- Publisher: Prentice Hall
- Format: Paperback | 216 pages
- Dimensions: 150mm x 226mm x 14mm | 281g
- Publication date: 24 December 2008
- Publication City/Country: Upper Saddle River
- ISBN 10: 0131112414
- ISBN 13: 9780131112414
- Edition: 4, Revised
- Edition statement: United States ed of 4th revised ed
- Sales rank: 733,306
For one-semester courses in Computer Ethics, Applied Ethics, Computers, Ethics and Society, Ethics and Information Systems, Computers and Society, or Social Effects of Technology. Written in clear, accessible prose, the Fourth edition of Computer Ethics brings together philosophy, law, and technology. The text provides an in-depth exploration and analysis of a broad range of topics regarding the ethical implications of widespread use of computer technology. The approach is normative while also exposing the student to alternative ethical stances.
Other books in this category
USD$20.21 - Save $7.75 27% off - RRP $27.96
USD$22.93 - Save $5.03 17% off - RRP $27.96
USD$8.95 - Save $6.58 42% off - RRP $15.53
USD$14.86 - Save $5.33 26% off - RRP $20.19
USD$12.47 - Save $6.17 33% off - RRP $18.64
USD$11.52 - Save $13.35 53% off - RRP $24.87
Deborah G. Johnson is the Anne Shirley Carter Olsson Professor of Applied Ethics and Chair of the Department of Science, Technology, and Society at the University of Virginia. Johnson has devoted her career to understanding the connections between ethics and technology. She received the John Barwise prize from the American Philosophical Association in 2004; the Sterling Olmsted Award from the Liberal Education Division of the American Society for Engineering Education in 2001; and the ACM SIGCAS Making a Difference Award in 2000. Keith W. Miller is a Professor of Computer Science at the University of Illinois at Springfield. His work in software engineering and computer ethics provide complementary perspectives to questions that challenge computer professionals. He is the editor-in-chief of IEEE Technology and Society, and helped develop the Software Engineering Code of Ethics and Professional Practice. He was named a University of Illinois Scholar in 2000 and received the ACM SIGCAS Outstanding Service Award in 2006.
Back cover copy
Computer Ethics: Analyzing Information Technology, The 4th edition brings the field of computer ethics into the 21st Century. Drawing on concepts and theories from STS, this edition introduces a new approach: sociotechnical computer ethics. The book maintains a focus on enduring issues of privacy, property, democracy, and professional ethics while coming to grips with current developments in computing, information, communication technologies, and ethical issues around social networking, free and open source software, Wikipedia, artificial agents, and more. The new edition is accessible to undergraduates while at the same time providing analyses that will be of interest to scholars and theorists. As before, chapters begin with short scenarios that make the issues concrete; explain the issues clearly; provide rigorous and provocative discussion; and conclude with a set of study questions. "Perhaps the greatest strength of this work is that it excels at being both a college course textbook and as a book that advances the basic ideas that comprise the field.""Peter Madsen, Carnegie Melon University"" ""I believe this is the best text on the market for Computer Ethics.""Day Radebaugh, Wichita State University"" ""The author does a good job of setting the setting the stage for a discussion on Computer Ethics and the many important factors surrounding this field.""Demetria Enis-Cole, University of North Texas"
Table of contents
Preface to 4th Edition Chapter 1 Computer Ethics (emphasis on Computer) SCENARIOS INTRODUCTION: WHY COMPUTER ETHICS? THE STANDARD ACCOUNT THE SOCIOTECHNICAL SYSTEMS PERSPECTIVE SOCIOTECHNICAL COMPUTER ETHICS CONCLUSION STUDY QUESTIONS 2. Computer Ethics (emphasis on Ethics) SCENARIOS INTRODUCTION ETHICAL THEORIES AND CONCEPTS CONCLUSION STUDY QUESITONS 3. Ethics in IT-Configured Societies SCENARIOS INTRODUCTION TECHNOLOGY AS THE INSTRUMENTATION OF HUMAN ACTION THREE MORALLY SIGNIFICANT CHARACTERISTICS IT CONFIGURED DOMAINS OF LIFE DEMOCRACY AND THE INTERNET VIRTUAL ACTION CONCLUSION STUDY QUESTIONS 4. Data Flow, Privacy, and Surveillance SCENARIOS INTRODUCTION: INFORMATION FLOW IN AN IT CONFIGURED WORLD WHY DOES PRIVACY MATTER? FROM PRIVACY TO SURVEILLANCE AND SOCIAL SORTING LEGISLATIVE STRATEGIES GLOBALIZATION CONCLUSION STUDY QUESTIONS 5. Property Rights in the IT World SCENARIOS INTRODUCTION THREE CATEGORIES OF LEGAL PROTECTION THE PHILOSOPHICAL BASIS OF PROPERTY CURRENT AND FUTURE ISSUES BREAKING RULES, NO RULES, AND NEW RULES CONCLUSION STUDY QUESTIONS 6. Regulating and Securing the IT Configured World SCENARIOS INTRODUCTION: REGULATION, CRIME, AND SECURITY CRIME IN IT-CONFIGURED SOCIETIES HACKERS AND HACKER ETHICS ORDER AND DISORDER REGULATION CONCLUSION STUDY QUESTIONS 7. Ethics and IT Professionals SCENARIOS INTRODUCTION: WHY PROFESSIONAL ETHICS? THE PARADIGM OF PROFESSIONS CHARACTERISTICS OF PROFESSIONS SORTING OUT THE FIELD OF COMPUTING AND ITS STATUS AS A PROFESSION SOFTWARE ENGINEERING PROFESSIONAL RELATIONSHIPS LEGAL PERSPECTIVE ON PROFESSIONALISM IN COMPUTING A FINAL LOOK AT THE STATE OF THE PROFESSION CONCLUSION STUDY QUESTIONS