ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Ethics for the Information Age

دانلود کتاب اخلاق برای عصر اطلاعات

Ethics for the Information Age

مشخصات کتاب

Ethics for the Information Age

ویرایش: 8 
نویسندگان:   
سری:  
ISBN (شابک) : 0135217725, 9780135217726 
ناشر:  
سال نشر:  
تعداد صفحات: 1364 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 15 مگابایت 

قیمت کتاب (تومان) : 50,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 11


در صورت تبدیل فایل کتاب Ethics for the Information Age به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اخلاق برای عصر اطلاعات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Ethics for the Information Age
Ethics for the Information Age
Brief Contents
Contents
Preface
	What’s New in the Eighth Edition
	Organization of the Book
	Note to Instructors
	Supplements
	Feedback
Chapter 1 Catalysts for Change
	1.1 Introduction
	1.2 Milestones in Computing
		1.2.1 Aids to Manual Calculating
		1.2.2 Mechanical Calculators
		1.2.3 Cash Register
		1.2.4 Punched-Card Tabulation
		1.2.5 Precursors of Commercial Computers
		1.2.6 First Commercial Computers
		1.2.7 Programming Languages and Time-Sharing
		1.2.8 Transistor and Integrated Circuit
		1.2.9 IBM System/360
		1.2.10 Microprocessor
		1.2.11 Personal Computer
	1.3 Milestones in Networking
		1.3.1 Electricity and Electromagnetism
		1.3.2 Telegraph
		1.3.3 Telephone
		1.3.4 Typewriter and Teletype
		1.3.5 Radio
		1.3.6 Television
		1.3.7 Remote Computing
		1.3.8 ARPANET
		1.3.9 Email
		1.3.10 Internet
		1.3.11 NSFNET
		1.3.12 Broadband
		1.3.13 Wireless Networks
		1.3.14 Cloud Computing
	1.4 Milestones in Information Storage and Retrieval
		1.4.1 Greek Alphabet
		1.4.2 Codex and Paper
		1.4.3 Gutenberg’s Printing Press
		1.4.4 Newspapers
		1.4.5 Hypertext
		1.4.6 Graphical User Interface
		1.4.7 Single-Computer Hypertext Systems
		1.4.8 Networked Hypertext: World Wide Web
		1.4.9 Search Engines
		1.4.10 Cloud Storage
	1.5 Contemporary Information Technology Issues
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercisse
		References
Chapter 2 Introduction to Ethics
	2.1 Introduction
		2.1.1 Defining Terms
		2.1.2 Four Scenarios
		2.1.3 Overview of Ethical Theories
	2.2 Subjective Relativism
		2.2.1 The Case For Subjective Relativism
		2.2.2 The Case Against Subjective Relativism
	2.3 Cultural Relativism
		2.3.1 The Case For Cultural Relativism
		2.3.2 The Case Against Cultural Relativism
	2.4 Divine Command Theory
		2.4.1 The Case For the Divine Command Theory
		2.4.2 The Case Against the Divine Command Theory
	2.5 Ethical Egoism
		2.5.1 The Case For Ethical Egoism
		2.5.2 The Case Against Ethical Egoism
	2.6 Kantianism
		2.6.1 Good Will and the Categorical Imperative
		2.6.2 Evaluating a Scenario Using Kantianism
		2.6.3 The Case For Kantianism
		2.6.4 The Case Against Kantianism
	2.7 Act Utilitarianism
		2.7.1 Principle of Utility
		2.7.2 Evaluating a Scenario Using Act Utilitarianism
		2.7.3 The Case For Act Utilitarianism
		2.7.4 The Case Against Act Utilitarianism
	2.8 Rule Utilitarianism
		2.8.1 Basis of Rule Utilitarianism
		2.8.2 Evaluating a Scenario Using Rule Utilitarianism
		2.8.3 The Case For Rule Utilitarianism
		2.8.4 The Case Against Utilitarianism in General
	2.9 Social Contract Theory
		2.9.1 The Social Contract
		2.9.2 Rawls’s Theory of Justice
		2.9.3 Evaluating a Scenario Using Social Contract Theory
		2.9.4 The Case For Social Contract Theory
		2.9.5 The Case Against Social Contract Theory
	2.10 Virtue Ethics
		2.10.1 Virtues and Vices
		2.10.2 Making a Decision Using Virtue Ethics
		2.10.3 The Case For Virtue Ethics
		2.10.4 The Case Against Virtue Ethics
	2.11 Comparing Workable Ethical Theories
	2.12 Morality of Breaking the Law
		2.12.1 Social Contract Theory Perspective
		2.12.2 Kantian Perspective
		2.12.3 Rule-Utilitarian Perspective
		2.12.4 Act-Utilitarian Perspective
		2.12.5 Conclusion
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercises
		References
Chapter 3 Networked Communications
	3.1 Introduction
	3.2 Spam
		3.2.1 The Spam Tsunami
		3.2.2 Need for Social-Technical Solutions
		3.2.3 Case Study: Ann the Acme Accountant
			Kantian Analysis
			Act-Utilitarian Analysis
			Rule-Utilitarian Analysis
			Social-Contract-Theory Analysis
			Virtue-Ethics Analysis
			Summary
	3.3 Internet Interactions
		3.3.1 The World Wide Web
		3.3.2 Mobile Apps
		3.3.3 How We Use the Internet
	3.4 Text Messaging
		3.4.1 Transforming Lives in Developing Countries
		3.4.2 Twitter
		3.4.3 Business Promotion
	3.5 Political Impact of Social Media and Online Advertising
		3.5.1 Political Activism
		3.5.2 Macedonian Entrepreneurs
		3.5.3 Internet Research Agency
		3.5.4 Is Democracy Being Threatened?
		3.5.5 Troubling Times for Traditional Newspapers
	3.6 Censorship
		3.6.1 Direct Censorship
		3.6.2 Self-Censorship
		3.6.3 Challenges Posed by the Internet
		3.6.4 Government Filtering and Surveillance of Internet Content
		3.6.5 Ethical Perspectives on Censorship
			Kant’s Views on Censorship
			Mill’s Views on Censorship
			Mill’s Principle of Harm
	3.7 Freedom of Expression
		3.7.1 History
		3.7.2 Freedom of Expression Not an Absolute Right
		3.7.3 FCC v. Pacifica Foundation
		3.7.4 Case Study: Kate’s Blog
			Kantian Analysis
			Social-Contract-Theory Analysis
			Act-Utilitarian Analysis
			Rule-Utilitarian Analysis
			Virtue-Ethics Analysis
			Summary
	3.8 Children and Inappropriate Content
		3.8.1 Web Filters
		3.8.2 Child Internet Protection Act
		3.8.3 Ethical Evaluations of CIPA
			Kantian Evaluation
			Act-Utilitarian Evaluation
			Social-Contract-Theory Evaluation
		3.8.4 Sexting
	3.9 Breaking Trust
		3.9.1 Identity Theft
		3.9.2 Fake Reviews
		3.9.3 Online Predators
		3.9.4 Ethical Evaluations of Police Sting Operations
			Utilitarian Analysis
			Kantian Analysis
			Social-Contract-Theory Analysis
			Summary of Ethical Analyses
		3.9.5 False Information
		3.9.6 Cyberbullying
		3.9.7 Revenge Porn
	3.10 Internet Addiction
		3.10.1 Is Internet Addiction Real?
		3.10.2 Contributing Factors to Addiction
		3.10.3 Ethical Evaluation of Internet Addiction
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercises
		References
Chapter 4 Intellectual Property
	4.1 Introduction
	4.2 Intellectual Property Rights
		4.2.1 Property Rights
		4.2.2 Extending the Argument to Intellectual Property
		4.2.3 Benefits of Intellectual Property Protection
		4.2.4 Limits to Intellectual Property Protection
	4.3 Protecting Intellectual Property
		4.3.1 Trade Secrets
		4.3.2 Trademarks and Service Marks
		4.3.3 Patents
			Polaroid v. Kodak
			Cleartype
		4.3.4 Copyrights
			Gershwin Publishing v. Columbia Artists
			Davey Jones Locker
			No Electronic Theft Act
			Copyright Creep
		4.3.5 Case Study: The Database Guru
			Kantian Evaluations
			Social-Contract-Theory Evaluations
			Act-Utilitarian Evaluations
			Virtue-Ethics Evaluations
			Conclusion
	4.4 Fair Use
		4.4.1 Sony v. Universal City Studios
		4.4.2 Audio Home Recording Act of 1992
		4.4.3 RIAA v. Diamond Multimedia
		4.4.4 Kelly v. Arriba Soft
		4.4.5 Authors Guild v. Google
		4.4.6 Mashups
	4.5 Digital Media
		4.5.1 Digital Rights Management
		4.5.2 Digital Millennium Copyright Act
		4.5.3 Secure Digital Music Initiative
		4.5.4 Sony BMG Music Entertainment Rootkit
		4.5.5 Criticisms of Digital Rights Management
		4.5.6 Online Music Stores Drop Digital Rights Management
		4.5.7 Microsoft Xbox One
	4.6 Peer-to-Peer Networks and Cyberlockers
		4.6.1 RIAA Lawsuits Against Napster, Grokster, and Kazaa
		4.6.2 MGM v. Grokster
		4.6.3 BitTorrent
		4.6.4 Legal Action Against the Pirate Bay
		4.6.5 PRO-IP Act
		4.6.6 Megaupload Shutdown
		4.6.7 Legal Online Access to Entertainment
	4.7 Protections for Software
		4.7.1 Software Copyrights
		4.7.2 Violations of Software Copyrights
			Apple Computer v. Franklin Computer
			Sega v. Accolade
		4.7.3 Safe Software Development
			Oracle v. Google
		4.7.4 Software Patents
			Origins of Software Patents
			Patent-Holding Companies
			Harms From too Many Software Patents
			Smartphone Patent Wars
			Alice Corporation v. CLS Bank
	4.8 Legitimacy of Intellectual Property Protection for Software
		4.8.1 Rights-Based Analysis
		4.8.2 Utilitarian Analysis
		4.8.3 Conclusion
	4.9 Open-Source Software
		4.9.1 Consequences of Proprietary Software
		4.9.2 “Open Source” Definition
		4.9.3 Beneficial Consequences of Open-Source Software
		4.9.4 Examples of Open-Source Software
		4.9.5 The GNU Project and Linux
		4.9.6 Impact of Open-Source Software
	4.10 Creative Commons
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercises
		References
Chapter 5 Information Privacy
	5.1 Introduction
	5.2 Perspectives on Privacy
		5.2.1 Defining Privacy
		5.2.2 Harms and Benefits of Privacy
			Harms of Privacy
			Benefits of Privacy
			Summary
		5.2.3 Is There a Natural Right to Privacy?
			Privacy Rights Evolve from Property Rights
			Warren and Brandeis: Clearly, People have A right to Privacy
			Thomson: Every “Privacy Right” Violation is a Violation of Another Right
			Autonomous Moral Agents Need Some Privacy
			Conclusion: Privacy is a Prudential Right
		5.2.4 Privacy and Trust
		5.2.5 Case Study: The New Parents
			Rule-Utilitarian Evaluation
			Social-Contract-Theory Evaluation
			Kantian Evaluation
			Virtue-Ethics Evaluation
			Summary
	5.3 Information Disclosures
		5.3.1 Public Records
		5.3.2 Information Held by Private Organizations
		5.3.3 Facebook Tags
		5.3.4 Enhanced 911 Services
		5.3.5 Rewards or Loyalty Programs
		5.3.6 Body Scanners
		5.3.7 RFID Tags
		5.3.8 Implanted Chips
		5.3.9 Mobile Apps
		5.3.10 Facebook Login
		5.3.11 OnStar
		5.3.12 Automobile “Black Boxes”
		5.3.13 Medical Records
		5.3.14 Digital Video Recorders
		5.3.15 Cookies
	5.4 Data Mining
		5.4.1 Data Mining Defined
			Google’s Personalized Search
			Collaborative Filtering
		5.4.2 Opt-In versus Opt-Out Policies
		5.4.3 Examples of Data Mining
			Targeting Pregnant Women
			Credit Reports
			Targeted Direct Mail and Data Brokers
			Microtargeting
		5.4.4 Social Network Analysis
		5.4.5 Release of “Anonymized” Datasets
			Netflix Prize
			AOL Search Dataset
	5.5 Examples of Consumer or Political Backlash
		5.5.1 Marketplace: Households
		5.5.2 Facebook Beacon
		5.5.3 Malls Track Shoppers’ Cell Phones
		5.5.4 iPhone Apps Uploading Address Books
		5.5.5 Instagram’s Proposed Change to Terms of Service
		5.5.6 Cambridge Analytica
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercises
		References
Chapter 6 Privacy and the Government
	6.1 Introduction
	6.2 US Legislation Restricting Information Collection
		6.2.1 Employee Polygraph Protection Act
		6.2.2 Children’s Online Privacy Protection Act
		6.2.3 Genetic Information Nondiscrimination Act
	6.3 Information Collection by the Government
		6.3.1 Census Records
		6.3.2 Internal Revenue Service Records
		6.3.3 FBI National Crime Information Center 2000
		6.3.4 OneDOJ Database
		6.3.5 Closed-Circuit Television Cameras
		6.3.6 License-Plate Scanners
		6.3.7 Police Drones
	6.4 Covert Government Surveillance
		6.4.1 Wiretaps and Bugs
			Olmstead v. United States
			Congress Makes Wiretapping Illegal
			FBI Continues Secret Wiretapping
			Charles Katz v. United States
		6.4.2 Operation Shamrock
		6.4.3 Carnivore Surveillance System
		6.4.4 Covert Activities After 9/11
			NSA Wiretapping
			Talon Database
	6.5 US Legislation Authorizing Wiretapping
		6.5.1 Title III
		6.5.2 Foreign Intelligence Surveillance Act
		6.5.3 Electronic Communications Privacy Act
		6.5.4 Stored Communications Act
		6.5.5 Communications Assistance for Law Enforcement Act
	6.6 USA PATRIOT Act
		6.6.1 Provisions of the Patriot Act
		6.6.2 National Security Letters
		6.6.3 Responses to the Patriot Act
		6.6.4 Successes and Failures
		6.6.5 Long-Standing NSA Access to Telephone Records
	6.7 Regulation of Public and Private Databases
		6.7.1 Code of Fair Information Practices
		6.7.2 Privacy Act of 1974
		6.7.3 Fair Credit Reporting Act
		6.7.4 Fair and Accurate Credit Transactions Act
		6.7.5 Financial Services Modernization Act
	6.8 Data Mining by the Government
		6.8.1 Internal Revenue Service Audits
		6.8.2 Syndromic Surveillance Systems
		6.8.3 Telecommunications Records Database
		6.8.4 Predictive Policing
		6.8.5 Potential Harms of Profiling
	6.9 National Identification Card
		6.9.1 History and Role of the Social Security Number
		6.9.2 Debate over a National ID Card
		6.9.3 The REAL ID Act
	6.10 Information Dissemination
		6.10.1 Family Education Rights and Privacy Act
		6.10.2 Video Privacy Protection Act
		6.10.3 Health Insurance Portability and Accountability Act
		6.10.4 Freedom of Information Act
		6.10.5 Tollbooth Records Used in Court
		6.10.6 Carpenter v. United States
	6.11 Invasion
		6.11.1 Telemarketing
		6.11.2 Loud Television Commercials
		6.11.3 Requiring Identification for Pseudoephedrine Purchases
		6.11.4 Advanced Imaging Technology Scanners
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercises
		References
Chapter 7 Computer and Network Security
	7.1 Introduction
	7.2 Hacking
		7.2.1 Hackers, Past and Present
		7.2.2 Penalties for Hacking
		7.2.3 Selected Hacking Incidents
		7.2.4 FBI and the Locked iPhone
		7.2.5 Case Study: Firesheep
			Act-Utilitarian Analysis
			Virtue-Ethics Analysis
			Kantian Analysis
	7.3 Malware
		7.3.1 Viruses
		7.3.2 The Internet Worm
			Background of Robert Tappan Morris Jr.
			Designing the Worm
			Launching the Worm
			Ethical Evaluation
		7.3.3 Sasser
		7.3.4 Instant Messaging Worms
		7.3.5 Conficker
		7.3.6 Cross-Site Scripting
		7.3.7 Drive-By Downloads
		7.3.8 Trojan Horses and Backdoor Trojans
		7.3.9 Ransomware
		7.3.10 Rootkits
		7.3.11 Spyware and Adware
		7.3.12 Bots and Botnets
		7.3.13 Security Risks Associated with “Bring Your Own Device”
	7.4 Cyber Crime and Cyber Attacks
		7.4.1 Phishing and Spear Phishing
		7.4.2 SQL Injection
		7.4.3 Denial-of-Service and Distributed Denial-of-Service Attacks
		7.4.4 Internet-of-Things Devices Co-opted for DDoS Attack
		7.4.5 Cyber Crime
			Jeanson James Ancheta
			Pharmamaster
			Albert Gonzalez
			Avalanche Gang
		7.4.6 Politically Motivated Cyber Attacks
			Estonia (2007)
			Georgia (2008)
			Georgia (2009)
			Exiled Tibetan Government (2009)
			United States and South Korea (2009)
			Iran (2009)
			Cyber Espionage Attributed to the People’s Liberation Army
			Anonymous
	7.5 Online Voting
		7.5.1 Motivation for Online Voting
		7.5.2 Proposals
		7.5.3 Ethical Evaluation
			Benefits of Online Voting
			Risks of Online Voting
			Utilitarian Analysis
			Kantian Analysis
			Conclusions
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercises
		References
Chapter 8 Computer Reliability
	8.1 Introduction
	8.2 Data-Entry or Data-Retrieval Errors
		8.2.1 Disenfranchised Voters
		8.2.2 False Arrests
		8.2.3 Utilitarian Analysis: Accuracy of NCIC Records
	8.3 Software and Billing Errors
		8.3.1 Errors Leading to System Malfunctions
		8.3.2 Errors Leading to System Failures
		8.3.3 Analysis: E-retailer Posts Wrong Price, Refuses to Deliver
	8.4 Notable Software System Failures
		8.4.1 Patriot Missile
		8.4.2 Ariane 5
		8.4.3 AT&T Long-Distance Network
		8.4.4 Robot Missions to Mars
		8.4.5 Denver International Airport
		8.4.6 Tokyo Stock Exchange
		8.4.7 Direct-Recording Electronic Voting Machines
	8.5 Therac-25
		8.5.1 Genesis of the Therac-25
		8.5.2 Chronology of Accidents and AECL Responses
			Marietta, Georgia, June 1985
			Hamilton, Ontario, July 1985
			First AECL Investigation, July–September 1985
			Yakima, Washington, December 1985
			Tyler, Texas, March 1986
			Second AECL Investigation, March 1986
			Tyler, Texas, April 1986
			Yakima, Washington, January 1987
			Therac-25 Declared Defective, February 1987
		8.5.3 Software Errors
		8.5.4 Postmortem
		8.5.5 Moral Responsibility of the Therac-25 Team
		8.5.6 Postscript
	8.6 Tesla Version 7.0 (Autopilot)
		8.6.1 Introduction
		8.6.2 May 2016 Fatal Accident
		8.6.3 The Hand-off Problem
		8.6.4 Assigning Moral Responsibility
	8.7 Uber Test-Vehicle Accident
		8.7.1 Introduction
		8.7.2 Shift to One Human Safety Operator
		8.7.3 Effort to Eliminate “Bad Experiences”
		8.7.4 March 18, 2018, Accident
	8.8 Computer Simulations
		8.8.1 Uses of Simulation
		8.8.2 Validating Simulations
	8.9 Software Engineering
		8.9.1 Specification
		8.9.2 Development
		8.9.3 Validation
		8.9.4 Evolution
		8.9.5 Improvement in Software Quality
		8.9.6 Gender Bias
		8.9.7 Bias in Training Data Sets for Artificial-Intelligence Systems
	8.10 Software Warranties and Vendor Liability
		8.10.1 Shrink-Wrap Warranties
		8.10.2 Are Software Warranties Enforceable?
			Step-Saver Data Systems v. Wyse Technology and The Software Link
			ProCD Inc. v. Zeidenberg
			Mortenson v. Timberline Software
		8.10.3 Should Software Be Considered a Product?
		8.10.4 Case Study: Incredible Bulk
			Ethical Analysis
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercises
		References
Chapter 9 Professional Ethics
	9.1 Introduction
	9.2 How Well Developed Are the Computing Professions?
		9.2.1 Characteristics of a Fully Developed Profession
		9.2.2 Case Study: Certified Public Accountants
		9.2.3 How Do Computer-Related Careers Stack Up?
			Status of Certification and Licensing
			Ability to Harm the Public
	9.3 Software Engineering Code of Ethics
		Preamble
		Principles
			Principle 1: Public
			Principle 2: Client and Employer
			Principle 3: Product
			Principle 4: Judgment
			Principle 5: Management
			Principle 6: Profession
			Principle 7: Colleagues
			Principle 8: Self
	9.4 Analysis of the Code
		9.4.1 Preamble
		9.4.2 Alternative List of Fundamental Principles
	9.5 Case Studies
		9.5.1 Software Recommendation
		9.5.2 Child Pornography
		9.5.3 Antiworm
		9.5.4 Consulting Opportunity
	9.6 Whistle-Blowing
		9.6.1 Morton Thiokol/NASA
		9.6.2 Hughes Aircraft
		9.6.3 US Legislation Related to Whistle-Blowing
		9.6.4 Morality of Whistle-Blowing
			Whistle-Blowers Cause Harm
			Whistle-Blowing is a Sign of Organizational Failure
			Whistle-Blowing as a Moral Duty
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercises
		References
Chapter 10 Work and Wealth
	10.1 Introduction
	10.2 Automation and Employment
		10.2.1 Automation and Job Destruction
			Lost Manufacturing Jobs
			Lost White-Collar Jobs
			Working Harder, Making Less
		10.2.2 Automation and Job Creation
			Increased Purchasing Power
			Working Less, Making More
		10.2.3 Effects of Increase in Productivity
			Americans Work Long Hours
			Protestant Work Ethic
			Time Versus Possessions
		10.2.4 Case Study: The Canceled Vacation
			Kantian/Social Contract Theory Evaluation
			Act-Utilitarian Evaluation
			Virtue-Ethics Evaluation
			Summary
		10.2.5 Rise of the Robots?
	10.3 Workplace Changes
		10.3.1 Organizational Changes
		10.3.2 Telework
			Advantages of Telework
			Disadvantages of Telework
		10.3.3 The Gig Economy
		10.3.4 Monitoring
		10.3.5 Multinational Teams
	10.4 Globalization
		10.4.1 Arguments For Globalization
		10.4.2 Arguments Against Globalization
		10.4.3 Dot-Com Bust Increased IT Sector Unemployment
		10.4.4 Foreign Workers in the American IT Industry
		10.4.5 Foreign Competition
	10.5 The Digital Divide
		10.5.1 Global Divide
		10.5.2 Social Divide
		10.5.3 Models of Technological Diffusion
		10.5.4 Critiques of the Digital Divide
		10.5.5 Massive Open Online Courses
		10.5.6 Net Neutrality
	10.6 The “Winner-Take-All” Society
		10.6.1 Harmful Effects of Winner-Take-All
		10.6.2 Reducing Winner-Take-All Effects
	Summary
		Further Reading and Viewing
		Review Questions
		Discussion Questions
		In-Class Exercises
		References
Appendix A Plagiarism
	Consequences of Plagiarism
	Types of Plagiarism
	Guidelines for Citing Sources
	How to Avoid Plagiarism
	Misuse of Sources
	Additional Information
	References
Appendix B Introduction to Argumentation
	B.1 Introduction
		B.1.1 Arguments and Propositions
		B.1.2 Conditional Statements
		B.1.3 Backing
	B.2 Valid Arguments
		B.2.1 Affirming the Antecedent (Modus Ponens)
		B.2.2 Denying the Consequent (Modus Tollens)
		B.2.3 Process of Elimination
		B.2.4 Chain Rule
	B.3 Unsound Arguments
	B.4 Common Fallacies
		B.4.1 Affirming the Consequent
		B.4.2 Denying the Antecedent
		B.4.3 Begging the Question
		B.4.4 Slippery Slope
		B.4.5 Bandwagon Fallacy
		B.4.6 Faulty Generalization (Hasty Generalization)
		B.4.7 Division Fallacy
		B.4.8 The Fallacy of Equivocation
	B.5 Unfair Debating Gambits
		B.5.1 Red Herring
		B.5.2 Ad Hominem Argument
		B.5.3 Attacking a Straw Man
	B.6 Writing Persuasive Essays
	The Government Should Ban Self-Driving Cars
	Quiz
	Answers to the Quiz Questions
	References




نظرات کاربران