Quigley M. Encyclopedia of information ethics and security (Hershey; New York, 2008). - ОГЛАВЛЕНИЕ / CONTENTS

Навигация

Архив выставки новых поступлений | Отечественные поступления | Иностранные поступления | Сиглы
ОбложкаQuigley M. Encyclopedia of information ethics and security. - Hershey; New York: Information science reference, 2008. - xvii, 661 p.: ill., tab. - Incl. bibl. ref. and index. - ISBN 978-159140-987-8
 

Место хранения: 02 | Отделение ГПНТБ СО РАН | Новосибирск

Оглавление / Contents
 
3D Avatars and Collaborative Virtual Environments
   Koon-Ying, Raymond Li, James Sofra, and Mark Power ........... 1
Access Control for Healthcare
   Yifeng Shen .................................................. 7
Advertising in the Networked Environment
   Savvas Papagiannidis and Michael Bourlakis .................. 15
Anonymous Peer-to-Peer Systems
   Wenbing Zhao ................................................ 23
Argumentation and Computing
   Ephraim Nissan .............................................. 30
Argumentation with Wigmore Charts and Computing
   Ephraim Nissan .............................................. 36
Artificial Intelligence Tools for Handling Legal Evidence
   Ephraim Nissan .............................................. 42
Barriers Facing African American Women in Technology
   Jianxia Du, George H. Pate, Deneen Sherrod, and Wei-Chieh
   Yu .......................................................... 49
B-POS Secure Mobile Payment System
   Antonio Griilo, Alessandro Lentini, and Gianluigi Me ........ 55
Building Secure and Dependable Information Systems
   Wenbing Zhao ................................................ 62
Classifying Articles in Information Ethics and Security
   Zack Joitrdan, R. Kelly Rainer Jr., and Thomas E. Marshall .. 68
Computational Ethics
   Alicia I. Ruvinsky .......................................... 76
Computer Ethics and Intelligent Technologies
   Yefim Kats .................................................. 83
Computer Worms, Detection, and Defense
   Robert J. Cole and Chao-Hsien Chu ........................... 89
Conflicting Value of Digital Music Piracy
   Matthew Butler .............................................. 96
Content Filtering Methods for Internet Pornography
   Jengchung V. Chen and Shao Yu F. Huang ..................... 102
Cyber-Terrorism in Australia
   Christopher Beggs .......................................... 108
Data Security and Chase
   Zbigniew W. Ras and Seunghyun Im ........................... 114
Defending against Distributed Denial of Service
   Yang Xiang and Wanlei Zhou ................................. 121
Digital Divide Implications and Trends
   Irene Chen and Terry T. Kidd ............................... 130
Digital Rights Management Metadata and Standards
   Jo Anne Cote and Eun G. Park ............................... 136
Dilemmas of Online Identity Theft
   Omer Mahmood ............................................... 143
Document Security in the Ancient World
   Christopher H. Walker ...................................... 150
DRM Practices in the E-Publication Industry
   Bong Wee Kiau and Norshuhada Shiratuddin ................... 157
Educational Technology Practitioner-Research Ethics
   Kathleen Gray .............................................. 164
E-Health and Ensuring Quality
   Prajesh Chhanabhai and Alec Holt ........................... 170
Electronic Signatures and Ethics
   A. Srivastava and S.B. Thomson ............................. 179
Engineering Multi-Agent Systems
   Tagelsir Mohamed Gasmelseid ................................ 187
Ethical Approach to Gathering Survey Data Online
   Sophie Nichol and Kathy Blashki ............................ 194
Ethical Behaviour in Technology-Mediated Communication
   Sutirtha Chatterjee ........................................ 201
Ethical Concerns in Computer Science Projects
   Alistair Irons and Roger Boyle ............................. 208
Ethical Debate Surrounding RFID The
   Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero,
   Susan J. Nestor, and Keith LeDonne ......................... 214
Ethical Dilemmas in Data Mining and Warehousing
   Joseph A. Cozier and Ryan C. LaBrie ........................ 221
Ethical Erosion at Enron
   John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee ..... 229
Ethical Usability Testing with Children
   Kirsten Ellis and Marian Quigley ........................... 235
Ethics and Access to Technology for Persons with
Disabilities
   Belinda Davis Lazarus ...................................... 241
Ethics and Perceptions in Online Learning Environments
   Michelle M. Ramim .......................................... 246
Ethics and Security under the Sarbanes-Oxley Act
   Thomas J. Tribunella and Heidi R. Tribunella ............... 254
Ethics Education for the Online Environment
   Lori N.K. Leonard and Tracy S. Manly ....................... 260
Ethics in Software Engineering
   Pankaj Kamthan ............................................. 266
Ethics in the Security of Organizational Information Systems
   Sushma Mishra and Amita Goyal Chin ......................... 273
Ethics of AI
   Kevin В. Korb .............................................. 279
Fair Use
   Pasi Tyrväskylä ............................................ 285
Federal Information Security Law
   Michael J. Chappie and Charles R. Crowell .................. 291
Formulating a Code of Cyberethics for a Municipality
   Udo Richard Averweg ........................................ 297
Hackers and Cyber Terrorists
   M.J. Warren ................................................ 304
Homo Electricus and the Continued Speciation of Humans
   Katina Michael and M.G. Michael ............................ 312
IT Security Culture Transition Process
   Leanne Ngo ................................................. 319
ICT Leapfrogging Policy and Development in the Third World
   Amanda Third and Kai-Ti Kao ................................ 326
Identity Verification using Resting State Brain Signals
   Ramaswamy Palaniappan and halit M. Patnaik ................. 335
Individual and Institutional Responses to Staff Plagiarism
   Carmel McNaught ............................................ 342
Information Ethics as Ideology
   Bernd Carsten Stahl ........................................ 348
Information Ethics from an Islamic Perspective
   Salam Abdallah ............................................. 355
Information Security and the "Privacy Broker"
   Michael Douma and Eduard J. Gamito ......................... 362
Information Security Policies for Networkable Devices
   Julia Kotlarsky, Han Oshri, and Corey Hirsch ............... 370
Information Security Policy Research Agenda
   Heather Fulford and Neil Doherty ........................... 377
Internet and Suicide
   Dianne Currier ............................................. 384
Internet Piracy and Copyright Debates
   Paul Sugden ................................................ 391
Internet Research Ethics Questions and Considerations
   Elizabeth Buchanan ......................................... 397
Interviews with Young People using Online Chat
   Elza Dunkels and Ann Britt Enochsson ....................... 403
Intrusion Detection and Information Security Audits
   Terry T. Kidd and Robert K. Hiltbrand ...................... 411
Investigation Strategy for the Small Pedophiles World
   Gianluigi Me ............................................... 418
Managed Services and Changing Workplace Ethics
   Alan Sixsmith .............................................. 426
Managing the Environmental Impact of Information Technology
   Laurel Evelyn Dyson ........................................ 433
Measuring Ethical Reasoning of IT Professionals and Students
   Mohammad Abdolmohammadi and Jane Fedorowicz ................ 440
Meta View of Information Ethics
   Charles R. Crowell and Robert N. Barger .................... 445
Mitigation of Identity Theft in the Information Age
   Reggie Becker, Mark B. Schmidt, and Allen C. Johnston ...... 451
Mobile Agents and Security
   Fei Xue .................................................... 457
Modelling Context-Aware Security for Electronic Health
Records
   Pravin Shetty and Seng Loke ................................ 463
Moral Rights in the Australian Public Sector
   Lynley Hocking ............................................. 470
Multimodal Biometrie System
   Ajita Rattani, Hunny Mehrotra, and Phalguni Gupta .......... 478
Objective Ethics for Managing Information Technology
   John R. Drake .............................................. 486
Parental Rights to Monitor Internet Usage
   Benjamin J. Halpert ........................................ 492
Patient Centric Healthcare Information Systems in the U.S.
   Nilmini Wickramasinghe ..................................... 498
Pedagogical Framework for Ethical Development
   Melissa Dark, Richard Epstein, Linda Morales, Terry
   Countermine, Qing Yuan, Muhammed Ali, Matt Rose, and
   Nathan Harter .............................................. 507
Personal Information Ethics
   Sabah S. Al-Fedaghi ........................................ 513
Pharming Attack Designs
   Manish Gupta and Raj Sharman ............................... 520
Port Scans
   Jalal Kawash ............................................... 527
Privacy and Access to Electronic Health Records
   Dick Whiddett, Inga Hunter, Judith Engelbrecht, and
   Jocelyn Handy .............................................. 534
Privacy and Online Data Collection
   Călin Gurău ................................................ 542
Privacy in Data Mining Textbooks
   James Lawler and John C. Molluzzo .......................... 549
Protection of Mobile Agent Data
   Sheng-Uei Guan ............................................. 556
Rule-Based Policies for Secured Defense Meetings
   Pravin Shetty and Seng Loke ................................ 563
Secure Agent Roaming under M-Coinmerce
   Sheng-Uei Guan ............................................. 571
Secure Automated Clearing House Transactions
   Jan Skalicky Hanson and Mark B. Schmidt .................... 579
Security Dilemmas for Canada's New Government
   Jeffrey Roy ................................................ 585
Security Model for Educational Satellite Networks
   Sanjay Jasola and Ramesh С. Sharma ......................... 594
Security of Communication and Quantum Technology
   Gregory Paperin ............................................ 602
Security Protection for Critical Infrastructure
   M.J. Warren and T.B. Busuttil .............................. 609
Spy ware
   Thomas F. Stafford ......................................... 616
Sustainable Information Society
   Ralf Isenmann .............................................. 622
Taxonomy of Computer and Information Ethics
   Sabah S. Al-Fedaghi ........................................ 631
Tools for Representing and Processing Narratives
   Ephraim Nissan ............................................. 638
Traditional Knowledge and Intellectual Property
   Ulia Popova-Gosart ......................................... 645
Universal Internet Access under an Ethical Lens
   Alessandro Arbore .......................................... 655


Архив выставки новых поступлений | Отечественные поступления | Иностранные поступления | Сиглы
 


[О библиотеке | Академгородок | Новости | Выставки | Ресурсы | Библиография | Партнеры | ИнфоЛоция | Поиск | English]
  Пожелания и письма: www@prometeus.nsc.ru
© 1997-2019 Отделение ГПНТБ СО РАН (Новосибирск)
Статистика доступов: архив | текущая статистика
 

Документ изменен: Wed Feb 27 14:27:42 2019. Размер: 15,204 bytes.
Посещение N 898 c 07.07.2015