Geometry.Net - the online learning center
Home  - Basic_C - Computer Ethics

e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 119    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Computer Ethics:     more books (100)
  1. Computer Ethics (Computers, Internet, and Society) by Robert Plotkin, 2011-06-30
  2. Nano-Bio-Ethics (Munsteraner Bioethik-Studien) (Volume 6)
  3. Ethics for the Information Age (3rd Edition) by Michael J. Quinn, 2008-02-14
  4. Computer Ethics, 3RD EDITION by DeborahJohnson, 2001
  5. COMPUTER ETHICS: An entry from Gale's <i>Gale Encyclopedia of E-Commerce</i>
  6. Computers & Ethics in the Cyberage by DMicah Hrstrr, 2000
  7. Computer Ethics Cautionary Tales& Ethical Dilemmas in Computing by ForesterTom; MorrisonPerry, 1990
  8. Virtual Morality: Christian Ethics in the Computer Age by Graham Houston, 1998-11
  9. Computer Ethics, Etiquette, and Safety for the 21St-Century Student by Nancy E. Willard, 2002-01
  10. Computers, Ethics & Social Values by Drborah GJohnson, 1995
  11. Computer Ethics 4TH EDITION by Deborsh GJohnson, 2009
  12. Computer Ethics Global Perspective by GiamnisStamatelos, 2007
  13. Computers and Ethics (Metaphilosophy 16(4) 1985.)
  14. Computer Ethics& Comptr Ethics Soc Valu Pkg by Deborah G. Johnson, Helen F. Nissenbaum, 2002-05

81. Computer Ethics Workshop 2000
The Second International computer ethics Workshop in Finland (ICEF'2000). inJyväskylä, Finland. Workshop is cancelled because of the low turnout.
http://www.cs.jyu.fi/~tvarti/seminaari2000.html
The Second International Computer Ethics
Workshop in Finland (ICEF'2000)
in Jyväskylä Finland
Workshop is cancelled because of the low turnout. We shall look forward to the year 2001.
University of Jyväskylä , Mattilanniemi, MaB102 Computer ethics concerns ethical issues raised by the development or use of information processing technology. All issues contributing to the area of computer ethics are equally welcome to the workshop. Three kinds of contributions are invited to be presented within ICEF'2000: 1) full papers, 2) short presentations (will not be published in the post-proceedings), 3) student sessions (mainly presentations - only papers which clearly contribute to the area of computer ethics will be published). The review process consists of two steps. First the extended abstracts will be blindly refereed in order to determine the suitability and adequate quality of the papers. When sending extended abstracts, the authors should inform whether they want to submit a full-paper or only a short presentation. In the case of an accepted short presentation, the author is invited to present his/her ideas, although they will not be published in the post-proceedings. Authors whose extended abstracts are accepted will be asked to write full papers. Full papers will be blindly refereed, and full papers which contribute to the area of computer ethics will be published in the post-proceedings.

82. Citation
ACM SIGCAS Computers and Society archive Volume 25 , Issue 4 (December 1995) tocA computer ethics bibliography Author Herman T. Tavani Publisher ACM Press
http://portal.acm.org/citation.cfm?id=216965&coll=portal&dl=ACM&CFID=11111111&CF

83. Citation
ACM SIGCAS Computers and Society archive Volume 25 , Issue 3 (September 1995) tocA computer ethics bibliography Author Herman T. Tavani Publisher ACM Press
http://portal.acm.org/citation.cfm?id=211988&coll=portal&dl=ACM&CFID=11111111&CF

84. StepForward Computer Ethics
computer ethics -. CONFERENCES / PROFESSIONAL ORGANIZATIONS Webpages Web Clearinghousefor Engineering and computer ethics (North Carolina State University).
http://www.casdn.neu.edu/~nucase/stepf/computer.html
C OMPUTER E THICS C ONFERENCES P ROFESSIONAL O RGANIZATIONS: Webpages: Centre for Computing and Social Responsibility (DeMontfort University) Computer Professionals for Social Responsibility Scientific Freedom, Responsibility, and Law (AAAS) Web Clearinghouse for Engineering and Computer Ethics (North Carolina State University) D ISCUSSIONS: Webpages: Centre for Computing and Social Responsibility (DeMontfort University) G UIDELINES: Webpages: Ethics of the Internet (University of Wisconsin) Web Clearinghouse for Engineering and Computer Ethics (North Carolina State University) N EWS: Webpages: Computer Professionals for Social Responsibility P ERSONAL R EFLECTIONS: Webpages: Engineering Ethics Cases (Case Western Reserve University) P UBLICATIONS: Webpages: Essays on Computer Ethics (Case Western Reserve University) Computer Professionals for Social Responsibility Professional Ethics Report (AAAS) Web Clearinghouse for Engineering and Computer Ethics (North Carolina State University) Women and Computer Science (Mills College) Articles: Learning IT right from wrong: As universities add computer ethics to the curriculum, observers want to know ...

85. Practical Computer Ethics - Book Review
Practical computer ethics Privacy Duncan Langford, Practical ComputerEthics, London McGrawHill, 1995, pp.148, ISBN 0077090128 More
http://www.mantex.co.uk/reviews/langford.htm
    Home Bookshop Software Reviews ... Subscribe here for our free email newsletter
    - regular updates on new technology - Practical Computer Ethics Privacy, protocols, and data protection issues. Those who have peeped into someone else's database or copied software from a friend's disk know that they've been naughty. They gamble that they're unlikely to be caught. Some people have even cut and pasted other's work and used it as their own. They too thought they wouldn't be noticed. But things are changing. They're starting to be noticed - and prosecuted. The world of electronic data, especially since the Internet explosion, is rife with problems of control, censorship, and intellectual property rights. Langford's slim introduction is an attempt to map out the ethical problems of computer use and present strategies for dealing with them. He starts out by defining the nature of moral philosophy in terms most readers will understand. In fact he goes on about this rather too long. It's chapter 5 before we get to computers - though his illustrative examples all come from the world of everyday keyboard and network use. But in fact many of the problems he identifies are ethical problems which arise from business and management practices rather than from IT itself. Should software developers construct programmes for rogue managers for instance? Would you report your colleagues if they downloaded politically incorrect material in work's time? These are not intrinsically questions of technology [even if they do occur in daily life] and since ethical judgements often rest on making fine distinctions, Langford ought really to be alert to such differences.

86. AICE - Australian Institute Of Computer Ethics
AICE, Australia, computer ethics, conferences, seminars, articles,papers, people, and other information. AiCE Australian Institute
http://www.cm.deakin.edu.au/aice/
A i CE Australian Institute of Computer Ethics www.aice.net Welcome to the A i CE Research Page. This site contains information relating to A i CE conferences including
free conference proceedings. To Access the Offical A i CE web site Click here To Access AiCE Conference proceedings Click Here

87. RUCS: Computer Ethics
computer ethics. In addition to the lecture material, you may like to searchthe Internet yourself for information relevant to computer ethics.
http://www.cafm.sbu.ac.uk/cs/people/jpb/teaching/ethics.html
Databases and Computer Ethics 3/CS/6S
See also:
Management and the Social Impact of Information Technology
3/CS/6Y
Computer Ethics
Lecturer: Jonathan Bowen
See lecture topics covered by the course and recommended books See also assessment In addition to the lecture material , you may like to search the Internet yourself for information relevant to computer ethics . The links below provide further material on the subject which may be of interest.
General information

88. Using The Socratic Method To Teach Computer Ethics
Using The Socratic Method To Teach computer ethics. However, some techniquescan be adapted and applied to a college level computer ethics course.
http://gise.org/JISE/Vol9/Using_The_Socratic_Method.htm
Journal of IS Education
on-line
. Request permission to republish from Eli_Cohen@acm.org Teach IS Site Informing Science Journal JISE Submission Guidelines Vol. 9 (1) Fall '98 issue pages 20-24
Using The Socratic Method To Teach Computer Ethics
John M. Artz, Ph.D.
Assistance Professor
of Management Science
George Washington University
Washington, D.C. 20052
Phone: (202)994-4931
Fax:(202)994-4930
Email: jartz@gwuvm.gwu.edu
ABSTRACT
INTRODUCTION
At a larger social level, information technology has impacted our lives in significant ways. It is creating a skills gap between the technologically literate and the technologically illiterate. Instead of calling in an order for pizza, we fax it in. Instead of calling someone on the telephone we send them an email. Instead of sitting around the television at an appointed time to watch our favorite television show, we record it and watch it at some other time. Sometimes we sit back and wonder where all this technology is going ? On the balance is life better or worse ? This reflection leads us back to basic questions such as What is the purpose in life ?, What is quality of life ?, and, more recently, How does technology affect the quality of life ?
THE SOCRATIC METHOD
The dialectic component in this approach goes beyond the identification of individual values and proceeds to develop moral reasoning through a reflective social process. It consists of three components: discussion, questioning, and concept analysis. The purpose of the discussion is to have a participatory social environment in which understanding can be achieved as a group consensus. The purpose of the questioning is twofold. First, the instructor can use questions to stimulate the discussion and focus on the clarification of the concepts. Second, the questions asked by the teacher can serve as models for the students to ask questions on his or her own. The purpose of the concept analysis is to drive the nature of the questions toward the understanding of a concept.

89. Academic Info: Computer Science - Computer Ethics
Home / Keyword Search / Subject Index / Reference Desk / StudentCenter Academic Info Computer Science computer ethics.
http://www.academicinfo.net/compsciethics.html
Home Keyword Search Subject Index Reference Desk ... Student Center
Academic Info
Computer Science: Computer Ethics
Sciences Computer Science Engineering Computer Science ... Computer Ethics and Cyber Ethics
"To provide information on Information Systems Ethics (Cyberethics) Education including content, delivery, pedagogy, and administration. To provide links to on-line information resources and courses that may be of interest to instructors and students. To provide a forum for discussion and assistance on issues and topics of interest to IS Ethics (Cyberethics) instructors."
Edited by David Vance and ArunRai. Computer Ethics Resources on WWW
Topics include Organizations, Publications On-Line, Pages on Specific Topics, and Courses,
Maintained by Chris MacDonalod, Centre for Applied Ethics Federal Bureau of Investigation Home Keyword Search ... Student Center Last modified on
Computer Science went online 04/01/98 An independent directory compiled by Mike Madin . I am always looking to add quality Internet resources. Please send me your suggestions.
URL: http://www.academicinfo.net/compsciethics.html

90. Employee Ethics Agreement
VCCS computer ethics Guideline. Thousands of users share VCCNet computingresources. Everyone must use these resources responsibly
http://www.vccs.edu/its/policies/EthicsGuideline.htm
VCCS Computer Ethics Guideline
Thousands of users share VCCNet computing resources. Everyone must use these resources responsibly since misuse by even a few individuals has the potential to disrupt VCCS business or the work of others. Therefore you must exercise ethical behavior when using VCCNet resources. State Law (Article 7.1 of Title 18.2 of the Code of Virginia) classifies damage to computer hardware or software (18.2-152.4), unauthorized examination (18.2-152.5), or unauthorized use (18.2-152.6) of computer systems as (misdemeanor) crimes. Computer fraud (18.2-152.3) and use of a computer as an instrument of forgery (18.2-152.14) can be felonies. The VCCS's internal procedures for enforcement of its policy are independent of possible prosecution under the law. DEFINITION VCCNet resources include mainframe computers, minicomputers, microcomputers, networks, software, data, facilities and related supplies. GUIDELINES The following guidelines shall govern the use of all VCCNet resources:
  • You must use only those computer resources that you have the authority to use. You must not provide false or misleading information to gain access to computing resources. The VCCS may regard these actions as criminal acts and may treat them accordingly. You must not use VCCNet resources to gain unauthorized access to computing resources of other institutions, organizations or individuals.
  • 91. University Of Bath Computing Services - Ten Commandments Of Computer Ethics
    BUCS University of Bath Computing Services. The Ten Commandments of ComputerEthics. From the computer ethics Institute Search BUCS BUCS home
    http://www.bath.ac.uk/bucs/10commandments.html
    University of Bath
    Computing Services
    The Ten Commandments of Computer Ethics
  • Thou shalt not use a computer to harm other people.
  • Thou shalt not interfere with other people's computer work.
  • Thou shalt not snoop around in other people's files.
  • Thou shalt not use a computer to steal.
  • Thou shalt not use a computer to bear false witness.
  • Thou shalt not use or copy software for which you have not paid.
  • Thou shalt not use other people's computer resources without authorisation.
  • Thou shalt not appropriate other people's intellectual output.
  • Thou shalt think about the social consequences of the program you write.
  • Thou shalt use a computer in ways that show consideration and respect. From the Computer Ethics Institute Search BUCS BUCS home Page maintained by bucs-web-mgt
    University of Bath Computing Services
  • 92. POLYWOG: Philosophy: Computer Ethics
    computer ethics.
    http://polywog.navpoint.com/philosophy/cethics/
    Computer Ethics
    [HOME] [BACK]
    • Assignment 2 - Wiretapping and Privacy Protection
    • Assignment 3 - Computer Hackers and Government's Crackdown
    • Term Paper Proposition - US Export Laws on Cryptography
    • Thesis - State of the Software Industry and the Emergence of Open Source
    • Thesis - PDF FORMATTED (for footnotes etc...) - State of the Software Industry and the Emergence of Open Source

    93. Ethics In Computing
    Information about the basics of ethics in computing or specific topics such as privacy,free speech, computer abuse, intellectual property,risks, commerce, and social justice.
    http://www.eos.ncsu.edu/eos/info/computer_ethics/
    Search This Site The Web for Get a Free Search Engine for Your Web Site var site="sm2ethics" This site is administered by Dr. Edward F. Gehringer efg@ncsu.edu

    94. CPSR Home Page
    Devoted to activism in issues such as Internet filters, censorship, encryption, digital signatures, PICS, ethics, NII, software freedom, Internet governance, and privacy.
    http://www.cpsr.org
    Home
    About

    Working Groups

    Publications
    ...
    Search
    C omputer P rofessionals for S ocial R esponsibility Join CPSR in providing the public and policymakers with realistic assessments of the power, promise, and problems of information technology. CPSR members work to direct public attention to critical choices concerning the applications of information technology and how those choices affect society.

    95. Computer Hacking And Ethics
    Paper about developing ethics in teenage hackers.
    http://www.cs.berkeley.edu/~bh/hackers.html
    Computer Hacking and Ethics
    Brian Harvey
    University of California, Berkeley [A slightly different version of this paper was written for the ``Panel on Hacking'' held by the Association for Computing Machinery in April, 1985. Thanks to Batya Friedman, Donn Parker, and Carter Sanders for their comments on early drafts.] [Neal Patrick] said he and his friends, who named themselves the ``414s'' after the Milwaukee area code, did not intend to do any damage and did not realize they were doing anything unethical or illegal. In fact, when asked [at a Congressional subcommittee hearing] at what point he questioned the ethics of his actions, he answered, ``Once the FBI knocked on the door.'' It's no secret that a mature sense of ethics is something a person develops over time. Parents are supposed to exercise authority over their children because the children are not expected to know how to make certain decisions for themselves. We have a juvenile court system separate from the adult criminal court system because we believe that a young person is not capable of criminal intent in the same sense that an adult is capable of it.

    96. CPSR Home Page
    CPSR's website devoted to issues such as Internet filters, encryption, digital signatures, PICS, ethics, NII, and privacy.
    http://cpsr.org
    Home
    About

    Working Groups

    Publications
    ...
    Search
    C omputer P rofessionals for S ocial R esponsibility Join CPSR in providing the public and policymakers with realistic assessments of the power, promise, and problems of information technology. CPSR members work to direct public attention to critical choices concerning the applications of information technology and how those choices affect society.

    97. Home Page
    Various papers on computer viruses, computer security, and ethics by Sarah Gordon.
    http://www.badguys.org
    Home Papers Press Photos ... Conferences click to visit the palmcam There have been so many inquiries about my work , I decided to put some of it online. If you don't find what you're looking for, please e-mail me . In the mean time, watch out for the dancing palm trees - and please excuse the mess.. peace, sarah Find out more About The WildList by visiting the official WildList Organization International site. I'm currently just finishing up my work with a group here I really enjoy doing research, so I've accepted this position. If you're thinking about working with viruses, you might want to consider these facts: "WHAT IS AN ANTIVIRUS RESEARCHER"? I do some work here and here and here too. The opinions on this site are, however, my own and may not necessarily reflect that of any group I work with!! If you'd like to know a little bit more about my background, click here. Here's a review of my latest work on testing AV products This page was last updated on Visit malware.org Learn About EICAR , the European Institute for Computer Antivirus Research Go to SecureComputing Go to ICSA 's WWW site Read About my Experiences with CARO - The Computer Antivirus Research Organization badguys.org - the name just seemed to fit.

    98. Computer And MP3 Ethics
    University student Jay Trussell explores the ethics surrounding the downloading of music in MP3 format in this class paper. Some arguments are based around Christianity.
    http://hubcap.clemson.edu/~jtrusse/cpsc291/ethics.html

    99. LANTRA-L Translation And Interpretation
    A forum for all aspects of translation and interpretation of natural languages including, but not restricted to, computer aids for translation and interpretation. Topics which can be discussed are translation theory and practice, translation tools, terminology, lexicography, court, conference and community interpreting, intercultural communication, sociolinguistics, psycholinguistics, professional ethics for interpreters and translators, education and training of interpreters and translators etc. (Note Very high traffic).
    http://www.geocities.com/Athens/7110/lantra.htm
    LANTRA-L 
    Translation and interpretation
    Welcome to the exciting world of translation and interpretation!
    LANTRA-L is a forum for all aspects of translation and interpretation of natural languages. Including, but not restricted to, computer aids for translation and interpretation.
    Topics which can be discussed are: * translation theory and practice * translation tools * terminology * lexicography * court, conference and community interpreting * intercultural communication * sociolinguistics * psycholinguistics * professional ethics for interpreters and translators * education and training of interpreters and translators etc.
    To subscribe, send the message SUB LANTRA-L Your Name to listserv@segate.sunet.se
    If Lantra-l is down...
    If the Listserv machine goes down temporarily and you don't receive any Lantra-l mail, you can still meet you friends, discuss professional issues, get answers to terminological problems etc. on the "emergency list"  i_miss_lantra / Translators Worldwide!
    To subscribe, send an empty message to

    100. Ed Mullen
    Folk music performances for downloading, discussions of ethics, using a computer as a recording device, ruminations.
    http://ejmullen.home.mindspring.com/contents.html

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 5     81-100 of 119    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20

    free hit counter