000 02355nam a22002657a 4500
003 NULRC
005 20250213150822.0
008 250213b ph ||||| |||| 00| 0 eng d
020 _a9783030039363
040 _cNULRC
050 _aZ 5643.C65 .K59 2019
100 _aKizza, Joseph Migga
_eauthor
245 _aEthical and secure computing :
_ba concise module /
_cJoseph Migga Kizza
250 _aSecond Edition
260 _aSwitzerland :
_bSpringer,
_cc2019.
300 _axv, 285 pages ;
_c24 cm.
365 _bUSD35.00
490 _aUndergraduate Topics in Computer Science
504 _aIncludes bibliographical references and index.
505 _aMorality and the Law -- Ethics and Ethical Analysis -- Ethics and the Professions -- Anonymity, Security, Privacy, and Civil Liberties -- Intellectual Property Rights and Computer Technology -- Social Context of Computing -- Software Issues: Risks and Liabilities -- Computer Crimes -- Cyberbullying -- Artificial Intelligence, Virtualization, and Cyberspace -- Ethical, Privacy, and Security Issues in Social Network Ecosystems -- Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies.
520 _aThis updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties; examines intellectual property rights in the context of computing, including the risks and liabilities associated with software; discusses such key social issues in computingas the digital divide, employee monitoring in the workplace, and risks to physical and mental health; reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination; considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies; includes learning objectives, discussion questions and exercises throughout the book.
650 _aCOMPUTER SECURITY
650 _aAPPLICATION SOFTWARE
942 _2lcc
_cBK
_n0
999 _c1894
_d1894