Computing Ethics
- Length: 149 pages
- Edition: 1
- Language: English
- Publisher: Nova Science Publishers Inc
- Publication Date: 2021-03-11
- ISBN-10: 153619378X
- ISBN-13: 9781536193787
- Sales Rank: #0 (See Top 100 Books)
Ethics is an important basis for controlling and regulating human behaviour in all areas of life, including but not limited to dealing with other people at work. This book covers ethical issues related to the field of information technology and computing, and discusses some of the ethical issues from the perspective of the Arabic and Islamic cultures. The book concentrates on understanding the legal, ethical, and societal issues related to the field of information technology and computing without indulging into the implications of these issues on other fields, such as music or painting copyrights. The book is well suited for undergraduate and graduate students in colleges and universities in the Middle East and Islamic world. The book also provides an excellent foundation in ethical, legal and cultural decision-making for current and future professionals, practitioners and managers in the field of computer science and information technology. The book covers many fundamental and contemporary topics, including: Ethical theories, philosophy, responsibility and code of ethics; History of computing ethics and ethics for the computing professions; Professional ethics in Islam; Negative uses of computers and the Internet; Privacy, anonymity and position of Islam on privacy; Ethical issues related to software piracy and intellectual property; Supporting and opposing Islamic views on intellectual copyright; Ethical Issues related to globalisation; Ethicality of threats and violation to information security; Hackers, vandals, spyware and network security risks.
Contents Acknowledgement Preface Chapter 1 Introduction to Computing Ethics 1.1. Introduction to Ethics 1.1.1. The Concept of Professional Ethics 1.1.2. Legal and Ethical Responsibility 1.1.3. Code of Ethics 1.2. Computing Ethics 1.2.1. Definition of Computing Ethics 1.2.2. History of Computing Ethics 1.2.3. Ethical Theories and Philosophy 1.3. Role and Uses of Computers in Our Lives 1.4. Negative Uses of Computers and the Internet Chapter 2 Ethics for the Computing Professions 2.1. Professional Ethics 2.1.1. Definition of a Profession 2.1.2. Definition of Professional Ethics 2.2. Sources for Professional Ethics 2.2.1. Political Source 2.2.2. Social Source 2.2.3. Economic Source 2.2.4. Administrative and Organizational Source 2.3. Professional Ethics in Islam 2.4. Professional Ethics in Management 2.4.1. Relationship between Employees and Management 2.4.2. Relationship between Workers 2.4.3. Establishing Professional Ethics in an Organization 2.4.3.1. Establishing Professional Ethics in the Work Place 2.4.3.2. Means for Establishing Professional Ethics Developing Self-Censorship Positive Role Model Holding the Officers and Employees Accountable Continuous Evaluation of Employees 2.5. Professional Ethics in the Computing Field 2.5.1. Software and Applications Design and Development Team 2.5.1.1. Systems Analysts Required Characteristics of a Successful Systems Analyst 2.5.1.2. Systems Designers 2.5.1.3. Programmers and Developers 2.5.2. Professional and Ethical Responsibilities of Software Engineers 2.5.3. Professional Responsibilities of Network Engineers Professional Responsibilities of the Network Administrator Objectives of Network Management 2.5.4. Professional Responsibilities of Web Designers Chapter 3 Privacy and Anonymity 3.1. Privacy in the Computer World 3.1.1. Economic Impact of Privacy 3.1.2. Ethical Issues Related to Privacy 3.2. The Concept of Privacy 3.3. Invasion of Privacy 3.3.1. Invasion of Privacy of an Individual by another Individual Case 1 Case 2 3.3.2. Invasion of Privacy of an Individual by a Group Case 3 3.3.3. Invasion of Privacy of a Group by an Individual 3.3.4. Invasion of Privacy of a Group by another Group 3.3.5. Position of the Duty School on Privacy Case 4 Case 5 3.3.6. Position of Islam on Privacy Chapter 4 Intellectual Property 4.1. History of Intellectual Property Rights 4.2. Software Piracy and Intellectual Property 4.2.1. Islamic View on Intellectual Copyright 4.2.1.1. Position Supporting Intellectual Property 4.2.1.2. Position Opposing Intellectual Property 4.3. Ethical Issues Related to Software Piracy 4.3.1. Method for Software Piracy 4.3.2. Factors Affecting Software Piracy 4.3.3. Economic Impact of Software Piracy 4.3.4. Software Piracy Monitoring Organizations Chapter 5 Globalization 5.1. Computers and Globalization 5.1.1. The Concept of Globalization 5.1.1.1. Globalization in the International Perspective 5.1.1.2. Globalization in the Perspective of Removing Restrictions 5.1.1.3. Globalization in the Universal Perspective 5.1.1.4. Globalization in the Perspective of Westernization 5.1.1.5. Globalization in the Sense of Overcoming Geography 5.2. The Historical Background of Globalization 5.3. Economic Globalization and Virtual Societies 5.3.1. Virtual Societies and “Transnational Companies” 5.3.2. Movement of Individuals in Virtual Societies 5.3.3. Direct Foreign Investment 5.3.4. Economic Globalization and Poverty 5.3.5. Globalization and Unemployment 5.4. Cultural Globalization 5.5. Political Globalization 5.6. Ethical Issues Related to Globalization Chapter 6 Computer and Information Crimes 6.1. Introduction to Information Security 6.2. Ethicality of Threats and Violation to Information Security 6.3. Computer Viruses 6.3.1. Computer Semi-Viruses 6.3.2. Harm Caused by Computer Viruses 6.3.3. Symptoms of Viruses 6.3.4. Work Stages for Viruses 6.3.5. Methods of Spreading a Virus 6.3.6. Prevention of Viruses 6.3.7. Treatment of Viruses 6.4. Hackers and Vandals 6.4.1. The Concept of Hacking 6.4.1.1. Hacking Methods 6.4.1.2. Forms of Hacking 6.4.1.3. Systems Vulnerabilities 6.4.1.4. Motives for Hacking 6.5. Spyware 6.5.1. Methods of Infection with Spyware 6.5.2. Methods to Prevent Infection with Spyware 6.5.3. Factors of Hacking through Spyware 6.6. Network Security Risks 6.6.1. Network Hacking Vulnerabilities 6.6.2. Network Protection Programs 6.6.3. Tips for Passwords References About the Authors Index Blank Page
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.