000 03145nam a22003017a 4500
003 OSt
005 20231024205347.0
008 210414b ||||| |||| 00| 0 eng d
020 _a9781285115382 (Reprint)
020 _a1285115384
040 _aCvSU-CCAT Campus Library.
_bEngish
_cCvSU-CCAT Campus Library.
_erda.
050 _aCIR QA 76.9.M65
_bB75 2012
100 _aBrinkman, II, William "Bo" John, author.
_92847
245 _aComputer ethics /
_cWilliam "Bo" John Brinkman II, Alton "Al" F. Sanders.
250 _aPhiippine edition.
260 _aPasig City :
_bCengage Learning Asia Private Limited (Philippine branch),
_cc2012.
300 _axiv, 274 pages :
_billustrations ;
_c23 cm
501 _aReprint. Originally published.
501 _aSingapore : Cengage Learning Asia Private Limited, 2012.
504 _aIncludes bibliographical references.
505 _aPreface xi Critical Reasoning and Moral Theory 1 Computing Professions and Professional Ethics 44 Intellectual and Intangible Property 104 Trust, Safety and Reliability 150 How Computing is Changing Who We Are 195 Computing and Vulnerable Groups 275 Autonomous and Pervasive Technology 309
520 _a"This book is intended to be used in one-semester undergraduate course on computer ethics. This book has nine chapters. Some chapters (1, 2 and 6) are organized around a particular branch of theory that is helpful for ethical decision makers in computing. Each of the others are organized around a central theme (such a provacy or safety). Chapter 1 introduces the fundamentals of moral and ethical reasoning that will be used in the rest of the text. The chapter covers the moral theories most useful for practical reasoning. Chapter 2 introduces professional ethics and professional codes of ethics, which necessarily requires some discussion of professions and professionalism. Chapter 3 examines the nature of intellectual and intangible property. Chapter 4 looks at the many ways people place their trust in computers and explores when such trust is justified. The chapter includes numerous real cases involving negative consequences of computer failures. The chapter explains the difficulties of preventing such failures and what can be done to mitigate the risks. Chapter 5 explores the ways computers and other modern technology change us. Computers affect our safety, our privacy, our communication, capabilities , our access to information and many other aspects of our lives. Chapter 6 looks at how computing technologies affect vulnerable groups in modern society, such as children and the physicallt disabled. Chapter 7 addresses the ubiquity of computers. It explores the ways they are becoming more and more a part of our lives, not only as tools employed by humans, but sometimes as substitutes for humans, or for some part of a human." - - From the Book
546 _aIn English text.
650 _aEthics
_vInformation technology aspect.
_92848
700 _aSanders, Alton "Al" F., author.
_92849
942 _cBK
_ePhilippine edition.
_hQA 76.9.M65 B75 2012
_kCIR
_2lcc
999 _c969
_d969