Morality and Machines: Perspectives on Computer EthicsJones & Bartlett Learning, 2002 - 522 páginas This text helps students explore the wider field of computer ethics, including discussion of key topics such as privacy, software protection, artificial intelligence, workplace issues, virtual reality, and cybersex. |
Dentro del libro
Resultados 1-5 de 65
Página ix
... Crimes 190 The European Cybercrime Treaty 190 Observations 191 Endnotes 191 Short Essay Questions 196 Long Essay Questions 197 References and Recommended Readings 197 Chapter 6 Computer Intruders , Viruses , and All That ix CONTENTS.
... Crimes 190 The European Cybercrime Treaty 190 Observations 191 Endnotes 191 Short Essay Questions 196 Long Essay Questions 197 References and Recommended Readings 197 Chapter 6 Computer Intruders , Viruses , and All That ix CONTENTS.
Página x
... Virus 223 Brain Virus 225 Lehigh Virus 225 The Israeli Virus 225 The Malta Disk Destroyer 226 The Ping - Pong Virus 226 The Datacrime Virus 226 The Bulgarian Dark Avenger 226 The Michelangelo Virus 227 Macintosh Viruses 227 The Health - ...
... Virus 223 Brain Virus 225 Lehigh Virus 225 The Israeli Virus 225 The Malta Disk Destroyer 226 The Ping - Pong Virus 226 The Datacrime Virus 226 The Bulgarian Dark Avenger 226 The Michelangelo Virus 227 Macintosh Viruses 227 The Health - ...
Página xi
... Virus 229 The Love Bug 229 Viruses Make It to the Big Screen 229 Misuse of the ( Electronic ) Mail 229 Is Hacking Moral , Value - Neutral , or Bad ? 232 Hacking as Civil Disobedience 234 The Sorcerer's Apprentice 235 What Is to Be Done ...
... Virus 229 The Love Bug 229 Viruses Make It to the Big Screen 229 Misuse of the ( Electronic ) Mail 229 Is Hacking Moral , Value - Neutral , or Bad ? 232 Hacking as Civil Disobedience 234 The Sorcerer's Apprentice 235 What Is to Be Done ...
Página 2
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Página 111
Lo sentimos, el contenido de esta página está restringido..
Lo sentimos, el contenido de esta página está restringido..
Contenido
Chapter | 7 |
Chapter | 8 |
Chapter | 13 |
Which View of Reason Is Correct? | 25 |
Chapter 6 | 28 |
Chapter 2 | 33 |
Chapter 3 | 52 |
Conclusion | 78 |
A National Computerized Criminal History System? | 262 |
Computer Matching | 268 |
The Worst Scenario | 274 |
The Importance of Privacy | 281 |
Technostress? | 339 |
Endnotes | 360 |
Responsibility Liability Law and Professional | 375 |
Computers the Government | 399 |
Chapter 4 | 99 |
Computer Crime | 167 |
Observations | 191 |
Long Essay Questions | 197 |
Chernobyl Virus | 229 |
The Sorcerers Apprentice | 235 |
Endnotes | 241 |
References and Recommended Readings | 248 |
Why Is Privacy of Value? | 254 |
Centralization Versus Decentralization of | 410 |
Some Dissenting Voices | 418 |
Star Wars by Any Other Name | 427 |
The Artificial Intelligensia | 443 |
Appendix A | 477 |
Appendix B | 485 |
Organizational Leadership Imperatives | 492 |
Index | 507 |
Otras ediciones - Ver todas
Morality and Machines: Perspectives on Computer Ethics Stacey L. Edgar Sin vista previa disponible - 2002 |
Términos y frases comunes
action argument Aristotle artificial intelligence bank basis bill binary calculating called Categorical Imperative Chapter choice claim Communications Computer Crime Computer Ethics computer program computer systems computerized Computerworld copy court CPSR created criminal decision Defense developed discussed disks electronic employees errors ethical egoism example files fraud freedom hackers human Hume idea illegal Inslaw Internet issue Kant knowledge Leibniz look machine mathematical means Microsoft million moral nature patent person Plato pleasure Press principles problem protection puter question rational reason records responsibility rules Samuelson scientists society Socrates Software Engineering Notes software patents software piracy someone Stallman telecommuting theory things tion truth University utilitarian virtue virus viruses Wall Street Journal worm write York