FREE SHIPPINGON EVERY ORDER!
Information technology professionals must not only have a strong understanding of the latest technology, but they also need to be grounded in ethics. The third edition provides them with the information they need to succeed in the field. Each chapter is updated with new case studies and scenarios to provide the most current information. Review and discussion questions are included to reinforce key concepts.
The in text citations and references are revised to offer additional resources. Updated material is also presented on online communities and democracy, globalization and job outsourcing, security for wireless networking, and international cybercrime legislation. This enables information technology professionals to apply the concepts with a focus on ethics.
"Herman Tavani has written an excellent introduction to the field of cyberethics ,that is extraordinarily comprehensive and up to date ,We need a good book in cyberethics to deal with the present and prepare us for an uncertain future. Tavani's Ethics and Technology is such a book." - from the Foreword by James H. Moor, Dartmouth College
The new edition of this respected text continues to provide students the information they need to fully grasp the complex issues in cyberethics that computer and noncomputer professionals alike need to navigate the challenging waters of cyberspace. Each chapter is updated with new examples and scenarios to provide the most current information.
New Issues examined in this edition include ethical implications of controversies involving:
-Blogs and the 'blogosphere";
-Web mining and personal privacy, including the Facebook Beacon controversy;
-Cyberbullying on social networking services (SNSs);
-"Sexting" incidents involving teenagers vis-à-vis current child pornography laws;
-Violence and pornography in massively multiplayer online role-playing games (MMORPGs), including World of Warcraft and Second Life;
-Virtual economies and "gold farming" in virtual worlds;
-Cyberespionage activities carried out by governments and state-sponsored organizations;
-"Certified Ethical Hackers" who carry out pre-emptive counter hacking activities on the part of organizations that hire them.
Updated material is also presented on ethical controversies affecting P2P file sharing sites, DRM systems, employee monitoring, spam and phishing, and cyberterrorism and information warfare. In addition to review and discussion questions that reinforce key concepts, newly constructed Essay Presentation questions are included in each chapter to provide instructors and students with additional resources for in class group projects and outside class assignments.