Notes on Contributors |
|
viii | |
Preface and Acknowledgments |
|
x | |
List of Abbreviations |
|
xv | |
Editors' Note: Computing Curricula 2001 Guidelines of IEEE-CS and the ACM |
|
xvii | |
Editors' Introduction: Ethics in the Information Age |
|
1 | (14) |
PART I: What Is Computer Ethics? |
|
15 | (74) |
|
|
17 | (4) |
|
1 Reason, Relativity, and Responsibility in Computer Ethics |
|
|
|
|
21 | (18) |
|
2 Unique Ethical Problems in Information Technology |
|
|
|
|
39 | (21) |
|
3 Ethical Decision-Making and Case Analysis in Computer Ethics Terrell |
|
|
|
|
60 | (27) |
|
Additional Readings and Web Resources |
|
|
87 | (2) |
PART II: Professional Responsibility |
|
89 | (44) |
|
|
91 | (7) |
|
4 Unintentional Power in the Design of Computing Systems |
|
|
|
|
98 | (9) |
|
5 Informatics and Professional Responsibility |
|
|
|
|
107 | (12) |
|
6 The Ethics of Software Development Project Management |
|
|
|
|
119 | (10) |
|
Case to Analyze: The London Ambulance Case |
|
|
129 | (3) |
|
Additional Readings and Web Resources |
|
|
132 | (1) |
PART III: Codes of Ethics |
|
133 | (70) |
|
|
135 | (7) |
|
7 No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All |
|
|
|
|
142 | (15) |
|
8 On Licensing Computer Professionals |
|
|
|
|
157 | (8) |
|
Case to Analyze: The Chemco Case |
|
|
165 | (2) |
|
Additional Readings and Web Resources |
|
|
167 | (2) |
|
Appendix: Example Codes of Ethics |
|
|
169 | (34) |
|
A1 The Software Engineering Code of Ethics and Professional Practice |
|
|
170 | (9) |
|
A2 The Association for Computing Machinery Code of Ethics and Professional Conduct |
|
|
179 | (9) |
|
A3 The Australian Computer Society Code of Ethics |
|
|
188 | (4) |
|
A4 The British Computer Society Code of Conduct |
|
|
192 | (4) |
|
A5 The Institute of Electrical and Electronics Engineers Code of Ethics |
|
|
196 | (1) |
|
A6 The Institute for the Management of Information Systems Code of Ethics |
|
|
197 | (6) |
PART IV: Sample Topics in Computer Ethics |
|
203 | (141) |
|
|
205 | (40) |
|
|
206 | (2) |
|
9 Computer Security and Human Values |
|
|
|
|
208 | (19) |
|
10 Are Computer Hacker Break-ins Ethical? |
|
|
|
|
227 | (14) |
|
Case to Analyze: A Flight of Fancy at AeroWright |
|
|
241 | (2) |
|
Additional Readings and Web Resources |
|
|
243 | (2) |
|
|
245 | (32) |
|
|
246 | (3) |
|
11 Towards a Theory of Privacy in the Information Age |
|
|
|
|
249 | (14) |
|
12 Data Protection in a Changing World |
|
|
|
|
263 | (11) |
|
Case to Analyze: A Small Matter of Privacy |
|
|
274 | (2) |
|
Additional Readings and Web Resources |
|
|
276 | (1) |
|
Computing and Intellectual Property |
|
|
277 | (38) |
|
|
278 | (7) |
|
13 Proprietary Rights in Computer Software: Individual and Policy Issues |
|
|
|
|
285 | (9) |
|
14 Why Software Should Be Free |
|
|
|
|
294 | (17) |
|
Case to Analyze: Free-Range Property |
|
|
311 | (3) |
|
Additional Readings and Web Resources |
|
|
314 | (1) |
|
Global Information Ethics |
|
|
315 | (29) |
|
|
316 | (3) |
|
15 The Computer Revolution and Global Ethics |
|
|
|
Krystyna Gorniak-Kocikowska |
|
|
319 | (8) |
|
16 Giving Offense on the Internet |
|
|
|
|
327 | (14) |
|
Case to Analyze: A Clever Idea |
|
|
341 | (2) |
|
Additional Readings and Web Resources |
|
|
343 | (1) |
A Final Case to Analyze |
|
344 | (3) |
Bibliography |
|
347 | (6) |
Index |
|
353 | |