Geometry.Net - the online learning center
Home  - Basic_C - Computer Ethics
e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 128    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Computer Ethics:     more books (100)
  1. Computer Ethics by Tom Forester, 1992
  2. Computer Ethics: A Guide for a New Age by Douglas W. Johnson, 1984-03
  3. Computer Ethics by Phillip Fetch, 1983-06
  4. Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing by FORESTER, 1992-01-01
  5. Microcomputers in Education Conference: Ethics and Excellence in Computer Education : Choice or Mandate (Sixth Annual)
  6. Computer and Information Ethics (Contributions to the Study of Computer Science) by John Weckert, Douglas Adeney, 1997-05-30
  7. Computer Ethics by Robert N. Barger, 2008-08
  8. Computer Ethics: Cautionary Tales & Ethical Dilemmas in Computing by Tom Forester, Perry Morrison, 1998-09
  9. Usmle Step 3 : Pediatrics and Medical Ethics With Computer-Based Simulations and Some Important Adult Topics by D. Kanjilal, 2001-06
  10. Encyclopedia of Information Ethics and Security by Marian Quigley, 2007-06-22
  11. Virtual Morality: Christian Ethics in the Computer Age by Graham R. Houston, 1998-11
  12. Computers and Ethics in the Cyberage by D. Micah Hester, Paul J. Ford, 2000-07-07
  13. Why Napster matters to writing: Filesharing as a new ethic of digital delivery [An article from: Computers and Composition] by D.N. DeVoss, J.E. Porter,
  14. Information Technology Ethics: Cultural Perspectives

41. Links - Computer Ethics
Boston University computer ethics Rules and regulations for computer usage at computer ethics Resources on WWW Provided by the Centre for Applied Ethics
http://www.emr.org/linksUCE.html
  • ACM Brings You the World of Computing The Association for Computing Machinery is the world's oldest and largest educational and scientific computing society. Since 1947, ACM has provided a vital forum for the exchange of information, ideas, and discoveries. Today, ACM serves a membership of more than 80,000 computing professionals in more than 100 countries in all areas of industry, academia, and government.
  • Albany College of Pharmacy - Computer Ethics A short sample that provides a one-page statement pertaining to computer usage by students in the Albany College of Pharmacy.
  • Atterbury Foundation Home Pag Producer of Creative Educational Materials for Responsible Computer use. Materials are specific for school-aged children.
  • Boston University Computer Ethics Rules and regulations for computer usage at Boston University; a helpful example for other universities and organizations seeking to prepare a computer usage policy.
  • Censorship and the Internet Many online articles and papers, as well as additional links regarding controlling access to the Internet.
  • Center for the Study of Ethics From the Center for the Study of Ethics in Society at Western Michigan University, this project was edited by Michael S. Pritchard and includes more than 30 cases addressing a wide range of ethical issues that can arise in engineering practice.

42. Computer Ethics & Professional Responsibility - Edited By Terrell Ward Bynum & S
Reference materials from the textbook by Bynum and Rogerson, including study questions and web resources. The Research Center on Computing Society, Southern Connecticut State University.
http://www.southernct.edu/organizations/rccs/textbook/index.html

Text-only Version
at Southern CT State University
Email: webmaster@computerethics.org
The Centre for Computing and Social Responsibility at De Montfort University
Email: ccsr@dmu.ac.uk

43. D O L C E --- ...Developing OnLine Computer Ethics
The workshop welcomed those who had never taught computer ethics before as well as those who already had and want to improve. Workshops were held in Golden,
http://csethics.uis.edu/dolce/
Project Links Forms Contest ... Teaching Aids/Software SITE DIRECTORY Links to Other Ethics Sites Consent Forms Contest Project Information Software and Teaching Aids Workshop Presentations Workshop Participants Invitation to 2002 Workshop Agenda for 2002 Workshop
DOLCE
People who make technical decisions must be educated to make good ethical decisions. Many computer science departments do not explicitly teach computer ethics, professional ethics, or computers and society issues. Not enough CS faculty are willing and able to teach such courses. The DOLCE project educates and supports computer science faculty who want to teach about these issues. The NSF has funded the project for three years.
DOLCE develops Web-based materials for teaching computer ethics to undergraduate computer science majors. (We think that many of the materials are also appropriate for graduate students, but our immediate emphasis is undergraduates.) The materials will be closely integrated with the upcoming third edition of Computer Ethics, by Deborah Johnson. The materials are designed for classes or modules that are online or face to face and at any undergraduate level. The materials will emphasize computer ethics theory and analytical skills, societal issues in computing and telecommunication, professional ethics. Gender issues in computer ethics are a particular focus. These materials do not duplicate existing materials, but do, with permission, link to existing materials.
Congratulations
To

44. Professional And Computer Ethics
computer ethics Professionalism It contains materials useful for classes and companies researching computer ethics and Professionalism.
http://www.cs.utexas.edu/users/ethics/
Search The Entire Site This web site was developed as part of CS378 "Contemporary Issues in Computer Science" at the University of Texas at Austin. It contains materials useful for classes and companies researching Computer Ethics and Professionalism. Please let us know how we can make our site better by using the "Contact" button. Some helpful pages developed by commercial organizations were included, but this should not be viewed as an endorsement of their products or services. These are rapidly and constantly growing areas, so this site will need to be updated frequently. Please tell us about additional sites which you think would be useful to the project. We hope that visitors will find our web pages helpful in learning more about these important topics. This is an ongoing project and can only benefit from the feedback of its users. Warning: Most of the sites use frames for easier navigation. If your browser is not capable of displaying frames, please use the "No-Frames" links provided below. There is frameless navigation used throughout the site, although you will occasionally have to use your "Back" button. Professional Ethics (no frames) Computer Ethics (no frames)
This page has been visited ...

45. Computer Ethics - Ethics Courses
created classes in specific areas of ethics, such as engineering and computer ethics. Below is a list of links to ethics courses in different fields at
http://www.cs.utexas.edu/users/ethics/computer_ethics/courses.html
Ethics Courses
Ethics courses are becoming increasingly popular in the university arena in colleges around the United States. Schools have created classes in specific areas of ethics, such as engineering and computer ethics. Below is a list of links to ethics courses in different fields at universities around the nation.
See Donald Gotterbarn's site for a set of ethics courses links
Computer Ethics
Engineering Ethics

46. Ten Commandments For Computer Ethics By CEI
THE TEN COMMANDMENTS FOR computer ethics. From the computer ethics Institute President of the computer ethics Institute. You may link to this page,
http://www.tekmom.com/tencommand/
THE TEN COMMANDMENTS FOR COMPUTER ETHICS From the Computer Ethics Institute
THE TEN COMMANDMENTS FOR COMPUTER ETHICS Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not use or copy software for which you have not paid. Thou shalt not use other people's computer resources without authorization. Thou shalt not appropriate other people's intellectual output. Thou shalt think about the social consequences of the program you write. Thou shalt use a computer in ways that show consideration and respect. Published (and reformatted) with the permission of Dr. Ramon Barquin,
President of the Computer Ethics Institute
You may link to this page, but you may not copy the HTML to use on another website. See No. 8. :-)

47. PHL 117: Computer Ethics
PHL 117 computer ethics is a new course at the University of Rochester, In PHL 117 computer ethics, we will examine how computers have affected
http://www.ling.rochester.edu/~duniho/phl117/
Paper Topics for the Second Paper PHL 117: Computer Ethics is a new course at the University of Rochester, which I will be teaching for the first time this summer. Computers have become a much more pervasive part of our lives than they were just two decades ago. Computers have given us new ways to commit crimes, new ways to affect the lives of others, and new ways to steal from others. Issues such as software piracy, computer hacking, and computerized record keeping affect nearly everyone who uses computers. In PHL 117: Computer Ethics , we will examine how computers have affected society and how they could further affect it in the future. We will examine various ethical issues surrounding computers. These will include piracy, hacking, viruses, responsibilty and liability for the use of software, cyberporn, computerized invasion of privacy, computers in the workplace, and the use of artificial intelligence and expert systems. We will also consider many of the moral and professional issues that those who work with computers might expect to face. The ACM and the IEEE both recognize that it is important for undergraduates in computer science to understand the social, ethical, and professional issues that arise in the field of computing. Like physicians and law-makers, computer professionals are put into unique positions of responsibility. So it is important for them to understand the responsibilities they bear, to know how their actions can affect both society and individual people, and to appreciate both the good and the harm they can do. It is also important for others to know the ethical issues surrounding computers, because computers will still play a large part in their lives.

48. Summer Syllabus For PHL 117
In PHL 117 computer ethics, we will examine how computers have affected computer ethics Cautionary Tales and Ethical Dilemmas in Computing 2nd Ed.
http://www.ling.rochester.edu/~duniho/phl117/syllabus.html
PHL 117: Computer Ethics
Course Description
In PHL 117: Computer Ethics , we will examine how computers have affected society and how they could further affect it in the future. We will examine various ethical issues surrounding computers. These will include piracy, hacking, viruses, responsibility and liability for the use of software, cyberporn, computerized invasion of privacy, computers in the workplace, and the use of artificial intelligence and expert systems. We will also consider many of the moral and professional issues that those who work with computers might expect to face.
Texts
  • Johnson, Deborah G. Computer Ethics 2nd Ed. (DJ)
  • Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing 2nd Ed. (FM)

49. Computer Ethics Bibliography
Perspectives on computer ethics. Sudbury, MA Jones and Bartlett Publishers, 1997; Spinello, Richard A. Case Studies in Information and computer ethics.
http://www.rivier.edu/faculty/htavani/biblio.htm
Computer Ethics Bibliography
Update: 1997-1998
Edited by:
Herman T. Tavani

Rivier College
http://cyberethics.cbi.msstate.edu/biblio
Bibliography of Recent Books
Recent Articles
(since Sep. 1996)
index.html Author's Home Page
Computer Professionals for Social Responsibility (CPSR)
Computers and Society (ACM/SIGCAS)
Last Updated: February 9, 1998
Recent Books: A Select List
Works cited in this section were published in 1997 and 1998. For a list of books published before 1997, refer to the main bibliography
Agre, Philip E. and Marc Rotenberg, eds. Technology and Privacy: The New Landscape. Cambridge, MA: MIT Press, 1997; 280 pages. ISBN 0-262-01162-X. Includes ten essays that examine technical, economical, and political aspects of privacy in the U.S., Canada, and Europe. Though not necessarily intended as a course text, the anthology can be used as a supplementary text, especially in either an upper-level undergraduate or a graduate course in which a significant portion is devoted to issues in technology and privacy.
Baase, Sara.

50. Computer Ethics: Basic Concepts And Historical Overview
3 Parts. Some Historical Milestones. Defining the Field of computer ethics. Example Topics in computer ethics. Plus, a bibliography and a list of online resources. 2001.
http://setis.library.usyd.edu.au/stanford/entries/ethics-computer/
version history
HOW TO CITE

THIS ENTRY
Stanford Encyclopedia of Philosophy
A ... Z
This document uses XHTML/Unicode to format the display. If you think special symbols are not displaying correctly, see our guide Displaying Special Characters last substantive content change
AUG
Computer Ethics: Basic Concepts and Historical Overview
Computer ethics is a new branch of ethics that is growing and changing rapidly as computer technology also grows and develops. The term "computer ethics" is open to interpretations both broad and narrow. On the one hand, for example, computer ethics might be understood very narrowly as the efforts of professional philosophers to apply traditional ethical theories like utilitarianism, Kantianism, or virtue ethics to issues regarding the use of computer technology. On the other hand, it is possible to construe computer ethics in a very broad way to include, as well, standards of professional practice, codes of conduct, aspects of computer law, public policy, corporate ethicseven certain topics in the sociology and psychology of computing. In the industrialized nations of the world, the "information revolution" already has significantly altered many aspects of life in banking and commerce, work and employment, medical care, national defense, transportation and entertainment. Consequently, information technology has begun to affect (in both good and bad ways) community life, family life, human relationships, education, freedom, democracy, and so on (to name a few examples). Computer ethics in the broadest sense can be understood as that branch of applied ethics which studies and analyzes such social and ethical impacts of information technology.

51. ETHICS ON THE WORLD WIDE WEB Computer
Home page of the computer ethics Institute based in Washington, DC. NetEthics Ten Commandments of computer ethics From the computer ethics Institute.
http://commfaculty.fullerton.edu/lester/ethics/computer.html

52. CCSR:The Ten Commandments For Computer Ethics
The Ten Commandments for computer ethics. computer ethics Institute. Document Also Available in PDF (35 kbytes), PS (32 kbytes), Printerfriendly HTML (2226
http://www.ccsr.cse.dmu.ac.uk/resources/professionalism/codes/cei_command.html
About the Centre
The who, what, how and why of CCSR
Conferences
Conferences, and related items
What's New
New Resources and Conferences
Search
Search Resources and Conference listings
Resources
Papers and topics dealt with by CCSR
E-Journal
The ETHICOMP E-Journal
Ethicol
The IMIS's column on Computer Ethics
Contents Page
Site map of CCSR
Last update 11 February 2004
The Ten Commandments for Computer Ethics
Computer Ethics Institute
Document Also Available in PDF (35 kbytes), PS (32 kbytes), Printer-friendly HTML (2226 bytes) Rich Text Format (3296 bytes) DocBook source (2104 bytes) See also commentary on the 'ten commandments' by Ben Fairweather and interpretation by Cem Say at Bogazi§i University, Turkey.
  • Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not use or copy software for which you have not paid. Thou shalt not use other people's computer resources without authorization.
  • 53. CCSR:Computer Ethics?
    The IMIS s column on computer ethics; Contents Page Site map of CCSR issues of ethics and social responsibility in the application of computers and
    http://www.ccsr.cse.dmu.ac.uk/resources/general/ethicol/Ecv5no3.html
    About the Centre
    The who, what, how and why of CCSR
    Conferences
    Conferences, and related items
    What's New
    New Resources and Conferences
    Search
    Search Resources and Conference listings
    Resources
    Papers and topics dealt with by CCSR
    E-Journal
    The ETHICOMP E-Journal
    Ethicol
    The IMIS's column on Computer Ethics
    Contents Page
    Site map of CCSR
    Last update 27 September 2004
    Computer Ethics?
    Prof. Simon Rogerson
    Originally published as ETHIcol in the IMIS Journal Volume 5 No 3 1995 Document Also Available in PDF (42 kbytes), PS (34 kbytes), Printer-friendly HTML (6 kbytes) Rich Text Format (6 kbytes) DocBook source (5 kbytes) This is the first edition of ETHICOL, a regular column aimed at raising issues of ethics and social responsibility in the application of computers and associated technologies. Every day, new systems are implemented in organisations in the search for efficiency gains and improved effectiveness in an effort to realise some corporate objective. Whilst these systems may be deemed successful in this context, far too often success is achieved at the price of, for example, breakdown of social groupings in the workplace, the de-skilling of jobs, over-reliance and intrusion of technology and the unacceptable side effects of system implementation. Technology has evolved from a coercive technology to a seductive technology resulting in many of these issues being overlooked. This is unacceptable and such issues must be addressed at the right time and at appropriate organisational levels.

    54. CAP Page
    Carnegie Mellon University, 4 to 6 August 2004. Featured topics include AI and Epistemology, new models of Logic Software, computer ethics, Computing and World Cultures, Electronic Resources, and the Impact of Distance Learning on the Profession.
    http://caae.phil.cmu.edu/CAAE/CAP/CAPpage.html
    Computing and Philosophy
    Sponsored by the APA Committee on Philosophy and Computers and the Host Institutions Proposal Submissions Programs Past and Present Registration Information Directions and Locations ... CAP Home Page Special thanks to Blackboard.com and SCT for their support of CAP 2000
    2004 North American
    CAP Conference
    At Carnegie Mellon
    August 4th- 6th
    Computing and Philosophy (CAP) conferences have become the central meeting place for all aspects of computing and philosophy. CAP meetings are now held in three international regions: North America (NA-CAP); Europe (E-CAP) and along the Asia-Pacific rim (AP-CAP). Information about all CAP conferences can be found on the web-site for the International Association for Computing and Philosophy at iacap.org As with all CAP conferences, speakers and panels will address many aspects of the "computational turn" that is occurring within the discipline of Philosophy. Featured topics include AI and Epistemology, new models of Logic Software, Computer Ethics, Computing and World Cultures, Electronic Resources, and the Impact of Distance Learning on the Profession. In addition to invited participants, the Program Committees welcome

    55. COMPUTER ETHICS THROUGH THICK THIN Computer Ethics Through Thick
    computer ethics THROUGH THICK THIN computer ethics through Thick Thin is a three year research project funded by an Applied Ethics Strategic Grant from
    http://eserver.org/philosophy/computer-ethics.txt

    56. Ethics? Right Vs. Wrong
    computer ethics and Copyright Issues? Right vs. Wrong Part I Sometimes these programs actually destroy the contents of our computer which rob our time.
    http://www.crews.org/curriculum/ex/compsci/articles/ethics.htm
    Home Viruses Computers The Internet Ethics Pt.1 Ethics Pt.2 How Computers Work History Pt.1 History Pt2 Part I Written by R. Hames Part II Questions Directions: Answer each of the questions after reading the article below. No questions can go unanswered. Full Name: Conn#: 8- E thics is the question of right and wrong. We are taught from a young age that plagiarism (copying other's work) is wrong one might say. One might say, it is like cheating on a test when you burn a CD copy of someone else's music or game. However, most people don't associate copying of songs, graphics, text, games, videos, etc. from the web as being wrong. It might also be that they feel because it is easy and not one can see them, they will not get caught. 1. How are plagiarism and sharing of music files alike?
    D id you know that there are federal rules that congress has passed to regulate and penalize those who violate these rules? Not only could you pay large fines if caught but you could also serve jail time Fines Jail Time both L ets see this as a personal issue.

    57. Computer Ethics From FOLDOC
    computer ethics. philosophy Ethics is the field of study that is concerned computer ethics can be grounded in one of four basic worldviews Idealism,
    http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?computer ethics

    58. Computer Ethics, 3/E - Prentice Hall Catalog
    The Ten Commandments of computer ethicscomputer ethics INSTITUTE 11 Dupont Circle, NW Suite 900 Washington, DC 20036 Tel. (202) 9393707 Fax (202) 797-7806. The Institute gives full permission to
    http://vig.prenhall.com/catalog/academic/product/1,4096,0130836990,00.html
    Select a Discipline Accounting and Taxation Agriculture Allied Health: Clinical Lab Science / Medical Tech Allied Health: Dental Hygiene / Dental Assisting Allied Health: Health Professions Allied Health: Massage Therapy Allied Health: Medical Assisting Allied Health: Physical / Occupational Therapy Allied Health: Respiratory Therapy Anthropology Art Automotive Technology BRADY: EMS / Emergency Medical Services Biology Business Communications Business Law Business Math Business Programming Business Studies CAD / Engineering Graphics / Drafting Chemistry Chinese Civil / Construction Technology Computer Applications / Microsoft Office Computer Concepts Computer Graphics / Arts Computer Science Computer Training and Certification Contren Counseling Criminal Justice Decision Science Economics Education: Agricultural Education Education: Early Childhood Education Education: Foundations / Intro to Teaching Education: Instructional Technology Education: Special Education Electronics and Computer Technology Engineering: Bioengineering Engineering: Chemical Engineering: Civil and Environmental Engineering: Electrical Engineering: General Engineering: Industrial Engineering: Mechanical English: Composition English: Developmental Environmental Science Environmental Technology Fashion Finance Fire / Police Science Foods and Nutrition French Geography Geology / Oceanography German Greek History Insurance Interior Design Introduction to Business Italian Japanese Latin MIS Management Marketing Mathematics Mech / Manufacturing / Industrial Tech Music Nursing - LPN / LVN

    59. UGA Computer Security And Ethics
    computer ethics Quiz This quiz is designed to make sure you are familiar with the University s computer ethics policies and that you know how to apply them
    http://www.uga.edu/~compsec/
    The University of Georgia
    Computer Security and Ethics
    These pages are brought to you by the University of Georgia's Computer Security and Ethical Use Committee . This is a standing University committee charged with keeping the University's computer security and ethics documents updated. A subset of the committee along with additional staff from the organizations represented constitute the University's Computer Incident Response Team which deals with security breaches and incidents of computer misuse. Policies on Use of Computers
    This is an official policy statement of The University of Georgia and as such it is binding on all faculty, staff and students at the University. Summary of Policies
    This is an official summary of the University's Policies on Use of Computers for use in publications to make people aware of the policies. Relevant Laws
    Section of the policy statement dealing with the relavent state and federal laws. USENet Newsgroup Redistribution Policy
    Policies for restricting distribution of some USENet newsgroups at UGA. Computer Ethics Quiz
    This quiz is designed to make sure you are familiar with the University's computer ethics policies and that you know how to apply them to specific situations. The quiz is not an official policy document.

    60. Computer Ethics
    October 2, 1998, p.12. EAI; computer ethics Institute s version of the Ten Commandments. Ethics. computer ethics page from Thinkquest
    http://www.lesley.edu/faculty/thormann/competh.html
    Talking about Computer Ethics There are four major areas which come under the umbrella of computer ethics
    • Netiquette Ethics Acceptable Use Policies
    Much has been written about this topic as well. One of the best recent articles is by Doug Johnson,
    Director of Media and Technology for Mankato Public Schools in Mankato, Minnesota.
    "Developing an ethical compass for worlds of learning" appeared in the November, 1998 issue of Multimedia Schools Magazine: http://www.infotoday.com/MMSchools/nov98/johnson.htm
    Use this article, along with the links below, to help you decide how to react to the scenario which has been assigned to your group. Answer the question as completely as you can, citing guiding resources that are relevant. Share the results with the class.
    Netiquette
    Ethics

    Acceptable Use Policies
    Don't gamble with the ethics of computer use! Learn

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 3     41-60 of 128    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

    free hit counter