Ethics for the Information Age (6th Edition)
Format: PDF / Kindle (mobi) / ePub
Ethics for the Information Age is appropriate for any standalone Computers and Society or Computer Ethics course offered by a computer science, business, or philosophy department, as well as special modules in any advanced CS course. It is also appropriate for readers interested in computers and society or computer ethics.
In an era where information technology changes constantly, a thoughtful response to these rapid changes requires a basic understanding of IT history, an awareness of current issues, and a familiarity with ethics. Ethics for the Information Ageis unique in its balanced coverage of ethical theories used to analyze problems encountered by computer professionals in today’s environment. By presenting provocative issues such as social networking, government surveillance, and intellectual property from all points of view, this market-leading text challenges students to think critically and draw their own conclusions, which ultimately prepares them to become responsible, ethical users of future technologies.
Teaching and Learning Experience
This program presents a better teaching and learning experience–for you and your students. It will help:
- Encourage Critical Thinking: A balanced, impartial approach to ethical issues avoids biased arguments, encouraging students to consider and analyze issues for themselves.
- Keep Your Course Current and Relevant: A thoughtful response to information technology requires an awareness of current information-technology-related issues.
- Support Learning: Resources are available to expand on the topics presented in the text.
Microsoft Project 2013 Step by Step
Microsoft® Excel® 2013 Step by Step
Interview to decide my creditworthiness, the bank consults a national Summary 39 credit bureau. What are the advantages and disadvantages of this alternative approach to lending money? Computers are now embedded in many devices on which we depend, from trafﬁc signals to pacemakers. Software errors have resulted in injury and even death. When bugs result in harm to humans, what should the liability be for the people or corporations that produced the software? When employees use IT devices in.
Cellular networks efﬁciently support our desire to interact with other people and accomplish a wide variety of everyday tasks (Figure 3.1). On the other hand, some people use these technologies to lower the quality of our lives through such activities as trying to sell us products we don’t want to buy, harassing us, or luring us into wasting our time with frivolous or counterproductive activities. In this chapter we explore moral issues associated with our use of the Internet and the telephone.
New credit card in someone else’s name or commandeer an existing account . By changing the billing address of existing accounts, a thief can run up large debts before the victim becomes aware of the problem. These activities can blemish the target’s credit history. As a result, victims of identity theft may have applications for credit cards, mortgage loans, and even employment denied. If the impostor shows false credentials to the police, the victim may even be saddled with a false criminal.
Widely used by the press. 3.9.2 Contributing Factors According to Peele, social, situational, and individual factors can increase a person’s susceptibility to addiction. For example, peer groups play an important role in determining how individuals use alcohol and other drugs. People in stressful situations are more likely to become addicted, as are those who lack social support and intimacy, and those who have limited opportunities for “rewarding, productive activity” . Individual 146.
Information is mixed in with correct information. Web users cannot believe everything they read on the Web. Web search engines incorporate algorithms that attempt to steer people toward higher-quality sites. The Internet and the telephone system have provided a new way for people to intimidate or humiliate others. After Megan Meier was cyberbullied, she took her own life. The adult involved in the cyberbullying was not prosecuted by local authorities because there were no state laws against.