Ethical and Social Issues in the Information Age

Pirmais vāks
Springer Science & Business Media, 2007. gada 2. jūn. - 375 lappuses
Since the publication of the ?rst edition in 1997, there have been tremendous changes in the ?elds of computer science and information sciences. During this period, we have become more dependent than ever before on computer and telecommunication technology. As we, both individually and as nations, become more dependent on cyberspace technology, it has itself become a cr- ical component of individual nation’s security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of - tional communication, including emergency services. The recent rise in cyber attacks—many of them with lightning speed, - fecting millions of computers worldwide, and causing billions of dollars in losses both to individuals and businesses—is an indication of how unprepared we are to handle such attacks not only today but also in the future. Such - tacks are a mark of the poor state of our cyberspace security policies. The facts that there are no signs to indicate there is going to be a slowdown in such - tacks, and that nations are not doing anything worth calling preventive, has heightened the need for an effective strategy to produce responsible prof- sionals who can play an active role in the ?ght against computer and cyber - tacks and vandalism.

No grāmatas satura

Saturs

INTRODUCTION TO SOCIAL
1
2
19
3
37
4
64
ANONYMITY SECURITY
97
INTELLECTUAL PROPERTY RIGHTS
125
7
156
8
201
9
239
11
282
B THE FEDERAL FALSE CLAIMS ACT 337
338
PROJECTS
363
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Populāri fragmenti

50. lappuse - The honest computing professional will not make deliberately false or deceptive claims about a system or system design, but will instead provide full disclosure of all pertinent system limitations and problems. A computer professional has a duty to be honest about his or her own qualifications, and about any circumstances that might lead to conflicts of interest. Membership in volunteer organizations such as ACM may at times place individuals in situations where their statements or actions could...
327. lappuse - No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof...
55. lappuse - ... oriented toward quality and the welfare of society will reduce harm to members of the public, thereby serving public interest and fulfilling social responsibility. Therefore, organizational leaders must encourage full participation in meeting social responsibilities as well as quality performance. 3.2 Manage personnel and resources to design and build information systems that enhance the quality of working life.
55. lappuse - While the number and scope of such rules should be minimal, they should be fully enforced when established. 3.4 Ensure that users and those who will be affected by a system have their needs clearly articulated during the assessment and design of requirements; later the system must be validated to meet requirements...
354. lappuse - Any changes in form or substance which the witness desires to make shall be entered upon the deposition by the officer with a statement of the reasons given by the witness for making them.
329. lappuse - Definitions. — For purposes of this subsection: (A) the term "encryption research" means activities necessary to identify and analyze flaws and vulnerabilities of encryption technologies applied to copyrighted works, if these activities are conducted to advance the state of knowledge in the field of encryption technology or to assist in the development of encryption products; and (B) the term "encryption technology" means the scrambling and descrambling of information using mathematical formulas...
347. lappuse - Whenever the Attorney General, or the Assistant Attorney General in charge of the Antitrust Division of the Department of Justice, has reason to believe that any person may be in possession, custody, or control of any documentary material, or may have any information, relevant to a civil antitrust investigation...
327. lappuse - ... without any purpose of direct or indirect commercial advantage; (2) the collections of the library or archives are (i) open to the public, or (ii) available not only to researchers affiliated with the library or archives or with the institution of which it is a part, but also to other persons doing research in a specialized field; and (3) the reproduction or distribution of the work includes a notice of copyright.
353. lappuse - The officer before whom the deposition is to be taken shall put the witness on oath and shall personally, or by someone acting under his direction and in his presence, record the testimony of the witness. The testimony shall be taken stenographically and transcribed unless the parties agree otherwise.
49. lappuse - Contribute to society and human well-being. This principle concerning the quality of life of all people affirms an obligation to protect fundamental human rights and to respect the diversity of all cultures. An essential aim of computing professionals is to minimize negative consequences of computing systems, including threats to health and safety. When designing or implementing systems, computing professionals must attempt to ensure that the products of their efforts will be used in socially responsible...

Par autoru (2007)

Dr. Joseph Migga Kizza is Professor and Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, USA. He is also the author of the successful Springer title Guide to Computer Network Security.

Bibliogrāfiskā informācija