11757nam 22004933 450 991100843030332120251125033317.01-80441-549-99781804415498(MiAaPQ)EBC31338105(CKB)31995243500041(Au-PeEL)EBL31338105(OCoLC)1434176826(EXLCZ)993199524350004120251121d2024 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierEthical Computing From Meta Ethics to Data Ethics1st ed.Bradford :Ethics International Press Limited,2024.©2024.1 online resource (509 pages)1-80441-548-0 Praise for Ethical Computing: From Meta Ethics to Data Ethics -- Preface -- Acknowledgements -- Chapter 1 Introduction -- The Context -- The Changes -- Finance and Banking Operations -- Digital Divide -- Work-life and Employment -- Democratic Values over the Internet -- The Problem -- Responsibility -- Accountability/ Liability -- Contractual Relationship -- Negligence -- Categorical Imperative and the buying/selling relationship -- Summary -- The Demand -- The Role of the Computer Professional -- Need for Ethical Standards -- Need for New Anti-Risk Mechanisms -- Conclusion -- References -- Chapter 2 The Computer-Ethics Connection - Computer Ethics &amp -- Ethical Computing Defined -- Introduction -- The Computer-Law-Ethics Connection -- Why Computer Ethics? -- The Argument Against 'Uniqueness' -- Premise 1 -- Premise 2 -- Conclusion -- The Argument For 'Uniqueness' -- Premise 1 -- Premise 2 -- Premise 3 -- Premise 4 -- Conclusion -- The Genus-species Approach (Lee, 2006-12, 2014-21): -- Philosophical views -- Practical views -- An Alternative Definition of Computer Ethics -- The Traditional View -- Classic definition -- Classic cases -- Dual Role of Ethics (Lee, 2015, p. 2994): -- The ethics &amp -- professionalism competencies (Lee, 2006-12, 2014-21): -- An Alternative View - a New Definition of Computer Ethics -- A different type of risk -- A different kind of anti-risk mechanism -- An academic discipline -- An applicable paradigm (Ethical Computing) -- Ethical Computing Defined -- Conclusion -- References -- Chapter 3 The Computer-Philosophy Connection: The Underpinning Ethical Principles -- Introduction -- Ethical Theories -- Why Ethical Theories -- Categories of Ethical Theories -- Meta-Ethics -- Metaphysical Issues -- Objectivism -- Voluntarism -- Skepticism -- Relativism -- Psychological Issues -- Egoism (Psychological).Hedonism (Psychological) -- Altruism (Psychological) -- Emotionalism -- Prescriptivism -- Rationalism -- Gender morality -- Normative Ethics -- Golden/Silver Rule -- Duty &amp -- Rights based Theories -- Deontology -- Kantianism/Categorical Imperative -- Consequentialist Normative Theories -- Consequentialism -- Ethical Egoism -- Ethical Altruism -- Utilitarianism -- Social Contract Theory -- Rawls' Theory of Justice -- Virtue Ethics -- Applied Ethics -- Characteristics of applied ethical issues -- Normative principles of applied ethics -- Summary of Common Ethical Principles -- Relativistic Ethics -- Duty and Rights Based Ethics -- Results-based Ethics -- Ethics of reciprocity -- Conclusion -- References -- Chapter 4 The Computer-Law Connection: Computer Laws Evolved -- Introduction -- Computer Security -- Computer Risks -- Inherent risks -- Application-oriented risks -- Development-oriented risks -- Software-oriented risks -- Hidden risks -- Computer Viruses -- How it works -- How it spreads? -- Who and why? -- Computer Crimes -- Category 1 crimes -- Category 2 crimes -- The roles of a computer in computer crimes -- The rise of computer crimes -- Generic examples of computer crimes -- Some Hong Kong cases -- Counter-measures -- Operations security -- Personnel security -- Computer-related Laws -- Computer-related Laws in Hong Kong -- Computer Crime Ordinance (Cap 23) -- Personal Data (Privacy) Ordinance (Cap 486) (Office of the Privacy Commissioner for Data Privacy, Hong Kong, n.d.) -- Other Laws (amended existing laws) -- Other laws also amended -- Classical Cases in Hong Kong -- Computer-related Laws in Other Countries (a select sample, Table 2) -- Conclusion -- References -- Chapter 5 Current Major Issues: Data Privacy -- Introduction -- Privacy -- Definition of Privacy -- Concept of privacy -- Notion of access -- Notion of situation.Notion of condition -- Definition 1 (Access) -- Definition 2 (Right, Condition) -- Concluding remarks -- Benefits of Privacy -- Harms of Privacy -- Rights to Privacy -- Value/Importance of Privacy -- Universal value -- Intrinsic value -- Core value -- Social value -- A Common Misuse of the Term Privacy -- Data Privacy -- What Data Privacy Is and Is Not -- Why Personal Privacy is Special in Cyberspace -- Category of Privacy -- The concept of privacy category -- Generally held categories of privacy -- Clarke's categorization of privacy -- Solove's taxonomy of privacy problems -- The seven types of privacy by Finn et al -- Protection of Data Privacy -- The problem of data privacy protection -- Data privacy protection and changes in demand and status -- Methods of protection -- Advice about personal data protection -- Cost of privacy protection -- Precautionary tips -- A pragmatic step forward -- Conclusion -- References -- Chapter 6 Current Major Issues: Intellectual Property -- Introduction -- Protection of Intellectual Property -- Concept of Intellectual Property -- Notion of Property Rights -- Privacy Rights and Property Rights -- Methods of Intellectual Property Protection -- Copyright -- Patent -- Trade secret -- Trademarks &amp -- service marks -- A Cocktail Approach -- Trade secrets vs Patent -- IP Rights -- Under the Social Contract Theory perspective -- Under the Kantian categorical imperative perspective -- Under the utilitarian perspective -- Under the consequentialist perspective -- Benefits &amp -- Limits of IP Protection -- Benefits of IP protection -- Limits to IP protection -- Software as an Intellectual Property -- Software Copyright -- Software Ownership -- Morality Of Copying Proprietary Software -- Is it wrong to copy proprietary software? -- Is copying software harmful? -- Is copying software immoral because it is illegal?.Conclusion -- References -- Chapter 7 Current Major Issues: Others -- Introduction -- Digital Divide -- Global Divide -- Social Divide -- Issues of Current Interest -- A Real-life Case -- Anonymity -- Anonymity and security -- Trap of pseudo-anonymity -- No secret over the Internet -- The shielding - the misconstrued belief (eSafety Commission, 2021) -- Hiding email address -- Professionalism -- Profession -- Characteristics of a profession -- Is Computing a Profession? -- A comparison of ICT with Medicine/Law -- Professional -- Professional relationships -- Strongly differentiated and non-differentiated professional -- Ethics &amp -- Professionalism -- The functional areas and respective conveners -- The eighteen generic competencies -- Netiquette -- Amalgamation of Views -- Rules of Netiquette -- The ten core rules of netiquette (Cyberdefender.hk, n.d.) -- The ten netiquette rules (Einorytė, 2023) -- The 20 Internet etiquette rules (Kaspersky, 2023) -- The 10 basic netiquette rules (Hartney, 2023) -- The 10 netiquette guidelines every online student needs to know (Brook, 2019) -- My List of Dos &amp -- Don'ts -- Cyberbullying -- Conclusion -- References -- Chapter 8 Tools &amp -- Methods: Logical Analysis -- Introduction -- Critical Thinking -- What Is Critical Thinking? -- Meaning and definition -- What critical thinking is not -- Why Is It Difficult? -- How To Do It? -- How Do We Know We Are Doing It? -- Critical Thinkers and Non-critical thinkers -- Critical thinkers -- Non-critical thinkers -- How to become a critical thinker? -- Outcome of Critical Thinking -- Three Practical Tips -- Logical Argument Analysis -- Structure of Logical Argument -- Logical Fallacy -- Type 1: False cause fallacy -- Type 2: Ad hominem argument -- Type 3: Fallacy of ambiguity -- Type 4: Slippery slope argument -- Type 5: The many/any fallacy.Type 6: Fallacy of composition/fallacy of division -- Type 7: Fallacy of appeal to authority -- Type 8: Begging the question -- Type 9: Appeal to the people -- Type 10: The "virtuality" fallacy -- Types of Argument -- Valid and invalid arguments -- Sound &amp -- unsound arguments -- Inductive &amp -- fallacious arguments -- Summary of argument types -- Constructing an Argument -- Test of Validity -- Conclusion -- References -- Chapter 9 Tools &amp -- Methods: Ethical Decision Making -- Introduction -- Ethical Decision-Making and Analysis Guidelines -- The Four Principles of Ethical Decision Making -- Harm minimization -- Deontological principle -- Consequentialist principle -- Principle of consistency and respect (Kantian categorical imperative) -- Illustration -- The Practical Approaches To Decision-Making -- Legal approach -- Formal guidelines -- Informal guidelines -- Menu-Driven Linear Checklists -- The 4-step analysis -- The 5-step of principled reasoning -- The 7-step path for making ethical decisions -- Privacy Impact Assessment -- Data processing cycle analysis -- Privacy Risk Analysis -- PIA Reporting -- Illustration -- The story of Case N - The CIO's Dilemma -- The Analysis -- Step 1 - Analyze the situation -- Step 2 - Make a defensible ethical decision -- Step 3 - describe solution steps -- Step 4 - Prepare policies and strategies to prevent recurrence -- Conclusion -- References -- Chapter 10 Tools &amp -- Methods: Ethical Analytics -- Introduction -- Ethical Matrix -- Origin of the Matrix -- Elements of the Matrix -- Column -- Row -- Cell -- The Practical Value of the Matrix -- Expected outcomes and precondition -- Efficacy -- Adaptability -- Development of the Ethical Matrix Algorithm (µemx Algorithm) -- Quantification for Ethical Evaluation -- The variables -- The procedure (called µhmc Algorithm) -- Illustration of the procedure.Hexa-Dimension Metric.Ethical Computing is a means to an end as well as an end to itself; a problem, and a solution to a problem. It is the application of computer ethics in striving for doing-the-right-thing effectively in cyberspace or an information-intensive and technology-driven environment. The book addresses the realities of using computers while measuring up to the hexa-dimension metric (technically effective, financially viable, legally valid, ethically and socially acceptable and ecologically sustainable) manifested in applications from problem to ethical solution. This book collects work and research in practise and teaching across decades, covering a multitude of fields including information technology and engineering, computer audit & data governance, law practice and enforcement, and public and business administration. This is useful reference for researchers, teachers and students in all fields of information technology. It will also be useful for Chief Information Officers and Chief Technology Officers (CIOs and CTOs) and information systems auditors, and specialist IT law practitioners.Electronic data processingMoral and ethical aspectsElectronic data processingMoral and ethical aspects.174.90904Lee Wanbil1827271MiAaPQMiAaPQMiAaPQBOOK9911008430303321Ethical computing4395375UNINA