top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
A hacker Manifesto / Wark McKenzie
A hacker Manifesto / Wark McKenzie
Autore WARK, McKenzie
Pubbl/distr/stampa Cambridge [Mass.] : Harvard University Press, 2004
Descrizione fisica 1 v. (Paginaz. varia) ; 22 cm
Disciplina 174.90904
Soggetto topico Hackers
Informatica - Diffusione - Aspetti sociali
Informatici - Morale professionale
ISBN 0-674-01543-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990002399340203316
WARK, McKenzie  
Cambridge [Mass.] : Harvard University Press, 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger
The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger
Autore Béranger Jérôme
Pubbl/distr/stampa London : , : ISTE Ltd
Descrizione fisica 1 online resource (285 pages)
Disciplina 174.90904
Collana Technological prospects and social applications set
Soggetto topico Electronic data processing - Moral and ethical aspects
Information technology - Moral and ethical aspects
Soggetto genere / forma Electronic books.
ISBN 1-119-54969-8
1-119-50863-0
1-119-54967-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910466901603321
Béranger Jérôme  
London : , : ISTE Ltd
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger
The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger
Autore Béranger Jérôme
Pubbl/distr/stampa London : , : ISTE Ltd
Descrizione fisica 1 online resource (285 pages)
Disciplina 174.90904
Collana Technological prospects and social applications set
Soggetto topico Electronic data processing - Moral and ethical aspects
Information technology - Moral and ethical aspects
ISBN 1-119-54969-8
1-119-50863-0
1-119-54967-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910537882303321
Béranger Jérôme  
London : , : ISTE Ltd
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger
The algorithmic code of ethics : ethics at the bedside of the digital revolution / / Jerome Beranger
Autore Béranger Jérôme
Pubbl/distr/stampa London : , : ISTE Ltd
Descrizione fisica 1 online resource (285 pages)
Disciplina 174.90904
Collana Technological prospects and social applications set
Soggetto topico Electronic data processing - Moral and ethical aspects
Information technology - Moral and ethical aspects
ISBN 1-119-54969-8
1-119-50863-0
1-119-54967-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910826594503321
Béranger Jérôme  
London : , : ISTE Ltd
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ethical Computing : From Meta Ethics to Data Ethics
Ethical Computing : From Meta Ethics to Data Ethics
Autore Lee Wanbil
Edizione [1st ed.]
Pubbl/distr/stampa Bradford : , : Ethics International Press Limited, , 2024
Descrizione fisica 1 online resource (509 pages)
Disciplina 174.90904
Soggetto topico Electronic data processing - Moral and ethical aspects
ISBN 1-80441-549-9
9781804415498
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Praise for Ethical Computing: From Meta Ethics to Data Ethics -- Preface -- Acknowledgements -- Chapter 1 Introduction -- The Context -- The Changes -- Finance and Banking Operations -- Digital Divide -- Work-life and Employment -- Democratic Values over the Internet -- The Problem -- Responsibility -- Accountability/ Liability -- Contractual Relationship -- Negligence -- Categorical Imperative and the buying/selling relationship -- Summary -- The Demand -- The Role of the Computer Professional -- Need for Ethical Standards -- Need for New Anti-Risk Mechanisms -- Conclusion -- References -- Chapter 2 The Computer-Ethics Connection - Computer Ethics & -- Ethical Computing Defined -- Introduction -- The Computer-Law-Ethics Connection -- Why Computer Ethics? -- The Argument Against 'Uniqueness' -- Premise 1 -- Premise 2 -- Conclusion -- The Argument For 'Uniqueness' -- Premise 1 -- Premise 2 -- Premise 3 -- Premise 4 -- Conclusion -- The Genus-species Approach (Lee, 2006-12, 2014-21): -- Philosophical views -- Practical views -- An Alternative Definition of Computer Ethics -- The Traditional View -- Classic definition -- Classic cases -- Dual Role of Ethics (Lee, 2015, p. 2994): -- The ethics & -- professionalism competencies (Lee, 2006-12, 2014-21): -- An Alternative View - a New Definition of Computer Ethics -- A different type of risk -- A different kind of anti-risk mechanism -- An academic discipline -- An applicable paradigm (Ethical Computing) -- Ethical Computing Defined -- Conclusion -- References -- Chapter 3 The Computer-Philosophy Connection: The Underpinning Ethical Principles -- Introduction -- Ethical Theories -- Why Ethical Theories -- Categories of Ethical Theories -- Meta-Ethics -- Metaphysical Issues -- Objectivism -- Voluntarism -- Skepticism -- Relativism -- Psychological Issues -- Egoism (Psychological).
Hedonism (Psychological) -- Altruism (Psychological) -- Emotionalism -- Prescriptivism -- Rationalism -- Gender morality -- Normative Ethics -- Golden/Silver Rule -- Duty & -- Rights based Theories -- Deontology -- Kantianism/Categorical Imperative -- Consequentialist Normative Theories -- Consequentialism -- Ethical Egoism -- Ethical Altruism -- Utilitarianism -- Social Contract Theory -- Rawls' Theory of Justice -- Virtue Ethics -- Applied Ethics -- Characteristics of applied ethical issues -- Normative principles of applied ethics -- Summary of Common Ethical Principles -- Relativistic Ethics -- Duty and Rights Based Ethics -- Results-based Ethics -- Ethics of reciprocity -- Conclusion -- References -- Chapter 4 The Computer-Law Connection: Computer Laws Evolved -- Introduction -- Computer Security -- Computer Risks -- Inherent risks -- Application-oriented risks -- Development-oriented risks -- Software-oriented risks -- Hidden risks -- Computer Viruses -- How it works -- How it spreads? -- Who and why? -- Computer Crimes -- Category 1 crimes -- Category 2 crimes -- The roles of a computer in computer crimes -- The rise of computer crimes -- Generic examples of computer crimes -- Some Hong Kong cases -- Counter-measures -- Operations security -- Personnel security -- Computer-related Laws -- Computer-related Laws in Hong Kong -- Computer Crime Ordinance (Cap 23) -- Personal Data (Privacy) Ordinance (Cap 486) (Office of the Privacy Commissioner for Data Privacy, Hong Kong, n.d.) -- Other Laws (amended existing laws) -- Other laws also amended -- Classical Cases in Hong Kong -- Computer-related Laws in Other Countries (a select sample, Table 2) -- Conclusion -- References -- Chapter 5 Current Major Issues: Data Privacy -- Introduction -- Privacy -- Definition of Privacy -- Concept of privacy -- Notion of access -- Notion of situation.
Notion of condition -- Definition 1 (Access) -- Definition 2 (Right, Condition) -- Concluding remarks -- Benefits of Privacy -- Harms of Privacy -- Rights to Privacy -- Value/Importance of Privacy -- Universal value -- Intrinsic value -- Core value -- Social value -- A Common Misuse of the Term Privacy -- Data Privacy -- What Data Privacy Is and Is Not -- Why Personal Privacy is Special in Cyberspace -- Category of Privacy -- The concept of privacy category -- Generally held categories of privacy -- Clarke's categorization of privacy -- Solove's taxonomy of privacy problems -- The seven types of privacy by Finn et al -- Protection of Data Privacy -- The problem of data privacy protection -- Data privacy protection and changes in demand and status -- Methods of protection -- Advice about personal data protection -- Cost of privacy protection -- Precautionary tips -- A pragmatic step forward -- Conclusion -- References -- Chapter 6 Current Major Issues: Intellectual Property -- Introduction -- Protection of Intellectual Property -- Concept of Intellectual Property -- Notion of Property Rights -- Privacy Rights and Property Rights -- Methods of Intellectual Property Protection -- Copyright -- Patent -- Trade secret -- Trademarks & -- service marks -- A Cocktail Approach -- Trade secrets vs Patent -- IP Rights -- Under the Social Contract Theory perspective -- Under the Kantian categorical imperative perspective -- Under the utilitarian perspective -- Under the consequentialist perspective -- Benefits & -- Limits of IP Protection -- Benefits of IP protection -- Limits to IP protection -- Software as an Intellectual Property -- Software Copyright -- Software Ownership -- Morality Of Copying Proprietary Software -- Is it wrong to copy proprietary software? -- Is copying software harmful? -- Is copying software immoral because it is illegal?.
Conclusion -- References -- Chapter 7 Current Major Issues: Others -- Introduction -- Digital Divide -- Global Divide -- Social Divide -- Issues of Current Interest -- A Real-life Case -- Anonymity -- Anonymity and security -- Trap of pseudo-anonymity -- No secret over the Internet -- The shielding - the misconstrued belief (eSafety Commission, 2021) -- Hiding email address -- Professionalism -- Profession -- Characteristics of a profession -- Is Computing a Profession? -- A comparison of ICT with Medicine/Law -- Professional -- Professional relationships -- Strongly differentiated and non-differentiated professional -- Ethics & -- Professionalism -- The functional areas and respective conveners -- The eighteen generic competencies -- Netiquette -- Amalgamation of Views -- Rules of Netiquette -- The ten core rules of netiquette (Cyberdefender.hk, n.d.) -- The ten netiquette rules (Einorytė, 2023) -- The 20 Internet etiquette rules (Kaspersky, 2023) -- The 10 basic netiquette rules (Hartney, 2023) -- The 10 netiquette guidelines every online student needs to know (Brook, 2019) -- My List of Dos & -- Don'ts -- Cyberbullying -- Conclusion -- References -- Chapter 8 Tools & -- Methods: Logical Analysis -- Introduction -- Critical Thinking -- What Is Critical Thinking? -- Meaning and definition -- What critical thinking is not -- Why Is It Difficult? -- How To Do It? -- How Do We Know We Are Doing It? -- Critical Thinkers and Non-critical thinkers -- Critical thinkers -- Non-critical thinkers -- How to become a critical thinker? -- Outcome of Critical Thinking -- Three Practical Tips -- Logical Argument Analysis -- Structure of Logical Argument -- Logical Fallacy -- Type 1: False cause fallacy -- Type 2: Ad hominem argument -- Type 3: Fallacy of ambiguity -- Type 4: Slippery slope argument -- Type 5: The many/any fallacy.
Type 6: Fallacy of composition/fallacy of division -- Type 7: Fallacy of appeal to authority -- Type 8: Begging the question -- Type 9: Appeal to the people -- Type 10: The "virtuality" fallacy -- Types of Argument -- Valid and invalid arguments -- Sound & -- unsound arguments -- Inductive & -- fallacious arguments -- Summary of argument types -- Constructing an Argument -- Test of Validity -- Conclusion -- References -- Chapter 9 Tools & -- Methods: Ethical Decision Making -- Introduction -- Ethical Decision-Making and Analysis Guidelines -- The Four Principles of Ethical Decision Making -- Harm minimization -- Deontological principle -- Consequentialist principle -- Principle of consistency and respect (Kantian categorical imperative) -- Illustration -- The Practical Approaches To Decision-Making -- Legal approach -- Formal guidelines -- Informal guidelines -- Menu-Driven Linear Checklists -- The 4-step analysis -- The 5-step of principled reasoning -- The 7-step path for making ethical decisions -- Privacy Impact Assessment -- Data processing cycle analysis -- Privacy Risk Analysis -- PIA Reporting -- Illustration -- The story of Case N - The CIO's Dilemma -- The Analysis -- Step 1 - Analyze the situation -- Step 2 - Make a defensible ethical decision -- Step 3 - describe solution steps -- Step 4 - Prepare policies and strategies to prevent recurrence -- Conclusion -- References -- Chapter 10 Tools & -- Methods: Ethical Analytics -- Introduction -- Ethical Matrix -- Origin of the Matrix -- Elements of the Matrix -- Column -- Row -- Cell -- The Practical Value of the Matrix -- Expected outcomes and precondition -- Efficacy -- Adaptability -- Development of the Ethical Matrix Algorithm (µemx Algorithm) -- Quantification for Ethical Evaluation -- The variables -- The procedure (called µhmc Algorithm) -- Illustration of the procedure.
Hexa-Dimension Metric.
Record Nr. UNINA-9911008430303321
Lee Wanbil  
Bradford : , : Ethics International Press Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ethical reasoning for a data-centered world / / by Rochelle E. Tractenberg, PhD, MPH, PhD, PStat®, FASA, FAAAS
Ethical reasoning for a data-centered world / / by Rochelle E. Tractenberg, PhD, MPH, PhD, PStat®, FASA, FAAAS
Autore Tractenberg Rochelle E.
Edizione [1st edition]
Pubbl/distr/stampa [Bradford, UK] : , : Ethics International Press Ltd, , 2022
Descrizione fisica 1 online resource (xx, 384 pages) : illustrations, charts
Disciplina 174.90904
Soggetto topico Data mining
Ethics
ISBN 9781804410790
1804410799
9781804410783
1804410780
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1. Background and introduction -- Section 2. Establishing familiarity with ASA and ACM principles/elements as they relate to the seven tasks of the statistics and data science pipeline: anticipating what problems may arise -- Section 3. Ethical reasoning using ASA and ACM principles/elements: case vignettes.
Record Nr. UNINA-9910796059603321
Tractenberg Rochelle E.  
[Bradford, UK] : , : Ethics International Press Ltd, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ethical reasoning for a data-centered world / / by Rochelle E. Tractenberg, PhD, MPH, PhD, PStat®, FASA, FAAAS
Ethical reasoning for a data-centered world / / by Rochelle E. Tractenberg, PhD, MPH, PhD, PStat®, FASA, FAAAS
Autore Tractenberg Rochelle E.
Edizione [1st edition]
Pubbl/distr/stampa Ethics International Press, 2022
Descrizione fisica 1 online resource (xx, 384 pages) : illustrations, charts
Disciplina 174.90904
Soggetto topico Data mining
Ethics
ISBN 9781804410790
1804410799
1-80441-079-9
9781804410783
1804410780
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1. Background and introduction -- Section 2. Establishing familiarity with ASA and ACM principles/elements as they relate to the seven tasks of the statistics and data science pipeline: anticipating what problems may arise -- Section 3. Ethical reasoning using ASA and ACM principles/elements: case vignettes.
Record Nr. UNINA-9910825037703321
Tractenberg Rochelle E.  
Ethics International Press, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ethics and information technology
Ethics and information technology
Pubbl/distr/stampa Dordrecht, Netherlands, : Kluwer Academic Publishers
Disciplina 174.90904
Soggetto topico Information technology - Moral and ethical aspects
Electronic data processing - Moral and ethical aspects
Ethics
Electronic Data Processing
Technologie de l'information - Aspect moral
Informationstechnik
Ethik
Zeitschrift
Online-Ressource
Soggetto genere / forma Periodical
Periodicals.
Soggetto non controllato Computer Science
ISSN 1572-8439
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Ethics & information technology
Ethics Inf Technol
Record Nr. UNISA-996208327303316
Dordrecht, Netherlands, : Kluwer Academic Publishers
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Ethics and information technology
Ethics and information technology
Pubbl/distr/stampa Dordrecht, Netherlands, : Kluwer Academic Publishers
Disciplina 174.90904
Soggetto topico Information technology - Moral and ethical aspects
Electronic data processing - Moral and ethical aspects
Ethics
Electronic Data Processing
Technologie de l'information - Aspect moral
Informationstechnik
Ethik
Zeitschrift
Online-Ressource
Ètica
Processament de dades
Tecnologia de la informació
Soggetto genere / forma Periodical
Periodicals.
Revistes electròniques.
ISSN 1572-8439
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Ethics & information technology
Ethics Inf Technol
Record Nr. UNINA-9910143380803321
Dordrecht, Netherlands, : Kluwer Academic Publishers
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ethics for the Information Age, Global Edition / / Michael J. Quinn
Ethics for the Information Age, Global Edition / / Michael J. Quinn
Autore Quinn Michael J.
Edizione [Sixth edition, Global edition.]
Pubbl/distr/stampa Boston : , : Pearson, , 2015
Descrizione fisica 1 online resource (551 pages) : illustrations
Disciplina 174.90904
Collana Always learning
Soggetto topico Electronic data processing - Moral and ethical aspects
ISBN 1-292-06123-5
1-292-06190-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910153253503321
Quinn Michael J.  
Boston : , : Pearson, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui