دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 8
نویسندگان: Michael J Quinn
سری:
ISBN (شابک) : 0135217725, 9780135217726
ناشر:
سال نشر:
تعداد صفحات: 1364
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 15 مگابایت
در صورت تبدیل فایل کتاب Ethics for the Information Age به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب اخلاق برای عصر اطلاعات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Ethics for the Information Age Ethics for the Information Age Brief Contents Contents Preface What’s New in the Eighth Edition Organization of the Book Note to Instructors Supplements Feedback Chapter 1 Catalysts for Change 1.1 Introduction 1.2 Milestones in Computing 1.2.1 Aids to Manual Calculating 1.2.2 Mechanical Calculators 1.2.3 Cash Register 1.2.4 Punched-Card Tabulation 1.2.5 Precursors of Commercial Computers 1.2.6 First Commercial Computers 1.2.7 Programming Languages and Time-Sharing 1.2.8 Transistor and Integrated Circuit 1.2.9 IBM System/360 1.2.10 Microprocessor 1.2.11 Personal Computer 1.3 Milestones in Networking 1.3.1 Electricity and Electromagnetism 1.3.2 Telegraph 1.3.3 Telephone 1.3.4 Typewriter and Teletype 1.3.5 Radio 1.3.6 Television 1.3.7 Remote Computing 1.3.8 ARPANET 1.3.9 Email 1.3.10 Internet 1.3.11 NSFNET 1.3.12 Broadband 1.3.13 Wireless Networks 1.3.14 Cloud Computing 1.4 Milestones in Information Storage and Retrieval 1.4.1 Greek Alphabet 1.4.2 Codex and Paper 1.4.3 Gutenberg’s Printing Press 1.4.4 Newspapers 1.4.5 Hypertext 1.4.6 Graphical User Interface 1.4.7 Single-Computer Hypertext Systems 1.4.8 Networked Hypertext: World Wide Web 1.4.9 Search Engines 1.4.10 Cloud Storage 1.5 Contemporary Information Technology Issues Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercisse References Chapter 2 Introduction to Ethics 2.1 Introduction 2.1.1 Defining Terms 2.1.2 Four Scenarios 2.1.3 Overview of Ethical Theories 2.2 Subjective Relativism 2.2.1 The Case For Subjective Relativism 2.2.2 The Case Against Subjective Relativism 2.3 Cultural Relativism 2.3.1 The Case For Cultural Relativism 2.3.2 The Case Against Cultural Relativism 2.4 Divine Command Theory 2.4.1 The Case For the Divine Command Theory 2.4.2 The Case Against the Divine Command Theory 2.5 Ethical Egoism 2.5.1 The Case For Ethical Egoism 2.5.2 The Case Against Ethical Egoism 2.6 Kantianism 2.6.1 Good Will and the Categorical Imperative 2.6.2 Evaluating a Scenario Using Kantianism 2.6.3 The Case For Kantianism 2.6.4 The Case Against Kantianism 2.7 Act Utilitarianism 2.7.1 Principle of Utility 2.7.2 Evaluating a Scenario Using Act Utilitarianism 2.7.3 The Case For Act Utilitarianism 2.7.4 The Case Against Act Utilitarianism 2.8 Rule Utilitarianism 2.8.1 Basis of Rule Utilitarianism 2.8.2 Evaluating a Scenario Using Rule Utilitarianism 2.8.3 The Case For Rule Utilitarianism 2.8.4 The Case Against Utilitarianism in General 2.9 Social Contract Theory 2.9.1 The Social Contract 2.9.2 Rawls’s Theory of Justice 2.9.3 Evaluating a Scenario Using Social Contract Theory 2.9.4 The Case For Social Contract Theory 2.9.5 The Case Against Social Contract Theory 2.10 Virtue Ethics 2.10.1 Virtues and Vices 2.10.2 Making a Decision Using Virtue Ethics 2.10.3 The Case For Virtue Ethics 2.10.4 The Case Against Virtue Ethics 2.11 Comparing Workable Ethical Theories 2.12 Morality of Breaking the Law 2.12.1 Social Contract Theory Perspective 2.12.2 Kantian Perspective 2.12.3 Rule-Utilitarian Perspective 2.12.4 Act-Utilitarian Perspective 2.12.5 Conclusion Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercises References Chapter 3 Networked Communications 3.1 Introduction 3.2 Spam 3.2.1 The Spam Tsunami 3.2.2 Need for Social-Technical Solutions 3.2.3 Case Study: Ann the Acme Accountant Kantian Analysis Act-Utilitarian Analysis Rule-Utilitarian Analysis Social-Contract-Theory Analysis Virtue-Ethics Analysis Summary 3.3 Internet Interactions 3.3.1 The World Wide Web 3.3.2 Mobile Apps 3.3.3 How We Use the Internet 3.4 Text Messaging 3.4.1 Transforming Lives in Developing Countries 3.4.2 Twitter 3.4.3 Business Promotion 3.5 Political Impact of Social Media and Online Advertising 3.5.1 Political Activism 3.5.2 Macedonian Entrepreneurs 3.5.3 Internet Research Agency 3.5.4 Is Democracy Being Threatened? 3.5.5 Troubling Times for Traditional Newspapers 3.6 Censorship 3.6.1 Direct Censorship 3.6.2 Self-Censorship 3.6.3 Challenges Posed by the Internet 3.6.4 Government Filtering and Surveillance of Internet Content 3.6.5 Ethical Perspectives on Censorship Kant’s Views on Censorship Mill’s Views on Censorship Mill’s Principle of Harm 3.7 Freedom of Expression 3.7.1 History 3.7.2 Freedom of Expression Not an Absolute Right 3.7.3 FCC v. Pacifica Foundation 3.7.4 Case Study: Kate’s Blog Kantian Analysis Social-Contract-Theory Analysis Act-Utilitarian Analysis Rule-Utilitarian Analysis Virtue-Ethics Analysis Summary 3.8 Children and Inappropriate Content 3.8.1 Web Filters 3.8.2 Child Internet Protection Act 3.8.3 Ethical Evaluations of CIPA Kantian Evaluation Act-Utilitarian Evaluation Social-Contract-Theory Evaluation 3.8.4 Sexting 3.9 Breaking Trust 3.9.1 Identity Theft 3.9.2 Fake Reviews 3.9.3 Online Predators 3.9.4 Ethical Evaluations of Police Sting Operations Utilitarian Analysis Kantian Analysis Social-Contract-Theory Analysis Summary of Ethical Analyses 3.9.5 False Information 3.9.6 Cyberbullying 3.9.7 Revenge Porn 3.10 Internet Addiction 3.10.1 Is Internet Addiction Real? 3.10.2 Contributing Factors to Addiction 3.10.3 Ethical Evaluation of Internet Addiction Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercises References Chapter 4 Intellectual Property 4.1 Introduction 4.2 Intellectual Property Rights 4.2.1 Property Rights 4.2.2 Extending the Argument to Intellectual Property 4.2.3 Benefits of Intellectual Property Protection 4.2.4 Limits to Intellectual Property Protection 4.3 Protecting Intellectual Property 4.3.1 Trade Secrets 4.3.2 Trademarks and Service Marks 4.3.3 Patents Polaroid v. Kodak Cleartype 4.3.4 Copyrights Gershwin Publishing v. Columbia Artists Davey Jones Locker No Electronic Theft Act Copyright Creep 4.3.5 Case Study: The Database Guru Kantian Evaluations Social-Contract-Theory Evaluations Act-Utilitarian Evaluations Virtue-Ethics Evaluations Conclusion 4.4 Fair Use 4.4.1 Sony v. Universal City Studios 4.4.2 Audio Home Recording Act of 1992 4.4.3 RIAA v. Diamond Multimedia 4.4.4 Kelly v. Arriba Soft 4.4.5 Authors Guild v. Google 4.4.6 Mashups 4.5 Digital Media 4.5.1 Digital Rights Management 4.5.2 Digital Millennium Copyright Act 4.5.3 Secure Digital Music Initiative 4.5.4 Sony BMG Music Entertainment Rootkit 4.5.5 Criticisms of Digital Rights Management 4.5.6 Online Music Stores Drop Digital Rights Management 4.5.7 Microsoft Xbox One 4.6 Peer-to-Peer Networks and Cyberlockers 4.6.1 RIAA Lawsuits Against Napster, Grokster, and Kazaa 4.6.2 MGM v. Grokster 4.6.3 BitTorrent 4.6.4 Legal Action Against the Pirate Bay 4.6.5 PRO-IP Act 4.6.6 Megaupload Shutdown 4.6.7 Legal Online Access to Entertainment 4.7 Protections for Software 4.7.1 Software Copyrights 4.7.2 Violations of Software Copyrights Apple Computer v. Franklin Computer Sega v. Accolade 4.7.3 Safe Software Development Oracle v. Google 4.7.4 Software Patents Origins of Software Patents Patent-Holding Companies Harms From too Many Software Patents Smartphone Patent Wars Alice Corporation v. CLS Bank 4.8 Legitimacy of Intellectual Property Protection for Software 4.8.1 Rights-Based Analysis 4.8.2 Utilitarian Analysis 4.8.3 Conclusion 4.9 Open-Source Software 4.9.1 Consequences of Proprietary Software 4.9.2 “Open Source” Definition 4.9.3 Beneficial Consequences of Open-Source Software 4.9.4 Examples of Open-Source Software 4.9.5 The GNU Project and Linux 4.9.6 Impact of Open-Source Software 4.10 Creative Commons Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercises References Chapter 5 Information Privacy 5.1 Introduction 5.2 Perspectives on Privacy 5.2.1 Defining Privacy 5.2.2 Harms and Benefits of Privacy Harms of Privacy Benefits of Privacy Summary 5.2.3 Is There a Natural Right to Privacy? Privacy Rights Evolve from Property Rights Warren and Brandeis: Clearly, People have A right to Privacy Thomson: Every “Privacy Right” Violation is a Violation of Another Right Autonomous Moral Agents Need Some Privacy Conclusion: Privacy is a Prudential Right 5.2.4 Privacy and Trust 5.2.5 Case Study: The New Parents Rule-Utilitarian Evaluation Social-Contract-Theory Evaluation Kantian Evaluation Virtue-Ethics Evaluation Summary 5.3 Information Disclosures 5.3.1 Public Records 5.3.2 Information Held by Private Organizations 5.3.3 Facebook Tags 5.3.4 Enhanced 911 Services 5.3.5 Rewards or Loyalty Programs 5.3.6 Body Scanners 5.3.7 RFID Tags 5.3.8 Implanted Chips 5.3.9 Mobile Apps 5.3.10 Facebook Login 5.3.11 OnStar 5.3.12 Automobile “Black Boxes” 5.3.13 Medical Records 5.3.14 Digital Video Recorders 5.3.15 Cookies 5.4 Data Mining 5.4.1 Data Mining Defined Google’s Personalized Search Collaborative Filtering 5.4.2 Opt-In versus Opt-Out Policies 5.4.3 Examples of Data Mining Targeting Pregnant Women Credit Reports Targeted Direct Mail and Data Brokers Microtargeting 5.4.4 Social Network Analysis 5.4.5 Release of “Anonymized” Datasets Netflix Prize AOL Search Dataset 5.5 Examples of Consumer or Political Backlash 5.5.1 Marketplace: Households 5.5.2 Facebook Beacon 5.5.3 Malls Track Shoppers’ Cell Phones 5.5.4 iPhone Apps Uploading Address Books 5.5.5 Instagram’s Proposed Change to Terms of Service 5.5.6 Cambridge Analytica Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercises References Chapter 6 Privacy and the Government 6.1 Introduction 6.2 US Legislation Restricting Information Collection 6.2.1 Employee Polygraph Protection Act 6.2.2 Children’s Online Privacy Protection Act 6.2.3 Genetic Information Nondiscrimination Act 6.3 Information Collection by the Government 6.3.1 Census Records 6.3.2 Internal Revenue Service Records 6.3.3 FBI National Crime Information Center 2000 6.3.4 OneDOJ Database 6.3.5 Closed-Circuit Television Cameras 6.3.6 License-Plate Scanners 6.3.7 Police Drones 6.4 Covert Government Surveillance 6.4.1 Wiretaps and Bugs Olmstead v. United States Congress Makes Wiretapping Illegal FBI Continues Secret Wiretapping Charles Katz v. United States 6.4.2 Operation Shamrock 6.4.3 Carnivore Surveillance System 6.4.4 Covert Activities After 9/11 NSA Wiretapping Talon Database 6.5 US Legislation Authorizing Wiretapping 6.5.1 Title III 6.5.2 Foreign Intelligence Surveillance Act 6.5.3 Electronic Communications Privacy Act 6.5.4 Stored Communications Act 6.5.5 Communications Assistance for Law Enforcement Act 6.6 USA PATRIOT Act 6.6.1 Provisions of the Patriot Act 6.6.2 National Security Letters 6.6.3 Responses to the Patriot Act 6.6.4 Successes and Failures 6.6.5 Long-Standing NSA Access to Telephone Records 6.7 Regulation of Public and Private Databases 6.7.1 Code of Fair Information Practices 6.7.2 Privacy Act of 1974 6.7.3 Fair Credit Reporting Act 6.7.4 Fair and Accurate Credit Transactions Act 6.7.5 Financial Services Modernization Act 6.8 Data Mining by the Government 6.8.1 Internal Revenue Service Audits 6.8.2 Syndromic Surveillance Systems 6.8.3 Telecommunications Records Database 6.8.4 Predictive Policing 6.8.5 Potential Harms of Profiling 6.9 National Identification Card 6.9.1 History and Role of the Social Security Number 6.9.2 Debate over a National ID Card 6.9.3 The REAL ID Act 6.10 Information Dissemination 6.10.1 Family Education Rights and Privacy Act 6.10.2 Video Privacy Protection Act 6.10.3 Health Insurance Portability and Accountability Act 6.10.4 Freedom of Information Act 6.10.5 Tollbooth Records Used in Court 6.10.6 Carpenter v. United States 6.11 Invasion 6.11.1 Telemarketing 6.11.2 Loud Television Commercials 6.11.3 Requiring Identification for Pseudoephedrine Purchases 6.11.4 Advanced Imaging Technology Scanners Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercises References Chapter 7 Computer and Network Security 7.1 Introduction 7.2 Hacking 7.2.1 Hackers, Past and Present 7.2.2 Penalties for Hacking 7.2.3 Selected Hacking Incidents 7.2.4 FBI and the Locked iPhone 7.2.5 Case Study: Firesheep Act-Utilitarian Analysis Virtue-Ethics Analysis Kantian Analysis 7.3 Malware 7.3.1 Viruses 7.3.2 The Internet Worm Background of Robert Tappan Morris Jr. Designing the Worm Launching the Worm Ethical Evaluation 7.3.3 Sasser 7.3.4 Instant Messaging Worms 7.3.5 Conficker 7.3.6 Cross-Site Scripting 7.3.7 Drive-By Downloads 7.3.8 Trojan Horses and Backdoor Trojans 7.3.9 Ransomware 7.3.10 Rootkits 7.3.11 Spyware and Adware 7.3.12 Bots and Botnets 7.3.13 Security Risks Associated with “Bring Your Own Device” 7.4 Cyber Crime and Cyber Attacks 7.4.1 Phishing and Spear Phishing 7.4.2 SQL Injection 7.4.3 Denial-of-Service and Distributed Denial-of-Service Attacks 7.4.4 Internet-of-Things Devices Co-opted for DDoS Attack 7.4.5 Cyber Crime Jeanson James Ancheta Pharmamaster Albert Gonzalez Avalanche Gang 7.4.6 Politically Motivated Cyber Attacks Estonia (2007) Georgia (2008) Georgia (2009) Exiled Tibetan Government (2009) United States and South Korea (2009) Iran (2009) Cyber Espionage Attributed to the People’s Liberation Army Anonymous 7.5 Online Voting 7.5.1 Motivation for Online Voting 7.5.2 Proposals 7.5.3 Ethical Evaluation Benefits of Online Voting Risks of Online Voting Utilitarian Analysis Kantian Analysis Conclusions Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercises References Chapter 8 Computer Reliability 8.1 Introduction 8.2 Data-Entry or Data-Retrieval Errors 8.2.1 Disenfranchised Voters 8.2.2 False Arrests 8.2.3 Utilitarian Analysis: Accuracy of NCIC Records 8.3 Software and Billing Errors 8.3.1 Errors Leading to System Malfunctions 8.3.2 Errors Leading to System Failures 8.3.3 Analysis: E-retailer Posts Wrong Price, Refuses to Deliver 8.4 Notable Software System Failures 8.4.1 Patriot Missile 8.4.2 Ariane 5 8.4.3 AT&T Long-Distance Network 8.4.4 Robot Missions to Mars 8.4.5 Denver International Airport 8.4.6 Tokyo Stock Exchange 8.4.7 Direct-Recording Electronic Voting Machines 8.5 Therac-25 8.5.1 Genesis of the Therac-25 8.5.2 Chronology of Accidents and AECL Responses Marietta, Georgia, June 1985 Hamilton, Ontario, July 1985 First AECL Investigation, July–September 1985 Yakima, Washington, December 1985 Tyler, Texas, March 1986 Second AECL Investigation, March 1986 Tyler, Texas, April 1986 Yakima, Washington, January 1987 Therac-25 Declared Defective, February 1987 8.5.3 Software Errors 8.5.4 Postmortem 8.5.5 Moral Responsibility of the Therac-25 Team 8.5.6 Postscript 8.6 Tesla Version 7.0 (Autopilot) 8.6.1 Introduction 8.6.2 May 2016 Fatal Accident 8.6.3 The Hand-off Problem 8.6.4 Assigning Moral Responsibility 8.7 Uber Test-Vehicle Accident 8.7.1 Introduction 8.7.2 Shift to One Human Safety Operator 8.7.3 Effort to Eliminate “Bad Experiences” 8.7.4 March 18, 2018, Accident 8.8 Computer Simulations 8.8.1 Uses of Simulation 8.8.2 Validating Simulations 8.9 Software Engineering 8.9.1 Specification 8.9.2 Development 8.9.3 Validation 8.9.4 Evolution 8.9.5 Improvement in Software Quality 8.9.6 Gender Bias 8.9.7 Bias in Training Data Sets for Artificial-Intelligence Systems 8.10 Software Warranties and Vendor Liability 8.10.1 Shrink-Wrap Warranties 8.10.2 Are Software Warranties Enforceable? Step-Saver Data Systems v. Wyse Technology and The Software Link ProCD Inc. v. Zeidenberg Mortenson v. Timberline Software 8.10.3 Should Software Be Considered a Product? 8.10.4 Case Study: Incredible Bulk Ethical Analysis Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercises References Chapter 9 Professional Ethics 9.1 Introduction 9.2 How Well Developed Are the Computing Professions? 9.2.1 Characteristics of a Fully Developed Profession 9.2.2 Case Study: Certified Public Accountants 9.2.3 How Do Computer-Related Careers Stack Up? Status of Certification and Licensing Ability to Harm the Public 9.3 Software Engineering Code of Ethics Preamble Principles Principle 1: Public Principle 2: Client and Employer Principle 3: Product Principle 4: Judgment Principle 5: Management Principle 6: Profession Principle 7: Colleagues Principle 8: Self 9.4 Analysis of the Code 9.4.1 Preamble 9.4.2 Alternative List of Fundamental Principles 9.5 Case Studies 9.5.1 Software Recommendation 9.5.2 Child Pornography 9.5.3 Antiworm 9.5.4 Consulting Opportunity 9.6 Whistle-Blowing 9.6.1 Morton Thiokol/NASA 9.6.2 Hughes Aircraft 9.6.3 US Legislation Related to Whistle-Blowing 9.6.4 Morality of Whistle-Blowing Whistle-Blowers Cause Harm Whistle-Blowing is a Sign of Organizational Failure Whistle-Blowing as a Moral Duty Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercises References Chapter 10 Work and Wealth 10.1 Introduction 10.2 Automation and Employment 10.2.1 Automation and Job Destruction Lost Manufacturing Jobs Lost White-Collar Jobs Working Harder, Making Less 10.2.2 Automation and Job Creation Increased Purchasing Power Working Less, Making More 10.2.3 Effects of Increase in Productivity Americans Work Long Hours Protestant Work Ethic Time Versus Possessions 10.2.4 Case Study: The Canceled Vacation Kantian/Social Contract Theory Evaluation Act-Utilitarian Evaluation Virtue-Ethics Evaluation Summary 10.2.5 Rise of the Robots? 10.3 Workplace Changes 10.3.1 Organizational Changes 10.3.2 Telework Advantages of Telework Disadvantages of Telework 10.3.3 The Gig Economy 10.3.4 Monitoring 10.3.5 Multinational Teams 10.4 Globalization 10.4.1 Arguments For Globalization 10.4.2 Arguments Against Globalization 10.4.3 Dot-Com Bust Increased IT Sector Unemployment 10.4.4 Foreign Workers in the American IT Industry 10.4.5 Foreign Competition 10.5 The Digital Divide 10.5.1 Global Divide 10.5.2 Social Divide 10.5.3 Models of Technological Diffusion 10.5.4 Critiques of the Digital Divide 10.5.5 Massive Open Online Courses 10.5.6 Net Neutrality 10.6 The “Winner-Take-All” Society 10.6.1 Harmful Effects of Winner-Take-All 10.6.2 Reducing Winner-Take-All Effects Summary Further Reading and Viewing Review Questions Discussion Questions In-Class Exercises References Appendix A Plagiarism Consequences of Plagiarism Types of Plagiarism Guidelines for Citing Sources How to Avoid Plagiarism Misuse of Sources Additional Information References Appendix B Introduction to Argumentation B.1 Introduction B.1.1 Arguments and Propositions B.1.2 Conditional Statements B.1.3 Backing B.2 Valid Arguments B.2.1 Affirming the Antecedent (Modus Ponens) B.2.2 Denying the Consequent (Modus Tollens) B.2.3 Process of Elimination B.2.4 Chain Rule B.3 Unsound Arguments B.4 Common Fallacies B.4.1 Affirming the Consequent B.4.2 Denying the Antecedent B.4.3 Begging the Question B.4.4 Slippery Slope B.4.5 Bandwagon Fallacy B.4.6 Faulty Generalization (Hasty Generalization) B.4.7 Division Fallacy B.4.8 The Fallacy of Equivocation B.5 Unfair Debating Gambits B.5.1 Red Herring B.5.2 Ad Hominem Argument B.5.3 Attacking a Straw Man B.6 Writing Persuasive Essays The Government Should Ban Self-Driving Cars Quiz Answers to the Quiz Questions References