Encyclopedia of information ethics and security
This book is a reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics,...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2007.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- 3D avatars and collaborative virtual environments / Koon-Ying Raymond Li, James Sofraand, and Mark Power
- Access control for healthcare / Yifeng Shen
- Advertising in the networked environment / Savvas Papagiannidis and Michael Bourlakis
- Anonymous peer-to-peer systems / Wenbing Zhao
- Argumentation and computing / Ephraim Nissan
- Argumentation with Wigmore charts and computing / Ephraim Nissan
- Artificial intelligence tools for handling legal evidence / Ephraim Nissan
- Barriers facing African American women in technology / Jianxia Du, George H. Pate,
- Deneen Sherrod, and Wei-Chieh Yu
- B-POS secure mobile payment system / Antonio Grillo, Alessandro Lentini, and Gianluigi Me
- Building secure and dependable information systems / Wenbing Zhao
- Classifying articles in information ethics and security / Zack Jourdan, R. Kelly Rainer Jr., and Thomas E. Marshall
- Computational ethics / Alicia I. Ruvinsky
- Computer ethics and intelligent technologies / Yefim Kats
- Computer worms, detection, and defense / Robert J. Cole and Chao-Hsien Chu
- Conflicting value of digital music piracy / Matthew Butler
- Content filtering methods for Internet pornography / Jengchung V. Chen and ShaoYu F. Huang
- Cyber-Terrorism in Australia / Christopher Beggs
- Data security and chase / Zbigniew W. Ras and Seunghyun Im
- Defending against distributed denial of service / Yang Xiang and Wanlei Zhou
- Digital divide implications and trends / Irene Chen and Terry T. Kidd
- Digital rights management metadata and standards / Jo Anne Cote and Eun G. Park
- Dilemmas of online identity theft / Omer Mahmood
- Document security in the ancient world / Christopher H. Walker
- DRM practices in the e-publication industry / Bong Wee Kiau and Norshuhada Shiratuddin
- Educational technology practitioner-research ethics / Kathleen Gray
- E-health and ensuring quality / Prajesh Chhanabhai and Alec Holt
- Electronic signatures and ethics / A. Srivastava and S. B. Thomson
- Engineering multi-agent systems / Tagelsir Mohamed Gasmelseid
- Ethical approach to gathering survey data online / Sophie Nichol and Kathy Blashki
- Ethical behaviour in technology-mediated communication / Sutirtha Chatterjee
- Ethical concerns in computer science projects / Alistair Irons and Roger Boyle
- Ethical debate surrounding RFID The / Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero, Susan J. Nestor, and Keith LeDonne
- Ethical dilemmas in data mining and warehousing / Joseph A. Cazier and Ryan C. LaBrie
- Ethical erosion at Enron / John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee
- Ethical usability testing with children / Kirsten Ellis and Marian Quigley
- Ethics and access to technology for persons with disabilities / Belinda Davis Lazarus
- Ethics and perceptions in online learning environments / Michelle M. Ramim
- Ethics and security under the Sarbanes-Oxley Act / Thomas J. Tribunella and Heidi R. Tribunella
- Ethics education for the online environment / Lori N. K. Leonard and Tracy S. Manly
- Ethics in software engineering / Pankaj Kamthan
- Ethics in the security of organizational information systems / Sushma Mishra and Amita Goyal Chin
- Ethics of AI / Kevin B. Korb
- Fair use / Pasi Tyrväskylä
- Federal information security law / Michael J. Chapple and Charles R. Crowell
- Formulating a code of cyberethics for a municipality / Udo Richard Averweg
- Hackers and Cyber Terrorists / M. J. Warren
- Homo electricus and the continued speciation of humans / Katina Michael and M. G. Michael
- IT security culture transition process / Leanne Ngo
- ICT leapfrogging policy and development in the third world / Amanda Third and Kai-Ti Kao
- Identity verification using resting state brain signals / Ramaswamy Palaniappan and Lalit M. Patnaik
- Individual and institutional responses to staff plagiarism / Carmel McNaught
- Information ethics as ideology / Bernd Carsten Stahl
- Information ethics from an Islamic perspective / Salam Abdallah
- Information security and the "Privacy Broker" / Michael Douma and Eduard J. Gamito
- Information security policies for networkable devices / Julia Kotlarsky, Ilan Oshri, and Corey Hirsch
- Information security policy research agenda / Heather Fulford and Neil Doherty
- Internet and suicide / Dianne Currier
- Internet piracy and copyright debates / Paul Sugden
- Internet research ethics questions and considerations / Elizabeth Buchanan
- Interviews with young people using online chat / Elza Dunkels and AnnBritt Enochsson
- Intrusion detection and information security audits / Terry T. Kidd and Robert K. Hiltbrand
- Investigation Strategy for the Small Pedophiles World / Gianluigi Me
- Managed services and changing workplace ethics / Alan Sixsmith
- Managing the environmental impact of information technology / Laurel Evelyn Dyson
- Measuring ethical reasoning of IT professionals and students / Mohammad Abdolmohammadi and Jane Fedorowicz
- Meta view of information ethics / Charles R. Crowell and Robert N. Barger
- Mitigation of identity theft in the information age / Reggie Becker, Mark B. Schmidt, and Allen C. Johnston
- Mobile agents and security / Fei Xue
- Modelling context-aware security for electronic health records / Pravin Shetty and Seng Loke
- Moral rights in the Australian public sector / Lynley Hocking
- Multimodal biometric system / Ajita Rattani, Hunny Mehrotra, and Phalguni Gupta
- Objective ethics for managing information technology / John R. Drake
- Parental rights to monitor Internet usage / Benjamin J. Halpert
- Patient centric healthcare information systems in the U.S. / Nilmini Wickramasinghe
- Pedagogical framework for ethical development / Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, and Nathan Harter
- Personal information ethics / Sabah S. Al-Fedaghi
- Pharming attack designs / Manish Gupta and Raj Sharman
- Port Scans / Jalal Kawash
- Privacy and access to electronic health records / Dick Whiddett, Inga Hunter, Judith Engelbrecht, and Jocelyn Handy
- Privacy and online data collection / Călin Gurău
- Privacy in data mining textbooks / James Lawler and John C. Molluzzo
- Protection of mobile agent data / Sheng-Uei Guan
- Rule-based policies for secured defense meetings / Pravin Shetty and Seng Loke
- Secure agent roaming under m-commerce / Sheng-Uei Guan
- Secure automated clearing house transactions / Jan Skalicky Hanson and Mark B. Schmidt
- Security dilemmas for Canada's new government / Jeffrey Roy
- Security model for educational satellite networks / Sanjay Jasola and Ramesh C. Sharma
- Security of communication and quantum technology / Gregory Paperin
- Security protection for critical infrastructure / M. J. Warren and T. B. Busuttil
- Spyware / Thomas F. Stafford
- Sustainable information society / Ralf Isenmann
- Taxonomy of computer and information ethics / Sabah S. Al-Fedaghi
- Tools for representing and processing narratives / Ephraim Nissan
- Traditional knowledge and intellectual property / Ulia Popova-Gosart
- Universal Internet access under an ethical lens / Alessandro Arbore.