Cover image for Encyclopedia of information ethics and security
Encyclopedia of information ethics and security
Title:
Encyclopedia of information ethics and security
Author:
Quigley, Marian.
ISBN:
9781591409885
Publication Information:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2007.
Physical Description:
electronic texts (various pagings : ill.) : digital files.
Contents:
3D avatars and collaborative virtual environments / Koon-Ying Raymond Li, James Sofraand, and Mark Power -- Access control for healthcare / Yifeng Shen -- Advertising in the networked environment / Savvas Papagiannidis and Michael Bourlakis -- Anonymous peer-to-peer systems / Wenbing Zhao -- Argumentation and computing / Ephraim Nissan -- Argumentation with Wigmore charts and computing / Ephraim Nissan -- Artificial intelligence tools for handling legal evidence / Ephraim Nissan -- Barriers facing African American women in technology / Jianxia Du, George H. Pate,-- Deneen Sherrod, and Wei-Chieh Yu -- B-POS secure mobile payment system / Antonio Grillo, Alessandro Lentini, and Gianluigi Me -- Building secure and dependable information systems / Wenbing Zhao -- Classifying articles in information ethics and security / Zack Jourdan, R. Kelly Rainer Jr., and Thomas E. Marshall -- Computational ethics / Alicia I. Ruvinsky -- Computer ethics and intelligent technologies / Yefim Kats -- Computer worms, detection, and defense / Robert J. Cole and Chao-Hsien Chu -- Conflicting value of digital music piracy / Matthew Butler -- Content filtering methods for Internet pornography / Jengchung V. Chen and ShaoYu F. Huang -- Cyber-Terrorism in Australia / Christopher Beggs -- Data security and chase / Zbigniew W. Ras and Seunghyun Im -- Defending against distributed denial of service / Yang Xiang and Wanlei Zhou -- Digital divide implications and trends / Irene Chen and Terry T. Kidd --

Digital rights management metadata and standards / Jo Anne Cote and Eun G. Park -- Dilemmas of online identity theft / Omer Mahmood -- Document security in the ancient world / Christopher H. Walker -- DRM practices in the e-publication industry / Bong Wee Kiau and Norshuhada Shiratuddin -- Educational technology practitioner-research ethics / Kathleen Gray -- E-health and ensuring quality / Prajesh Chhanabhai and Alec Holt -- Electronic signatures and ethics / A. Srivastava and S. B. Thomson -- Engineering multi-agent systems / Tagelsir Mohamed Gasmelseid -- Ethical approach to gathering survey data online / Sophie Nichol and Kathy Blashki -- Ethical behaviour in technology-mediated communication / Sutirtha Chatterjee -- Ethical concerns in computer science projects / Alistair Irons and Roger Boyle -- Ethical debate surrounding RFID The / Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero, Susan J. Nestor, and Keith LeDonne -- Ethical dilemmas in data mining and warehousing / Joseph A. Cazier and Ryan C. LaBrie -- Ethical erosion at Enron / John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee -- Ethical usability testing with children / Kirsten Ellis and Marian Quigley -- Ethics and access to technology for persons with disabilities / Belinda Davis Lazarus -- Ethics and perceptions in online learning environments / Michelle M. Ramim -- Ethics and security under the Sarbanes-Oxley Act / Thomas J. Tribunella and Heidi R. Tribunella -- Ethics education for the online environment / Lori N. K. Leonard and Tracy S. Manly --

Ethics in software engineering / Pankaj Kamthan -- Ethics in the security of organizational information systems / Sushma Mishra and Amita Goyal Chin -- Ethics of AI / Kevin B. Korb -- Fair use / Pasi Tyrväskylä -- Federal information security law / Michael J. Chapple and Charles R. Crowell -- Formulating a code of cyberethics for a municipality / Udo Richard Averweg -- Hackers and Cyber Terrorists / M. J. Warren -- Homo electricus and the continued speciation of humans / Katina Michael and M. G. Michael -- IT security culture transition process / Leanne Ngo -- ICT leapfrogging policy and development in the third world / Amanda Third and Kai-Ti Kao -- Identity verification using resting state brain signals / Ramaswamy Palaniappan and Lalit M. Patnaik -- Individual and institutional responses to staff plagiarism / Carmel McNaught -- Information ethics as ideology / Bernd Carsten Stahl -- Information ethics from an Islamic perspective / Salam Abdallah -- Information security and the "Privacy Broker" / Michael Douma and Eduard J. Gamito -- Information security policies for networkable devices / Julia Kotlarsky, Ilan Oshri, and Corey Hirsch -- Information security policy research agenda / Heather Fulford and Neil Doherty -- Internet and suicide / Dianne Currier -- Internet piracy and copyright debates / Paul Sugden -- Internet research ethics questions and considerations / Elizabeth Buchanan -- Interviews with young people using online chat / Elza Dunkels and AnnBritt Enochsson --

Intrusion detection and information security audits / Terry T. Kidd and Robert K. Hiltbrand -- Investigation Strategy for the Small Pedophiles World / Gianluigi Me -- Managed services and changing workplace ethics / Alan Sixsmith -- Managing the environmental impact of information technology / Laurel Evelyn Dyson -- Measuring ethical reasoning of IT professionals and students / Mohammad Abdolmohammadi and Jane Fedorowicz -- Meta view of information ethics / Charles R. Crowell and Robert N. Barger -- Mitigation of identity theft in the information age / Reggie Becker, Mark B. Schmidt, and Allen C. Johnston -- Mobile agents and security / Fei Xue -- Modelling context-aware security for electronic health records / Pravin Shetty and Seng Loke -- Moral rights in the Australian public sector / Lynley Hocking -- Multimodal biometric system / Ajita Rattani, Hunny Mehrotra, and Phalguni Gupta -- Objective ethics for managing information technology / John R. Drake -- Parental rights to monitor Internet usage / Benjamin J. Halpert -- Patient centric healthcare information systems in the U.S. / Nilmini Wickramasinghe -- Pedagogical framework for ethical development / Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, and Nathan Harter -- Personal information ethics / Sabah S. Al-Fedaghi -- Pharming attack designs / Manish Gupta and Raj Sharman -- Port Scans / Jalal Kawash --

Privacy and access to electronic health records / Dick Whiddett, Inga Hunter, Judith Engelbrecht, and Jocelyn Handy -- Privacy and online data collection / Călin Gurău -- Privacy in data mining textbooks / James Lawler and John C. Molluzzo -- Protection of mobile agent data / Sheng-Uei Guan -- Rule-based policies for secured defense meetings / Pravin Shetty and Seng Loke -- Secure agent roaming under m-commerce / Sheng-Uei Guan -- Secure automated clearing house transactions / Jan Skalicky Hanson and Mark B. Schmidt -- Security dilemmas for Canada's new government / Jeffrey Roy -- Security model for educational satellite networks / Sanjay Jasola and Ramesh C. Sharma -- Security of communication and quantum technology / Gregory Paperin -- Security protection for critical infrastructure / M. J. Warren and T. B. Busuttil -- Spyware / Thomas F. Stafford -- Sustainable information society / Ralf Isenmann -- Taxonomy of computer and information ethics / Sabah S. Al-Fedaghi -- Tools for representing and processing narratives / Ephraim Nissan -- Traditional knowledge and intellectual property / Ulia Popova-Gosart -- Universal Internet access under an ethical lens / Alessandro Arbore.
Abstract:
This book is a reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals.
Added Author:
Added Corporate Author:
Holds: Copies: