Morality and Machines: Perspectives on Computer EthicsJones & Bartlett Learning, 2002 - 522 páginas This text helps students explore the wider field of computer ethics, including discussion of key topics such as privacy, software protection, artificial intelligence, workplace issues, virtual reality, and cybersex. |
Dentro del libro
Resultados 1-5 de 78
Página v
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Página xi
... Communications Decency Act ( CDA ) and CDA II ( COPA ) 272 Carnivore 273 The Worst Scenario 274 What Protections Are There for Privacy ? 276 Warren and Brandeis Make a Case for Privacy 277 Existing Privacy Legislation 279 The Importance ...
... Communications Decency Act ( CDA ) and CDA II ( COPA ) 272 Carnivore 273 The Worst Scenario 274 What Protections Are There for Privacy ? 276 Warren and Brandeis Make a Case for Privacy 277 Existing Privacy Legislation 279 The Importance ...
Página xii
... Systems 325 Three Functions of DNA 326 The Industrial Revolution Crisis of Control 327 Data Processing and an Information Bureaucracy 328 Information Theory and Communication 329 Levels of Problems in Communication xii CONTENTS.
... Systems 325 Three Functions of DNA 326 The Industrial Revolution Crisis of Control 327 Data Processing and an Information Bureaucracy 328 Information Theory and Communication 329 Levels of Problems in Communication xii CONTENTS.
Página xiii
Perspectives on Computer Ethics Stacey L. Edgar. Information Theory and Communication 329 Levels of Problems in Communication 330 The Information Workplace 331 Loss of Jobs , or Just Relocation ? 335 The End of Work ? 338 " Technostress ...
Perspectives on Computer Ethics Stacey L. Edgar. Information Theory and Communication 329 Levels of Problems in Communication 330 The Information Workplace 331 Loss of Jobs , or Just Relocation ? 335 The End of Work ? 338 " Technostress ...
Página 5
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Contenido
Chapter | 7 |
Chapter | 8 |
Chapter | 13 |
Which View of Reason Is Correct? | 25 |
Chapter 6 | 28 |
Chapter 2 | 33 |
Chapter 3 | 52 |
Conclusion | 78 |
A National Computerized Criminal History System? | 262 |
Computer Matching | 268 |
The Worst Scenario | 274 |
The Importance of Privacy | 281 |
Technostress? | 339 |
Endnotes | 360 |
Responsibility Liability Law and Professional | 375 |
Computers the Government | 399 |
Chapter 4 | 99 |
Computer Crime | 167 |
Observations | 191 |
Long Essay Questions | 197 |
Chernobyl Virus | 229 |
The Sorcerers Apprentice | 235 |
Endnotes | 241 |
References and Recommended Readings | 248 |
Why Is Privacy of Value? | 254 |
Centralization Versus Decentralization of | 410 |
Some Dissenting Voices | 418 |
Star Wars by Any Other Name | 427 |
The Artificial Intelligensia | 443 |
Appendix A | 477 |
Appendix B | 485 |
Organizational Leadership Imperatives | 492 |
Index | 507 |
Otras ediciones - Ver todas
Morality and Machines: Perspectives on Computer Ethics Stacey L. Edgar Sin vista previa disponible - 2002 |
Términos y frases comunes
action argument Aristotle artificial intelligence bank basis bill binary calculating called Categorical Imperative Chapter choice claim Communications Computer Crime Computer Ethics computer program computer systems computerized Computerworld copy court CPSR created criminal decision Defense developed discussed disks electronic employees errors ethical egoism example files fraud freedom hackers human Hume idea illegal Inslaw Internet issue Kant knowledge Leibniz look machine mathematical means Microsoft million moral nature patent person Plato pleasure Press principles problem protection puter question rational reason records responsibility rules Samuelson scientists society Socrates Software Engineering Notes software patents software piracy someone Stallman telecommuting theory things tion truth University utilitarian virtue virus viruses Wall Street Journal worm write York