𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Ethics in Information Technology: A Practical Guide (Cognitive Approaches in Cloud and Edge Computing.)

✍ Scribed by G. K. Awari, Sarvesh V. Warjurkar


Publisher
CRC Press
Year
2022
Tongue
English
Leaves
237
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This reference text introduces concepts of computer and Internet crime, ethics in information technology, and privacy techniques.

It comprehensively covers important topics including ethical consideration in decision making, security attacks, identification of theft, strategies for consumer profiling, types of intellectual property rights, issues related to intellectual property, process and product quality, software quality assurance techniques, elements of an ethical organization, telemedicine, and electronic health records.

This book will serve as a useful text for senior undergraduate and graduate students in interdisciplinary areas including computer science, information technology, electronics and communications engineering, and electrical engineering.

✦ Table of Contents


Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents
Foreword
Preface
Acknowledgements
Authors
Chapter 1 An Overview of Ethics
1.1 Definition of Ethics
1.2 Ethics in Business World
1.2.1 Corporate Social Responsibility
1.2.2 Reasons for Good Business Ethics
1.3 Ethical Consideration in Decision Making
1.3.1 Develop a Problem Statement
1.3.2 Identify Alternatives
1.3.3 Evaluate and Choose an Alternative
1.3.4 Implement Decision
1.3.5 Evaluate Results
1.3.5.1 The Ethical System’s Nature and Problems
1.4 Difference between Morals, Ethics, and Laws
1.5 Necessity of Ethics in Information Technology
1.6 Ethics for IT Professionals
1.6.1 Professionals
1.6.2 Professional Code of Ethics
1.6.2.1 Client Sophistication
1.6.2.2 Governance
1.6.2.3 Interconnectedness
1.6.2.4 Discretion
1.6.2.5 Modularization
1.6.2.6 Globalization
1.6.2.7 Commoditization
1.7 Professional Relationships
1.7.1 Relationship between IT Workers and Employers
1.7.2 Relationship between IT Workers and Clients
1.7.3 Relationship between IT Workers and Suppliers
1.7.4 Relationships between IT Workers and Other Professionals
1.7.5 Relationship between IT Workers and Users
1.7.6 Relationship between IT Workers and Society
1.8 Information Technology Professional Malpractices
1.9 Common Ethical Issues for IT Users
1.9.1 Software Privacy
1.9.2 Inappropriate Use of Computing Resources
1.9.3 Inappropriate Sharing of Information
1.10 Certification
1.10.1 Vendors Certification
1.10.2 Industry Association Certification
Review Questions
Multiple Choice Questions ( MCQs)
Answers to MCQs
Chapter 2 Computer and Internet Crime
2.1 Introduction to Cybercrime
2.2 Computer User Expectations
2.3 Expanding and Changing System
2.4 Increased Reliance on Commercial Software
2.5 Security Attacks
2.5.1 Viruses
2.5.2 Worms
2.5.3 Trojan Horse
2.5.4 Botnet
2.5.5 DDoS Attack
2.5.6 Rootkit
2.5.7 Spam
2.5.7.1 Spam’s Different Types
2.5.8 Phishing
2.5.8.1 Techniques Used in Phishing
2.6 Primary Perpetrators
2.6.1 Hackers and Crackers
2.6.1.1 Hackers
2.6.1.2 Crackers
2.6.2 Malicious Insiders
2.6.3 Industrial Spies
2.6.3.1 How to Prevent Industrial Espionage
2.6.4 Cybercriminals
2.6.4.1 Cyber Terrorists and Hacktivists
2.6.5 Cyber Terrorists
2.7 Industrial Spies and Competitive Intelligence
2.8 Cybercriminals
2.9 Cyber Terrorists
2.10 Risk Assessment
2.11 Trustworthy Computing
Review Questions
Multiple Choice Questions (MCQs)
Answers to MCQs
Chapter 3 Organization Privacy
3.1 Introduction to Cyber Security
3.2 Global Cyber Security and Related Laws in the United States
3.3 Corporate Cyber Security Preparedness
3.4 Future of Cyber Laws
3.5 Identification of Theft
3.5.1 Data Breaches
3.5.2 Purchase Personal Information from Criminals
3.5.3 Phishing
3.5.4 Spyware
3.5.5 Identify Theft-Monitoring Services
3.6 Anonymity on Internet
3.7 Defamation
3.8 Hate Speech
3.9 Workplace Monitoring
3.10 Strategies for Consumer Profiling
3.10.1 Aggregating Consumer Data
3.10.2 Collecting Data from Website Visits
3.10.3 Personalization Software
3.10.4 Consumer Data Privacy
3.10.4.1 General Data Protection Regulation
3.11 Electronic Discovery
3.12 Children’s Internet Protection Act
3.13 Internet Filtering
3.14 Advance Surveillance Technology
3.14.1 Camera Surveillance
3.14.2 GPS Chips
3.15 Legal Developments in Cyber Laws
3.16 Federal Trade Commission Act Section 5
3.17 Public Concerns about Security
3.18 Preventive Measures to Avoid Spear Phishing Attacks
Review Questions
Multiple Choice Questions (MCQs)
Answers to MCQs
Chapter 4 Intellectual Property
4.1 Introduction to Intellectual Property
4.1.1 Block Diagram of IPR
4.1.2 Process Flow Chart of Patent Prosecution
4.2 Intellectual Property Rights
4.3 Types of IPR
4.3.1 Patents
4.3.2 Trademarks
4.3.3 Copyrights and Related Rights
4.3.4 Geographical Indications
4.3.5 Industrial Designs
4.3.6 Trade Secrets
4.3.7 Layout Design for Integrated Circuits
4.3.7.1 Layout-Design Register Ability
4.3.7.2 Security Timeframe
4.3.7.3 Layout-Design Infringement
4.3.8 Projection of New Plant Variety
4.4 Enforcing IP Rights in the United States and India
4.5 Self-Help Considerations
4.6 Key Issues Related to IP
4.6.1 Plagiarism
4.6.2 Reverse Engineering
4.6.3 Open Source Code
4.6.4 Competitive Intelligence
4.6.5 Trademark Infringement
4.6.6 Cyber Squatting
4.6.6.1 Recognizing the Signs of Cyber Squatting
4.7 Capability Maturity Model Integration
4.8 General Agreement on Tariffs and Trade
4.9 The WTO–TRIPS Agreement 1994
4.10 The WIPO Copyright
4.11 The Global Digital Millennium Copyright Act 1998
4.12 The PRO-IP Act of 2008
4.13 Essential Components of Software Development Methodology
4.14 Software Testing
4.15 Process and Product Quality
4.15.1 Quality Assurance and Standards
4.15.2 Quality Planning
4.15.3 Quality Control
4.16 Software Quality and Assurance Techniques
Review Questions
Multiple Choice Questions (MCQs)
Answers to MCQs
Chapter 5 Ethics of IT Organization
5.1 Introduction to Ethics of IT Organization
5.1.1 Rules and Laws of IT Organizations in the United States
5.1.2 Rules and Laws of IT Organizations in Other Countries
5.2 Element of an Ethical Organization
5.2.1 Respect
5.2.2 Honor
5.2.3 Integrity
5.2.4 Consumer Focus
5.2.5 Result-Oriented
5.2.6 Risk Taking
5.2.7 Passion
5.2.8 Persistence
5.3 Need of Traditional and Nontraditional Workers in Organizations
5.4 Gaining Visibility and Standardization
5.5 Contingent Worker
5.5.1 Rights of Contingent Workers in the IT Industry at Global Level
5.5.2 Pros and Cons of Contingent Workers
5.5.3 Differences between Contingent Workers and Employees
5.6 Recruitment of Contingent Workers
5.6.1 Flexibility
5.6.2 Cost
5.6.3 Timeliness
5.6.4 Specialization
5.6.5 Recruiting Opportunity
5.7 H-1B Workers
5.7.1 H-1B Visa Application Process
5.7.2 Potential Exploitation of H-1B Process
5.7.2.1 Benefitsof H-1B Visa for International Employees
5.7.2.2 Requirements in General
5.7.2.3 Residency Period
5.7.2.4 Adaptability
5.7.2.5 Dependents and Partners
5.7.2.6 Dual Purpose
5.7.2.7 Employers in the United States Benefit from the H-1B Visa
5.7.2.8 Local Labor Shortages Must Be Tackled
5.7.2.9 Competitiveness in the Global Market
5.8 Whistle Blowing
5.8.1 Employers Responsibilities to Whistle Blowing
5.8.2 Whistle-Blowing Process
5.9 Outsourcing
5.10 Information and Communications Technology Code of Conduct
Review Questions
Multiple Choice Questions ( MCQs)
Answers to MCQs
Chapter 6 Impact of IT on Quality of Life
6.1 Introduction to Impact of IT on Quality of Life
6.2 Impact of IT on the Standard of Living and Productivity
6.3 Digital Divide
6.4 Factors Attributing to Digital Divide
6.4.1 Education
6.4.2 Income
6.4.3 Race
6.4.4 Overcoming the Digital Divide
6.5 Universal Access
6.6 Impact of IT on Healthcare Costs
6.6.1 Digitization in Health Records
6.7 Big Data and Cloud
6.7.1 Introduction to Cloud Computing
6.8 Information and Communication Technology
6.9 Telemedicine
6.10 Mobility
6.11 Electronic Health Records
6.11.1 Benefits of EHRs
6.11.2 Use of Mobile and Wireless Technology to Improve EHR Industry
6.12 Telehealth
6.13 Medical Information Websites for Lay People
Review Questions
Multiple Choice Questions (MCQs)
Answers to MCQs
Chapter 7 Case Studies
7.1 Security Breach
7.1.1 Examples of a Security Breach
7.1.2 Types of Security Breaches
7.1.3 Security Breach Investigation at IT NetworkZ, Nagpur
7.1.4 Preventive Measures to Be Taken to AvoidΒ Security Breach Incidences
7.1.5 Conclusions
7.2 Data Breach
7.2.1 Protecting the Organization from DataΒ BreachΒ Occurrences
7.2.2 Conclusions
7.3 Extortion of Money
7.3.1 Incidence Reported by Cyber Police Station, Nagpur City, MS
7.3.2 Conclusions
Index


πŸ“œ SIMILAR VOLUMES


Ethics in Information Technology: A Prac
✍ G. K. Awari, Sarvesh V. Warjurkar πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English

<p><span>This reference text introduces concepts of computer and Internet crime, ethics in information technology, and privacy techniques.</span></p><p><span>It comprehensively covers important topics including ethical consideration in decision making, security attacks, identification of theft, stra

The Cognitive Approach in Cloud Computin
✍ Dinesh Peter (editor), Amir H Alavi (editor), Bahman Javadi (editor), Steven L. πŸ“‚ Library πŸ“… 2020 πŸ› Academic Press 🌐 English

<p><i>The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems</i> discusses the recent, rapid development of Internet of things (IoT) and its focus on research in smart cities, especially on surveillance tracking systems in which computing devi

Cloud Computing in Libraries: Concepts,
✍ Mayank Yuvaraj πŸ“‚ Library πŸ“… 2020 πŸ› De Gruyter Saur 🌐 English

<p>Cloud computing is a model where computing resources (processors, storage, software) are offered as a utility from an indistinct location and boundaries to the user. Adoption of Cloud computing in recent years has gained momentum within various avenues round the globe due to its characteristics l

Cloud Computing in Libraries: Concepts,
✍ Mayank Yuvaraj πŸ“‚ Library πŸ“… 2020 πŸ› De Gruyter Saur 🌐 English

<p>Cloud computing is a model where computing resources (processors, storage, software) are offered as a utility from an indistinct location and boundaries to the user. Adoption of Cloud computing in recent years has gained momentum within various avenues round the globe due to its characteristics l

Smart Grid Technology: A Cloud Computing
✍ Sudip Misra, Samaresh Bera πŸ“‚ Library πŸ“… 2018 πŸ› Cambridge University Press 🌐 English

This comprehensive text covers fundamental concepts of smart grid technologies, integrating the tools and techniques of cloud computing and data management for application in smart grids. Different cloud and data management approaches are explained, highlighting energy management, information manage