Geometry.Net - the online learning center
Home  - Basic_C - Computer Ethics

e99.com Bookstore
  
Images 
Newsgroups
Page 3     41-60 of 119    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Computer Ethics:     more books (100)
  1. Perspectives and Policies on ICT in Society: An IFIP TC9 (Computers and Society) Handbook (IFIP Advances in Information and Communication Technology)
  2. Towards the Information Society: The Case of Central and Eastern European Countries (Ethics of Science and Technology Assessment)
  3. Biodiversität: Wissenschaftliche Grundlagen und gesellschaftliche Relevanz (Ethics of Science and Technology Assessment) (German Edition)
  4. Computers and Ethics in the Cyberage by D. Micah Hester, Paul J. Ford, 2000-07-06
  5. Ethics of Information Management (SAGE Series on Business Ethics) by Richard O. Mason, Florence M. Mason, et all 1995-08-03
  6. Ethical Issues in the Use of Computers by Deborah B. Johnson, John Snapper, 1985-01
  7. Introduction to Modula-2 (Prentice Hall International Series in Computer Science) by Jim Welsh, John Elder, 1987-11
  8. Brain-Computer Interfaces: An international assessment of research and development trends by Theodore W. Berger, John K. Chapin, et all 2010-11-30
  9. USMLE Step 3 Board Certification Review: Pediatrics and Medical Ethics (Adult and Pediatric) With Computer-Based Case Simulations and Some Important Adult Topics by D., M.D. Kanjilal, 2001-10-15
  10. Case Studies in Information Technology Ethics (2nd Edition) by Richard A. Spinello, 2002-09-07
  11. Cyber Ethics (Cyber Citizenship and Cyber Safety) by Diane Bailey, 2008-01-30
  12. Information Ethics in the Electronic Age: Current Issues in Africa and the World
  13. Information Security and Ethics: Concepts, Methodologies, Tools and Applications by Hamid Nemati, 2008-09-05
  14. Information Technology Ethics: Cultural Perspectives by Soraj Hongladaram, 2006-12-31

41. The Ten Commandments Of Computer Ethics
TEN COMMANDMENTS OF computer ethics. computer ethics INSTITUTE 11 Dupont Circle,NW Suite 900 Washington, DC 20036 Tel. (202) 9393707 Fax (202) 797-7806.
http://courses.cs.vt.edu/~cs3604/lib/WorldCodes/10.Commandments.html
TEN COMMANDMENTS OF COMPUTER ETHICS
1. THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE. 2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK. 3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES. 4. THOU SHALT NOT USE A COMPUTER TO STEAL. 5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS. 6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 7. THOU SHALT NOT USE OTHER PEOPLE'S COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION. 8. THOU SHALT NOT APPROPRIATE OTHER PEOPLE'S INTELLECTUAL OUTPUT. 9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING. 10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS. COMPUTER ETHICS INSTITUTE
11 Dupont Circle, NW Suite 900
Washington, DC 20036
Tel. (202) 939-3707
Fax (202) 797-7806
The Institute gives full permission to copy and use these commandments, with the request that the source be acknowledged. Commentary on the 'Ten Commandments for Computer Ethics' by N. Ben Fairweather, The Centre for Computing and Social Responsibility, United Kingdom.

42. BIBLIOGRAPHY ON COMPUTER ETHICS
BIBLIOGRAPHY ON computer ethics. This A list of general references oncomputer ethics follows at the end. 1 INTELLECTUAL PROPERTY. Bynum
http://courses.cs.vt.edu/~cs3604/lib/Bibliography/Biblio.acm.html
BIBLIOGRAPHY ON COMPUTER ETHICS
This list of references was developed in conjunction with the article, "Using the new ACM code of ethics in decision making" (Commmunications of the ACM, February, 1993) by Ronald E. Anderson, Deborah G. Johnson, Donald Gotterbarn and Judith Perrolle. The article shows how to evaluate individual cases with the newly adopted ACM Code of Ethics and Professional Conduct. The references in this bibliography are grouped into nine topics corresponding to the nine case studies in the article. A list of general references on computer ethics follows at the end.
1: INTELLECTUAL PROPERTY
Bynum, T. W., Maner, W., and Fodor, J. eds., Software Ownership and Intellectual Property Rights , Research Center on Computing and Society, Southern Connecticut State University, New Haven, CT 06515, 1992.
Forester, T. "Software theft and the problem of intellectual property rights. Computers and Society 20,1 (March, 1990) 2-11.
National Research Council. Intellectual Propety Issues in Software . National Academy of Sciences, Washington DC., 1991.

43. Computer Ethics From FOLDOC
computer ethics. computer ethics can be grounded in one of four basicworldviews Idealism, Realism, Pragmatism, or Existentialism.
http://wombat.doc.ic.ac.uk/foldoc/foldoc.cgi?computer ethics

44. Computer Ethics From FOLDOC
ethics . computer ethics. computer ethics can be grounded in one of fourbasic worldviews Idealism, Realism, Pragmatism, or Existentialism.
http://wombat.doc.ic.ac.uk/foldoc/foldoc.cgi?ethics

45. CEPE 2000
CEPE 2000. computer ethics Philosophical Enquiry. In Cooperation with the ACM SIGon Computers and Society. Dartmouth College. Hanover, NH (USA) July 1416, 2000
http://www.dartmouth.edu/~phil/events/CEPE2000.html
CEPE 2000 Computer Ethics: Philosophical Enquiry In Cooperation with the ACM SIG on Computers and Soci ety Dartmouth College Hanover, NH (USA) July 14-16, 2000 Conference Co-Chairs Deborah G. Johnson, Georgia Institute of Technology deborah.johnson@pubpolicy.gatech.edu James H. Moor, Dartmouth College james.moor@dartmouth.edu Herman T. Tavani Rivier College htavani@rivier.edu Program Committee Sara Baase , San Diego State University (USA); Frans Birrer , University of Leiden (Netherlands); Philip Brey , Twente University (Netherlands); Robin Brothers , Brown University (USA); Terrell Ward Bynum , Southern Connecticut State University (USA); Jacques Catudal , Drexel University (USA); Judith Wagner DeCew , Clark University (USA); Richard Epstein , West Chester University (USA); Luciano Floridi , Wolfson College, Oxford (UK); Wendy Gordon , Boston University (USA); Don Gotterbarn , East Tennessee State University (USA); Fran Grodzinsky ; Sacred Heart University (USA); Lawrence Hinman , University of San Diego (USA); Deborah Hurley , Harvard University (USA); Lucas Introna , London School of Economics (UK);

46. Computer Ethics
B Loyola Crest computer ethics. List of statements regarding computerethics EDUCOM Code on Software and Intellectual Rights EDUCOM
http://www.luc.edu/infotech/cease/computer-ethics.html
B
Computer Ethics
List of statements regarding computer ethics
  • EDUCOM Code on Software and Intellectual Rights EDUCOM was a non-profit consortium of colleges and universities committed to the use and management of information technology for teaching and learning. The EDUCOM Code is their statement of principle about intellectual property and the legal and ethical use of software. As an institutional member of EDUCOM, Loyola University Chicago had endorsed the EDUCOM Code when it was promulgated in 1987. In July, 1998, EDUCOM merged with CAUSE to form EDUCAUSE whose mission is to focus on the management and use of computational, network and information resources in support of higher education's missions of scholarship, instruction, service and administration. Loyola University Chicago having been members of both EDUCOM and CAUSE is an institutional member of EDUCAUSE and continues to endorse the principles presented in the EDUCOM Code.
  • "Intellectual Honesty in the Era of Computing" a paper presented by Dr. Frank W. Connolly, associate professor at the American University in Washington, DC, addressing the challenges to educational institutions regarding intellectual honesty and cyberspace.
  • Ten Commandments of Computer Ethics simple code of computer ethics prepared by the Computer Ethics Institute, a project with

47. Ten Commandments Of Computer Ethics
Ten Commandments of computer ethics. Thou shalt not use a computer to harmother people. Thou shalt not interfere with other people's computer work.
http://www.luc.edu/infotech/cease/ten-commandments.html
Ten Commandments of Computer Ethics
  • Thou shalt not use a computer to harm other people.
  • Thou shalt not interfere with other people's computer work.
  • Thou shalt not snoop around in other people's computer files.
  • Thou shalt no use a computer to steal.
  • Thou shalt not use a computer to bear false witness.
  • Thou shalt not copy or use proprietary software for which you have not paid (or been given authority to do so).
  • Thou shalt not use other people's computer resources without authorization or proper compensation (includes using computers or telephones for personal business, or printing nonacademic materials with university-owned printers).
  • Thou shalt not appropriate other people's intellectual output.
  • Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  • Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans. Computer Ethics Institute, Author: Dr. Ramon C. Barquin (1991),
    1815 H Street, Suite 1100, Washington, DC 20006, (202) 296-7147,
    e-mail: rbarquin@aol.com
  • 48. GSU Computing Ethics Policy
    computer ethics Policy. Georgia State University March 6, 1995 Version1.0. 1. Overview. This document details the Acceptable Use and
    http://www.gsu.edu/welcome/policy.html
    Computer Ethics Policy
    Georgia State University
    March 6, 1995
    Version 1.0
    1. Overview
    This document details the Acceptable Use and Ethics Policy which covers the proper utilization of the computers, networks and related services at Georgia State University. This policy has been developed to ensure a quality computing environment at GSU that furthers the academic, research and service mission of the University. Providing this environment requires equitable resource distribution, computer and network availability, personal privacy and data integrity. Achieving this goal requires that everyone in the University community cooperate and adhere to these guidelines. This policy has been developed by members of the Wells Computer Center, in conjunction with the Offices of the Dean of Students, Human Resources and Legal Affairs.
    2.0 Authorized users
    Individuals who have been granted and hold an active and authorized account on a GSU computer or network and abide by this policy are considered authorized users.
    3.0 Authorized use

    49. On Campus - Code Of Conduct: Computer Ethics Policy - The Official Student Handb
    On Campus,
    http://www.gsu.edu/~wwwcam/code/computerethics/
    Related Information:
    Adopted by the Student Life and Development Committee, April 15, 1992. Amended and approved by the SLDC, March 18, 2002 This online version of the Student Code of Conduct is the most update version available.
    Code of Conduct
    Computer Ethics Policy
    Site Photography Credits - Last Modified: 01/23/2003 12:57 PM

    50. D O L C E --- ...Developing OnLine Computer Ethics
    Many computer science departments do not explicitly teach computerethics, professional ethics, or computers and society issues.
    http://csethics.uis.edu/dolce/
    Project Links Forms Contest ... Teaching Aids/Software SITE DIRECTORY Links to Other Ethics Sites Consent Forms Contest Project Information Software and Teaching Aids Workshop Presentations Workshop Participants Invitation to 2002 Workshop Agenda for 2002 Workshop
    DOLCE
    People who make technical decisions must be educated to make good ethical decisions. Many computer science departments do not explicitly teach computer ethics, professional ethics, or computers and society issues. Not enough CS faculty are willing and able to teach such courses. The DOLCE project educates and supports computer science faculty who want to teach about these issues. The NSF has funded the project for three years.
    DOLCE develops Web-based materials for teaching computer ethics to undergraduate computer science majors. (We think that many of the materials are also appropriate for graduate students, but our immediate emphasis is undergraduates.) The materials will be closely integrated with the upcoming third edition of Computer Ethics, by Deborah Johnson. The materials are designed for classes or modules that are online or face to face and at any undergraduate level. The materials will emphasize computer ethics theory and analytical skills, societal issues in computing and telecommunication, professional ethics. Gender issues in computer ethics are a particular focus. These materials do not duplicate existing materials, but do, with permission, link to existing materials.
    Congratulations
    To

    51. UGA Computer Security And Ethics
    computer ethics Quiz This quiz is designed to make sure you are familiar with theUniversity's computer ethics policies and that you know how to apply them to
    http://www.uga.edu/compsec/
    The University of Georgia
    Computer Security and Ethics
    These pages are brought to you by the University of Georgia's Computer Security and Ethical Use Committee . This is a standing University committee charged with keeping the University's computer security and ethics documents updated. A subset of the committee along with additional staff from the organizations represented constitute the University's Computer Incident Response Team which deals with security breaches and incidents of computer misuse. Policies on Use of Computers
    This is an official policy statement of The University of Georgia and as such it is binding on all faculty, staff and students at the University. Summary of Policies
    This is an official summary of the University's Policies on Use of Computers for use in publications to make people aware of the policies. Relevant Laws
    Section of the policy statement dealing with the relavent state and federal laws. USENet Newsgroup Redistribution Policy
    Policies for restricting distribution of some USENet newsgroups at UGA. Computer Ethics Quiz
    This quiz is designed to make sure you are familiar with the University's computer ethics policies and that you know how to apply them to specific situations. The quiz is not an official policy document.

    52. U.Ga. Computer Use Policies Summary
    computer ethics at Georgia. Summary of Policies. They fulfill a Board of Regents directiverequiring adoption of explicit computer security and ethics policies.
    http://www.uga.edu/compsec/summary.html
    Computer Ethics at Georgia
    Summary of Policies
    Last Revised May 23, 2001 The University of Georgia is committed to free and open inquiry and discussion, fair allocation of University resources, and the provision of a working environment free of needless disruption. To advance these goals, the University has adopted policies on computer usage that are summarized here and stated in detail elsewhere. Most of these policies follow from pre-existing regulations, agreements, and/or laws. They fulfill a Board of Regents directive requiring adoption of explicit computer security and ethics policies.
    • Like all University facilities, University computers and computer networks are to be used only by persons authorized by the University, and only for University purposes. University purposes include the educational programs of the University, as well as its research, administrative, and outreach activities. Use of University facilities for other purposes requires prior authorization.
    • No one shall knowingly endanger the security of any University computer or network facility, nor willfully interfere with others' authorized computer usage.
    • No one shall use the University's communication facilities to attempt unauthorized use, nor to interfere with others' legitimate use, of any computer or network facility anywhere.

    53. Myths And Misperception On Computer Ethics
    be responsible computer users that were included in the best entries. One of themost important roles we play as adults with children is to impart ethics and
    http://www.computerlearning.org/articles/respmyth.htm
    Computer Learning Foundation
    Emphasizes Responsible Use of Technology
    by Sally Bowman Alden, Executive Director
    Computer Learning Foundation

    Background
    In April 1990, a concerned group of individuals representing industry, education, law enforcement and government, including the Computer Learning Foundation, were invited by the National Institute of Justice, in cooperation with the Department of Education, to participate in a two-day meeting in Washington, D.C. The purpose of this meeting was to discuss ethical issues surrounding technology and to develop a plan for addressing the problems identified. As a result of this conference, the Computer Learning Foundation, in conjunction with the Department of Justice and the Department of Education, began emphasizing the importance of practicing responsible computing and teaching our children to be responsible users of technology. During Computer Learning Month 1990, the Foundation hosted two competitions on responsible computing, one for teachers and one for students, and winners received valuable technology prizes and recognition from the Computer Learning Foundation, Department of Education and Department of Justice. In 1991, the Computer Learning Foundation began disseminating information to schools on methods for teaching children to be responsible computer users that were included in the best entries. One of the most important roles we play as adults with children is to impart ethics and values important to our society a sense of responsibility, a sense of right and wrong and a sense of the law. While laws exist to protect people, their property and their rights, education instills the belief that people, their property and their rights should be protected and respected.

    54. Online Ethics Center: Essays On Computer Ethics
    onlineethics.org The Online Ethics Center for Engineering and Science.Essays on computer ethics. Material on David LaMacchia case.
    http://onlineethics.org/essays/computers/
    onlineethics.org The Online Ethics Center for Engineering and Science
    Essays on Computer Ethics
    • Material on David LaMacchia case. A series of articles from newspapers and e-zines related to David LaMachia, including references to court hearings and legal documents.
    Essays maintained by others. (will open in a new browser window) Return to the Essays Index.

    55. CIS-590 Resources
    computer ethics Resources Page. CIS590 is a graduate level course oncomputer ethics at the University of Pennnsylvania by Dave Farber.
    http://www.seas.upenn.edu/~pws/ethics/cis590.html
    Computer Ethics Resources Page
    CIS-590 is a graduate level course on Computer Ethics at the University of Pennnsylvania by Dave Farber. This course investigates the various issues and facets of computer crime and computer ethics. Topics to be covered include: These links were compiled by Paul W. Shaffer for the fall term, 1997.

    56. Computer Ethics: Future Directions
    computer ethics Future Directions. This Paper Was Held On Wednesday17 May 2000. computer ethics Future Directions. John Weckert.
    http://www.acs.org.au/act/events/2000acs4.html
    Computer Ethics: Future Directions
    This Paper Was Held On Wednesday 17 May 2000
    ANU campus map Internal Links: Abstract
    Biography

    Paper
    Abstract This talk will consider three aspects of computer ethics: problem areas, methodology, and its interdisciplinary nature. Second, computer ethics must become more rigorous and develop a stronger theoretical base. Simultaneously there must be close liaison between theoreticians and practitioners. Computer ethics without theory is mere consciousness raising, useful, but not enough on its own. Theoretical studies remote from professional practice can be mere intellectual exercise, again useful, but insufficient alone. If computer ethics is to be taken seriously there must be a rigorous and theoretically sound examination of practical problems, and it must propose answers within the parameters of the available technology. Third, a number of disciplines must cooperate to a greater extent if thoroughly analysed and practical answers are to be provided. At a minimum, computing professionals and academics, philosophers, psychologists, sociologists and lawyers are required. An examination of these three aspects will give some guidance to the directions that computer ethics ought to take.

    57. McNulty's Computer Ethics At Wilfrid Laurier University
    This is Mike McNulty's Communications and computer ethics Web site, designed primarilyfor use by students in CS 323 at Wilfrid Laurier University in Waterloo
    http://www.wlu.ca/~wwwphil/mcnulty/
    Media and Communications Ethics Course Information: Winter 2003 WLU Communications Studies Dept. Philosophy Dept. CS/PY 201 ... Lecturer This is Mike McNulty's Communications and Computer Ethics Web site, designed primarily for use by students in CS 323 at Wilfrid Laurier University in Waterloo, Canada. Nota Bene:
    • Essay due March 28. Papers accepted without extension or penalty until April 4. Final test: Monday, March 31.
    Updated on Monday, March 24, 2003

    58. McNulty's Computer Ethics At Wilfrid Laurier University
    Religious ethics (authority based); Consequentialism Utilitarianism (ends basedconsequences); The nature of computer work is such that it can cause certain
    http://www.wlu.ca/~wwwphil/mcnulty/overheads.htm
    Course Overheads WLU Home Schedule Overheads ... Lecturer This page contains the overheads for the course. They are arranged (more or less) chronologically. Check frequently for updates.
    Last update: Monday, March 24, 2003
    Links
    Goals

    Morality and Ethics

    Normative Theories

    Table of Five Principles
    Goals of this course: With regard to critical thinking:
    • promote clarity, accuracy and organization in thinking improve your writing and expression skills
    With regard to morality:
    • develop clear and organized moral thinking: Explore how morality works and what lies behind moral judgments Determine methods of attaining moral certainty Provide you with dependable grounds for your moral judgments
    With regard to political ideology:
    • See the connection with morality See how ideology influences our judgements See how ideology is expressed in real life
    With regard to media and communications ethics specifically:
    • Show how ethics is connected with electronic technology Show why ethics is important to the subject matter Consider the basis for existing ethical rules (generally and with regard to specific codes of conduct).

    59. Eserver.org/philosophy/computer-ethics.txt
    computer ethics THROUGH THICK THIN computer ethics through Thick Thin is a threeyear research project funded by an Applied Ethics Strategic Grant from the
    http://eserver.org/philosophy/computer-ethics.txt

    60. Computer Ethics - Lecture 10
    computer ethics. However, as their use became widespread in every facet of ourlives, discussions in computer ethics resulted in some kind of a consensus.
    http://www.cmpe.boun.edu.tr/~say/c150/intro/lit10.html

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 3     41-60 of 119    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20

    free hit counter