Limit search to available items
Your search query has been changed... Tried: (personal and information and management and government and pol) no results found... Tried: (personal or information or management or government or pol)
32000 results found. Sorted by relevance .
Book Cover
E-book

Title Encyclopedia of information ethics and security / Marian Quigley [editor]
Published Hershey : Information Science Reference, ©2008

Copies

Description 1 online resource (1 volume (various pagings))
Series Gale Reference
Contents Machine derived contents note: Table of Contents -- 1. 3D Avatars and collaborative virtual environments, Dr. KoonYing Raymond Li, James Sofra, Mark Power -- 2. Access control model for healthcare system, Yifeng Shen -- 3. Advertising in the networked environment, Dr Savvas Papagiannidis, Dr. Michael Bourlakis -- 4. Anonymous Peer-to-Peer Systems, Wenbing Zhao -- 5. Argumentation and Computing, Ephraim Nissan -- 6. Argumentation with Wigmore Charts and Computing, Ephraim Nissan -- 7. Artificial Intelligence tools for Handling Legal Evidence, Ephraim Nissan -- 8. Barriers facing African American women in technology, Jianxia Du, George H Pate, Deneen Sherrod, Wei-Chieh Yu -- 9. B-POS secure mobile payment system, Gianluigi Me, Antonio Grillo -- 10. Building Secure and Dependable Information Systems, Wenbing Zhao -- 11. Classifying articles in information ethics and security, Zack Jourdan, R. Kelly Rainer, Jr Thomas E Marshall, -- 12. Computational Ethics, Alicia I. Ruvinsky -- 13. Computer ethics and intelligent technologies, Yefim Kats -- 14. Computer Worms Detection and Defense, Robert J Cole, Chao-Hsien Chu -- 15. Conflicting value of digital music piracy, Matthew Butler -- 16. Content filtering methods for internet pornography, Jengchung V. Chen, ShaoYu F. Huang -- 17. Copyright and Electronic Monitoring of Student Work for Plagiarism, Mary Wyburn, John MacPhail, Lan Lam WITHDRAWN -- 18. Cyber-Terrorism in Australia, Christopher Beggs -- 19. Data Security and Chase, Zbigniew W. Ras, Seunghyun Im -- 20. Defending against distributed denial of service, Yang Xiang, Wanlei Zhou -- 21. Digital Divide Implications and Trends, Terry T. Kidd, Dr. Irene Chen -- 22. Digital Rights Management Metadata and Standards, Eun G. Park, Jo Anne Cote -- 23. Dilemmas of online identity theft, Omer Mahmood -- 24. Document Security in the Ancient World, Christopher H. Walker -- 25. DRM Practices in ePublication Industry, Bong Wee Kiau, Ass Prof Dr. Norshuhada Shiratuddin -- 26. Educational Technology Practitioner Research Ethics, Dr Kathleen Gray -- 27. E-health and quality assurance, Prajesh Chhanabhai, Alec Holt -- 28. Electronic Signatures and Ethics, A. Srivastava, B Thomson -- 29. Engineering multiagent systems, Tagelsir Mohamed Gasmelseid -- 30. Ethical approach to gathering survey data online, Sophie Nicho, Prof Kathy Blashki -- 31. Ethical Behaviour in Technology Mediated Communication, Sutirtha Chatterjee -- 32. Ethical concerns in computer science projects, Alastair Irons -- 33. Ethical Debate Surrounding RFID, Stephanie Etter, D. Sc, Patricia G. Phillips, D. Sc -- Ashli M. Molinero, D. Sc, Susan J. Nestor, D. Sc, Keith LeDonne, M.P.M. -- 34. Ethical Dilemmas in Data Mining and Warehousing, Joseph A. Cazier, Ryan C. LaBrie -- 35. Ethical Erosion at Enron, John Wang, James Yao, Richard Peterson, Zu-Hsu Lee -- 36. Ethical usability testing with children, Kirsten Ellis, Marian Quigley -- 37. Ethics and Access to Technology for Persons with Disabilities, Belinda Davis Lazarus -- 38. Ethics and Perceptions in Online Learning Environments, Michelle M. Ramim -- 39. Ethics and Security under the Sarbanes-Oxley Act, Thomas J. Tribunella, Heidi R. Tribunella -- 40. Ethics Education for the Online Environment, Lori N.K. Leonard, Tracy S. Manly -- 41. Ethics in Software Engineering, Pankaj Kamthan -- 42. Ethics in the Security of Organizational Information Systems, Sushma Mishra, Amita Goyal Chin, Ph. D -- 43. Ethics of AI, Kevin B. Korb -- 44. Fair Use, Pasi Tyrvĩnen -- 45. Federal Information Security Law, Charles R. Crowell -- 46. Formulating a Code of Cyberethics for a Municipality, Udo Richard Averweg -- 47. Hackers and Cyber Terrorists, M.J. Warren, S Leitch -- 48. Homo electricus and the continued speciation of humans, Katina Michae, M.G. Michael -- 49. I.T. Security Culture Transition Process, Ms. Leanne Ngo -- 50. ICT Leapfrogging policy and development in the third world, Amanda Third, KaiTi Kao -- 51. Identity Verification Using Resting State Brain Signals, Ramaswamy Palaniappan, Lalit M. Patnaik -- 52. Individual & Institutional Responses to Staff Plagiarism, Carmel McNaught -- 53. Information Ethics as Ideology, Bernd Carsten Stahl -- 54. Information Ethics from an Islamic Perspective, Salam Abdallah -- 55. Information Security and the "Privacy Broker", Michael Douma, Eduard J. Gamito -- 56. Information Security Policies for Networkable Devices, Julia Kotlarsky, Ilan Oshri, Corey Hirsch -- 57. Information Security Policy Research Agenda, Dr. Heather Fulford, Dr. Neil Doherty -- 58. Internet and suicide, Dianne Currie -- 59. Internet Piracy and copyright debates, Paul Thomas Sugden -- 60. Internet Research Ethics Questions and Considerations, Elizabeth A. Buchanan -- 61. Interviews with Young People using Online Chat, Elza Dunkels, AnnBritt Enochsson -- 62. Intrusion Detection & Information Security Audits, Terry T. Kidd, Robert K. Hiltbrand -- 63. Investigation strategy for the small paedophiles world, Gianluigi Me -- 64. Managed Services and Changing Workplace Ethics, Alan Sixsmith -- 65. Managing The Environmental Impact of Information Technology, Laurel Evelyn Dyson -- 66. Measuring Ethical Reasoning of IT Professional and Students, Jane Fedorowicz, Mohammad Abdolmohammadi -- 67. Meta View of Information Ethics, Charles R. Crowell, Robert N. Barger -- 68. Mitigation of Identity Theft in the Information Age, Mark B. Schmidt, Reggie Becker, Allen C. Johnston -- 69. Mobile Agents and Security, Fei Xue -- 70. Modelling Context-Aware Security for Electronic Health Records, Pravin Shetty, Seng Loke -- 71. Moral Rights in the Australian Public Sector, Lynley Hocking -- 72. Multimodal Biometric System, Ajita Rattani, Hunny Mehrotra Phalguni Gupta -- 73. Objective Ethics for Managing Information Technology, John R. Drake -- 74. Parental Rights to Monitor Internet Usage, Benjamin J. Halpert -- 75. Patient Centric Healthcare Information Systems in the US, Nilmini Wickramasinghe -- 76. Pedagogical Framework for Ethical Development, Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, Nathan Harter, -- 77. Personal Information Ethics, Dr Sabah S. AlFedaghi -- 78. Pharming Attack Designs, Manish Gupta, Dr. Raj Sharman -- 79. Port Scans, Jalal Kawash -- 80. Privacy and Access to Electronic Health Records, Richard Whiddett, Inga Hunter, Judith Engelbrecht, Jocelyn Handy -- 81. Privacy and Online Data Collection, Calin Gurau -- 82. Privacy in Data Mining Textbooks, James Lawler, John C. Molluzzo -- 83. Protection of Mobile Agent Data, Steven Sheng-Ue Guan -- 84. Rule Based Policies for Secured Defence Meetings, Pravin Shetty, Seng Loke -- 85. Secure Agent Roaming under M-Commerce, Steven Sheng-Ue Guan -- 86. Secure Automated Clearing House Transactions, Mark B. Schmidt, Jan Skalicky Hanson -- 87. Security Dilemmas for Canada's New Government, Jeffrey Roy -- 88. Security Model for Educational Satellite Networks, Ramesh C Sharma, PhD, Sanjay Jasola, PhD -- 89. Security of Communication and Quantum Technology, Greg Paperin -- 90. Security Protection for Critical Infrastructure, M.J. Warren, T.B. Busuttil -- 91. Spyware, Thomas F. Stafford -- 92. Sustainable Information Society, Ralf Isenmann -- 93. Taxonomy of Computer and Information Ethics, Sabah S. Al-Fedaghi -- 94. Tools for Representing and Processing Narratives, Ephraim Nissan -- 95. Traditional Knowledge and Intellectual property, Ulia Popova-Gosart -- 96. Universal Internet Access Under an Ethical Lens, Alessandro Arbore
Summary "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher
Analysis Artificial intelligence
Banking
Censorship
Communication
Computer crime
Cyber terrorism
Education
Equity and access
Health
Identity
Intellectual property
Legal and political issues
Privacy
Publishing
Shopping
Environment
Workplace
Notes Topics address a wide range of life areas affected by computer technology, including: education, the workplace, health, privacy, intellectual property, identity, computer crime, cyber terrorism, equity and access, banking, shopping, publishing, legal and political issues, censorship, artificial intelligence, the environment, communication
Bibliography Includes bibliographical references and indexes
Notes Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
En-aus
Print version record and CIP data provided by publisher; resource not viewed
digitized 2011 HathiTrust Digital Library committed to preserve pda MiAaHDL
In ACQUIRE [electronic resource] : Central Queensland University Institutional Repository
Subject Information technology -- Social aspects
Information technology -- Moral and ethical aspects.
Computer crimes.
Computer security.
Information networks -- Security measures
Computer crimes -- Encyclopedias
Computer security -- Encyclopedias
Computer Security
BUSINESS & ECONOMICS -- Business Ethics.
Computer crimes
Computer security
Information networks -- Security measures
Information technology -- Moral and ethical aspects
Information technology -- Social aspects
Informationstechnik
Computersicherheit
Ethik
Genre/Form encyclopedias.
Encyclopedias
Encyclopedias.
Encyclopédies.
Form Electronic book
Author Quigley, Marian.
LC no. 2021695691
ISBN 9781591409885
1591409888
9786610919314
6610919313