<p>In the last few years, the protection of computerised medical records, and of other personal health information, has become the subject of both technical research and political dispute in a number of countries. In Britain, the issue arose initially as an argument between the British MeΒ dical Ass
Encyclopedia of Information Ethics and Security
β Scribed by Marian Quigley
- Year
- 2007
- Tongue
- English
- Leaves
- 697
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Rapid technological advancement has given rise to new ethical dilemmas and security threats, while the development of appropriate ethical codes and security measures fail to keep pace, which makes the education of computer users and professionals crucial. The Encyclopedia of Information Ethics and Security is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool includes topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. This encyclopedia is a useful tool for students, academics, and professionals.
β¦ Table of Contents
Title Page......Page 2
List of Contributors......Page 5
Contents......Page 9
Preface......Page 14
Acknowledgment......Page 17
About the Editor......Page 18
3D Avatars and Collaborative Virtual
Environments......Page 20
Access Control for Healthcare......Page 26
Advertising in the Networked Environment......Page 34
Anonymous Peer-to-Peer Systems......Page 42
Argumentation and Computing......Page 49
Argumentation with Wigmore Charts and
Computing......Page 55
Artificial Intelligence Tools for Handling Legal
Evidence......Page 61
Barriers Facing African American Women in
Technology......Page 68
B-POS Secure Mobile Payment System......Page 74
Building Secure and Dependable Information
Systems......Page 81
Classifying Articles in Information Ethics and
Security......Page 87
Computational Ethics......Page 95
Computer Ethics and Intelligent Technologies......Page 102
Computer Worms, Detection, and Defense......Page 108
Conflicting Value of Digital Music Piracy......Page 115
Content Filtering Methods for Internet
Pornography......Page 121
Cyber-Terrorism in Australia......Page 127
Data Security and Chase......Page 133
Defending against Distributed Denial of
Service......Page 140
Digital Divide Implications and Trends......Page 149
Digital Rights Management Metadata and
Standards......Page 155
Dilemmas of Online Identity Theft......Page 162
Document Security in the Ancient World......Page 169
DRM Practices in the E-Publication Industry......Page 176
Educational Technology Practitioner-Research
Ethics......Page 183
E-Health and Ensuring Quality......Page 189
Electronic Signatures and Ethics......Page 198
Engineering Multi-Agent Systems......Page 206
Ethical Approach to Gathering Survey Data
Online......Page 213
Ethical Behaviour in Technology-Mediated
Communication......Page 220
Ethical Concerns in Computer Science Projects......Page 227
The Ethical Debate Surrounding RFID......Page 233
Ethical Dilemmas in Data Mining and
Warehousing......Page 240
Ethical Erosion at Enron......Page 248
Ethical Usability Testing with Children......Page 254
Ethics and Access to Technology for Persons
with Disabilities......Page 260
Ethics and Perceptions in Online Learning
Environments......Page 265
Ethics and Security under the
Sarbanes-Oxley Act......Page 273
Ethics Education for the Online Environment......Page 279
Ethics in Software Engineering......Page 285
Ethics in the Security of Organizational
Information Systems......Page 292
Ethics of AI......Page 298
Fair Use......Page 304
Federal Information Security Law......Page 310
Formulating a Code of Cyberethics for a
Municipality......Page 316
Hackers and Cyber Terrorists......Page 323
Homo Electricus and the Continued
Speciation of Humans......Page 331
IT Security Culture Transition Process......Page 338
ICT Leapfrogging Policy and Development in
the Third World......Page 345
Identity Verification using Resting State Brain
Signals......Page 354
Individual and Institutional Responses to Staff
Plagiarism......Page 361
Information Ethics as Ideology......Page 367
Information Ethics from an Islamic Perspective......Page 374
Information Security and the βPrivacy Brokerβ......Page 381
Information Security Policies for Networkable
Devices......Page 389
Information Security Policy Research Agenda......Page 396
Internet and Suicide......Page 403
Internet Piracy and Copyright Debates......Page 410
Internet Research Ethics Questions and
Considerations......Page 416
Interviews with Young People using Online
Chat......Page 422
Intrusion Detection and Information Security
Audits......Page 430
Investigation Strategy for the Small
Pedophiles World......Page 437
Managed Services and Changing Workplace
Ethics......Page 445
Managing the Environmental Impact of
Information Technology......Page 452
Measuring Ethical Reasoning of IT
Professionals and Students......Page 459
Meta View of Information Ethics......Page 464
Mitigation of Identity Theft in the Information
Age......Page 470
Mobile Agents and Security......Page 476
Modelling Context-Aware Security for
Electronic Health Records......Page 482
Moral Rights in the Australian Public Sector......Page 489
Multimodal Biometric System......Page 497
Objective Ethics for Managing Information
Technology......Page 505
Parental Rights to Monitor Internet Usage......Page 511
Patient Centric Healthcare Information
Systems in the U.S.......Page 517
Pedagogical Framework for Ethical
Development......Page 526
Personal Information Ethics......Page 532
Pharming Attack Designs......Page 539
Port Scans......Page 546
Privacy and Access to Electronic Health
Records......Page 553
Privacy and Online Data Collection......Page 561
Privacy in Data Mining Textbooks......Page 568
Protection of Mobile Agent Data......Page 575
Rule-Based Policies for Secured Defense
Meetings......Page 582
Secure Agent Roaming under M-Comme......Page 590
Secure Automated Clearing House
Transactions......Page 598
Security Dilemmas for Canadaβs New
Government......Page 604
Security Model for Educational Satellite
Networks......Page 613
Security of Communication and Quantum
Technology......Page 621
Security Protection for Critical Infrastructure......Page 628
Spyware......Page 635
Sustainable Information Society......Page 641
Taxonomy of Computer and Information
Ethics......Page 650
Tools for Representing and Processing
Narratives......Page 657
Traditional Knowledge and Intellectual
Property......Page 664
Universal Internet Access under an Ethical
Lens......Page 674
Key Term Index......Page 682
Index......Page 690
π SIMILAR VOLUMES
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as wel
Emphasizing the importance of ethics to electronic societies, fourteen chapters by an international panel of academics in information technology and business provide an overview of the growing field of information ethics and its intersection with information security. Chapters delve into topics incl
Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information processing and management technologies. As technology continues to advance, the need for strong responses to these challenges, well centered on reliable research, becomes increasingly cr