Encyclopedia of information ethics and security

This book is a reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics,...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Quigley, Marian.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2007.
Subjects:
Online Access:View fulltext via EzAccess
Table of Contents:
  • 3D avatars and collaborative virtual environments / Koon-Ying Raymond Li, James Sofraand, and Mark Power
  • Access control for healthcare / Yifeng Shen
  • Advertising in the networked environment / Savvas Papagiannidis and Michael Bourlakis
  • Anonymous peer-to-peer systems / Wenbing Zhao
  • Argumentation and computing / Ephraim Nissan
  • Argumentation with Wigmore charts and computing / Ephraim Nissan
  • Artificial intelligence tools for handling legal evidence / Ephraim Nissan
  • Barriers facing African American women in technology / Jianxia Du, George H. Pate,
  • Deneen Sherrod, and Wei-Chieh Yu
  • B-POS secure mobile payment system / Antonio Grillo, Alessandro Lentini, and Gianluigi Me
  • Building secure and dependable information systems / Wenbing Zhao
  • Classifying articles in information ethics and security / Zack Jourdan, R. Kelly Rainer Jr., and Thomas E. Marshall
  • Computational ethics / Alicia I. Ruvinsky
  • Computer ethics and intelligent technologies / Yefim Kats
  • Computer worms, detection, and defense / Robert J. Cole and Chao-Hsien Chu
  • Conflicting value of digital music piracy / Matthew Butler
  • Content filtering methods for Internet pornography / Jengchung V. Chen and ShaoYu F. Huang
  • Cyber-Terrorism in Australia / Christopher Beggs
  • Data security and chase / Zbigniew W. Ras and Seunghyun Im
  • Defending against distributed denial of service / Yang Xiang and Wanlei Zhou
  • Digital divide implications and trends / Irene Chen and Terry T. Kidd
  • Digital rights management metadata and standards / Jo Anne Cote and Eun G. Park
  • Dilemmas of online identity theft / Omer Mahmood
  • Document security in the ancient world / Christopher H. Walker
  • DRM practices in the e-publication industry / Bong Wee Kiau and Norshuhada Shiratuddin
  • Educational technology practitioner-research ethics / Kathleen Gray
  • E-health and ensuring quality / Prajesh Chhanabhai and Alec Holt
  • Electronic signatures and ethics / A. Srivastava and S. B. Thomson
  • Engineering multi-agent systems / Tagelsir Mohamed Gasmelseid
  • Ethical approach to gathering survey data online / Sophie Nichol and Kathy Blashki
  • Ethical behaviour in technology-mediated communication / Sutirtha Chatterjee
  • Ethical concerns in computer science projects / Alistair Irons and Roger Boyle
  • Ethical debate surrounding RFID The / Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero, Susan J. Nestor, and Keith LeDonne
  • Ethical dilemmas in data mining and warehousing / Joseph A. Cazier and Ryan C. LaBrie
  • Ethical erosion at Enron / John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee
  • Ethical usability testing with children / Kirsten Ellis and Marian Quigley
  • Ethics and access to technology for persons with disabilities / Belinda Davis Lazarus
  • Ethics and perceptions in online learning environments / Michelle M. Ramim
  • Ethics and security under the Sarbanes-Oxley Act / Thomas J. Tribunella and Heidi R. Tribunella
  • Ethics education for the online environment / Lori N. K. Leonard and Tracy S. Manly
  • Ethics in software engineering / Pankaj Kamthan
  • Ethics in the security of organizational information systems / Sushma Mishra and Amita Goyal Chin
  • Ethics of AI / Kevin B. Korb
  • Fair use / Pasi Tyrväskylä
  • Federal information security law / Michael J. Chapple and Charles R. Crowell
  • Formulating a code of cyberethics for a municipality / Udo Richard Averweg
  • Hackers and Cyber Terrorists / M. J. Warren
  • Homo electricus and the continued speciation of humans / Katina Michael and M. G. Michael
  • IT security culture transition process / Leanne Ngo
  • ICT leapfrogging policy and development in the third world / Amanda Third and Kai-Ti Kao
  • Identity verification using resting state brain signals / Ramaswamy Palaniappan and Lalit M. Patnaik
  • Individual and institutional responses to staff plagiarism / Carmel McNaught
  • Information ethics as ideology / Bernd Carsten Stahl
  • Information ethics from an Islamic perspective / Salam Abdallah
  • Information security and the "Privacy Broker" / Michael Douma and Eduard J. Gamito
  • Information security policies for networkable devices / Julia Kotlarsky, Ilan Oshri, and Corey Hirsch
  • Information security policy research agenda / Heather Fulford and Neil Doherty
  • Internet and suicide / Dianne Currier
  • Internet piracy and copyright debates / Paul Sugden
  • Internet research ethics questions and considerations / Elizabeth Buchanan
  • Interviews with young people using online chat / Elza Dunkels and AnnBritt Enochsson
  • Intrusion detection and information security audits / Terry T. Kidd and Robert K. Hiltbrand
  • Investigation Strategy for the Small Pedophiles World / Gianluigi Me
  • Managed services and changing workplace ethics / Alan Sixsmith
  • Managing the environmental impact of information technology / Laurel Evelyn Dyson
  • Measuring ethical reasoning of IT professionals and students / Mohammad Abdolmohammadi and Jane Fedorowicz
  • Meta view of information ethics / Charles R. Crowell and Robert N. Barger
  • Mitigation of identity theft in the information age / Reggie Becker, Mark B. Schmidt, and Allen C. Johnston
  • Mobile agents and security / Fei Xue
  • Modelling context-aware security for electronic health records / Pravin Shetty and Seng Loke
  • Moral rights in the Australian public sector / Lynley Hocking
  • Multimodal biometric system / Ajita Rattani, Hunny Mehrotra, and Phalguni Gupta
  • Objective ethics for managing information technology / John R. Drake
  • Parental rights to monitor Internet usage / Benjamin J. Halpert
  • Patient centric healthcare information systems in the U.S. / Nilmini Wickramasinghe
  • Pedagogical framework for ethical development / Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, and Nathan Harter
  • Personal information ethics / Sabah S. Al-Fedaghi
  • Pharming attack designs / Manish Gupta and Raj Sharman
  • Port Scans / Jalal Kawash
  • Privacy and access to electronic health records / Dick Whiddett, Inga Hunter, Judith Engelbrecht, and Jocelyn Handy
  • Privacy and online data collection / Călin Gurău
  • Privacy in data mining textbooks / James Lawler and John C. Molluzzo
  • Protection of mobile agent data / Sheng-Uei Guan
  • Rule-based policies for secured defense meetings / Pravin Shetty and Seng Loke
  • Secure agent roaming under m-commerce / Sheng-Uei Guan
  • Secure automated clearing house transactions / Jan Skalicky Hanson and Mark B. Schmidt
  • Security dilemmas for Canada's new government / Jeffrey Roy
  • Security model for educational satellite networks / Sanjay Jasola and Ramesh C. Sharma
  • Security of communication and quantum technology / Gregory Paperin
  • Security protection for critical infrastructure / M. J. Warren and T. B. Busuttil
  • Spyware / Thomas F. Stafford
  • Sustainable information society / Ralf Isenmann
  • Taxonomy of computer and information ethics / Sabah S. Al-Fedaghi
  • Tools for representing and processing narratives / Ephraim Nissan
  • Traditional knowledge and intellectual property / Ulia Popova-Gosart
  • Universal Internet access under an ethical lens / Alessandro Arbore.