000 | 02355nam a22002657a 4500 | ||
---|---|---|---|
003 | NULRC | ||
005 | 20250213150822.0 | ||
008 | 250213b ph ||||| |||| 00| 0 eng d | ||
020 | _a9783030039363 | ||
040 | _cNULRC | ||
050 | _aZ 5643.C65 .K59 2019 | ||
100 |
_aKizza, Joseph Migga _eauthor |
||
245 |
_aEthical and secure computing : _ba concise module / _cJoseph Migga Kizza |
||
250 | _aSecond Edition | ||
260 |
_aSwitzerland : _bSpringer, _cc2019. |
||
300 |
_axv, 285 pages ; _c24 cm. |
||
365 | _bUSD35.00 | ||
490 | _aUndergraduate Topics in Computer Science | ||
504 | _aIncludes bibliographical references and index. | ||
505 | _aMorality and the Law -- Ethics and Ethical Analysis -- Ethics and the Professions -- Anonymity, Security, Privacy, and Civil Liberties -- Intellectual Property Rights and Computer Technology -- Social Context of Computing -- Software Issues: Risks and Liabilities -- Computer Crimes -- Cyberbullying -- Artificial Intelligence, Virtualization, and Cyberspace -- Ethical, Privacy, and Security Issues in Social Network Ecosystems -- Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies. | ||
520 | _aThis updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties; examines intellectual property rights in the context of computing, including the risks and liabilities associated with software; discusses such key social issues in computingas the digital divide, employee monitoring in the workplace, and risks to physical and mental health; reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination; considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies; includes learning objectives, discussion questions and exercises throughout the book. | ||
650 | _aCOMPUTER SECURITY | ||
650 | _aAPPLICATION SOFTWARE | ||
942 |
_2lcc _cBK _n0 |
||
999 |
_c1894 _d1894 |