Description |
1 online resource (1 volume (various pagings)) |
Series |
Gale Reference
|
Contents |
Machine derived contents note: Table of Contents -- 1. 3D Avatars and collaborative virtual environments, Dr. KoonYing Raymond Li, James Sofra, Mark Power -- 2. Access control model for healthcare system, Yifeng Shen -- 3. Advertising in the networked environment, Dr Savvas Papagiannidis, Dr. Michael Bourlakis -- 4. Anonymous Peer-to-Peer Systems, Wenbing Zhao -- 5. Argumentation and Computing, Ephraim Nissan -- 6. Argumentation with Wigmore Charts and Computing, Ephraim Nissan -- 7. Artificial Intelligence tools for Handling Legal Evidence, Ephraim Nissan -- 8. Barriers facing African American women in technology, Jianxia Du, George H Pate, Deneen Sherrod, Wei-Chieh Yu -- 9. B-POS secure mobile payment system, Gianluigi Me, Antonio Grillo -- 10. Building Secure and Dependable Information Systems, Wenbing Zhao -- 11. Classifying articles in information ethics and security, Zack Jourdan, R. Kelly Rainer, Jr Thomas E Marshall, -- 12. Computational Ethics, Alicia I. Ruvinsky -- 13. Computer ethics and intelligent technologies, Yefim Kats -- 14. Computer Worms Detection and Defense, Robert J Cole, Chao-Hsien Chu -- 15. Conflicting value of digital music piracy, Matthew Butler -- 16. Content filtering methods for internet pornography, Jengchung V. Chen, ShaoYu F. Huang -- 17. Copyright and Electronic Monitoring of Student Work for Plagiarism, Mary Wyburn, John MacPhail, Lan Lam WITHDRAWN -- 18. Cyber-Terrorism in Australia, Christopher Beggs -- 19. Data Security and Chase, Zbigniew W. Ras, Seunghyun Im -- 20. Defending against distributed denial of service, Yang Xiang, Wanlei Zhou -- 21. Digital Divide Implications and Trends, Terry T. Kidd, Dr. Irene Chen -- 22. Digital Rights Management Metadata and Standards, Eun G. Park, Jo Anne Cote -- 23. Dilemmas of online identity theft, Omer Mahmood -- 24. Document Security in the Ancient World, Christopher H. Walker -- 25. DRM Practices in ePublication Industry, Bong Wee Kiau, Ass Prof Dr. Norshuhada Shiratuddin -- 26. Educational Technology Practitioner Research Ethics, Dr Kathleen Gray -- 27. E-health and quality assurance, Prajesh Chhanabhai, Alec Holt -- 28. Electronic Signatures and Ethics, A. Srivastava, B Thomson -- 29. Engineering multiagent systems, Tagelsir Mohamed Gasmelseid -- 30. Ethical approach to gathering survey data online, Sophie Nicho, Prof Kathy Blashki -- 31. Ethical Behaviour in Technology Mediated Communication, Sutirtha Chatterjee -- 32. Ethical concerns in computer science projects, Alastair Irons -- 33. Ethical Debate Surrounding RFID, Stephanie Etter, D. Sc, Patricia G. Phillips, D. Sc -- Ashli M. Molinero, D. Sc, Susan J. Nestor, D. Sc, Keith LeDonne, M.P.M. -- 34. Ethical Dilemmas in Data Mining and Warehousing, Joseph A. Cazier, Ryan C. LaBrie -- 35. Ethical Erosion at Enron, John Wang, James Yao, Richard Peterson, Zu-Hsu Lee -- 36. Ethical usability testing with children, Kirsten Ellis, Marian Quigley -- 37. Ethics and Access to Technology for Persons with Disabilities, Belinda Davis Lazarus -- 38. Ethics and Perceptions in Online Learning Environments, Michelle M. Ramim -- 39. Ethics and Security under the Sarbanes-Oxley Act, Thomas J. Tribunella, Heidi R. Tribunella -- 40. Ethics Education for the Online Environment, Lori N.K. Leonard, Tracy S. Manly -- 41. Ethics in Software Engineering, Pankaj Kamthan -- 42. Ethics in the Security of Organizational Information Systems, Sushma Mishra, Amita Goyal Chin, Ph. D -- 43. Ethics of AI, Kevin B. Korb -- 44. Fair Use, Pasi Tyrvĩnen -- 45. Federal Information Security Law, Charles R. Crowell -- 46. Formulating a Code of Cyberethics for a Municipality, Udo Richard Averweg -- 47. Hackers and Cyber Terrorists, M.J. Warren, S Leitch -- 48. Homo electricus and the continued speciation of humans, Katina Michae, M.G. Michael -- 49. I.T. Security Culture Transition Process, Ms. Leanne Ngo -- 50. ICT Leapfrogging policy and development in the third world, Amanda Third, KaiTi Kao -- 51. Identity Verification Using Resting State Brain Signals, Ramaswamy Palaniappan, Lalit M. Patnaik -- 52. Individual & Institutional Responses to Staff Plagiarism, Carmel McNaught -- 53. Information Ethics as Ideology, Bernd Carsten Stahl -- 54. Information Ethics from an Islamic Perspective, Salam Abdallah -- 55. Information Security and the "Privacy Broker", Michael Douma, Eduard J. Gamito -- 56. Information Security Policies for Networkable Devices, Julia Kotlarsky, Ilan Oshri, Corey Hirsch -- 57. Information Security Policy Research Agenda, Dr. Heather Fulford, Dr. Neil Doherty -- 58. Internet and suicide, Dianne Currie -- 59. Internet Piracy and copyright debates, Paul Thomas Sugden -- 60. Internet Research Ethics Questions and Considerations, Elizabeth A. Buchanan -- 61. Interviews with Young People using Online Chat, Elza Dunkels, AnnBritt Enochsson -- 62. Intrusion Detection & Information Security Audits, Terry T. Kidd, Robert K. Hiltbrand -- 63. Investigation strategy for the small paedophiles world, Gianluigi Me -- 64. Managed Services and Changing Workplace Ethics, Alan Sixsmith -- 65. Managing The Environmental Impact of Information Technology, Laurel Evelyn Dyson -- 66. Measuring Ethical Reasoning of IT Professional and Students, Jane Fedorowicz, Mohammad Abdolmohammadi -- 67. Meta View of Information Ethics, Charles R. Crowell, Robert N. Barger -- 68. Mitigation of Identity Theft in the Information Age, Mark B. Schmidt, Reggie Becker, Allen C. Johnston -- 69. Mobile Agents and Security, Fei Xue -- 70. Modelling Context-Aware Security for Electronic Health Records, Pravin Shetty, Seng Loke -- 71. Moral Rights in the Australian Public Sector, Lynley Hocking -- 72. Multimodal Biometric System, Ajita Rattani, Hunny Mehrotra Phalguni Gupta -- 73. Objective Ethics for Managing Information Technology, John R. Drake -- 74. Parental Rights to Monitor Internet Usage, Benjamin J. Halpert -- 75. Patient Centric Healthcare Information Systems in the US, Nilmini Wickramasinghe -- 76. Pedagogical Framework for Ethical Development, Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, Nathan Harter, -- 77. Personal Information Ethics, Dr Sabah S. AlFedaghi -- 78. Pharming Attack Designs, Manish Gupta, Dr. Raj Sharman -- 79. Port Scans, Jalal Kawash -- 80. Privacy and Access to Electronic Health Records, Richard Whiddett, Inga Hunter, Judith Engelbrecht, Jocelyn Handy -- 81. Privacy and Online Data Collection, Calin Gurau -- 82. Privacy in Data Mining Textbooks, James Lawler, John C. Molluzzo -- 83. Protection of Mobile Agent Data, Steven Sheng-Ue Guan -- 84. Rule Based Policies for Secured Defence Meetings, Pravin Shetty, Seng Loke -- 85. Secure Agent Roaming under M-Commerce, Steven Sheng-Ue Guan -- 86. Secure Automated Clearing House Transactions, Mark B. Schmidt, Jan Skalicky Hanson -- 87. Security Dilemmas for Canada's New Government, Jeffrey Roy -- 88. Security Model for Educational Satellite Networks, Ramesh C Sharma, PhD, Sanjay Jasola, PhD -- 89. Security of Communication and Quantum Technology, Greg Paperin -- 90. Security Protection for Critical Infrastructure, M.J. Warren, T.B. Busuttil -- 91. Spyware, Thomas F. Stafford -- 92. Sustainable Information Society, Ralf Isenmann -- 93. Taxonomy of Computer and Information Ethics, Sabah S. Al-Fedaghi -- 94. Tools for Representing and Processing Narratives, Ephraim Nissan -- 95. Traditional Knowledge and Intellectual property, Ulia Popova-Gosart -- 96. Universal Internet Access Under an Ethical Lens, Alessandro Arbore |
Summary |
"This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher |
Analysis |
Artificial intelligence |
|
Banking |
|
Censorship |
|
Communication |
|
Computer crime |
|
Cyber terrorism |
|
Education |
|
Equity and access |
|
Health |
|
Identity |
|
Intellectual property |
|
Legal and political issues |
|
Privacy |
|
Publishing |
|
Shopping |
|
Environment |
|
Workplace |
Notes |
Topics address a wide range of life areas affected by computer technology, including: education, the workplace, health, privacy, intellectual property, identity, computer crime, cyber terrorism, equity and access, banking, shopping, publishing, legal and political issues, censorship, artificial intelligence, the environment, communication |
Bibliography |
Includes bibliographical references and indexes |
Notes |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
|
En-aus |
|
Print version record and CIP data provided by publisher; resource not viewed |
|
digitized 2011 HathiTrust Digital Library committed to preserve pda MiAaHDL |
In |
ACQUIRE [electronic resource] : Central Queensland University Institutional Repository |
Subject |
Information technology -- Social aspects
|
|
Information technology -- Moral and ethical aspects.
|
|
Computer crimes.
|
|
Computer security.
|
|
Information networks -- Security measures
|
|
Computer crimes -- Encyclopedias
|
|
Computer security -- Encyclopedias
|
|
Computer Security
|
|
BUSINESS & ECONOMICS -- Business Ethics.
|
|
Computer crimes
|
|
Computer security
|
|
Information networks -- Security measures
|
|
Information technology -- Moral and ethical aspects
|
|
Information technology -- Social aspects
|
|
Informationstechnik
|
|
Computersicherheit
|
|
Ethik
|
Genre/Form |
encyclopedias.
|
|
Encyclopedias
|
|
Encyclopedias.
|
|
Encyclopédies.
|
Form |
Electronic book
|
Author |
Quigley, Marian.
|
LC no. |
2021695691 |
ISBN |
9781591409885 |
|
1591409888 |
|
9786610919314 |
|
6610919313 |
|