|
|
|
|
LEADER |
03291nam a22005055i 4500 |
001 |
978-0-387-22466-4 |
003 |
DE-He213 |
005 |
20151204184001.0 |
007 |
cr nn 008mamaa |
008 |
100301s2003 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387224664
|9 978-0-387-22466-4
|
024 |
7 |
|
|a 10.1007/b98842
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.C66
|
072 |
|
7 |
|a UBJ
|2 bicssc
|
072 |
|
7 |
|a COM079000
|2 bisacsh
|
082 |
0 |
4 |
|a 004
|2 23
|
245 |
1 |
0 |
|a Ethical And Social Issues In The Information Age
|h [electronic resource] /
|c edited by Joseph Migga Kizza.
|
250 |
|
|
|a Second Edition.
|
264 |
|
1 |
|a New York, NY :
|b Springer New York,
|c 2003.
|
300 |
|
|
|a XXIII, 375 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Texts in Computer Science
|
505 |
0 |
|
|a to Social and Ethical Computing -- Morality and The Law -- Ethics, Technology, And Value -- Ethics And The Professions -- Anonymity, Security, Privacy, and Civil Liberties -- Intellectual Property Rights and Computer Technology -- Social Context of Computing -- Software Issues: Risks and Liabilities -- Computer Crimes -- New Frontiers For Computer Ethics -- Cyberspace and Cyberethics.
|
520 |
|
|
|a Since the publication of the ?rst edition in 1997, there have been tremendous changes in the ?elds of computer science and information sciences. During this period, we have become more dependent than ever before on computer and telecommunication technology. As we, both individually and as nations, become more dependent on cyberspace technology, it has itself become a cr- ical component of individual nation’s security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of - tional communication, including emergency services. The recent rise in cyber attacks—many of them with lightning speed, - fecting millions of computers worldwide, and causing billions of dollars in losses both to individuals and businesses—is an indication of how unprepared we are to handle such attacks not only today but also in the future. Such - tacks are a mark of the poor state of our cyberspace security policies. The facts that there are no signs to indicate there is going to be a slowdown in such - tacks, and that nations are not doing anything worth calling preventive, has heightened the need for an effective strategy to produce responsible prof- sionals who can play an active role in the ?ght against computer and cyber - tacks and vandalism.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Ethics.
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Ethics.
|
650 |
2 |
4 |
|a User Interfaces and Human Computer Interaction.
|
700 |
1 |
|
|a Kizza, Joseph Migga.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387954219
|
830 |
|
0 |
|a Texts in Computer Science
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b98842
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|