dc.description |
233Rapid developments in information andcommunication technologies have created newsecurity threats along with ethical dilemmas. Thesedevelopments have been so fast that appropriatesecurity precautions and ethical codes fail to keeppace with the technological developments. In thisrespect, education of both professionals andordinary citizens regarding information technologyethics carries utmost importance. Encyclopedia ofInformation Ethics and Security serves as anauthentic and comprehensive reference source onsecurity and ethical issues related to informationand communication technologies. The encyclopediais consisted of 661 pages (+xvii) covering a total of95 alphabetically ordered chapters on informationethics and security, which are followed by twocomprehensive sets of indexes. Each entry is anauthoritative contribution followed by in-depthdefinitions of relevant terminology and acronyms.The total number of key terms included in the encyclopedia is approximately 700. Thesource also includes more than 2000 references to existing literature on ethical andsecurity issues related to information and communication technologies. A total of 148respected scholars and leading experts all around the world contributed to the source.As indicated in the preface of the encyclopedia by editor, all entries were subjected toan initial double-blind peer review and an additional review prior to acceptance forpublication. Chapters mostly have parallel layouts beginning with a clear introductionfollowed by the theoretical background and the contribution. Each chapter concludeswith invaluable ethical implications for the field along with suggestions for furtherThe editor, Marian Quigley (PhD – Monash University, Australia; BA – ChisholmInstitute of Technology, Australia; Higher Diploma of Teaching Secondary [Art andCraft]) is a former senior lecturer in the Faculty of Information Technology, MonashUniversity, Australia. She primarily works on the social effects of technology andanimation. Her recent publications are Women Do Animate: Interviews with 10Australian Animators (Insight Publications, 2005) and Information Security and Ethics:Social and Organizational Issues (IRM Press, 2004). The Editorial Advisory Boardmembers who contributed to the work as both reviewers and authors are Kathy Blashki(Deakin University, Australia), Matthew Butler (Monash University, Australia), HeatherFulford (The Robert Gordon University, UK), James E. Goldman (Purdue University,234USA), Katina Michael (University of Wollongong, Australia) and Bernd Carsten Stahl (DeMontfort University, UK).A diverse set of topics are covered by different entries addressing a wide range of lifeareas affected by information and communication technologies. These topics includeeducation, the workplace, health, privacy, intellectual property, identity, computercrime, cyber terrorism, equity and access, banking, shopping, publishing, legal andpolitical issues, censorship, artificial intelligence, the environment and communication.As stated by the editor, ‗apart from providing information about current and possiblefuture technological developments, the volume contains much thought-provokingmaterial concerning the social and moral implications of information andcommunication technologies which are of immense importance to us all‘ (p. xiv).It is important for ordinary citizens as well as professionals in the field to involve in thedebates regarding the transformative effects of information and communicationtechnologies on our lives. In this respect, the book serves as a great reference sourcefor professionals working on information and communication technologies,professionals teaching at educational institutions, both experienced and noviceresearchers interested in the field, and ordinary citizens who want to be enlightenedabout ethical practices and implications of information and communicationtechnologies. In addition, moral and social implications of information andcommunication technologies provided in the source can help educationaladministrators and policy-makers. Table of contents along with the names ofcontributors are provided below: 3D Avatars and Collaborative Virtual Environments/Koon-Ying Raymond Li,James Sofra, and Mark Power Access Control for Healthcare/Yifeng Shen Advertising in the Networked Environment/Savvas Papagiannidis and MichaelBourlakis Anonymous Peer-to-Peer Systems/Wenbing Zhao Argumentation and Computing/Ephraim Nissan Argumentation with Wigmore Charts and Computing/Ephraim Nissan Artificial Intelligence Tools for Handling Legal Evidence/Ephraim Nissan Barriers Facing African American Women in Technology/Jianxia Du, George H.Pate, Deneen Sherrod, and Wei-Chieh Yu B-POS Secure Mobile Payment System/Antonio Grillo, Alessandro Lentini, andGianluigi Me Building Secure and Dependable Information Systems/Wenbing Zhao Classifying Articles in Information Ethics and Security/Zack Jourdan, R. KellyRainer Jr., and Thomas E. Marshall Computational Ethics/Alicia I. Ruvinsky Computer Ethics and Intelligent Technologies/Yefim Kats Computer Worms, Detection, and Defense/Robert J. Cole and Chao-Hsien Chu Conflicting Value of Digital Music Piracy/Matthew Butler Content Filtering Methods for Internet Pornography/Jengchung V. Chen andShaoYu F. Huang Cyber-Terrorism in Australia/Christopher Beggs Data Security and Chase/Zbigniew W. Ras and Seunghyun Im Defending against Distributed Denial of Service/Yang Xiang and Wanlei Zhou Digital Divide Implications and Trends/Irene Chen and Terry T. Kidd Digital Rights Management Metadata and Standards/Jo Anne Cote and Eun G.Park235 Dilemmas of Online Identity Theft/Omer Mahmood Document Security in the Ancient World/Christopher H. Walker DRM Practices in the E-Publication Industry/Bong Wee Kiau and NorshuhadaShiratuddin Educational Technology Practitioner-Research Ethics/Kathleen Gray E-Health and Ensuring Quality/Prajesh Chhanabhai and Alec Holt Electronic Signatures and Ethics/A. Srivastava and S. B. Thomson Engineering Multi-Agent Systems/Tagelsir Mohamed Gasmelseid Ethical Approach to Gathering Survey Data Online/Sophie Nichol and KathyBlashki Ethical Behaviour in Technology-Mediated Communication/Sutirtha Chatterjee Ethical Concerns in Computer Science Projects/Alistair Irons and Roger Boyle Ethical Debate Surrounding RFID The/Stephanie Etter, Patricia G. Phillips, AshliM. Molinero, Susan J. Nestor, and Keith LeDonne Ethical Dilemmas in Data Mining and Warehousing/Joseph A. Cazier and Ryan C.LaBrie Ethical Erosion at Enron/John Wang, James Yao, Richard Peterson, and Zu-HsuLee Ethical Usability Testing with Children/Kirsten Ellis and Marian Quigley Ethics and Access to Technology for Persons with Disabilities/Belinda DavisLazarus Ethics and Perceptions in Online Learning Environments/Michelle M. Ramim Ethics and Security under the Sarbanes-Oxley Act/Thomas J. Tribunella andHeidi R. Tribunella Ethics Education for the Online Environment/Lori N. K. Leonard and Tracy S.Manly Ethics in Software Engineering/Pankaj Kamthan Ethics in the Security of Organizational Information Systems/Sushma Mishraand Amita Goyal Chin Ethics of AI/Kevin B. Korb Fair Use/Pasi Tyrväskylä Federal Information Security Law/Michael J. Chapple and Charles R. Crowell Formulating a Code of Cyberethics for a Municipality/Udo Richard Averweg Hackers and Cyber Terrorists/M. J. Warren Homo Electricus and the Continued Speciation of Humans/Katina Michael and M.G. Michael IT Security Culture Transition Process/Leanne Ngo ICT Leapfrogging Policy and Development in the Third World/Amanda Third andKai-Ti Kao Identity Verification using Resting State Brain Signals/Ramaswamy Palaniappanand Lalit M. Patnaik Individual and Institutional Responses to Staff Plagiarism/Carmel McNaught Information Ethics as Ideology/Bernd Carsten Stahl Information Ethics from an Islamic Perspective/Salam Abdallah Information Security and the ―Privacy Broker‖/Michael Douma and Eduard J.Gamito Information Security Policies for Networkable Devices/Julia Kotlarsky, IlanOshri, and Corey Hirsch Information Security Policy Research Agenda/Heather Fulford and Neil Doherty Internet and Suicide/Dianne Currier Internet Piracy and Copyright Debates/Paul Sugden Internet Research Ethics Questions and Considerations/Elizabeth Buchanan Interviews with Young People using Online Chat/Elza Dunkels and AnnBrittEnochsson Intrusion Detection and Information Security Audits/Terry T. Kidd and Robert K.Hiltbrand Investigation Strategy for the Small Pedophiles World/Gianluigi Me Managed Services and Changing Workplace Ethics/Alan Sixsmith Managing the Environmental Impact of Information Technology/Laurel EvelynDyson Measuring Ethical Reasoning of IT Professionals and Students/MohammadAbdolmohammadi and Jane Fedorowicz Meta View of Information Ethics/Charles R. Crowell and Robert N. Barger Mitigation of Identity Theft in the Information Age/Reggie Becker, Mark B.Schmidt, and Allen C. Johnston Mobile Agents and Security/Fei Xue Modelling Context-Aware Security for Electronic Health Records/Pravin Shettyand Seng Loke Moral Rights in the Australian Public Sector/Lynley Hocking Multimodal Biometric System/Ajita Rattani, Hunny Mehrotra, and PhalguniGupta Objective Ethics for Managing Information Technology/John R. Drake Parental Rights to Monitor Internet Usage/Benjamin J. Halpert Patient Centric Healthcare Information Systems in the U.S./NilminiWickramasinghe Pedagogical Framework for Ethical Development/Melissa Dark, Richard Epstein,Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, andNathan Harter Personal Information Ethics/Sabah S. Al-Fedaghi Pharming AttackDesigns/Manish Gupta and Raj Sharman Port Scans/Jalal Kawash Privacy and Access to Electronic Health Records/Dick Whiddett, Inga Hunter,Judith Engelbrecht, and Jocelyn Handy Privacy and Online Data Collection/Cãlin Gurãu Privacy in Data Mining Textbooks/James Lawler and John C. Molluzzo Protection of Mobile Agent Data/Sheng-Uei Guan Rule-Based Policies for Secured Defense Meetings/Pravin Shetty and Seng Loke Secure Agent Roaming under M-Commerce/Sheng-Uei Guan Secure Automated Clearing House Transactions/Jan Skalicky Hanson and MarkB. Schmidt Security Dilemmas for Canada‘s New Government/Jeffrey Roy Security Model for Educational Satellite Networks/Sanjay Jasola and Ramesh C.Sharma Security of Communication and Quantum Technology/Gregory Paperin Security Protection for Critical Infrastructure/M. J. Warren and T. B. Busuttil Spyware/Thomas F. Stafford Sustainable Information Society/Ralf Isenmann Taxonomy of Computer and Information Ethics/Sabah S. Al-Fedaghi Tools for Representing and Processing Narratives/Ephraim Nissan Traditional Knowledge and Intellectual Property/Ulia Popova-Gosart Universal Internet Access under an Ethical Lens/Alessandro Arbore |
|