Description
Ethics in a Computing Culture by William John Brinkman EBOOK PDF Instant Download
Table of Contents
Brief Contents
Contents
Preface
Ch 1: Critical Reasoning and Moral Theory
1.1 Case: Borrowing a Password
1.2 Case: Warning or Ticket?
1.3 Morality and Ethics
1.5 Ethical Reasoning
Summary
Chapter Exercises
Works Cited
Related Readings
Ch 2: Computing Professions and Professional Ethics
2.1 Case: Fighting Injustice
2.2 Case: Refusing to Do a Favor for a Friend
2.3 Professions and Codes
2.4 Ethical Standards
2.5 Professionalism and the Law
2.6 Case: Going into Business
2.7 Multicultural Perspective: The New Zealand Computer Society’s Code of Professional Conduct
Summary
Chapter Exercises
Works Cited
Related Readings
Ch 3: Privacy
3.1 Case: Security Class
3.2 Case: Michael’s Essay
3.3 Theories and Conceptions of Privacy
3.4 Privacy in Practice and in the Law
3.5 Multicultural Perspectives
3.6 Interdisciplinary Topic: Panopticism
3.7 Case: Camera Phone Predator Alert Act
3.8 Case: The Texas Infant DNA Database
3.9 Case: Lower Merion School District
Summary
Chapter Exercises
Works Cited
Related Readings
Ch 4: Intellectual and Intangible Property
4.1 Case: Sony BMG Antipiracy Rootkit
4.2 Case: Virtual Investment Fraud
4.3 Intellectual Property Law in the United States
4.4 Virtual Goods
4.5 Complications Surrounding Intangible Property
4.6 Intellectual Property Protection for Software
4.7 Multicultural Perspectives
4.8 Interdisciplinary Topics
4.9 Philosophical Foundations of Intangible Property Law
Summary
Chapter Exercises
Works Cited
Related Readings
Ch 5: Trust, Safety, and Reliability
5.1 Causes of Computer Failure
5.2 Case: Ariane 5 Flight 501
5.3 Case: Pentium Floating Point Divide
5.4 Case: Why Software Fails
5.5 Bugs and Public Safety
5.6 Case: A&P’s Cash Register Scandal
5.7 Malware
5.8 Public Trust
Summary
Chapter Exercises
Works Cited
Related Readings
Ch 6: How Computing is Changing Who We Are
6.1 Case: Kratos and Poseidon’s Princess
6.2 Case: Virtual Two-Timing
6.3 The Internet and the Self
6.4 Interdisciplinary Topics: Social Network Analysis
6.5 How the Internet Changes How We Know
6.6 Diverse Perspectives: Race in Video Games
6.7 Interdisciplinary Topic: Understanding Media
6.8 Our Cybernetic Future
Summary
Chapter Exercises
Works Cited
Related Readings
Ch 7: Democracy, Freedom of Speech, and Freedom of the Press
7.1 Understanding the First Amendment
7.2 Case: New York Times v. Sullivan
7.3 Case: WikiLeaks
7.4 Case: DeCSS
7.5 Foundations of Free Speech
7.6 Case: Interactive Course for Terrorist Training
7.7 Protection of Children
7.8 State Mandated Censorship
7.9 Private Censorship and the First Amendment
Summary
Chapter Exercises
Works Cited
Related Readings
Ch 8: Computing and Vulnerable Groups
8.1 Why Pay Special Attention to Vulnerable Groups?
8.2 The Threat Analysis Method
8.3 Persons Subject to Institutional Control
8.4 People with Impaired, or Legally Limited, Decision-Making Abilities
8.5 People with Physical Limitations or Frailties
8.6 People with Insufficient Resources
8.7 Members of Minority Groups
Summary
Chapter Exercises
Works Cited
Related Readings
Ch 9: Autonomous and Pervasive Technology
9.1 Case: Pervasiveness of Camera Phones
9.2 Case: Injured by GPS
9.3 Case: More GPS, More Risks
9.4 More on the Definition of “Autonomous”
9.5 The Synergy of Autonomy and Pervasiveness
9.6 Who is Responsible for Autonomous Systems?
9.7 Diverse and Multicultural Perspectives
9.8 Inter-Disciplinary Topics
Summary
Chapter Exercises
Works Cited
Related Readings
Appendix A: ACM Code of Ethics and Professional Conduct
Appendix B: ACM/IEEE Software Engineering Code of Ethics and Professional Practice
Index