Skip to content

Computer Ethics Cautionary Tales and Ethical Dilemmas in Computing

Best in textbook rentals since 2012!

ISBN-10: 0262560739

ISBN-13: 9780262560733

Edition: 2nd 1993

Authors: Tom Forester, Perry Morrison

List price: $39.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

For anyone interested in the issues arising from computer malfunctions and, more perniciously, from misuse, this new edition of Computer Ethicsis right on the mark. Widely acclaimed for its readability and its balanced and authoritative coverage, Computer Ethics has been thoroughly revised and updated with new anecdotes, new revelations, and lively discussion of the ethical, social, and professional issues arising from the computer revolution, such as computer crime, software theft, hacking, viruses, and the invasion of privacy. An entirely rewritten first chapter is followed by expanded chapters that contain compelling new case studies and analyses. A new final section contains 10…    
Customers also bought

Book details

List price: $39.00
Edition: 2nd
Copyright year: 1993
Publisher: MIT Press
Publication date: 12/16/1993
Binding: Paperback
Pages: 362
Size: 6.00" wide x 9.25" long x 0.75" tall
Weight: 1.232
Language: English

Tom Forester is a Lecturer in the, Division of Science and Technology at Griffith University in Australia. He is editor of The The Microelectronics Revolution and The Information Technology Revolution and author of High Tech Society.

Preface and Acknowledgments
Introduction: Social, Ethical, and Professional Issues in Computing
Our Computerized Society
Some New Social Problems Created by Computers
Ethical Dilemmas for Computer Users
How Ethical Theory Can Help
Ethics and the Computer Professional
The Responsibility of Computing Educators
Computer Crime
The Rise of the High-Tech Heist
Is Reported Crime the Tip of an Iceberg?
Targets of the Computer Criminal
Who Are the Computer Criminals and Why Do They Do It?
Improving Computer Security
Fighting Crime with Computers
Software Theft
The Problem of Software Piracy
Revenge of the Nerds? Intellectual Property Rights and the Law
It Looks and Feels Like the Law Is a Mess
Software Piracy and Industry Progress
Busting the Pirates
Hacking and Viruses
What Is Hacking?
Why Do Hackers Hack?
Hackers: Criminals or Modern Robin Hoods?
The Hacker Crackdown
The Virus Invasion
Ethical Issues Arising from Hacking
Unreliable Computers
Many Information Systems Are Failures
When a Crash Really Can Be a Crash
Banking Blunders
More Great Software Disasters
Why Are Complex Systems So Unreliable?
What Are Computer Scientists Doing about It?
The Invasion of Privacy
Database Disasters
The Information Mosaic
The Number of the Beast: Calling Number Identification
Privacy Legislation
The National Security Agency: Big Brother Is Watching You
Surveillance Societies
Just When You Thought No One Was Listening
Privacy and the Instrumentalism of Efficiency
Artificial Intelligence and Expert Systems
What Is Artificial Intelligence?
What Is Intelligence?
Expert Systems
Legal Problems
Newer Developments
Ethical Issues: Is AI A Proper Goal?
Conclusion: The Limits of Hype
Computerizing the Workplace
Where Will the Jobs Come From? Computers and the Quantity of Work
What Kind of Jobs? Computers and the Quality of Work
The Dangers of the Techno-Fix: Stress in the Modern Workplace
Health and Safety Issues: Video Display Terminals and the Repetitive Strain Injury Debate
The Productivity Paradox: Improving the Payoff from Information Technology
Hypothetical Scenarios for Classroom Discussion
Appendix A: ACM Code of Ethics and Professional Conduct
Appendix B: Computing Curricula 1991: A Summary of the ACM/IEEE-CS Joint Curriculum Task Force Report
Notes
Index