A hacker Manifesto / Wark McKenzie
| A hacker Manifesto / Wark McKenzie |
| Autore | WARK, McKenzie |
| Pubbl/distr/stampa | Cambridge [Mass.] : Harvard University Press, 2004 |
| Descrizione fisica | 1 v. (Paginaz. varia) ; 22 cm |
| Disciplina | 174.90904 |
| Soggetto topico |
Hackers Informatica - Diffusione - Aspetti sociali Informatici - Morale professionale |
| ISBN | 0-674-01543-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-990002399340203316 |
WARK, McKenzie
|
||
| Cambridge [Mass.] : Harvard University Press, 2004 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger
| The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger |
| Autore | Béranger Jérôme |
| Pubbl/distr/stampa | London : , : ISTE Ltd |
| Descrizione fisica | 1 online resource (285 pages) |
| Disciplina | 174.90904 |
| Collana | Technological prospects and social applications set |
| Soggetto topico |
Electronic data processing - Moral and ethical aspects
Information technology - Moral and ethical aspects |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-119-54969-8
1-119-50863-0 1-119-54967-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910466901603321 |
Béranger Jérôme
|
||
| London : , : ISTE Ltd | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger
| The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger |
| Autore | Béranger Jérôme |
| Pubbl/distr/stampa | London : , : ISTE Ltd |
| Descrizione fisica | 1 online resource (285 pages) |
| Disciplina | 174.90904 |
| Collana | Technological prospects and social applications set |
| Soggetto topico |
Electronic data processing - Moral and ethical aspects
Information technology - Moral and ethical aspects |
| ISBN |
1-119-54969-8
1-119-50863-0 1-119-54967-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910537882303321 |
Béranger Jérôme
|
||
| London : , : ISTE Ltd | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger
| The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger |
| Autore | Béranger Jérôme |
| Pubbl/distr/stampa | London : , : ISTE Ltd |
| Descrizione fisica | 1 online resource (285 pages) |
| Disciplina | 174.90904 |
| Collana | Technological prospects and social applications set |
| Soggetto topico |
Electronic data processing - Moral and ethical aspects
Information technology - Moral and ethical aspects |
| ISBN |
1-119-54969-8
1-119-50863-0 1-119-54967-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910826594503321 |
Béranger Jérôme
|
||
| London : , : ISTE Ltd | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ethical Computing : From Meta Ethics to Data Ethics
| Ethical Computing : From Meta Ethics to Data Ethics |
| Autore | Lee Wanbil |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Bradford : , : Ethics International Press Limited, , 2024 |
| Descrizione fisica | 1 online resource (509 pages) |
| Disciplina | 174.90904 |
| Soggetto topico | Electronic data processing - Moral and ethical aspects |
| ISBN |
1-80441-549-9
9781804415498 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Praise for Ethical Computing: From Meta Ethics to Data Ethics -- Preface -- Acknowledgements -- Chapter 1 Introduction -- The Context -- The Changes -- Finance and Banking Operations -- Digital Divide -- Work-life and Employment -- Democratic Values over the Internet -- The Problem -- Responsibility -- Accountability/ Liability -- Contractual Relationship -- Negligence -- Categorical Imperative and the buying/selling relationship -- Summary -- The Demand -- The Role of the Computer Professional -- Need for Ethical Standards -- Need for New Anti-Risk Mechanisms -- Conclusion -- References -- Chapter 2 The Computer-Ethics Connection - Computer Ethics & -- Ethical Computing Defined -- Introduction -- The Computer-Law-Ethics Connection -- Why Computer Ethics? -- The Argument Against 'Uniqueness' -- Premise 1 -- Premise 2 -- Conclusion -- The Argument For 'Uniqueness' -- Premise 1 -- Premise 2 -- Premise 3 -- Premise 4 -- Conclusion -- The Genus-species Approach (Lee, 2006-12, 2014-21): -- Philosophical views -- Practical views -- An Alternative Definition of Computer Ethics -- The Traditional View -- Classic definition -- Classic cases -- Dual Role of Ethics (Lee, 2015, p. 2994): -- The ethics & -- professionalism competencies (Lee, 2006-12, 2014-21): -- An Alternative View - a New Definition of Computer Ethics -- A different type of risk -- A different kind of anti-risk mechanism -- An academic discipline -- An applicable paradigm (Ethical Computing) -- Ethical Computing Defined -- Conclusion -- References -- Chapter 3 The Computer-Philosophy Connection: The Underpinning Ethical Principles -- Introduction -- Ethical Theories -- Why Ethical Theories -- Categories of Ethical Theories -- Meta-Ethics -- Metaphysical Issues -- Objectivism -- Voluntarism -- Skepticism -- Relativism -- Psychological Issues -- Egoism (Psychological).
Hedonism (Psychological) -- Altruism (Psychological) -- Emotionalism -- Prescriptivism -- Rationalism -- Gender morality -- Normative Ethics -- Golden/Silver Rule -- Duty & -- Rights based Theories -- Deontology -- Kantianism/Categorical Imperative -- Consequentialist Normative Theories -- Consequentialism -- Ethical Egoism -- Ethical Altruism -- Utilitarianism -- Social Contract Theory -- Rawls' Theory of Justice -- Virtue Ethics -- Applied Ethics -- Characteristics of applied ethical issues -- Normative principles of applied ethics -- Summary of Common Ethical Principles -- Relativistic Ethics -- Duty and Rights Based Ethics -- Results-based Ethics -- Ethics of reciprocity -- Conclusion -- References -- Chapter 4 The Computer-Law Connection: Computer Laws Evolved -- Introduction -- Computer Security -- Computer Risks -- Inherent risks -- Application-oriented risks -- Development-oriented risks -- Software-oriented risks -- Hidden risks -- Computer Viruses -- How it works -- How it spreads? -- Who and why? -- Computer Crimes -- Category 1 crimes -- Category 2 crimes -- The roles of a computer in computer crimes -- The rise of computer crimes -- Generic examples of computer crimes -- Some Hong Kong cases -- Counter-measures -- Operations security -- Personnel security -- Computer-related Laws -- Computer-related Laws in Hong Kong -- Computer Crime Ordinance (Cap 23) -- Personal Data (Privacy) Ordinance (Cap 486) (Office of the Privacy Commissioner for Data Privacy, Hong Kong, n.d.) -- Other Laws (amended existing laws) -- Other laws also amended -- Classical Cases in Hong Kong -- Computer-related Laws in Other Countries (a select sample, Table 2) -- Conclusion -- References -- Chapter 5 Current Major Issues: Data Privacy -- Introduction -- Privacy -- Definition of Privacy -- Concept of privacy -- Notion of access -- Notion of situation. Notion of condition -- Definition 1 (Access) -- Definition 2 (Right, Condition) -- Concluding remarks -- Benefits of Privacy -- Harms of Privacy -- Rights to Privacy -- Value/Importance of Privacy -- Universal value -- Intrinsic value -- Core value -- Social value -- A Common Misuse of the Term Privacy -- Data Privacy -- What Data Privacy Is and Is Not -- Why Personal Privacy is Special in Cyberspace -- Category of Privacy -- The concept of privacy category -- Generally held categories of privacy -- Clarke's categorization of privacy -- Solove's taxonomy of privacy problems -- The seven types of privacy by Finn et al -- Protection of Data Privacy -- The problem of data privacy protection -- Data privacy protection and changes in demand and status -- Methods of protection -- Advice about personal data protection -- Cost of privacy protection -- Precautionary tips -- A pragmatic step forward -- Conclusion -- References -- Chapter 6 Current Major Issues: Intellectual Property -- Introduction -- Protection of Intellectual Property -- Concept of Intellectual Property -- Notion of Property Rights -- Privacy Rights and Property Rights -- Methods of Intellectual Property Protection -- Copyright -- Patent -- Trade secret -- Trademarks & -- service marks -- A Cocktail Approach -- Trade secrets vs Patent -- IP Rights -- Under the Social Contract Theory perspective -- Under the Kantian categorical imperative perspective -- Under the utilitarian perspective -- Under the consequentialist perspective -- Benefits & -- Limits of IP Protection -- Benefits of IP protection -- Limits to IP protection -- Software as an Intellectual Property -- Software Copyright -- Software Ownership -- Morality Of Copying Proprietary Software -- Is it wrong to copy proprietary software? -- Is copying software harmful? -- Is copying software immoral because it is illegal?. Conclusion -- References -- Chapter 7 Current Major Issues: Others -- Introduction -- Digital Divide -- Global Divide -- Social Divide -- Issues of Current Interest -- A Real-life Case -- Anonymity -- Anonymity and security -- Trap of pseudo-anonymity -- No secret over the Internet -- The shielding - the misconstrued belief (eSafety Commission, 2021) -- Hiding email address -- Professionalism -- Profession -- Characteristics of a profession -- Is Computing a Profession? -- A comparison of ICT with Medicine/Law -- Professional -- Professional relationships -- Strongly differentiated and non-differentiated professional -- Ethics & -- Professionalism -- The functional areas and respective conveners -- The eighteen generic competencies -- Netiquette -- Amalgamation of Views -- Rules of Netiquette -- The ten core rules of netiquette (Cyberdefender.hk, n.d.) -- The ten netiquette rules (Einorytė, 2023) -- The 20 Internet etiquette rules (Kaspersky, 2023) -- The 10 basic netiquette rules (Hartney, 2023) -- The 10 netiquette guidelines every online student needs to know (Brook, 2019) -- My List of Dos & -- Don'ts -- Cyberbullying -- Conclusion -- References -- Chapter 8 Tools & -- Methods: Logical Analysis -- Introduction -- Critical Thinking -- What Is Critical Thinking? -- Meaning and definition -- What critical thinking is not -- Why Is It Difficult? -- How To Do It? -- How Do We Know We Are Doing It? -- Critical Thinkers and Non-critical thinkers -- Critical thinkers -- Non-critical thinkers -- How to become a critical thinker? -- Outcome of Critical Thinking -- Three Practical Tips -- Logical Argument Analysis -- Structure of Logical Argument -- Logical Fallacy -- Type 1: False cause fallacy -- Type 2: Ad hominem argument -- Type 3: Fallacy of ambiguity -- Type 4: Slippery slope argument -- Type 5: The many/any fallacy. Type 6: Fallacy of composition/fallacy of division -- Type 7: Fallacy of appeal to authority -- Type 8: Begging the question -- Type 9: Appeal to the people -- Type 10: The "virtuality" fallacy -- Types of Argument -- Valid and invalid arguments -- Sound & -- unsound arguments -- Inductive & -- fallacious arguments -- Summary of argument types -- Constructing an Argument -- Test of Validity -- Conclusion -- References -- Chapter 9 Tools & -- Methods: Ethical Decision Making -- Introduction -- Ethical Decision-Making and Analysis Guidelines -- The Four Principles of Ethical Decision Making -- Harm minimization -- Deontological principle -- Consequentialist principle -- Principle of consistency and respect (Kantian categorical imperative) -- Illustration -- The Practical Approaches To Decision-Making -- Legal approach -- Formal guidelines -- Informal guidelines -- Menu-Driven Linear Checklists -- The 4-step analysis -- The 5-step of principled reasoning -- The 7-step path for making ethical decisions -- Privacy Impact Assessment -- Data processing cycle analysis -- Privacy Risk Analysis -- PIA Reporting -- Illustration -- The story of Case N - The CIO's Dilemma -- The Analysis -- Step 1 - Analyze the situation -- Step 2 - Make a defensible ethical decision -- Step 3 - describe solution steps -- Step 4 - Prepare policies and strategies to prevent recurrence -- Conclusion -- References -- Chapter 10 Tools & -- Methods: Ethical Analytics -- Introduction -- Ethical Matrix -- Origin of the Matrix -- Elements of the Matrix -- Column -- Row -- Cell -- The Practical Value of the Matrix -- Expected outcomes and precondition -- Efficacy -- Adaptability -- Development of the Ethical Matrix Algorithm (µemx Algorithm) -- Quantification for Ethical Evaluation -- The variables -- The procedure (called µhmc Algorithm) -- Illustration of the procedure. Hexa-Dimension Metric. |
| Record Nr. | UNINA-9911008430303321 |
Lee Wanbil
|
||
| Bradford : , : Ethics International Press Limited, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ethical reasoning for a data-centered world / / by Rochelle E. Tractenberg, PhD, MPH, PhD, PStat®, FASA, FAAAS
| Ethical reasoning for a data-centered world / / by Rochelle E. Tractenberg, PhD, MPH, PhD, PStat®, FASA, FAAAS |
| Autore | Tractenberg Rochelle E. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | [Bradford, UK] : , : Ethics International Press Ltd, , 2022 |
| Descrizione fisica | 1 online resource (xx, 384 pages) : illustrations, charts |
| Disciplina | 174.90904 |
| Soggetto topico |
Data mining
Ethics |
| ISBN |
9781804410790
1804410799 9781804410783 1804410780 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Section 1. Background and introduction -- Section 2. Establishing familiarity with ASA and ACM principles/elements as they relate to the seven tasks of the statistics and data science pipeline: anticipating what problems may arise -- Section 3. Ethical reasoning using ASA and ACM principles/elements: case vignettes. |
| Record Nr. | UNINA-9910796059603321 |
Tractenberg Rochelle E.
|
||
| [Bradford, UK] : , : Ethics International Press Ltd, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ethical reasoning for a data-centered world / / by Rochelle E. Tractenberg, PhD, MPH, PhD, PStat®, FASA, FAAAS
| Ethical reasoning for a data-centered world / / by Rochelle E. Tractenberg, PhD, MPH, PhD, PStat®, FASA, FAAAS |
| Autore | Tractenberg Rochelle E. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Ethics International Press, 2022 |
| Descrizione fisica | 1 online resource (xx, 384 pages) : illustrations, charts |
| Disciplina | 174.90904 |
| Soggetto topico |
Data mining
Ethics |
| ISBN |
9781804410790
1804410799 1-80441-079-9 9781804410783 1804410780 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Section 1. Background and introduction -- Section 2. Establishing familiarity with ASA and ACM principles/elements as they relate to the seven tasks of the statistics and data science pipeline: anticipating what problems may arise -- Section 3. Ethical reasoning using ASA and ACM principles/elements: case vignettes. |
| Record Nr. | UNINA-9910825037703321 |
Tractenberg Rochelle E.
|
||
| Ethics International Press, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ethics and information technology
| Ethics and information technology |
| Pubbl/distr/stampa | Dordrecht, Netherlands, : Kluwer Academic Publishers |
| Disciplina | 174.90904 |
| Soggetto topico |
Information technology - Moral and ethical aspects
Electronic data processing - Moral and ethical aspects Ethics Electronic Data Processing Technologie de l'information - Aspect moral Informationstechnik Ethik Zeitschrift Online-Ressource |
| Soggetto genere / forma |
Periodical
Periodicals. |
| Soggetto non controllato | Computer Science |
| ISSN | 1572-8439 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Ethics & information technology
Ethics Inf Technol |
| Record Nr. | UNISA-996208327303316 |
| Dordrecht, Netherlands, : Kluwer Academic Publishers | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Ethics and information technology
| Ethics and information technology |
| Pubbl/distr/stampa | Dordrecht, Netherlands, : Kluwer Academic Publishers |
| Disciplina | 174.90904 |
| Soggetto topico |
Information technology - Moral and ethical aspects
Electronic data processing - Moral and ethical aspects Ethics Electronic Data Processing Technologie de l'information - Aspect moral Informationstechnik Ethik Zeitschrift Online-Ressource Ètica Processament de dades Tecnologia de la informació |
| Soggetto genere / forma |
Periodical
Periodicals. Revistes electròniques. |
| ISSN | 1572-8439 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Ethics & information technology
Ethics Inf Technol |
| Record Nr. | UNINA-9910143380803321 |
| Dordrecht, Netherlands, : Kluwer Academic Publishers | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ethics for the Information Age, Global Edition / / Michael J. Quinn
| Ethics for the Information Age, Global Edition / / Michael J. Quinn |
| Autore | Quinn Michael J. |
| Edizione | [Sixth edition, Global edition.] |
| Pubbl/distr/stampa | Boston : , : Pearson, , 2015 |
| Descrizione fisica | 1 online resource (551 pages) : illustrations |
| Disciplina | 174.90904 |
| Collana | Always learning |
| Soggetto topico | Electronic data processing - Moral and ethical aspects |
| ISBN |
1-292-06123-5
1-292-06190-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910153253503321 |
Quinn Michael J.
|
||
| Boston : , : Pearson, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||