Ethics in information technology / George W. Reynolds
Material type:

Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | National University - Manila | CCIT | General Circulation | GC HC 79 .R49 2015 (Browse shelf (Opens below)) | c.1 | Checked out | 10/22/2024 | NULIB000013781 |
Includes bibliographical references and index.
1. An overview of ethics -- Cisco Chairman and CEO advocates ethical behavior -- Importance of integrity -- Difference between morals, ethics, and laws -- Ethics in the business world -- Corporate social responsibility -- Creating an ethical work environment -- Ethical considerations in decision making -- Ethics in information technology -- 2. Ethics for IT workers and IT users -- IT professionals -- Professional code of ethics -- Professional organizations -- Government licensing -- IT professional malpractice -- IT users -- Compliance -- 3. Computer and internet crime -- The Reveton Ransomware attacks -- IT security incidents -- Federal laws for prosecuting computer attacks -- Implementing trustworthy computing -- 4. Privacy -- National Security Agency (NSA) -- Privacy protection and the law -- Information privacy -- Privacy laws, applications, and court rulings -- Key privacy and anonymity issues -- Data breaches -- Electronic discovery -- Consumer profiling -- Workplace monitoring -- Advanced surveillance technology -- 5. Freedom of expression -- Reputation Changer : online reputation management company -- First Amendment rights -- Obscene speech -- Defamation -- Freedom of expression -- Controlling access to information on the Internet -- Strategic Lawsuit Against Public Participation (SLAPP) -- Anonymity on the Internet -- Hate speech -- Pornography -- 6. Intellectual property -- Copyrights -- Fair use doctrine -- Software copyright protection -- The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 -- General Agreement on Tariffs and Trade (GATT) -- The WTO and the WTO TRIPS Agreement (1994) -- The World Intellectual Property Organization (WIOP) Copyright Treaty (1996) -- The Digital Millennium Copyright Act (1998) -- Patents -- Leahy-smith America Invents Act (2011) -- Software patents -- Cross-licensing agreements -- Trade secrets -- Trade secret laws -- Employees and trade secrets -- Key intellectual property issues -- Plagiarism -- Reverse engineering -- Open Source Code -- Competitive intelligence -- Trademark infringement -- Cybersquatting.
7. Software development -- Stock markets susceptible to software glitches -- Strategies for engineering quality software -- Software product liability -- Capability maturity model integration -- Key issues in software development -- Development of safety-critical systems -- Quality management standards -- 8. The impact of information technology on productivity and quality of life -- E-rate Program -- Impact of It on the standard of living and worker productivity -- Impact of IT on health care costs -- Electronic health records -- Telehealth -- Medial information web sites for laypeople -- 9. Social networking -- Wanelo -- Social networking web site -- Business applications of online social networking -- Social network advertising -- Social networks in the hiring process -- Social media to improve customer service -- Social shopping web sites -- Social networking ethical issues -- Cyberbullying -- Cyberstalking -- Encounters with sexual predators -- Uploading of inappropriate material -- Online virtual worlds -- Crime in virtual worlds -- Educational and business uses of virtual worlds -- 10. Ethics of IT organizations -- Key ethical issues for organizations -- Need for nontraditional workers -- Contingent workers -- H-1B workers -- Using H-1B workers instead of U.S. workers -- Potential exploitation -- Outsourcing -- Offshore outsourcing -- Whistle-blowing -- Whistle-blowing protection for private-sector workers -- Green computing -- ICT Industry Code of Conduct -- Appendix A.A brief introduction to morality -- Egoism vs. altruism -- Deontology, or the ethics of logical consistency and duty -- Utilitarianism -- Promises and contracts -- Greeks : the good life of virtue -- Feminism and the ethics of care -- Pluralism -- Appendix B. Answers to self-assessment questions.
Gain a strong understanding of the legal, ethical, and societal implications of information technology with Reynolds' ETHICS IN INFORMATION TECHNOLOGY, Fifth Edition. The latest edition of this dynamic text provides up-to-date, thorough coverage of notable technology developments and their impact on business today. You will examine issues surrounding professional codes of ethics, file sharing, infringement of intellectual property, security risk assessment, Internet crime, identity theft, employee surveillance, privacy, compliance, social networking, and the ethics of IT corporations. This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals. Unlike typical introductory Information Systems books that cover ethical issues only briefly, ETHICS IN INFORMATION TECHNOLOGY provides thorough coverage to prepare the individuals responsible for addressing ethical issues in today's workplace. You will learn how to examine ethical situations that typically arise in IT and gain practical advice for addressing the relevant issues. Up-to-the-minute business vignettes and thought-provoking questions challenge your knowledge, while features focused on decision-making--including updated Manager's Checklists--provide brief, critical points to consider in making key business decisions. Trust ETHICS IN INFORMATION TECHNOLOGY, Fifth Edition, to equip you with the understanding of IT and ethics needed for confident decision-making and professional success.
There are no comments on this title.