Local cover image
Local cover image
Custom cover image
Custom cover image

Computer ethics / William "Bo" John Brinkman II, Alton "Al" F. Sanders.

By: Contributor(s): Material type: TextPublication details: Pasig City : Cengage Learning Asia Private Limited (Philippine branch), c2012.Edition: Phiippine editionDescription: xiv, 274 pages : illustrations ; 23 cmISBN:
  • 9781285115382 (Reprint)
  • 1285115384
Subject(s): LOC classification:
  • CIR QA 76.9.M65 B75 2012
Contents:
Preface xi Critical Reasoning and Moral Theory 1 Computing Professions and Professional Ethics 44 Intellectual and Intangible Property 104 Trust, Safety and Reliability 150 How Computing is Changing Who We Are 195 Computing and Vulnerable Groups 275 Autonomous and Pervasive Technology 309
Summary: "This book is intended to be used in one-semester undergraduate course on computer ethics. This book has nine chapters. Some chapters (1, 2 and 6) are organized around a particular branch of theory that is helpful for ethical decision makers in computing. Each of the others are organized around a central theme (such a provacy or safety). Chapter 1 introduces the fundamentals of moral and ethical reasoning that will be used in the rest of the text. The chapter covers the moral theories most useful for practical reasoning. Chapter 2 introduces professional ethics and professional codes of ethics, which necessarily requires some discussion of professions and professionalism. Chapter 3 examines the nature of intellectual and intangible property. Chapter 4 looks at the many ways people place their trust in computers and explores when such trust is justified. The chapter includes numerous real cases involving negative consequences of computer failures. The chapter explains the difficulties of preventing such failures and what can be done to mitigate the risks. Chapter 5 explores the ways computers and other modern technology change us. Computers affect our safety, our privacy, our communication, capabilities , our access to information and many other aspects of our lives. Chapter 6 looks at how computing technologies affect vulnerable groups in modern society, such as children and the physicallt disabled. Chapter 7 addresses the ubiquity of computers. It explores the ways they are becoming more and more a part of our lives, not only as tools employed by humans, but sometimes as substitutes for humans, or for some part of a human." - - From the Book
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Book Cavite State University - CCAT Campus Book GCS CIR QA 76.9.M65 B75 2012 (Browse shelf(Opens below)) c.1 Available R0011009
Book Cavite State University - CCAT Campus Book GCS CIR QA 76.9.M65 B75 2012 (Browse shelf(Opens below)) c.2 Available R0011010

Browsing Cavite State University - CCAT Campus shelves,Shelving location: GCS,Collection: Book Close shelf browser (Hides shelf browser)

Reprint. Originally published.

Singapore : Cengage Learning Asia Private Limited, 2012.

Includes bibliographical references.

Preface xi Critical Reasoning and Moral Theory 1 Computing Professions and Professional Ethics 44 Intellectual and Intangible Property 104 Trust, Safety and Reliability 150 How Computing is Changing Who We Are 195 Computing and Vulnerable Groups 275 Autonomous and Pervasive Technology 309

"This book is intended to be used in one-semester undergraduate course on computer ethics. This book has nine chapters. Some chapters (1, 2 and 6) are organized around a particular branch of theory that is helpful for ethical decision makers in computing. Each of the others are organized around a central theme (such a provacy or safety). Chapter 1 introduces the fundamentals of moral and ethical reasoning that will be used in the rest of the text. The chapter covers the moral theories most useful for practical reasoning. Chapter 2 introduces professional ethics and professional codes of ethics, which necessarily requires some discussion of professions and professionalism. Chapter 3 examines the nature of intellectual and intangible property. Chapter 4 looks at the many ways people place their trust in computers and explores when such trust is justified. The chapter includes numerous real cases involving negative consequences of computer failures. The chapter explains the difficulties of preventing such failures and what can be done to mitigate the risks. Chapter 5 explores the ways computers and other modern technology change us. Computers affect our safety, our privacy, our communication, capabilities , our access to information and many other aspects of our lives. Chapter 6 looks at how computing technologies affect vulnerable groups in modern society, such as children and the physicallt disabled. Chapter 7 addresses the ubiquity of computers. It explores the ways they are becoming more and more a part of our lives, not only as tools employed by humans, but sometimes as substitutes for humans, or for some part of a human." - - From the Book

In English text.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image