ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computer Ethics

دانلود کتاب اخلاق کامپیوتری

Computer Ethics

مشخصات کتاب

Computer Ethics

ویرایش: 4 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 9780131112414, 2008040152 
ناشر: Pearson 
سال نشر:  
تعداد صفحات: 322 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 2 مگابایت 

قیمت کتاب (تومان) : 36,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Computer Ethics به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اخلاق کامپیوتری نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Acknowledgments
About the Authors
Chapter 1 Introduction to Sociotechnical Computer Ethics
	Chapter Outline
	Scenarios
	1.1 A Virtual Rape
	1.2 Surprises About Social Networking
	1.3 RFID and Caring for the Elderly
	Introduction: Why Computer Ethics?
	The Standard Account
	New Possibilities, a Vacuum of Policies, Conceptual Muddles
	An Update to the Standard Account
	The Sociotechnical Systems Perspective
	Reject Technological Determinism/Think Coshaping
	Reject Technology as Material Objects/Think Sociotechnical Systems
	Reject Technology as Neutral/Think Technology Infused with Value
	Sociotechnical Computer Ethics
	Micro- and Macro-Level Analysis
	Return to the “Why Computer Ethics?” Question
	Conclusion
	Study Questions
Chapter 2 Ethics and Information Technology
	Chapter Outline
	Introduction: “Doing” Ethics
	Descriptive/Normative
	The Dialectic Method
	“Ethics is Relative”
	Ethical Theories and Concepts
	Utilitarianism
	Intrinsic and Instrumental Value
	Acts versus Rules
	Critique of Utilitarianism
	Case Illustration
	Deontological Theory
	Case Illustration
	Rights
	Rights and Social Contract Theory
	Virtue Ethics
	Analogical Reasoning in Computer Ethics
	Conclusion
	Study Questions
Chapter 3 Ethics in IT-Configured Societies
	Chapter Outline
	Scenarios
	3.1 Google in China: “Don’t Be Evil”
	3.2 Turing Doesn’t Need to Know
	3.3 Turnitin Dot Com
	Introduction: IT-Configured Societies
	Technology as the Instrumentation of Human Action
	Cyborgs, Robots, and Humans
	Three Features of IT-Configured Activities
	Global, Many-to-Many Scope
	Distinctive Identity Conditions
	Reproducibility
	IT-Configured Domains of Life
	Virtuality, Avatars, and Role-Playing Games
	Friendship and Social Networking
	Education and Plagiarism Detection
	Democracy and the Internet
	What Is Democracy?
	The Arguments
	Is the Internet a Democratic Technology?
	Conclusion
	Study Questions
Chapter 4 Information Flow, Privacy, and Surveillance
	Chapter Outline
	Scenarios
	4.1 Email Privacy and Advertising
	4.2 Workplace Spying: The Lidl Case
	4.3 Data Mining and e-Business
	Introduction: Information Flow With and Without Information Technology
	Why Care About Privacy?
	“No Need to Worry”
	The Importance of Privacy
	Privacy as an Individual Good
	Privacy as Contextual Integrity
	Privacy as a Social Good Essential for Democracy
	Autonomy, Democracy, and the Panoptic Gaze
	Data Mining, Social Sorting, and Discrimination
	Crude Categories
	Summary of the Arguments for Privacy and Against Surveillance
	Is Privacy Over? Strategies for Shaping Personal Information Flow
	Fair Information Practices
	Transparency
	Opt-In versus Opt-Out
	Design and Computer Professionals
	Personal Steps for All IT Users
	A Note on Privacy and Globalization
	Conclusion
	Study Questions
Chapter 5 Digital Intellectual Property
	Chapter Outline
	Scenarios
	5.1 Obtaining Pirated Software Abroad
	5.2 Free Software that Follows Proprietary Software
	5.3 Using Public Domain Software in Proprietary Software
	Introduction: The Complexities of Digital Property
	Definitions
	Setting the Stage
	Protecting Property Rights in Software
	Copyright
	Trade Secrecy
	Patent Protection
	Free and Open Source Software
	The Philosophical Basis of Property
	Natural Rights Arguments
	Critique of the Natural Rights Argument
	A Natural Rights Argument Against Software Ownership
	PS Versus FOSS
	Is it Wrong to Copy Proprietary Software?
	Breaking Rules, No Rules, and New Rules
	Conclusion
	Study Questions
Chapter 6 Digital Order
	Chapter Outline
	Scenarios
	6.1 Bot Roast
	6.2 Wiki Warfare
	6.3 Yahoo and Nazi Memorabilia
	Introduction: Law and Order on the Internet
	Sociotechnical Order
	Online Crime
	Hackers and the Hacker Ethic
	Sociotechnical Security
	Who Is to Blame in Security Breaches?
	Trade-Offs in Security
	Wikipedia: A New Order of Knowledge Production
	Freedom of Expression and Censorship
	John Stuart Mill and Freedom of Expression
	Conclusion
	Study Questions
Chapter 7 Professional Ethics in Computing
	Chapter Outline
	Scenarios
	7.1 Software Safety
	7.2 Security in a Custom Database
	7.3 Conflict of Interest
	Introduction: Why Professional Ethics?
	Therac-25 and Malfunction 54
	The Paradigm of Professions
	Characteristics of Professions
	Sorting Out Computing and its Status as a Profession
	Mastery of Knowledge
	Formal Organization
	Autonomy
	Codes of Ethics
	The Culture of Computing
	Software Engineering
	Professional Relationships
	Employer–Employee
	Client–Professional
	Other Stakeholders–Professional
	Professional–Professional
	Conflicting Responsibilities
	A Legal Perspective on Professionalism in Computing
	Licensing
	Selling Software
	Selling–Buying and the Categorical Imperative
	Torts
	Negligence
	A Final Look at the State of the Profession
	Guns-for-Hire or Professionals
	Efficacy, Public Trust, and the Social Contract
	Conclusion
	Study Questions
Websites
References
Index




نظرات کاربران