Geometry.Net - the online learning center
Home  - Basic_C - Computer Ethics
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 128    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Computer Ethics:     more books (100)
  1. Ethics on display: often, it's not what you do. It's how you do it.(ROI) : An article from: Printed Circuit Design & Manufacture by Peter Bigelow, 2006-03-01
  2. Ethics and Computing: Living Responsibly in a Computerized World by Kevin Bowyer, 1995-10
  3. Human Values and the Design of Computer Technology (Center for the Study of Language and Information - Lecture Notes)
  4. Practical Ethics for a Technological World by Paul A. Alcorn, 2000-06-25
  5. Ethics and Electronic Information: A Festschrift for Stephen Almagno
  6. Information Ethics in the Electronic Age: Current Issues in Africa and the World
  7. Social and Ethical Effects of the Computer Revolution
  8. Using computer-related technology for assessment activities: ethical and professional practice issues for school psychologists [An article from: Computers in Human Behavior] by J.F. Carlson, V. Smith Harvey, 2004-09-01
  9. The impact of computers on society and ethics: A bibliography by Gary M Abshire, 1980
  10. Ethics in Information Technology by George Reynolds, 2002-10-28
  11. Ethics and Information Technology by James G. Anderson, Kenneth Goodman, 2002-07-10
  12. Spreading the ethical word: multinational companies are learning that profits and corporate ethics go hand in hand.: An article from: Information Management Journal by Mark Richard Moss, 2002-07-01
  13. Ethical issues in the use of computerized assessment [An article from: Computers in Human Behavior] by S.E. Schulenberg, B.A. Yutrzenka, 2004-07-01
  14. Case studies and codes of ethics: the relevance of the ACS experience to ALIA.(Australian Computer Society and Australian library and Information Association): ... article from: The Australian Library Journal by Stuart Ferguson, Rachel Salmond, et all 2005-08-01

81. Practical Computer Ethics - Book Review
Book review by Roy Johnson of Duncan Langford s Practical computer ethics .
http://www.mantex.co.uk/reviews/langford.htm
Home Tutorials Bookshop Software ... Subscribe here for our free email newsletter Practical Computer Ethics Privacy, protocols, and data protection issues. Those who have peeped into someone else's database or copied software from a friend's disk know that they've been naughty. They gamble that they're unlikely to be caught. Some people have even cut and pasted other's work and used it as their own. They too thought they wouldn't be noticed. But things are changing. They're starting to be noticed - and prosecuted. The world of electronic data, especially since the Internet explosion, is rife with problems of control, censorship, and intellectual property rights. Langford's slim introduction is an attempt to map out the ethical problems of computer use and present strategies for dealing with them. He starts out by defining the nature of moral philosophy in terms most readers will understand. In fact he goes on about this rather too long. It's chapter 5 before we get to computers - though his illustrative examples all come from the world of everyday keyboard and network use. But in fact many of the problems he identifies are ethical problems which arise from business and management practices rather than from IT itself. Should software developers construct programmes for rogue managers for instance? Would you report your colleagues if they downloaded politically incorrect material in work's time? These are not intrinsically questions of technology [even if they do occur in daily life] and since ethical judgements often rest on making fine distinctions, Langford ought really to be alert to such differences.

82. Home Articles Computer Ethics Responsibility Regained
An examination of the current state of computer ethics will reveal some causes THE PROBLEM The extensive discussion of computer ethics in the past few
http://csciwww.etsu.edu/gotterbarn/artpp1.htm
Home Articles
Computer Ethics: Responsibility Regained
Donald Gotterbarn INTRODUCTION In an address to the Computers and Quality of Life Conference[1], Gary Chapman, director of Computer Professionals for Social Responsibility described his perception of the state of work in computer ethics. He said that, over the years he had attended many meetings where computer ethics and social issues were discussed and that he keeps hearing the same thing. He has noticed no progress in the field. I think he is right. An examination of the current state of computer ethics will reveal some causes for this lack of progress and enable us to see some positive directions to take to make some progress in computer ethics. THE PROBLEM The extensive discussion of computer ethics in the past few years has had little consequence. A look at the content of these discussions reveals a primary source of the problem, viz ., an absence of a coherent concept of computer ethics. The types of events that are subsumed under issues in computer ethics are so varied that one does not have a clear concept of computer ethics. Starting from a clouded concept of computer ethics, one cannot derive clear ethical positions. I will show the difficulties with the current concept of computer ethics, and describe some of the difficulties created by this concept. Then I will offer an alternative approach to computer ethics which both avoids the current difficulties and broadens the concept of computer ethics to include both proscriptive and prescriptive judgements.

83. Research Ethics Resources On The World Wide Web
Instructional Resources in Engineering Ethics, computer ethics, and Research Ethics Syllabi are aimed at undergraduate courses in computer ethics.
http://www.indiana.edu/~poynter/tre-onln.html
Research Ethics Resources on the World Wide Web
Matt Strother, Teaching Research Ethics Intern
April 1999
[Note: The World Wide Web is subject to considerable link rot; many of the links compiled on this site in 1999 are no longer active. We will update the site as time permits and welcome suggestions for repairs or additions. In the meantime, we hope it is still useful as an outline and a conceptual system for resources on the Web. 17 September 2002] One of the newer resources available to a teacher of research ethics is cyberspace. The World Wide Web offers a vast array of ideas and information simply waiting to be discovered. Syllabi, teaching ideas, teaching material, lecture outlines, and many other resources for the budding research ethics program await, but because of sheer volume this array can be dizzying. Therefore, in order to save you the effort of winnowing the wheat from the chaff, I have compiled a list of sites that I believe to be worthwhile. The sites have been roughly grouped, based on their content, into the following categories:

84. Electronic Privacy Issues
Center for Applied Ethics Computer Information Ethics Resources on WWW Ten Commandments for computer ethics - Arlene Rinaldi
http://mason.gmu.edu/~montecin/eprivacy.htm
Computer Ethics, Laws, Privacy Issues
Some Computer Legislation

(Laws can be amended and changed, so these may not be the most current.)
George Mason University Responsible Computing Policy

ACM Computing and Public Policy
ACM Moral Imperatives American Civil Liberties Union ... Archives: an electronic civil liberties library - The Electronic Frontier Foundation's Online Civil Liberties Document Library Centre for Computing and Social Responsibility - UK Center for Democracy and Technology - "to enhance free expression and privacy in global communications technologies"
Children's Online Privacy Protection Act of 1998
- Federal Trade Commission Computer Crime and Intellectual Property Section (CCIPS) - Criminal Division, U.S. Dept. of Justice Computer Ethics Institute - the Brookings Institute Computer Ethics Resources - Hood College Computer Legislation Computer Professionals for Social Responsibility Computers and Privacy - Special Edition - Northern Lights
Computer Security Resource Center
- National Institute of Standards and Technology Consumer Protection - E-Commerce and the Internet Federal Trade Commission
Consumer Tips/Information
for ... Computer/Internet - Better Business Bureau Cyber-Liberties - ACLU Cyberstalked? Use Common sense

85. Computer Ethics And Professional Responsibility - Book Information
Part I What Is computer ethics? Part II Professional Responsibility Part III Codes of Ethics Part IV Sample Topics In computer ethics Bibliography
http://www.blackwellpublishing.com/book.asp?ref=1855548453

86. Program For Anvendt Etikk
Bridging Cultures computer ethics, Culture, and ICT A) important elements of computer ethics, including notions of professional responsibilities of
http://www.anvendtetikk.ntnu.no/pres/bridgingcultures.php
Kontaktperson:
Koordinator
May Thorseth,
Filosofisk institutt, NTNU
Tlf: +47 73 59 65 35,
may.thorseth@hf.ntnu.no
Bridging Cultures: Computer Ethics, Culture, and ICT
Interdisciplinary Graduate Course
Time: May 23rd – 27th plus june 1st 2005
Lecturer: Charles Ess, distinguished research professor at Interdisciplinary Studies at Drury University, USA and professor II at NTNU (Globalization and Program for Applied Ethics).
The course is open to PhD and master students, and our targetgroup is students from technological, humanistic and social science studies. The main part of the graduate course will be held from monday 23rd to friday 27th, and will continue on june 1st (wednesday) which is reserved for individual/group presentations and summaries. 7.5 credits (studiepoeng) will be given for completed course (requires writing and submitting one essay by the end of the course).
Description / Goals of the course: The course will examine
    A) important elements of computer ethics, including notions of professional responsibilities of programmers, HCI designers, etc. (including Bernd Carsten Stahl’s notion of “reflexive responsibility” as developed in his book Responsible Management of Information Systems). Here we will develop a basic “ethical toolkit” that will provide participants with a range of terms and approaches to ethical analysis and decision-making with regarding to common issues in computer and information sciences.

87. Higher Education::Computer Ethics
Home Engineering and Computer Science Computer Science computer ethics Ethics and Technology Ethical Issues in an Age of Information and
http://he-cda.wiley.com/WileyCDA/HigherEdCourse/cd-CX5100.html
Shopping Cart My Account Help Contact Us
By Keyword By Title By Author By ISBN Home Engineering and Computer Science Computer Science Computer Ethics Computer Ethics Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology
Tavani
by var s_pageName = "Computer Ethics" var s_server = "he-cda.wiley.com" var s_channel = "Courses" var s_pageType = "Course"

88. Computer Ethics (CS 335) Syllabus
computer ethics (CS 335) Syllabus. Patent and Trademark computer law issues Please complete the reading before class. This class will be led by Maurine
http://www.cs.uic.edu/~sloan/CLASSES/335-course-info/
Next: Assignments for second and
Computer Ethics (CS 335) Syllabus
Robert H. Sloan August 23, 2004 Class Lecture: Monday-Wednesday, 10:00-10:50, 118 DH
Instructor: Prof. Robert H. Sloan , 1132 SEO. Phone: 6-2369.
Email: Prof's last name at host uic.edu.
Professor's office hours: Mon. 1:30-2:30, and by appointment.
(Exception: First day of classes, office hours are 12:45-1:45.)
TA: Shun Liang.
TA Office Hours: Wednesday, 3:30 to 4:30, 907 SEO
TA IM: MSN messenger: liangshun@msn.com
Email: sliang2 at host uic.edu
This course also has a UIC Blackboard page , although right now it contains only a link to this information. We will definitely use it for its grade book, and probably that is where I will post additional reading assignments, etc, later in the course.

89. BUCS: Documentation
The Ten Commandments of computer ethics. Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people s computer work.
http://www.bath.ac.uk/bucs/10commandments.shtml
University Computing Services Search News ... Computing Services Search: Home Services we offer Resources Support ... Need Help? Check the FAQ
The Ten Commandments of Computer Ethics
  • Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not use or copy software for which you have not paid. Thou shalt not use other people's computer resources without authorisation. Thou shalt not appropriate other people's intellectual output. Thou shalt think about the social consequences of the program you write. Thou shalt use a computer in ways that show consideration and respect.
  • From the Computer Ethics Institute Rate this page... How useful was this page to you? Very Mostly Fairly Not really Not at all Constructive comments?
    Email address (optional):
    ^Top
    29 June 2004 Computing Services Privacy Statement Page last modified 29 June 2004

    90. Computer Ethics: Information From Answers.com
    computer ethics computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
    http://www.answers.com/topic/computer-ethics
    showHide_TellMeAbout2('false'); Business Entertainment Games Health ... More... On this page: Wikipedia Mentioned In Or search: - The Web - Images - News - Blogs - Shopping computer ethics Wikipedia computer ethics Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.
    Issues
    The core issues of computer ethics include, but are not limited to: professional responsibility, intellectual property rights privacy , and the impact of technology in society:
    • Issues of privacy relate to the usage of information collected about individuals and stored in databases. The final issue, the impact of technology in society, is perhaps the controlling issue in computer ethics. This issue relates to the consequences of the introduction of technology for society as a whole, as well as the place computers have in society.
    An issue that now goes hand in hand with ethics today is social responsibility . This is an attempt by organizations to find equilibrium between all their commitments, including investors, employees, customers and competitors alike. Social responsibility is an obligation for managers to serve and protect the investments of the other people involved in the company, not only themselves.
    Identifying issues
    Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, Collins and Miller proposed a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue.

    91. Computer Ethics - 2nd Edition - The MIT Press
    thoroughly revised and updated with new anecdotes, new revelations, and lively discussion of the ethical, social, and professional issues arising from the
    http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=5854

    92. Computer Science Department - Professional Ethics And Computer Science At Stony
    Tom Forester and Perry Morrison, computer ethics Cautionary Tales and Ethical +Richard Spinello, Case Studies in Information and computer ethics,
    http://www.cs.sunysb.edu/ProfessionalEthics.html
    Professional Ethics and Computer Science/Information Systems
    Top Introduction Codes of Ethics Organizations ... Books and Journals Introduction If you are looking at this page, you probably have an interest in (or have been told by a professor to have an interest in) computers and ethics. Ethics One definition of ethics, according to Merriam-Webster, is "a set of moral principles or values". You may derive your own personal ethics from many sources: your family and culture, your religion or faith, the legal system where you live, etc. However, ethics in general is not the topic of this web page. Computing Ethics Sometimes you will hear someone refer to "computing ethics", which is a whole range of ethical questions surrounding computer science and the use of computers. This is also not the primary topic of this web page, although it is addressed. If this is your primary interest, you might also want to take a look at Social Responsibility and the CS Student , which appeared in the ACM Crossroads Student Magazine in May 1995. Professional Ethics This web page discusses professional ethics (or professional practice): the "principles of conduct" that we agree to be governed by as computer scientists and engineers.

    93. Computer Ethics - Lecture 10
    computer ethics. Ethics deals with placing a “value” on acts according to whether they The Ten Commandments of computer ethics have been defined by the
    http://www.cmpe.boun.edu.tr/~say/c150/intro/lit10.html
    Computer Ethics Ethics value good bad When computers first began to be used in society at large, the absence of ethical standards about their use and related issues caused some problems. However, as their use became widespread in every facet of our lives, discussions in computer ethics resulted in some kind of a consensus. Today, many of these rules have been formulated as laws, either national or international. Computer crimes and computer fraud are now common terms. There are laws against them, and everyone is responsible for knowing what constitutes computer crime and computer fraud. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute . Here is our interpretation of them: 1) Thou shalt not use a computer to harm other people: 2) Thou shalt not interfere with other people's computer work: Computer viruses 3) Thou shalt not snoop around in other people's files: encryption 4) Thou shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it. 5) Thou shalt not use a computer to bear false witness: The Internet can spread untruth as fast as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong.

    94. Why Bother? Understanding Copyright And Computer Ethics
    Understanding Copyright and computer ethics. Dr. Colleen Swain University of Florida cswain@coe.ufl.edu. Teachers and students at all levels are using
    http://www.coe.ufl.edu/faculty/swain/fetc2005/fetc2005.htm
    Dr. Colleen Swain
    University of Florida
    cswain@coe.ufl.edu
    (PowerPoint via browser) or (pdf version)

    95. Morality And Machines: Perspectives On Computer Ethics, Second Edition
    Morality and Machines Perspectives on computer ethics, Second Edition Stacey L Edgar, SUNY, Geneseo. ISBN 0763717673 Price $61.95 (Sugg. US List)
    http://computerscience.jbpub.com/catalog/0763717673/
    Cart Help Sign up for eUpdates Tell a Friend ... Computer Science Product Details Appropriate Courses Key Features Table of Contents About the Author(s) ... Bundles
    Quick Links Find Your Sales Rep Technical Support International Sales
    Related Products Computer Science Introduction to Computer Science (CS0) Ethics Product Detail Add to Shopping Cart Request a Review Copy
    Recommend this title

    to your Library
    Morality and Machines: Perspectives on Computer Ethics, Second Edition
    Stacey L Edgar, SUNY, Geneseo ISBN:
    Price:
    (Sugg. US List)
    Cover: Paperback
    Pages:
    Morality and Machines, Second Edition Additional Information... Computer Science Home Sign up for eUpdates Tell a Friend ... Contact Us
    Contact For Technical Help

    96. Information Ethics
    Centre for Applied Ethics. Computer information ethics resources on WWW. Information Ethics On the philosophical foundation of computer ethics.
    http://web.syr.edu/~jryan/infopro/ethics.html
    Information Resources for Information Professionals
    Information Ethics
    Compiled by:
    Joe Ryan
    Return to Information Policy Table of Contents

    Return to Special Topics section Table of Contents

    Return to the Main Menu
    Table of Contents [Introductions] [Guides] [Ethical Principles] [Codes of Ethics] ... [Cases]
    Introductions
    Johnson, Deborah G. (1994). Computer ethics , 2nd ed. Englewood Cliffs, NJ: Prentice Hall. Summary and table of contents Johnson, Deborah G. and Nissenbaum, Helen. (1994). . Englewood Cliffs, NJ: Prentice Hall. Summary and table of contents Ethical decision making and information technology: An introduction with cases . NY: McGraw-Hill. The best practical guide to ethical reasoning I know.
    Also of Interest
    Alfino, Mark and Pierce, Linda. (1997). Information ethics for librarians . Jefferson, NC: McFarland. Baase, Sara. (1997). A gift of fire: social, legal, and ethical issues in computing . Englewood Cliffs, NJ: Prentice Hall. Summary and table of contents Organizational Dynamics, 18 Forester, and Morrison, Perry. (1994). Computer ethics ( 2nd ed). Cambridge, MA: MIT Press.

    97. Student/Patron Ethics Agreement
    that relate to the Information Security Policy and the computer ethics Guideline. I will follow all the security procedures of the VCCS computer systems
    http://www.vccs.edu/stuagr.htm
    Information Technology
    Student/Patron Ethics Agreement
    Information Technology Student/Patron Ethics Agreement As a user of the Virginia Community College System's local and wide area computer systems, I understand and agree to abide by the following ethics agreement terms. These terms govern my access to and use of the information technology applications, services and resources of the VCCS and the information they generate. The college granted access to me as a necessary privilege in order to perform authorized functions at the college where I am currently enrolled. I will not knowingly permit use of my entrusted access control mechanism for any purposes other than those required to perform authorized functions related to my status as a student. These include logon identification, password, workstation identification, user identification, file protection keys or production read or write keys. I will not disclose information concerning any access control mechanism unless properly authorized to do so by my enrolling college. I will not use any access mechanism that the VCCS has not expressly assigned to me. I will treat all information maintained on the VCCS computer systems as strictly confidential and will not release information to any unauthorized person. I agree to abide by all applicable state, federal, VCCS, and college policies, procedures and standards that relate to the Information Security Policy and the Computer Ethics Guideline. I will follow all the security procedures of the VCCS computer systems and protect the data contained therein.

    98. Purchase College - Computer Information Services - Computer Ethics And Usage Pol
    computer ethics and Usage Policy. Users of computer systems and networks at Purchase College must read, understand, agree to comply with and sign the
    http://www.purchase.edu/finance/cis/computer_ethics_and_usage.asp

    Computing and Telecom Services
    Telephone Services for Students Faculty and Staff Services ResNet ...
  • ResNet
  • Computer Ethics and Usage Policy
    Users of computer systems and networks at Purchase College must read, understand, agree to comply with and sign the Purchase College Computing Ethics Policy. You are responsible for your actions. That responsibility exists regardless of what security mechanisms are in place. Unauthorized use of computing facilities will lead to suspension or loss of privilege, and may lead to more serious penalties. All rules and policies of Purchase College must be adhered to by all users of computing and information services at Purchase College. All rights and privileges of all users should be protected. Do not consider e-mail private or secure. Purchase College does not encrypt e-mail. Mail can be easily intercepted at any machine that it passes through. Mail can be altered and copies can be made and forwarded. Messages sent to nonexistent or incorrect addresses may be delivered to an unintended destination. The systems administrator(s) at Purchase College has the right to monitor the computer system. The systems administrator has the right to examine user files to diagnose system problems or investigate security breaches.

    99. Computer Hacking And Ethics
    Paper about developing ethics in teenage hackers.
    http://www.cs.berkeley.edu/~bh/hackers.html
    Computer Hacking and Ethics
    Brian Harvey
    University of California, Berkeley [A slightly different version of this paper was written for the ``Panel on Hacking'' held by the Association for Computing Machinery in April, 1985. Thanks to Batya Friedman, Donn Parker, and Carter Sanders for their comments on early drafts.] [Neal Patrick] said he and his friends, who named themselves the ``414s'' after the Milwaukee area code, did not intend to do any damage and did not realize they were doing anything unethical or illegal. In fact, when asked [at a Congressional subcommittee hearing] at what point he questioned the ethics of his actions, he answered, ``Once the FBI knocked on the door.'' It's no secret that a mature sense of ethics is something a person develops over time. Parents are supposed to exercise authority over their children because the children are not expected to know how to make certain decisions for themselves. We have a juvenile court system separate from the adult criminal court system because we believe that a young person is not capable of criminal intent in the same sense that an adult is capable of it.

    100. CPSR - Computer Professionals For Social Responsibility
    CPSR's website devoted to issues such as Internet filters, encryption, digital signatures, PICS, ethics, NII, and privacy.
    http://cpsr.org
    @import url(http://www.cpsr.org/cpsr_global.css); @import url(cpsr_home.css); @import url(http://www.cpsr.org/ploneCustom.css); @import url(http://www.cpsr.org/cpsr_print.css); Skip to content.
    CPSR
    Sections Personal tools
    Computer Professionals for Social Responsibility
    Annual Meeting
    Please consider joining us for the annual members' meeting and/or Norbert Wiener Award Reception. The Meeting is an opportunity for members to meet with the Board and a newly forming Advisory Council, face-to-face, for an extended discussion focusing intensively on the state of CPSR and a Strategic Plan. We want members to be involved in planning our future direction and prospects.
    October 29, 2005
    Palo Alto. CA
    Details
    Working Papers
    Collective Learning in the World Summit on the Information Society
    by William J. Drake, President, CPSR May 2005
    Launched in May 2005, CPSR Working Papers are research and opinion pieces by CPSR members on social issues related to information and communication technology. This is the second paper in the series.
    Highlight from CPSR Compiler
    Public Sphere Project
    We have exciting Public Sphere Project news: we have just signed a contract with MIT Press to develop a book based on our "Liberating Voices!" pattern language project.

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 5     81-100 of 128    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | Next 20

    free hit counter