Ethics for the Information Age, Global Edition

Series
Pearson
Author
Michael J. Quinn  
Publisher
Pearson
Cover
Softcover
Edition
6
Language
English
Total pages
552
Pub.-date
January 2015
ISBN13
9781292061238
ISBN
1292061235
Related Titles


Product detail

Product Price CHF Available  
9781292061238
Ethics for the Information Age, Global Edition
84.50 approx. 7-9 days

eBook

You'll find the eBook here.:

Free evaluation copy for lecturers


Description

This book is appropriate for any standalone Computers and Society or Computer Ethics course offered by a computer science, business, or philosophy department, as well as special modules in any advanced CS course.


In an era where information technology changes constantly, a thoughtful response to these rapid changes requires a basic understanding of IT history, an awareness of current issues, and a familiarity with ethics. Ethics for the Information Age is unique in its balanced coverage of ethical theories used to analyze problems encountered by computer professionals in today’s environment. By presenting provocative issues such as social networking, government surveillance, and intellectual property from all points of view, this market-leading text challenges students to think critically and draw their own conclusions, which ultimately prepares them to become responsible, ethical users of future technologies.

 

Teaching and Learning Experience

This program presents a better teaching and learning experience–for you and your students. It will help:

  • Encourage Critical Thinking: A balanced, impartial approach to ethical issues avoids biased arguments, encouraging students to consider and analyze issues for themselves.
  • Keep Your Course Current and Relevant: A thoughtful response to information technology requires an awareness of current information-technology-related issues.
  • Support Learning: Resources are available to expand on the topics presented in the text.

Features

Encourage Critical Thinking


  • A balanced, impartial approach to ethical issues avoids biased arguments, encouraging students to consider and analyze issues for themselves.
  • Ethical theories are introduced early–The text surveys nine popular ethical theories in Chapter 2, and helps students understand why Kantianism, act utilitarianism, rule utilitarianism, social contract theory, and virtue ethics are the most useful bases for constructing persuasive moral arguments. In the remainder of the text, these theories are used to evaluate moral problems related to information technology.
    • NEW! The most significant change in the sixth edition is the new emphasis on virtue ethics. A completely new section on virtue ethics appears in Chapter 2, replacing the description of virtue ethics that formerly appeared in the chapter on professional ethics. In addition, analyses from the perspective of virtue ethics are included in the case studies appearing in Chapters 3, 5, and 7.
  • The provocative questions raised at the end of every chapter, together with dozens of in-class exercises, provide many opportunities for students to express their viewpoints.
  • End-of-chapter interviews with leaders from industry and academia provide important new insights and perspectives into ethical topics.
    • NEW! To increase the relevance and value of the “Further Reading and Viewing" sections, the references to scholarly tomes are replaced with lists of recent magazine and newspaper articles, television interviews, documentaries, and other videos available on the Internet. Most of the videos are only a few minutes long and could fuel interesting classroom discussions.
  • NEW! A table in Chapter 7 provides students with practical tips about how to choose good passwords.

Keep Your Course Current and Relevant


  • All major topics listed in the recommended syllabus of the IEEE Computer Society and the Association for Computing Machinery’s report Computing Curricula 2001 are addressed.
  • NEW! Facts and figures are updated throughout the book.
 

NEW! The sixth edition references many important recent developments; among them are:

  • Edward Snowden's revelations of longstanding National Security Agency access to telephone metadata, email messages, and live communications;
  • the privacy implications of Twitter, Foursquare, Instagram and other apps gathering information from address books stored on smartphones;
  • the controversy surrounding Microsoft's proposal for digital rights management on the Xbox One;
  • the activities of the “hacktivist" group Anonymous;
  • benefits and harms of tracking the movement of people through their smartphones;
  • the debate over the use of drones by police departments;
  • retailers using information collected from online sales to differentiate between customers and offer different prices to different people;
  • retailers using targeted direct marketing to win new customers;
  • the use of “crowdsourcing" by companies to improve products and services;
  • coverage of how cell phones are changing lives in developing countries;
  • predictive policing based on data mining;
  • massive open online courses (MOOCs) and implications for students from different socio-economic groups; and
  • the “Internet of things"–Internet-connected devices that can be controlled remotely. 

Support Learning


The following supplements are available to qualified instructors on Pearson's Instructor Resource Center.

 

  • An instructor's manual provides tips for teaching a course in computer ethics. It also contains answers to all of the review questions.
  • A test bank contains more than 300 multiple-choice, fill-in-the-blank, and essay questions that you can use for quizzes, midterms, and final examinations.
  • A set of PowerPoint lecture slides outlines the material covered in every chapter.

New to this Edition

Encourage Critical Thinking

 

  • The most significant change in the sixth edition is the new emphasis on virtue ethics. A completely new section on virtue ethics appears in Chapter 2, replacing the description of virtue ethics that formerly appeared in the chapter on professional ethics. In addition, analyses from the perspective of virtue ethics are included in the case studies appearing in Chapters 3, 5, and 7.
  • To increase the relevance and value of the “Further Reading and Viewing" sections, the references to scholarly tomes are replaced with lists of recent magazine and newspaper articles, television interviews, documentaries, and other videos available on the Internet. Most of the videos are only a few minutes long and could fuel interesting classroom discussions.
  • A table in Chapter 7 provides students with practical tips about how to choose good passwords.

 

Keep Your Course Current and Relevant

 

  • Facts and figures are updated throughout the book.

 

The sixth edition references many important recent developments; among them are:

  • Edward Snowden's revelations of longstanding National Security Agency access to telephone metadata, email messages, and live communications;
  • the privacy implications of Twitter, Foursquare, Instagram and other apps gathering information from address books stored on smartphones;
  • the controversy surrounding Microsoft's proposal for digital rights management on the Xbox One;
  • the activities of the “hacktivist" group Anonymous;
  • benefits and harms of tracking the movement of people through their smartphones;
  • the debate over the use of drones by police departments;
  • retailers using information collected from online sales to differentiate between customers and offer different prices to different people;
  • retailers using targeted direct marketing to win new customers;
  • the use of “crowdsourcing" by companies to improve products and services;
  • coverage of how cell phones are changing lives in developing countries;
  • predictive policing based on data mining;
  • massive open online courses (MOOCs) and implications for students from different socio-economic groups; and
  • the “Internet of things"–Internet-connected devices that can be controlled remotely.


Table of Contents

Brief Table of Contents

Preface xxiii
1 Catalysts for Change 1
An Interview with Dalton Conley 77
2 Introduction to Ethics 79
An Interview with James Moor 175
3 Networked Communications 179
An Interview with Michael Liebhold 265
4 Intellectual Property 269
An Interview with June Besek 375
5 Information Privacy 379
An Interview with Michael Zimmer 443
6 Privacy and the Government 447
An Interview with Jerry Berman 523
7 Computer and Network Security 527
An Interview with Matt Bishop 593
8 Computer Reliability 597
An Interview with Avi Rubin 671
9 Professional Ethics 673
An Interview with Paul Axtell 739
10 Work and Wealth 743
An Interview with Martin Ford 809
Appendix A: Plagiarism 813
Index 817