Morality and Machines: Perspectives on Computer EthicsJones & Bartlett Learning, 2002 - 522 páginas This text helps students explore the wider field of computer ethics, including discussion of key topics such as privacy, software protection, artificial intelligence, workplace issues, virtual reality, and cybersex. |
Dentro del libro
Resultados 1-5 de 60
Página ii
... Electronic data processing - Moral and ethical aspects . I. Title . QA76.9.M65 E34 2002 174'.90904 - dc21 2002022110 All rights reserved . No part of the material protected by this copyright notice may be reproduced or utilized in any ...
... Electronic data processing - Moral and ethical aspects . I. Title . QA76.9.M65 E34 2002 174'.90904 - dc21 2002022110 All rights reserved . No part of the material protected by this copyright notice may be reproduced or utilized in any ...
Página xi
... ( Electronic ) Mail 229 Is Hacking Moral , Value - Neutral , or Bad ? 232 Hacking as Civil Disobedience 234 The Sorcerer's Apprentice 235 What Is to Be Done ? Endnotes 241 236 Short Essay Questions 246 Long Essay Questions 246 References ...
... ( Electronic ) Mail 229 Is Hacking Moral , Value - Neutral , or Bad ? 232 Hacking as Civil Disobedience 234 The Sorcerer's Apprentice 235 What Is to Be Done ? Endnotes 241 236 Short Essay Questions 246 Long Essay Questions 246 References ...
Página xiv
... Electronic Highways 412 The Vision of the Government for NII 413 Manufacturing and Commerce 414 Health Care 414 Education 414 Environment 416 Libraries 416 Some Dissenting Voices 418 Nuclear Threats 420 Computers and Nuclear Power 421 ...
... Electronic Highways 412 The Vision of the Government for NII 413 Manufacturing and Commerce 414 Health Care 414 Education 414 Environment 416 Libraries 416 Some Dissenting Voices 418 Nuclear Threats 420 Computers and Nuclear Power 421 ...
Página 5
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Página 101
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Contenido
Chapter | 7 |
Chapter | 8 |
Chapter | 13 |
Which View of Reason Is Correct? | 25 |
Chapter 6 | 28 |
Chapter 2 | 33 |
Chapter 3 | 52 |
Conclusion | 78 |
A National Computerized Criminal History System? | 262 |
Computer Matching | 268 |
The Worst Scenario | 274 |
The Importance of Privacy | 281 |
Technostress? | 339 |
Endnotes | 360 |
Responsibility Liability Law and Professional | 375 |
Computers the Government | 399 |
Chapter 4 | 99 |
Computer Crime | 167 |
Observations | 191 |
Long Essay Questions | 197 |
Chernobyl Virus | 229 |
The Sorcerers Apprentice | 235 |
Endnotes | 241 |
References and Recommended Readings | 248 |
Why Is Privacy of Value? | 254 |
Centralization Versus Decentralization of | 410 |
Some Dissenting Voices | 418 |
Star Wars by Any Other Name | 427 |
The Artificial Intelligensia | 443 |
Appendix A | 477 |
Appendix B | 485 |
Organizational Leadership Imperatives | 492 |
Index | 507 |
Otras ediciones - Ver todas
Morality and Machines: Perspectives on Computer Ethics Stacey L. Edgar Sin vista previa disponible - 2002 |
Términos y frases comunes
action argument Aristotle artificial intelligence bank basis bill binary calculating called Categorical Imperative Chapter choice claim Communications Computer Crime Computer Ethics computer program computer systems computerized Computerworld copy court CPSR created criminal decision Defense developed discussed disks electronic employees errors ethical egoism example files fraud freedom hackers human Hume idea illegal Inslaw Internet issue Kant knowledge Leibniz look machine mathematical means Microsoft million moral nature patent person Plato pleasure Press principles problem protection puter question rational reason records responsibility rules Samuelson scientists society Socrates Software Engineering Notes software patents software piracy someone Stallman telecommuting theory things tion truth University utilitarian virtue virus viruses Wall Street Journal worm write York