Morality and Machines: Perspectives on Computer EthicsJones & Bartlett Learning, 2002 - 522 páginas This text helps students explore the wider field of computer ethics, including discussion of key topics such as privacy, software protection, artificial intelligence, workplace issues, virtual reality, and cybersex. |
Dentro del libro
Resultados 1-5 de 90
Página ii
... protected by this copyright notice may be reproduced or utilized in any form , electronic or mechanical , including photocopying , recording , or any information storage or retrieval system , without written permission from the ...
... protected by this copyright notice may be reproduced or utilized in any form , electronic or mechanical , including photocopying , recording , or any information storage or retrieval system , without written permission from the ...
Página viii
... Protection 99 A Brief History of Hardware 99 A Brief History of Software 102 Euclidean Algorithm for Greatest Common Divisor 106 Software Piracy 107 What Is Software Piracy ? 107 11 Chapter 5 How Can Software Rights Be Protected ? viii ...
... Protection 99 A Brief History of Hardware 99 A Brief History of Software 102 Euclidean Algorithm for Greatest Common Divisor 106 Software Piracy 107 What Is Software Piracy ? 107 11 Chapter 5 How Can Software Rights Be Protected ? viii ...
Página ix
... Protected ? 117 Arguments for Private Property 117 Arguments against Private Property 121 Intellectual Property 122 ... Protection of Software 147 What Is Reasonable and Fair ? 149 New Issues Raised by the Internet 154 Endnotes 156 ...
... Protected ? 117 Arguments for Private Property 117 Arguments against Private Property 121 Intellectual Property 122 ... Protection of Software 147 What Is Reasonable and Fair ? 149 New Issues Raised by the Internet 154 Endnotes 156 ...
Página 20
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Página 57
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Contenido
Chapter | 7 |
Chapter | 8 |
Chapter | 13 |
Which View of Reason Is Correct? | 25 |
Chapter 6 | 28 |
Chapter 2 | 33 |
Chapter 3 | 52 |
Conclusion | 78 |
A National Computerized Criminal History System? | 262 |
Computer Matching | 268 |
The Worst Scenario | 274 |
The Importance of Privacy | 281 |
Technostress? | 339 |
Endnotes | 360 |
Responsibility Liability Law and Professional | 375 |
Computers the Government | 399 |
Chapter 4 | 99 |
Computer Crime | 167 |
Observations | 191 |
Long Essay Questions | 197 |
Chernobyl Virus | 229 |
The Sorcerers Apprentice | 235 |
Endnotes | 241 |
References and Recommended Readings | 248 |
Why Is Privacy of Value? | 254 |
Centralization Versus Decentralization of | 410 |
Some Dissenting Voices | 418 |
Star Wars by Any Other Name | 427 |
The Artificial Intelligensia | 443 |
Appendix A | 477 |
Appendix B | 485 |
Organizational Leadership Imperatives | 492 |
Index | 507 |
Otras ediciones - Ver todas
Morality and Machines: Perspectives on Computer Ethics Stacey L. Edgar Sin vista previa disponible - 2002 |
Términos y frases comunes
action argument Aristotle artificial intelligence bank basis bill binary calculating called Categorical Imperative Chapter choice claim Communications Computer Crime Computer Ethics computer program computer systems computerized Computerworld copy court CPSR created criminal decision Defense developed discussed disks electronic employees errors ethical egoism example files fraud freedom hackers human Hume idea illegal Inslaw Internet issue Kant knowledge Leibniz look machine mathematical means Microsoft million moral nature patent person Plato pleasure Press principles problem protection puter question rational reason records responsibility rules Samuelson scientists society Socrates Software Engineering Notes software patents software piracy someone Stallman telecommuting theory things tion truth University utilitarian virtue virus viruses Wall Street Journal worm write York