of the Internet 175Introduction 175The Internet Protocols 176The Origins of the Internet 178Early Arguments 181The Root of All Evil 185Commercialization 185Internet Corporation for Assigned Names and Numbers 186ccTLDs 188Alternative Root Servers 188Commercialization, Ownership and Corporate Identity 189Trade Marks 189Trade Marks in Domain Names 191The Uniform Dispute Resolution Process 196The Nominet Dispute Resolution Process 198Criticisms of Dispute Resolution 199Do Trade Marks Matter in Domain Names or in URLs? 203The Future of Internet Governance 204ICANN, DoC, EU and ccTLDs 204Wiring the World: Who Really Owns ‘The Internet’? 205Discussion Topics 206Should Trade Marks Be Valid in Domain Names? 206What Governance Should ICANN Have? 207How Many Top-Level Domains Should There Be? 2087 Privacy and Surveillance 211Introduction 211Cryptography and Steganography 212Definition of Privacy 214Communication Technology and Eavesdropping 215Ways to Eavesdrop 215Identity of Eavesdropper 217Legality of Eavesdropping 218The Whole Is Greater than the Sum of its Parts 220Data Protection 222Data Protection Issues in EU Law 223Data Protection Issues in US Regulation 227International Movement of Data 229Data Protection, not an Impediment to Life 230Big Brother is Watching You: Automated CCTV Processing 231Privacy After 9/11 234Technological Privacy and Surveillance 235Discussion Topics 237Leaving Little Trace: Anonymity in the Digital World? 237Availability of Cryptography and Steganography 238Data Retention by ISPs 239Related Reading 2418 Information Age Warfare 243Introduction 243History of Warfare 245The Technology of War 248War News 249Cyber-Wars 250Satellites—the View from Space 253Star Wars Technology 254Network-centric Warfare 255The Battlefield 258Robo-Soldier 258Man or Machine? 259The Unseen Enemy 260Mobile Phones as Weapons 261War Games 261Information Dominance 263Intelligence Gathering and Surveillance 265Discussion Topics 267Working for Arms Manufacturers 267Cyberterrorism: Real Threat or Virtual Bogeyman? 268Overall Benefit or Drain on Resources? 2699 Technology and the Human Body 273Introduction 273Health Information Systems 275Treatment 276Electronic Patient Records 276E-booking 278E-prescribing 279Intranets, the Internet and Call Centres 280Factors for Success 281Power to the Patient 283The Internet and CDs 284Television Programmes 286Digital Television 287Self-Diagnosis Kits 288Online Pharmacies 290Online Body Trafficking 291Techno-Medicine 292Telemedicine 293Training and Supporting Nurses and Doctors 294Virtual Therapy 297Robots in Hospitals 298Smart Monitoring 301Computer Modelling 305Assistive Technology and Rehabilitation 308New Medical Technologies 309Implants for Diagnosis and Healing 310Implants and Prosthetics for Replacement and Reconstruction 311Digital Flesh and Cyborgs 315Discussion Topics 318The Longevity and Social Justice Debate 318Suggested Positions 319Owning the Code of Life 319What Is a Human? 320Related Reading 32110 Professionalism in IT 323Introduction 323Conduct 327Practice 333Whistleblowing 334Vulnerability of E-mail 335‘Illegal’ espionage 337Consequences of ‘Whistleblowing’ 337Due Diligence 338Personal Responsibility 340Discussion Topics 340Self-Incrimination 340Responsibility for DDoS Attacks 341Whistleblowing Insecurity 34311 Online Crime and Real Punishment 345Introduction 345A Brief History of Crime and Computers 347Computer Fraud 348Malware 351A Taxonomy of Malware 351Problems Caused by Malware 352Malware Authors: Who, How and Why? 359Hoaxes and Life Imitating Art 362Computer Security: Cops and Robbers, Poachers and Gamekeepers 363Historical Roots of Cracking 364Who are the Crackers? 366Vulnerability, Risk and Threat 370Closed vs Open Security 373Walking the Tightrope: Social Pressures on Security 379How Much Security Is Necessary? 382Poachers and Gamekeepers 386Laws Against Computer Misuse 387UK Computer Misuse Act 388US Sequence of Laws 391Council of Europe Convention on Cybercrime 393The Growing Problem of Computer Crime 395Discussion Topics 396Grey Hat Cracking Should Be Legalized 396Web Scrapers and Robot Denial Files 397An Immune System for the Internet 399Related Reading 40012 Patents and Copyright 401Introduction 401Intellectual Property? 402Trade mark 402Patent 403Copyright 404The Philosophical Basis of Patents and Copyright 404Patents 406A Brief History of Patents 406Modern Patent Systems 407Business Methods and Software Patents 411General Criticisms of Patents 414Patent-Licensing Companies 417Copyright 419Origins and Development of Copyright 420The Main Provisions of Modern Copyright Statutes 424US Case Law for Copyright 428The Current State of Play 434The Music Industry and Higher Education 435The Originator’s Rights 436Software Copyright 437Copyright and the Architecture of Cyberspace 449Free Culture 449Discussion Topics 450Is Copyright the Correct Way to Reward Artists? Does It Promote Artistic Activity? 450Lack of Legitimate Downloads Caused the Rise of Peer-to-Peer File-Sharing 452A New Basis for Copyright Law Is Required 453Control and the Copyright Bargain 454Related Reading 45513 Unwanted Electronic Attentions 457Introduction 457Types of Unsolicited Communication 459Static Visual Communication 459Audio Communication 460Types of Communication Media 461Public Displays 461Broadcast Non-Interactive Media 461Broadcast Interactive Media 462Telephonic Services 463Internet Services 465The Economics of Unsolicited Contacts 470Sender Economics 470Junk mail 471Cold calling 472Receiver Economics 474Referral Economics 477Social, Legal and Technological Discouragement 481Malicious Unwanted Attentions 494Online and Telephone Fraud 495Electronic Stalking 496Online Grooming 499Discussion Topics 500Tackling Spam at the Transport Layer 500Opt-In, Opt-Out, Shake It All About 501Freedom of Speech or Online Stalking 502Related Reading 50314 Education and Online Learning 505Introduction 505From the Chalkboard to the Virtual Classroom 507Technology through the Years 507Visual Aids to Learning 508Audio Aids to Learning 510Audio–Visual Aids to Learning 511Developing E-Learning Environments 513ICT and e-Learning in Further Education Colleges in England 515e-Portfolio 516Videoconferencing 517Online Encyclopedia 518Mobile Education (PDAs and Mobile Devices) 519Electronic Books 521Electronic Whiteboards 521Online Marketing 522Electronic Application and Admission Systems 523Digital Library 523Second Life 524Web 2.0 525Developing and Embracing e-Learning Resources 526The Learner Perspective 527The Teacher Perspective 529Accessibility of Education in a Wired World 533Cheating the System 535Bogus Degrees 538Discussion Topics 539One Person’s Plagiarism Is Another’s Research 539Overseas Education vs Distance Education 540The Net of a Million Lies 542Related Reading 54315 Living and Working in a Wired World 545Introduction 545The Digital Lifestyle 547Work, Skills and Roles 547Teleworking 548The Mobile Office: the ‘Non-Office’ Office Job 551The New Role of the Office 552Smarter Travel 552Smarter Homes 555Shopping 556Buying Entertainment 561The Sporting Life 562Technology and the Individual 563Education 563Health 563Crime 564Religion 564Communication 565The Changing Face of Communication 565The Global Village 573The Digital Divide 574The Digital Divide in the Industrialized World 577E-Government 578The Digital Divide Between the Nations 579Discussion Topics 580The Language of the Digital Age 580Digital Relationships 581Digital Divides 581Related Reading 582Appendix—Ethical Analysis 583Introduction 583Traditional Western Moral Philosophy 584Rationalism 584Locke vs Hobbes 585Hume and Human Passion 587Kant and the Categorical Imperative 587Legality and Morality 587Modern Ethical Theory 589Utilitarian Ethics 589Relativistic vs Universal Utiliarianism 590New Utilitarianism: Singer 591Computer Ethics 591Metaphysical Foundations for Computer Ethics 593Informed Consent Theory in Information Technology 594Ethical Decisions: Using the Back of the Envelope 594Information Ethics: ICT Professional Responsibility in the Information Environment 595The Good Computer Professional Does not Cheat at Cards 596Conclusion 596Discussion Topics 597General: The Death Penalty 597ICT: Artificial Sentience Rights and Wrongs 598General: Is Religion an Excuse for Discrimination? 599ICT: Search Ethics 600General: Lying to Tell the Truth? 601ICT: Gender Presentation Online 601General: Fair Fines 602ICT: Should Internet Access be a Human Right? 603General: Prediction of Harm 604ICT: Programmer Responsibility 605Related Reading 607Index 609
"I.T. has triggered complex social, political, economic and ethical issues that need urgent action if we are to survive the coming decades of unprecedented technological change. This book is a must-read for all those who want to understand the issues or, more important, want to help in their resolution."—James Burke "This book provides a breath of fresh air in the subject... with??numerous examples.??Further, it provides a nice link between ethical behaviour, professionalism and the law."—Karl Jones, Liverpool John Moores University "I found this an excellent read, covering a wide range of essential social and professional issues for computer scientists. There is a good balance between ethical material and technical material, and it would be suitable for a layperson.?? An entertaining and thought-provoking book."—Dr. Carron Shankland of the University of Stirling