Encyclopedia of information ethics and security / Marian Quigley [editor].

"Rapid technological advancement has given rise to new ethical dilemmas and security threats, while the development of appropriate ethical codes and security measures fail to keep pace, which makes the education of computer users and professionals crucial.The Encyclopedia of Information Ethics...

Full description

Saved in:
Bibliographic Details
Corporate Author: InfoSci-Books
Other Authors: Quigley, Marian
Format: Ebook
Language:English
Published: Hershey : Information Science Reference, c2008.
Subjects:
Online Access:IGI Global e-Book Collection
Table of Contents:
  • 3D Avatars and Collaborative Virtual Environments / Koon-Ying Raymond Li, James Sofra
  • Access Control for Healthcare / Yifeng Shen
  • Advertising in the Networked Environment / Savvas Papagiannidis, Michael Bourlakis
  • Anonymous Peer-to-Peer Systems / Wenbing Zhao
  • Argumentation and Computing / Ephraim Nissan
  • Argumentation with Wigmore Charts and Computing / Ephraim Nissan
  • Artificial Intelligence Tools for Handling Legal Evidence / Ephraim Nissan
  • Barriers Facing African American Women in Technology / Jianxia Du
  • B-POS Secure Mobile Payment System / Antonio Grillo
  • Building Secure and Dependable Information Systems / Wenbing Zhao
  • Classifying Articles in Information Ethics and Security / Zack Jourdan
  • Computational Ethics / Alicia I. Ruvinsky
  • Computer Ethics and Intelligent Technologies / Yefim Kats
  • Computer Worms, Detection, and Defense / Robert J. Cole
  • Conflicting Value of Digital Music Piracy / Matthew Butler
  • Content Filtering Methods for Internet Pornography / Jengchung V. Chen
  • Cyber-Terrorism in Australia / Christopher Beggs
  • Data Security and Chase / Zbigniew W. Ras, Seunghyun Im
  • Defending against Distributed Denial of Service / Yang Xiang, Wanlei Zhou
  • Digital Divide Implications and Trends / Irene Chen, Terry T. Kidd
  • Digital Rights Management Metadata and Standards / Jo Anne Cote, Eun G. Park
  • Dilemmas of Online Identity Theft / Omer Mahmood
  • Document Security in the Ancient World / Christopher H. Walker
  • DRM Practices in the E-Publication Industry / Bong Wee Kiau
  • Educational Technology Practitioner-Research Ethics / Kathleen Gray
  • E-Health and Ensuring Quality / Prajesh Chhanabhai
  • Electronic Signatures and Ethics / A. Srivastava
  • Engineering Multi-Agent Systems / Tagelsir Mohamed Gasmelseid
  • Ethical Approach to Gathering Survey Data Online / Sophie Nichol
  • Ethical Behaviour in Technology-Mediated Communication / Sutirtha Chatterjee
  • Ethical Concerns in Computer Science Projects / Alistair Irons, Roger Boyle
  • The Ethical Debate Surrounding RFID / Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero
  • Ethical Dilemmas in Data Mining and Warehousing / Joseph A. Cazier, Ryan C. LaBrie
  • Ethical Erosion at Enron / John Wang
  • Ethical Usability Testing with Children / Kirsten Ellis
  • Ethics and Access to Technology for Persons with Disabilities / Belinda Davis Lazarus
  • Ethics and Perceptions in Online Learning Environments / Michelle M. Ramim
  • Ethics and Security under the Sarbanes-Oxley Act / Thomas J. Tribunella, Heidi R. Tribunella
  • Ethics Education for the Online Environment / Lori N.K. Leonard
  • Ethics in Software Engineering / Pankaj Kamthan
  • Ethics in the Security of Organizational Information Systems / Sushma Mishra
  • Ethics of AI / Kevin B. Korb
  • Fair Use / Pasi Tyrväskylä
  • Federal Information Security Law / Michael J. Chapple
  • Formulating a Code of Cyberethics for a Municipality / Udo Richard Averweg
  • Hackers and Cyber Terrorists / M. J. Warren
  • Homo Electricus and the Continued Speciation of Humans / Katina Michael
  • IT Security Culture Transition Process / Leanne Ngo
  • ICT Leapfrogging Policy and Development in the Third World / Amanda Third
  • Identity Verification using Resting State Brain Signals / Ramaswamy Palaniappan, Lalit M. Patnaik
  • Individual and Institutional Responses to Staff Plagiarism / Carmel McNaught
  • Information Ethics as Ideology / Bernd Carsten Stahl
  • Information Ethics from an Islamic Perspective / Salam Abdallah
  • Information Security and the "Privacy Broker" / Michael Douma, Eduard J. Gamito
  • Information Security Policies for Networkable Devices / Julia Kotlarsky, Ilan Oshri, Corey Hirsch
  • Information Security Policy Research Agenda / Heather Fulford, Neil Doherty
  • Internet and Suicide / Dianne Currier
  • Internet Piracy and Copyright Debates / Paul Sugden
  • Internet Research Ethics Questions and Considerations / Elizabeth Buchanan
  • Interviews with Young People using Online Chat / Elza Dunkels, AnnBritt Enochsson
  • Intrusion Detection and Information Security Audits / Terry T. Kidd, Robert K. Hiltbrand
  • Investigation Strategy for the Small Pedophiles World / Gianluigi Me
  • Managed Services and Changing Workplace Ethics / Alan Sixsmithm
  • Managing the Environmental Impact of Information Technology / Laurel Evelyn Dyson
  • Measuring Ethical Reasoning of IT Professionals and Students / Mohammad Abdolmohammadi
  • Meta View of Information Ethics / Charles R. Crowell
  • Mitigation of Identity Theft in the Information Age / Reggie Becker, Mark B. Schmidt, Allen C. Johnston
  • Mobile Agents and Security / Fei Xue
  • Modelling Context-Aware Security for Electronic Health Records / Pravin Shetty, Seng Loke
  • Moral Rights in the Australian Public Sector / Lynley Hocking
  • Multimodal Biometric System / Ajita Rattani
  • Objective Ethics for Managing InformationTechnology / John R. Drake
  • Parental Rights to Monitor Internet Usage / Benjamin J. Halpert
  • Patient Centric Healthcare InformationSystems in the U.S. / Nilmini Wickramasinghe
  • Pedagogical Framework for EthicalDevelopment / Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan
  • Personal Information Ethics / Sabah S. Al-Fedaghi
  • Pharming Attack Designs / Manish Gupta
  • Port Scans / Jalal Kawash
  • Privacy and Access to Electronic Health Records / Dick Whiddett
  • Privacy and Online Data Collection / Calin Gurau
  • Privacy in Data Mining Textbooks / James P. Lawler
  • Protection of Mobile Agent Data / Sheng-Uei Guan
  • Rule-Based Policies for Secured Defense Meetings / Pravin Shetty, Seng Loke
  • Secure Agent Roaming under M-Commerce / Sheng-Uei Guan
  • Secure Automated Clearing House Transactions / Jan Skalicky Hanson
  • Security Dilemmas for Canada's New Government / Jeffrey Roy
  • Security Model for Educational Satellite Networks / Sanjay Jasola, Ramesh C. Sharma
  • Security of Communication and Quantum Technology / Gregory Paperin
  • Security Protection for Critical Infrastructure / M. J. Warren
  • Spyware / Thomas F. Stafford
  • Sustainable Information Society / Ralf Isenmann
  • Taxonomy of Computer and Information Ethics / Sabah S. Al-Fedaghi
  • Tools for Representing and Processing Narratives / Ephraim Nissan
  • Traditional Knowledge and Intellectual Property / Ulia Popova-Gosart
  • Universal Internet Access under an Ethical Lens / Alessandro Arbore.
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.