Morality and Machines: Perspectives on Computer EthicsJones & Bartlett Learning, 2002 - 522 páginas This text helps students explore the wider field of computer ethics, including discussion of key topics such as privacy, software protection, artificial intelligence, workplace issues, virtual reality, and cybersex. |
Dentro del libro
Resultados 1-5 de 47
Página viii
... COMPUTERIZED WORLD 97 Chapter 4 Software Piracy , Property , and Protection 99 A Brief History of Hardware 99 A Brief History of Software 102 Euclidean Algorithm for Greatest Common Divisor 106 Software Piracy 107 What Is Software ...
... COMPUTERIZED WORLD 97 Chapter 4 Software Piracy , Property , and Protection 99 A Brief History of Hardware 99 A Brief History of Software 102 Euclidean Algorithm for Greatest Common Divisor 106 Software Piracy 107 What Is Software ...
Página xi
... Computerized Criminal History System ? 262 The FBI Wiretap Law 264 The Clipper Chip Proposal 264 Computerized Credit 265 Caller ID 267 Computer Matching 268 How the Internet Complicates Privacy Considerations 271 Cookies 272 ...
... Computerized Criminal History System ? 262 The FBI Wiretap Law 264 The Clipper Chip Proposal 264 Computerized Credit 265 Caller ID 267 Computer Matching 268 How the Internet Complicates Privacy Considerations 271 Cookies 272 ...
Página xii
... Computerized Translation 302 Mistaken Identities 303 Billing and Record - Keeping Errors 303 Automatic Payments 305 More " Dead Souls in the Computer " 305 Military Dangers 305 " Surplus " Computers Sold with Sensitive Information Still ...
... Computerized Translation 302 Mistaken Identities 303 Billing and Record - Keeping Errors 303 Automatic Payments 305 More " Dead Souls in the Computer " 305 Military Dangers 305 " Surplus " Computers Sold with Sensitive Information Still ...
Página 95
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Página 97
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Contenido
Chapter | 7 |
Chapter | 8 |
Chapter | 13 |
Which View of Reason Is Correct? | 25 |
Chapter 6 | 28 |
Chapter 2 | 33 |
Chapter 3 | 52 |
Conclusion | 78 |
A National Computerized Criminal History System? | 262 |
Computer Matching | 268 |
The Worst Scenario | 274 |
The Importance of Privacy | 281 |
Technostress? | 339 |
Endnotes | 360 |
Responsibility Liability Law and Professional | 375 |
Computers the Government | 399 |
Chapter 4 | 99 |
Computer Crime | 167 |
Observations | 191 |
Long Essay Questions | 197 |
Chernobyl Virus | 229 |
The Sorcerers Apprentice | 235 |
Endnotes | 241 |
References and Recommended Readings | 248 |
Why Is Privacy of Value? | 254 |
Centralization Versus Decentralization of | 410 |
Some Dissenting Voices | 418 |
Star Wars by Any Other Name | 427 |
The Artificial Intelligensia | 443 |
Appendix A | 477 |
Appendix B | 485 |
Organizational Leadership Imperatives | 492 |
Index | 507 |
Otras ediciones - Ver todas
Morality and Machines: Perspectives on Computer Ethics Stacey L. Edgar Sin vista previa disponible - 2002 |
Términos y frases comunes
action argument Aristotle artificial intelligence bank basis bill binary calculating called Categorical Imperative Chapter choice claim Communications Computer Crime Computer Ethics computer program computer systems computerized Computerworld copy court CPSR created criminal decision Defense developed discussed disks electronic employees errors ethical egoism example files fraud freedom hackers human Hume idea illegal Inslaw Internet issue Kant knowledge Leibniz look machine mathematical means Microsoft million moral nature patent person Plato pleasure Press principles problem protection puter question rational reason records responsibility rules Samuelson scientists society Socrates Software Engineering Notes software patents software piracy someone Stallman telecommuting theory things tion truth University utilitarian virtue virus viruses Wall Street Journal worm write York