Synopses & Reviews
From the reviews of the third edition: "It is encouraging to encounter a textbook for undergraduate students that is devoted to information age ethics ... . This third edition contains three new chapters. ... I appreciate Kizza's work in the ethical education of information technology (IT) students. ... Overall, I recommend this very basic ... but significant educational topic as an introductory text." (Brad Reid, ACM Computing Reviews, December, 2008) From the reviews of the fourth edition: "It could work in a computers and society course for students majoring in information technology or in a general education computers and society course for students with other majors. ... Companies that have a serious and ongoing commitment to ethical and privacy issues might use the book as a reference. ... I recommend this book to those who develop computer and business ethics coursework; it is as good as any other option available." (J. Fendrich, ACM Computing Reviews, October, 2010)
This thoroughly revised and expanded fourth edition provides an updated discussion of the ethical and social issues that continue to evolve as computing and information technologies proliferate.
The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity, speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual s social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services."
Table of Contents
History of Computing Morality and the Law Ethics and Ethical Analysis Ethics and the Professions Anonymity, Security, Privacy, and Civil Liberties Intellectual Property Rights and Computer Technology Social Context of Computing Software Issues: Risks and Liabilities Computer Crimes New Frontiers for Computer Ethics, Artificial Intelligence, Cyberspace, and Virtual Reality Cyberspace, Cyberethics and Social Networking Computer Networks and Online Crimes Computer Crime Investigations-Computer Forensics Biometrics