Computer ethics / William "Bo" John Brinkman II, Alton "Al" F. Sanders.
Material type:
TextPublication details: Pasig City : Cengage Learning Asia Private Limited (Philippine branch), c2012.Edition: Phiippine editionDescription: xiv, 274 pages : illustrations ; 23 cmISBN: - 9781285115382 (Reprint)
- 1285115384
- CIR QA 76.9.M65 B75 2012
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Book
|
Cavite State University - CCAT Campus | Book | GCS | CIR QA 76.9.M65 B75 2012 (Browse shelf(Opens below)) | c.1 | Available | R0011009 | |||||||||||
Book
|
Cavite State University - CCAT Campus | Book | GCS | CIR QA 76.9.M65 B75 2012 (Browse shelf(Opens below)) | c.2 | Available | R0011010 |
Browsing Cavite State University - CCAT Campus shelves,Shelving location: GCS,Collection: Book Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
|
||
| CIR QA 76.9.D37 A56 2020 Jumpstart Snowflake : a step-by-step guide to modern cloud analytics / | CIR QA 76.9.F48 P33 2007 Adobe Acrobat 8 PDF bible / | CIR QA 76.9.M65 B75 2012 Computer ethics / | CIR QA 76.9.M65 B75 2012 Computer ethics / | CIR QA 76.9.M65 H35 2002 CyberEthics / | CIR QA 76.9.S88 K46 2001 Systems analysis and design / | CIR QA 76.9.S88 W48 2004 Systems analysis and design methods / |
Reprint. Originally published.
Singapore : Cengage Learning Asia Private Limited, 2012.
Includes bibliographical references.
Preface xi Critical Reasoning and Moral Theory 1 Computing Professions and Professional Ethics 44 Intellectual and Intangible Property 104 Trust, Safety and Reliability 150 How Computing is Changing Who We Are 195 Computing and Vulnerable Groups 275 Autonomous and Pervasive Technology 309
"This book is intended to be used in one-semester undergraduate course on computer ethics. This book has nine chapters. Some chapters (1, 2 and 6) are organized around a particular branch of theory that is helpful for ethical decision makers in computing. Each of the others are organized around a central theme (such a provacy or safety). Chapter 1 introduces the fundamentals of moral and ethical reasoning that will be used in the rest of the text. The chapter covers the moral theories most useful for practical reasoning. Chapter 2 introduces professional ethics and professional codes of ethics, which necessarily requires some discussion of professions and professionalism. Chapter 3 examines the nature of intellectual and intangible property. Chapter 4 looks at the many ways people place their trust in computers and explores when such trust is justified. The chapter includes numerous real cases involving negative consequences of computer failures. The chapter explains the difficulties of preventing such failures and what can be done to mitigate the risks. Chapter 5 explores the ways computers and other modern technology change us. Computers affect our safety, our privacy, our communication, capabilities , our access to information and many other aspects of our lives. Chapter 6 looks at how computing technologies affect vulnerable groups in modern society, such as children and the physicallt disabled. Chapter 7 addresses the ubiquity of computers. It explores the ways they are becoming more and more a part of our lives, not only as tools employed by humans, but sometimes as substitutes for humans, or for some part of a human." - - From the Book
In English text.
There are no comments on this title.
