Encyclopedia of information ethics and security

This book is a reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics,...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Quigley, Marian.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2007.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 09892cam a2200721 a 4500
001 29254
003 IGIG
005 20100606233951.0
006 m eo d
007 cr bn||||m|||a
008 100531s2007 paua fob 001 0 eng d
010 # # |z 2007007277 
020 # # |a 9781591409885 (ebook) 
020 # # |a 1591409888 (ebook) 
020 # # |z 9781591409878 (hardcover) 
020 # # |z 159140987X (hardcover) 
024 7 # |a 10.4018/978-1-59140-987-8  |2 doi 
035 # # |a (CaBNVSL)gtp00540390 
035 # # |a (OCoLC)707617009 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a HM851  |b .E555 2007e 
082 0 4 |a 174/.900403  |2 22 
245 0 0 |a Encyclopedia of information ethics and security  |c Marian Quigley [editor].  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2007. 
300 # # |a electronic texts (various pagings : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references and indexes. 
505 0 # |a 3D avatars and collaborative virtual environments / Koon-Ying Raymond Li, James Sofraand, and Mark Power -- Access control for healthcare / Yifeng Shen -- Advertising in the networked environment / Savvas Papagiannidis and Michael Bourlakis -- Anonymous peer-to-peer systems / Wenbing Zhao -- Argumentation and computing / Ephraim Nissan -- Argumentation with Wigmore charts and computing / Ephraim Nissan -- Artificial intelligence tools for handling legal evidence / Ephraim Nissan -- Barriers facing African American women in technology / Jianxia Du, George H. Pate,-- Deneen Sherrod, and Wei-Chieh Yu -- B-POS secure mobile payment system / Antonio Grillo, Alessandro Lentini, and Gianluigi Me -- Building secure and dependable information systems / Wenbing Zhao -- Classifying articles in information ethics and security / Zack Jourdan, R. Kelly Rainer Jr., and Thomas E. Marshall -- Computational ethics / Alicia I. Ruvinsky -- Computer ethics and intelligent technologies / Yefim Kats -- Computer worms, detection, and defense / Robert J. Cole and Chao-Hsien Chu -- Conflicting value of digital music piracy / Matthew Butler -- Content filtering methods for Internet pornography / Jengchung V. Chen and ShaoYu F. Huang -- Cyber-Terrorism in Australia / Christopher Beggs -- Data security and chase / Zbigniew W. Ras and Seunghyun Im -- Defending against distributed denial of service / Yang Xiang and Wanlei Zhou -- Digital divide implications and trends / Irene Chen and Terry T. Kidd -- 
505 0 # |a Digital rights management metadata and standards / Jo Anne Cote and Eun G. Park -- Dilemmas of online identity theft / Omer Mahmood -- Document security in the ancient world / Christopher H. Walker -- DRM practices in the e-publication industry / Bong Wee Kiau and Norshuhada Shiratuddin -- Educational technology practitioner-research ethics / Kathleen Gray -- E-health and ensuring quality / Prajesh Chhanabhai and Alec Holt -- Electronic signatures and ethics / A. Srivastava and S. B. Thomson -- Engineering multi-agent systems / Tagelsir Mohamed Gasmelseid -- Ethical approach to gathering survey data online / Sophie Nichol and Kathy Blashki -- Ethical behaviour in technology-mediated communication / Sutirtha Chatterjee -- Ethical concerns in computer science projects / Alistair Irons and Roger Boyle -- Ethical debate surrounding RFID The / Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero, Susan J. Nestor, and Keith LeDonne -- Ethical dilemmas in data mining and warehousing / Joseph A. Cazier and Ryan C. LaBrie -- Ethical erosion at Enron / John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee -- Ethical usability testing with children / Kirsten Ellis and Marian Quigley -- Ethics and access to technology for persons with disabilities / Belinda Davis Lazarus -- Ethics and perceptions in online learning environments / Michelle M. Ramim -- Ethics and security under the Sarbanes-Oxley Act / Thomas J. Tribunella and Heidi R. Tribunella -- Ethics education for the online environment / Lori N. K. Leonard and Tracy S. Manly -- 
505 0 # |a Ethics in software engineering / Pankaj Kamthan -- Ethics in the security of organizational information systems / Sushma Mishra and Amita Goyal Chin -- Ethics of AI / Kevin B. Korb -- Fair use / Pasi Tyrväskylä -- Federal information security law / Michael J. Chapple and Charles R. Crowell -- Formulating a code of cyberethics for a municipality / Udo Richard Averweg -- Hackers and Cyber Terrorists / M. J. Warren -- Homo electricus and the continued speciation of humans / Katina Michael and M. G. Michael -- IT security culture transition process / Leanne Ngo -- ICT leapfrogging policy and development in the third world / Amanda Third and Kai-Ti Kao -- Identity verification using resting state brain signals / Ramaswamy Palaniappan and Lalit M. Patnaik -- Individual and institutional responses to staff plagiarism / Carmel McNaught -- Information ethics as ideology / Bernd Carsten Stahl -- Information ethics from an Islamic perspective / Salam Abdallah -- Information security and the "Privacy Broker" / Michael Douma and Eduard J. Gamito -- Information security policies for networkable devices / Julia Kotlarsky, Ilan Oshri, and Corey Hirsch -- Information security policy research agenda / Heather Fulford and Neil Doherty -- Internet and suicide / Dianne Currier -- Internet piracy and copyright debates / Paul Sugden -- Internet research ethics questions and considerations / Elizabeth Buchanan -- Interviews with young people using online chat / Elza Dunkels and AnnBritt Enochsson -- 
505 0 # |a Intrusion detection and information security audits / Terry T. Kidd and Robert K. Hiltbrand -- Investigation Strategy for the Small Pedophiles World / Gianluigi Me -- Managed services and changing workplace ethics / Alan Sixsmith -- Managing the environmental impact of information technology / Laurel Evelyn Dyson -- Measuring ethical reasoning of IT professionals and students / Mohammad Abdolmohammadi and Jane Fedorowicz -- Meta view of information ethics / Charles R. Crowell and Robert N. Barger -- Mitigation of identity theft in the information age / Reggie Becker, Mark B. Schmidt, and Allen C. Johnston -- Mobile agents and security / Fei Xue -- Modelling context-aware security for electronic health records / Pravin Shetty and Seng Loke -- Moral rights in the Australian public sector / Lynley Hocking -- Multimodal biometric system / Ajita Rattani, Hunny Mehrotra, and Phalguni Gupta -- Objective ethics for managing information technology / John R. Drake -- Parental rights to monitor Internet usage / Benjamin J. Halpert -- Patient centric healthcare information systems in the U.S. / Nilmini Wickramasinghe -- Pedagogical framework for ethical development / Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, and Nathan Harter -- Personal information ethics / Sabah S. Al-Fedaghi -- Pharming attack designs / Manish Gupta and Raj Sharman -- Port Scans / Jalal Kawash -- 
505 0 # |a Privacy and access to electronic health records / Dick Whiddett, Inga Hunter, Judith Engelbrecht, and Jocelyn Handy -- Privacy and online data collection / Călin Gurău -- Privacy in data mining textbooks / James Lawler and John C. Molluzzo -- Protection of mobile agent data / Sheng-Uei Guan -- Rule-based policies for secured defense meetings / Pravin Shetty and Seng Loke -- Secure agent roaming under m-commerce / Sheng-Uei Guan -- Secure automated clearing house transactions / Jan Skalicky Hanson and Mark B. Schmidt -- Security dilemmas for Canada's new government / Jeffrey Roy -- Security model for educational satellite networks / Sanjay Jasola and Ramesh C. Sharma -- Security of communication and quantum technology / Gregory Paperin -- Security protection for critical infrastructure / M. J. Warren and T. B. Busuttil -- Spyware / Thomas F. Stafford -- Sustainable information society / Ralf Isenmann -- Taxonomy of computer and information ethics / Sabah S. Al-Fedaghi -- Tools for representing and processing narratives / Ephraim Nissan -- Traditional knowledge and intellectual property / Ulia Popova-Gosart -- Universal Internet access under an ethical lens / Alessandro Arbore. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a This book is a reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on May 31, 2010). 
650 # 0 |a Information technology  |x Social aspects. 
650 # 0 |a Information technology  |x Moral and ethical aspects. 
650 # 0 |a Computer crimes. 
650 # 0 |a Computer security. 
650 # 0 |a Information networks  |x Security measures. 
653 # # |a Artificial intelligence 
653 # # |a Banking 
653 # # |a Censorship 
653 # # |a Communication 
653 # # |a Computer crime 
653 # # |a Cyber terrorism 
653 # # |a Education 
653 # # |a Equity and access 
653 # # |a Health 
653 # # |a Identity 
653 # # |a Intellectual property 
653 # # |a Legal and political issues 
653 # # |a Privacy 
653 # # |a Publishing 
653 # # |a Shopping 
653 # # |a Environment 
653 # # |a Workplace 
700 1 # |a Quigley, Marian. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2007007277  |z 9781591409878  |z 159140987X 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8  |z View fulltext via EzAccess