|
|
|
|
LEADER |
09892cam a2200721 a 4500 |
001 |
29254 |
003 |
IGIG |
005 |
20100606233951.0 |
006 |
m eo d |
007 |
cr bn||||m|||a |
008 |
100531s2007 paua fob 001 0 eng d |
010 |
# |
# |
|z 2007007277
|
020 |
# |
# |
|a 9781591409885 (ebook)
|
020 |
# |
# |
|a 1591409888 (ebook)
|
020 |
# |
# |
|z 9781591409878 (hardcover)
|
020 |
# |
# |
|z 159140987X (hardcover)
|
024 |
7 |
# |
|a 10.4018/978-1-59140-987-8
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00540390
|
035 |
# |
# |
|a (OCoLC)707617009
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a HM851
|b .E555 2007e
|
082 |
0 |
4 |
|a 174/.900403
|2 22
|
245 |
0 |
0 |
|a Encyclopedia of information ethics and security
|c Marian Quigley [editor].
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2007.
|
300 |
# |
# |
|a electronic texts (various pagings : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references and indexes.
|
505 |
0 |
# |
|a 3D avatars and collaborative virtual environments / Koon-Ying Raymond Li, James Sofraand, and Mark Power -- Access control for healthcare / Yifeng Shen -- Advertising in the networked environment / Savvas Papagiannidis and Michael Bourlakis -- Anonymous peer-to-peer systems / Wenbing Zhao -- Argumentation and computing / Ephraim Nissan -- Argumentation with Wigmore charts and computing / Ephraim Nissan -- Artificial intelligence tools for handling legal evidence / Ephraim Nissan -- Barriers facing African American women in technology / Jianxia Du, George H. Pate,-- Deneen Sherrod, and Wei-Chieh Yu -- B-POS secure mobile payment system / Antonio Grillo, Alessandro Lentini, and Gianluigi Me -- Building secure and dependable information systems / Wenbing Zhao -- Classifying articles in information ethics and security / Zack Jourdan, R. Kelly Rainer Jr., and Thomas E. Marshall -- Computational ethics / Alicia I. Ruvinsky -- Computer ethics and intelligent technologies / Yefim Kats -- Computer worms, detection, and defense / Robert J. Cole and Chao-Hsien Chu -- Conflicting value of digital music piracy / Matthew Butler -- Content filtering methods for Internet pornography / Jengchung V. Chen and ShaoYu F. Huang -- Cyber-Terrorism in Australia / Christopher Beggs -- Data security and chase / Zbigniew W. Ras and Seunghyun Im -- Defending against distributed denial of service / Yang Xiang and Wanlei Zhou -- Digital divide implications and trends / Irene Chen and Terry T. Kidd --
|
505 |
0 |
# |
|a Digital rights management metadata and standards / Jo Anne Cote and Eun G. Park -- Dilemmas of online identity theft / Omer Mahmood -- Document security in the ancient world / Christopher H. Walker -- DRM practices in the e-publication industry / Bong Wee Kiau and Norshuhada Shiratuddin -- Educational technology practitioner-research ethics / Kathleen Gray -- E-health and ensuring quality / Prajesh Chhanabhai and Alec Holt -- Electronic signatures and ethics / A. Srivastava and S. B. Thomson -- Engineering multi-agent systems / Tagelsir Mohamed Gasmelseid -- Ethical approach to gathering survey data online / Sophie Nichol and Kathy Blashki -- Ethical behaviour in technology-mediated communication / Sutirtha Chatterjee -- Ethical concerns in computer science projects / Alistair Irons and Roger Boyle -- Ethical debate surrounding RFID The / Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero, Susan J. Nestor, and Keith LeDonne -- Ethical dilemmas in data mining and warehousing / Joseph A. Cazier and Ryan C. LaBrie -- Ethical erosion at Enron / John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee -- Ethical usability testing with children / Kirsten Ellis and Marian Quigley -- Ethics and access to technology for persons with disabilities / Belinda Davis Lazarus -- Ethics and perceptions in online learning environments / Michelle M. Ramim -- Ethics and security under the Sarbanes-Oxley Act / Thomas J. Tribunella and Heidi R. Tribunella -- Ethics education for the online environment / Lori N. K. Leonard and Tracy S. Manly --
|
505 |
0 |
# |
|a Ethics in software engineering / Pankaj Kamthan -- Ethics in the security of organizational information systems / Sushma Mishra and Amita Goyal Chin -- Ethics of AI / Kevin B. Korb -- Fair use / Pasi Tyrväskylä -- Federal information security law / Michael J. Chapple and Charles R. Crowell -- Formulating a code of cyberethics for a municipality / Udo Richard Averweg -- Hackers and Cyber Terrorists / M. J. Warren -- Homo electricus and the continued speciation of humans / Katina Michael and M. G. Michael -- IT security culture transition process / Leanne Ngo -- ICT leapfrogging policy and development in the third world / Amanda Third and Kai-Ti Kao -- Identity verification using resting state brain signals / Ramaswamy Palaniappan and Lalit M. Patnaik -- Individual and institutional responses to staff plagiarism / Carmel McNaught -- Information ethics as ideology / Bernd Carsten Stahl -- Information ethics from an Islamic perspective / Salam Abdallah -- Information security and the "Privacy Broker" / Michael Douma and Eduard J. Gamito -- Information security policies for networkable devices / Julia Kotlarsky, Ilan Oshri, and Corey Hirsch -- Information security policy research agenda / Heather Fulford and Neil Doherty -- Internet and suicide / Dianne Currier -- Internet piracy and copyright debates / Paul Sugden -- Internet research ethics questions and considerations / Elizabeth Buchanan -- Interviews with young people using online chat / Elza Dunkels and AnnBritt Enochsson --
|
505 |
0 |
# |
|a Intrusion detection and information security audits / Terry T. Kidd and Robert K. Hiltbrand -- Investigation Strategy for the Small Pedophiles World / Gianluigi Me -- Managed services and changing workplace ethics / Alan Sixsmith -- Managing the environmental impact of information technology / Laurel Evelyn Dyson -- Measuring ethical reasoning of IT professionals and students / Mohammad Abdolmohammadi and Jane Fedorowicz -- Meta view of information ethics / Charles R. Crowell and Robert N. Barger -- Mitigation of identity theft in the information age / Reggie Becker, Mark B. Schmidt, and Allen C. Johnston -- Mobile agents and security / Fei Xue -- Modelling context-aware security for electronic health records / Pravin Shetty and Seng Loke -- Moral rights in the Australian public sector / Lynley Hocking -- Multimodal biometric system / Ajita Rattani, Hunny Mehrotra, and Phalguni Gupta -- Objective ethics for managing information technology / John R. Drake -- Parental rights to monitor Internet usage / Benjamin J. Halpert -- Patient centric healthcare information systems in the U.S. / Nilmini Wickramasinghe -- Pedagogical framework for ethical development / Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, and Nathan Harter -- Personal information ethics / Sabah S. Al-Fedaghi -- Pharming attack designs / Manish Gupta and Raj Sharman -- Port Scans / Jalal Kawash --
|
505 |
0 |
# |
|a Privacy and access to electronic health records / Dick Whiddett, Inga Hunter, Judith Engelbrecht, and Jocelyn Handy -- Privacy and online data collection / Călin Gurău -- Privacy in data mining textbooks / James Lawler and John C. Molluzzo -- Protection of mobile agent data / Sheng-Uei Guan -- Rule-based policies for secured defense meetings / Pravin Shetty and Seng Loke -- Secure agent roaming under m-commerce / Sheng-Uei Guan -- Secure automated clearing house transactions / Jan Skalicky Hanson and Mark B. Schmidt -- Security dilemmas for Canada's new government / Jeffrey Roy -- Security model for educational satellite networks / Sanjay Jasola and Ramesh C. Sharma -- Security of communication and quantum technology / Gregory Paperin -- Security protection for critical infrastructure / M. J. Warren and T. B. Busuttil -- Spyware / Thomas F. Stafford -- Sustainable information society / Ralf Isenmann -- Taxonomy of computer and information ethics / Sabah S. Al-Fedaghi -- Tools for representing and processing narratives / Ephraim Nissan -- Traditional knowledge and intellectual property / Ulia Popova-Gosart -- Universal Internet access under an ethical lens / Alessandro Arbore.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a This book is a reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on May 31, 2010).
|
650 |
# |
0 |
|a Information technology
|x Social aspects.
|
650 |
# |
0 |
|a Information technology
|x Moral and ethical aspects.
|
650 |
# |
0 |
|a Computer crimes.
|
650 |
# |
0 |
|a Computer security.
|
650 |
# |
0 |
|a Information networks
|x Security measures.
|
653 |
# |
# |
|a Artificial intelligence
|
653 |
# |
# |
|a Banking
|
653 |
# |
# |
|a Censorship
|
653 |
# |
# |
|a Communication
|
653 |
# |
# |
|a Computer crime
|
653 |
# |
# |
|a Cyber terrorism
|
653 |
# |
# |
|a Education
|
653 |
# |
# |
|a Equity and access
|
653 |
# |
# |
|a Health
|
653 |
# |
# |
|a Identity
|
653 |
# |
# |
|a Intellectual property
|
653 |
# |
# |
|a Legal and political issues
|
653 |
# |
# |
|a Privacy
|
653 |
# |
# |
|a Publishing
|
653 |
# |
# |
|a Shopping
|
653 |
# |
# |
|a Environment
|
653 |
# |
# |
|a Workplace
|
700 |
1 |
# |
|a Quigley, Marian.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2007007277
|z 9781591409878
|z 159140987X
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8
|z View fulltext via EzAccess
|