3D Avatars and Collaborative Virtual Environments
Koon-Ying, Raymond Li, James Sofra, and Mark Power ........... 1
Access Control for Healthcare
Yifeng Shen .................................................. 7
Advertising in the Networked Environment
Savvas Papagiannidis and Michael Bourlakis .................. 15
Anonymous Peer-to-Peer Systems
Wenbing Zhao ................................................ 23
Argumentation and Computing
Ephraim Nissan .............................................. 30
Argumentation with Wigmore Charts and Computing
Ephraim Nissan .............................................. 36
Artificial Intelligence Tools for Handling Legal Evidence
Ephraim Nissan .............................................. 42
Barriers Facing African American Women in Technology
Jianxia Du, George H. Pate, Deneen Sherrod, and Wei-Chieh
Yu .......................................................... 49
B-POS Secure Mobile Payment System
Antonio Griilo, Alessandro Lentini, and Gianluigi Me ........ 55
Building Secure and Dependable Information Systems
Wenbing Zhao ................................................ 62
Classifying Articles in Information Ethics and Security
Zack Joitrdan, R. Kelly Rainer Jr., and Thomas E. Marshall .. 68
Computational Ethics
Alicia I. Ruvinsky .......................................... 76
Computer Ethics and Intelligent Technologies
Yefim Kats .................................................. 83
Computer Worms, Detection, and Defense
Robert J. Cole and Chao-Hsien Chu ........................... 89
Conflicting Value of Digital Music Piracy
Matthew Butler .............................................. 96
Content Filtering Methods for Internet Pornography
Jengchung V. Chen and Shao Yu F. Huang ..................... 102
Cyber-Terrorism in Australia
Christopher Beggs .......................................... 108
Data Security and Chase
Zbigniew W. Ras and Seunghyun Im ........................... 114
Defending against Distributed Denial of Service
Yang Xiang and Wanlei Zhou ................................. 121
Digital Divide Implications and Trends
Irene Chen and Terry T. Kidd ............................... 130
Digital Rights Management Metadata and Standards
Jo Anne Cote and Eun G. Park ............................... 136
Dilemmas of Online Identity Theft
Omer Mahmood ............................................... 143
Document Security in the Ancient World
Christopher H. Walker ...................................... 150
DRM Practices in the E-Publication Industry
Bong Wee Kiau and Norshuhada Shiratuddin ................... 157
Educational Technology Practitioner-Research Ethics
Kathleen Gray .............................................. 164
E-Health and Ensuring Quality
Prajesh Chhanabhai and Alec Holt ........................... 170
Electronic Signatures and Ethics
A. Srivastava and S.B. Thomson ............................. 179
Engineering Multi-Agent Systems
Tagelsir Mohamed Gasmelseid ................................ 187
Ethical Approach to Gathering Survey Data Online
Sophie Nichol and Kathy Blashki ............................ 194
Ethical Behaviour in Technology-Mediated Communication
Sutirtha Chatterjee ........................................ 201
Ethical Concerns in Computer Science Projects
Alistair Irons and Roger Boyle ............................. 208
Ethical Debate Surrounding RFID The
Stephanie Etter, Patricia G. Phillips, Ashli M. Molinero,
Susan J. Nestor, and Keith LeDonne ......................... 214
Ethical Dilemmas in Data Mining and Warehousing
Joseph A. Cozier and Ryan C. LaBrie ........................ 221
Ethical Erosion at Enron
John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee ..... 229
Ethical Usability Testing with Children
Kirsten Ellis and Marian Quigley ........................... 235
Ethics and Access to Technology for Persons with
Disabilities
Belinda Davis Lazarus ...................................... 241
Ethics and Perceptions in Online Learning Environments
Michelle M. Ramim .......................................... 246
Ethics and Security under the Sarbanes-Oxley Act
Thomas J. Tribunella and Heidi R. Tribunella ............... 254
Ethics Education for the Online Environment
Lori N.K. Leonard and Tracy S. Manly ....................... 260
Ethics in Software Engineering
Pankaj Kamthan ............................................. 266
Ethics in the Security of Organizational Information Systems
Sushma Mishra and Amita Goyal Chin ......................... 273
Ethics of AI
Kevin В. Korb .............................................. 279
Fair Use
Pasi Tyrväskylä ............................................ 285
Federal Information Security Law
Michael J. Chappie and Charles R. Crowell .................. 291
Formulating a Code of Cyberethics for a Municipality
Udo Richard Averweg ........................................ 297
Hackers and Cyber Terrorists
M.J. Warren ................................................ 304
Homo Electricus and the Continued Speciation of Humans
Katina Michael and M.G. Michael ............................ 312
IT Security Culture Transition Process
Leanne Ngo ................................................. 319
ICT Leapfrogging Policy and Development in the Third World
Amanda Third and Kai-Ti Kao ................................ 326
Identity Verification using Resting State Brain Signals
Ramaswamy Palaniappan and halit M. Patnaik ................. 335
Individual and Institutional Responses to Staff Plagiarism
Carmel McNaught ............................................ 342
Information Ethics as Ideology
Bernd Carsten Stahl ........................................ 348
Information Ethics from an Islamic Perspective
Salam Abdallah ............................................. 355
Information Security and the "Privacy Broker"
Michael Douma and Eduard J. Gamito ......................... 362
Information Security Policies for Networkable Devices
Julia Kotlarsky, Han Oshri, and Corey Hirsch ............... 370
Information Security Policy Research Agenda
Heather Fulford and Neil Doherty ........................... 377
Internet and Suicide
Dianne Currier ............................................. 384
Internet Piracy and Copyright Debates
Paul Sugden ................................................ 391
Internet Research Ethics Questions and Considerations
Elizabeth Buchanan ......................................... 397
Interviews with Young People using Online Chat
Elza Dunkels and Ann Britt Enochsson ....................... 403
Intrusion Detection and Information Security Audits
Terry T. Kidd and Robert K. Hiltbrand ...................... 411
Investigation Strategy for the Small Pedophiles World
Gianluigi Me ............................................... 418
Managed Services and Changing Workplace Ethics
Alan Sixsmith .............................................. 426
Managing the Environmental Impact of Information Technology
Laurel Evelyn Dyson ........................................ 433
Measuring Ethical Reasoning of IT Professionals and Students
Mohammad Abdolmohammadi and Jane Fedorowicz ................ 440
Meta View of Information Ethics
Charles R. Crowell and Robert N. Barger .................... 445
Mitigation of Identity Theft in the Information Age
Reggie Becker, Mark B. Schmidt, and Allen C. Johnston ...... 451
Mobile Agents and Security
Fei Xue .................................................... 457
Modelling Context-Aware Security for Electronic Health
Records
Pravin Shetty and Seng Loke ................................ 463
Moral Rights in the Australian Public Sector
Lynley Hocking ............................................. 470
Multimodal Biometrie System
Ajita Rattani, Hunny Mehrotra, and Phalguni Gupta .......... 478
Objective Ethics for Managing Information Technology
John R. Drake .............................................. 486
Parental Rights to Monitor Internet Usage
Benjamin J. Halpert ........................................ 492
Patient Centric Healthcare Information Systems in the U.S.
Nilmini Wickramasinghe ..................................... 498
Pedagogical Framework for Ethical Development
Melissa Dark, Richard Epstein, Linda Morales, Terry
Countermine, Qing Yuan, Muhammed Ali, Matt Rose, and
Nathan Harter .............................................. 507
Personal Information Ethics
Sabah S. Al-Fedaghi ........................................ 513
Pharming Attack Designs
Manish Gupta and Raj Sharman ............................... 520
Port Scans
Jalal Kawash ............................................... 527
Privacy and Access to Electronic Health Records
Dick Whiddett, Inga Hunter, Judith Engelbrecht, and
Jocelyn Handy .............................................. 534
Privacy and Online Data Collection
Călin Gurău ................................................ 542
Privacy in Data Mining Textbooks
James Lawler and John C. Molluzzo .......................... 549
Protection of Mobile Agent Data
Sheng-Uei Guan ............................................. 556
Rule-Based Policies for Secured Defense Meetings
Pravin Shetty and Seng Loke ................................ 563
Secure Agent Roaming under M-Coinmerce
Sheng-Uei Guan ............................................. 571
Secure Automated Clearing House Transactions
Jan Skalicky Hanson and Mark B. Schmidt .................... 579
Security Dilemmas for Canada's New Government
Jeffrey Roy ................................................ 585
Security Model for Educational Satellite Networks
Sanjay Jasola and Ramesh С. Sharma ......................... 594
Security of Communication and Quantum Technology
Gregory Paperin ............................................ 602
Security Protection for Critical Infrastructure
M.J. Warren and T.B. Busuttil .............................. 609
Spy ware
Thomas F. Stafford ......................................... 616
Sustainable Information Society
Ralf Isenmann .............................................. 622
Taxonomy of Computer and Information Ethics
Sabah S. Al-Fedaghi ........................................ 631
Tools for Representing and Processing Narratives
Ephraim Nissan ............................................. 638
Traditional Knowledge and Intellectual Property
Ulia Popova-Gosart ......................................... 645
Universal Internet Access under an Ethical Lens
Alessandro Arbore .......................................... 655
|