Limit search to available items
Book Cover
Book
Author Baase, Sara, author

Title A gift of fire : social, legal, and ethical issues for computing technology / Sara Baase, San Diego State University, Timothy M. Henry, New England Institute of Technology
Edition Fifth edition
Published NY,NY : Pearson, [2018]

Copies

Location Call no. Vol. Availability
 MELB  303.4834 Baa/Gof 2018  AVAILABLE
 MELB  303.4834 Baa/Gof 2018  AVAILABLE
 MELB  303.4834 Baa/Gof 2018  AVAILABLE
 MELB  303.4834 Baa/Gof 2018  AVAILABLE
 MELB  303.4834 Baa/Gof 2018  AVAILABLE
 MELB  303.4834 Baa/Gof 2018  AVAILABLE
 MELB  303.4834 Baa/Gof 2018  AVAILABLE
 MELB  303.4834 Baa/Gof 2018  AVAILABLE
 MELB  303.4834 Baa/Gof 2018  AVAILABLE
Description xviii, 536 pages ; 24 cm
Contents Contents note continued: 2.3.2.Background, Law, and Court Decisions -- 2.3.3.Applying the Fourth Amendment in New Areas -- 2.4.Government Systems -- 2.4.1.Video Surveillance and Face Recognition -- 2.4.2.Databases -- 2.4.3.Public Records: Access versus Privacy -- 2.4.4.National ID Systems -- 2.4.5.The NSA and Secret Intelligence Gathering -- 2.5.Protecting Privacy: Technology and Markets -- 2.5.1.Developing Privacy Tools -- 2.5.2.Encryption -- 2.5.3.Blocking Ads -- 2.5.4.Policies for Protecting Personal Data -- 2.6.Protecting Privacy: Theory, Rights, and Laws -- 2.6.1.A Right to Privacy -- 2.6.2.Law and Regulation -- 2.6.3.Contrasting Viewpoints -- 2.7.Privacy Regulations in the European Union -- Exercises -- 3.Freedom of Speech -- 3.1.The First Amendment and Communications Paradigms -- 3.1.1.Free Speech Principles -- 3.1.2.Regulating Communications Media -- 3.2.Controlling Speech in Cyberspace -- 3.2.1.What Is Offensive Speech? What Is Illegal? --
Contents note continued: 3.2.2.Censorship Laws and Alternatives -- 3.2.3.Child Pornography and Sexting -- 3.2.4.Spam -- 3.2.5.Challenging Old Regulatory Structures and Special Interests -- 3.3.Decisions about Legal but Objectionable Content -- 3.4.Leaking Sensitive Material -- 3.5.Anonymity -- 3.6.The Global Net: Censorship and Political Freedom -- 3.6.1.Tools for Communication, Tools for Oppression -- 3.6.2.Aiding Foreign Censors and Repressive Regimes -- 3.6.3.Shutting Down Communications in Free Countries -- 3.7.Net Neutrality: Regulations or the Market? -- Exercises -- 4.Intellectual Property -- 4.1.Principles and Laws -- 4.1.1.What Is Intellectual Property? -- 4.1.2.Challenges of New Technologies -- 4.1.3.A Bit of History -- 4.1.4.The Fair Use Doctrine -- 4.1.5.Ethical Arguments About Copying -- 4.2.Significant Fair Use Cases and Precedents -- 4.2.1.Sony v. Universal City Studios (1984) -- 4.2.2.Reverse Engineering: Game Machines --
Contents note continued: 4.2.3.Sharing Music: The Napster and Grokster Cases -- 4.2.4.User and Programmer Interfaces -- 4.3.Responses to Copyright Infringement -- 4.3.1.Defensive and Aggressive Responses from the Content Industries -- 4.3.2.The Digital Millennium Copyright Act: Anticircumvention -- 4.3.3.The Digital Millennium Copyright Act: Safe Harbor -- 4.3.4.Evolving Business Models -- 4.4.Search Engines and Online Libraries -- 4.5.Free Software -- 4.5.1.What Is Free Software? -- 4.5.2.Should All Software Be Free? -- 4.6.Patents for Software Inventions -- 4.6.1.Patent Trends, Confusion, and Controversies -- 4.6.2.To Patent or Not? -- Exercises -- 5.Crime and Security -- 5.1.Introduction -- 5.2.What is Hacking? -- 5.2.1.The Evolution of Hacking -- 5.2.2.Hacker Tools -- 5.2.3.Is "Harmless" Hacking Harmless? -- 5.3.Some Specific Applications of Hacking -- 5.3.1.Identity Theft -- 5.3.2.Case Study: The Target Breach -- 5.3.3.Hacktivism, or Political Hacking --
Contents note continued: 5.3.4.Hacking by Governments -- 5.4.Why Is the Digital World So Vulnerable? -- 5.4.1.Vulnerability of Operating Systems and the Internet -- 5.4.2.Human Nature, Markets, and Vulnerability of the Internet of Things -- 5.5.Security -- 5.5.1.Tools to Help Protect the Digital World -- 5.5.2.People Who Can Help Protect the Digital World -- 5.5.3.Hacking to Improve Security -- 5.5.4.Backdoors for Law Enforcement -- 5.6.The Law -- 5.6.1.The Computer Fraud and Abuse Act -- 5.6.2.Criminalize Virus Writing and Hacker Tools? -- 5.6.3.Penalties for Young Hackers -- 5.7.Whose Laws Rule the Web? -- 5.7.1.A Crime in One Country but Not Another -- 5.7.2.Libel and Freedom of Speech -- 5.7.3.Culture, Law, and Ethics -- 5.7.4.Potential Solutions -- Exercises -- 6.Work -- 6.1.Fears and Questions -- 6.2.Impacts on Employment -- 6.2.1.Job Destruction and Creation -- 6.2.2.Changing Skills and Skill Levels -- 6.2.3.Are We Earning Less and Working More? --
Contents note continued: 6.3.Changing Work Patterns: From Telecommuting to Gigs -- 6.3.1.Telecommuting -- 6.3.2.The Sharing Economy, On-Demand Services, and Gig Work -- 6.4.A Global Workforce -- 6.5.Employee Communication and Monitoring by Employers -- 6.5.1.Social Media Content -- 6.5.2.Separating---or Merging---Work and Personal Systems -- 6.5.3.Monitoring Employer Systems and Tracking Employees -- Exercises -- 7.Evaluating and Controlling Technology -- 7.1.Evaluating Information -- 7.1.1.The Need for Responsible Judgment -- 7.1.2.Computer Models -- 7.2.Neo-Luddite Views of Computers, Technology, and Quality of Life -- 7.2.1.Criticisms of Computing Technologies -- 7.2.2.Views of Economics, Nature, and Human Needs -- 7.3.Digital Divides -- 7.3.1.Trends in Access in the United States -- 7.3.2.Reaching the Next Billion Users -- 7.4.Control of Our Devices and Data -- 7.4.1.Remote Deletion of Software and Data -- 7.4.2.Automatic Software Upgrades --
Contents note continued: 7.5.Making Decisions About Technology -- 7.5.1.Questions -- 7.5.2.The Difficulty of Prediction -- 7.5.3.Intelligent Machines and Superintelligent Humans---Or the End of the Human Race? -- 7.5.4.A Few Observations -- Exercises -- 8.Errors, Failures, and Risks -- 8.1.Failures and Errors in Computer Systems -- 8.1.1.An Overview -- 8.1.2.Problems for Individuals -- 8.1.3.System Failures -- 8.1.4.Example: Stalled Airports at Denver, Hong Kong, and Malaysia -- 8.1.5.Example: HealthCare.gov -- 8.1.6.What Goes Wrong? -- 8.2.Case Study: The Therac-25 -- 8.2.1.Therac-25 Radiation Overdoses -- 8.2.2.Software and Design Problems -- 8.2.3.Why So Many Incidents? -- 8.2.4.Observations and Perspective -- 8.3.Increasing Reliability and Safety -- 8.3.1.Professional Techniques -- 8.3.2.Trust the Human or the Computer System? -- 8.3.3.Law, Regulation, and Markets -- 8.4.Dependence, Risk, and Progress -- 8.4.1.Are We Too Dependent on Computers? -- 8.4.2.Risk and Progress --
Contents note continued: A.1.Software Engineering Code of Ethics and Professional Practice -- A.2.ACM Code of Ethics and Professional Conduct
Contents note continued: Exercises -- 9.Professional Ethics and Responsibilities -- 9.1.What Are "Professional Ethics"? -- 9.2.Ethical Guidelines for Computer Professionals -- 9.2.1.Special Aspects of Professional Ethics -- 9.2.2.Professional Codes of Ethics -- 9.2.3.Guidelines and Professional Responsibilities -- 9.3.Scenarios -- 9.3.1.Introduction and Methodology -- 9.3.2.Protecting Personal Data -- 9.3.3.Designing an Application with Targeted Ads -- 9.3.4.Webcams in School Laptops -- 9.3.5.Publishing Security Vulnerabilities -- 9.3.6.Specifications -- 9.3.7.Schedule Pressures -- 9.3.8.Software License Violation -- 9.3.9.Going Public with Safety Concerns -- 9.3.10.Release of Personal Information -- 9.3.11.Conflict of Interest -- 9.3.12.Kickbacks and Disclosure -- 9.3.13.A Test Plan -- 9.3.14.Artificial Intelligence and Sentencing Criminals -- 9.3.15.A Gracious Host -- Exercises -- Epilogue -- A.The Software Engineering Code and the ACM Code --
Machine generated contents note: 1.Unwrapping the Gift -- 1.1.The Pace of Change -- 1.2.Change and Unexpected Developments -- 1.2.1.Self-Driving Vehicles -- 1.2.2.Connections: Mobile Phones, Social Networking, and the Internet of Things -- 1.2.3.E-commerce and Free Stuff -- 1.2.4.Artificial Intelligence, Robotics, Sensors, and Motion -- 1.2.5.Tools for Disabled People -- 1.3.Themes -- 1.4.Ethics -- 1.4.1.What is Ethics, Anyway? -- 1.4.2.A Variety of Ethical Views -- 1.4.3.Some Important Distinctions -- Exercises -- 2.Privacy -- 2.1.Privacy Risks and Principles -- 2.1.1.What Is Privacy? -- 2.1.2.New Technology, New Risks -- 2.1.3.Terminology and Principles for Managing Personal Data -- 2.2.The Business and Social Sectors -- 2.2.1.Marketing and Personalization -- 2.2.2.Our Social and Personal Activity -- 2.2.3.Location Tracking -- 2.2.4.A Right to Be Forgotten -- 2.3.The Fourth Amendment and Changing Technology -- 2.3.1.The Fourth Amendment --
Notes Includes index
Bibliography Includes bibliographical references
Subject Computers -- Moral and ethical aspects.
Internet -- Moral and ethical aspects.
Computers -- Social aspects.
Internet -- Social aspects.
Author Henry, Timothy, author
LC no. 2016058670
ISBN 0134615271 (alk. paper)
9780134615271 (alk. paper)