Think! Evidence

Encyclopedia of Information Ethics and Security

Show simple item record

dc.creator Reviewed by Yavuz AKBULUT
dc.date 2008-01-01T00:00:00Z
dc.date.accessioned 2015-07-20T22:19:36Z
dc.date.available 2015-07-20T22:19:36Z
dc.identifier 1302-6488
dc.identifier https://doaj.org/article/be116a50f90e48a0b10e533cddf84578
dc.identifier.uri http://evidence.thinkportal.org/handle/123456789/19773
dc.description 233Rapid developments in information andcommunication technologies have created newsecurity threats along with ethical dilemmas. Thesedevelopments have been so fast that appropriatesecurity precautions and ethical codes fail to keeppace with the technological developments. In thisrespect, education of both professionals andordinary citizens regarding information technologyethics carries utmost importance. Encyclopedia ofInformation Ethics and Security serves as anauthentic and comprehensive reference source onsecurity and ethical issues related to informationand communication technologies. The encyclopediais consisted of 661 pages (+xvii) covering a total of95 alphabetically ordered chapters on informationethics and security, which are followed by twocomprehensive sets of indexes. Each entry is anauthoritative contribution followed by in-depthdefinitions of relevant terminology and acronyms.The total number of key terms included in the encyclopedia is approximately 700. Thesource also includes more than 2000 references to existing literature on ethical andsecurity issues related to information and communication technologies. A total of 148respected scholars and leading experts all around the world contributed to the source.As indicated in the preface of the encyclopedia by editor, all entries were subjected toan initial double-blind peer review and an additional review prior to acceptance forpublication. Chapters mostly have parallel layouts beginning with a clear introductionfollowed by the theoretical background and the contribution. Each chapter concludeswith invaluable ethical implications for the field along with suggestions for furtherThe editor, Marian Quigley (PhD – Monash University, Australia; BA – ChisholmInstitute of Technology, Australia; Higher Diploma of Teaching Secondary [Art andCraft]) is a former senior lecturer in the Faculty of Information Technology, MonashUniversity, Australia. She primarily works on the social effects of technology andanimation. Her recent publications are Women Do Animate: Interviews with 10Australian Animators (Insight Publications, 2005) and Information Security and Ethics:Social and Organizational Issues (IRM Press, 2004). The Editorial Advisory Boardmembers who contributed to the work as both reviewers and authors are Kathy Blashki(Deakin University, Australia), Matthew Butler (Monash University, Australia), HeatherFulford (The Robert Gordon University, UK), James E. Goldman (Purdue University,234USA), Katina Michael (University of Wollongong, Australia) and Bernd Carsten Stahl (DeMontfort University, UK).A diverse set of topics are covered by different entries addressing a wide range of lifeareas affected by information and communication technologies. These topics includeeducation, the workplace, health, privacy, intellectual property, identity, computercrime, cyber terrorism, equity and access, banking, shopping, publishing, legal andpolitical issues, censorship, artificial intelligence, the environment and communication.As stated by the editor, ‗apart from providing information about current and possiblefuture technological developments, the volume contains much thought-provokingmaterial concerning the social and moral implications of information andcommunication technologies which are of immense importance to us all‘ (p. xiv).It is important for ordinary citizens as well as professionals in the field to involve in thedebates regarding the transformative effects of information and communicationtechnologies on our lives. In this respect, the book serves as a great reference sourcefor professionals working on information and communication technologies,professionals teaching at educational institutions, both experienced and noviceresearchers interested in the field, and ordinary citizens who want to be enlightenedabout ethical practices and implications of information and communicationtechnologies. In addition, moral and social implications of information andcommunication technologies provided in the source can help educationaladministrators and policy-makers. Table of contents along with the names ofcontributors are provided below: 3D Avatars and Collaborative Virtual Environments/Koon-Ying Raymond Li,James Sofra, and Mark Power Access Control for Healthcare/Yifeng Shen Advertising in the Networked Environment/Savvas Papagiannidis and MichaelBourlakis Anonymous Peer-to-Peer Systems/Wenbing Zhao Argumentation and Computing/Ephraim Nissan Argumentation with Wigmore Charts and Computing/Ephraim Nissan Artificial Intelligence Tools for Handling Legal Evidence/Ephraim Nissan Barriers Facing African American Women in Technology/Jianxia Du, George H.Pate, Deneen Sherrod, and Wei-Chieh Yu B-POS Secure Mobile Payment System/Antonio Grillo, Alessandro Lentini, andGianluigi Me Building Secure and Dependable Information Systems/Wenbing Zhao Classifying Articles in Information Ethics and Security/Zack Jourdan, R. KellyRainer Jr., and Thomas E. Marshall Computational Ethics/Alicia I. Ruvinsky Computer Ethics and Intelligent Technologies/Yefim Kats Computer Worms, Detection, and Defense/Robert J. Cole and Chao-Hsien Chu Conflicting Value of Digital Music Piracy/Matthew Butler Content Filtering Methods for Internet Pornography/Jengchung V. Chen andShaoYu F. Huang Cyber-Terrorism in Australia/Christopher Beggs Data Security and Chase/Zbigniew W. Ras and Seunghyun Im Defending against Distributed Denial of Service/Yang Xiang and Wanlei Zhou Digital Divide Implications and Trends/Irene Chen and Terry T. Kidd Digital Rights Management Metadata and Standards/Jo Anne Cote and Eun G.Park235 Dilemmas of Online Identity Theft/Omer Mahmood Document Security in the Ancient World/Christopher H. Walker DRM Practices in the E-Publication Industry/Bong Wee Kiau and NorshuhadaShiratuddin Educational Technology Practitioner-Research Ethics/Kathleen Gray E-Health and Ensuring Quality/Prajesh Chhanabhai and Alec Holt Electronic Signatures and Ethics/A. Srivastava and S. B. Thomson Engineering Multi-Agent Systems/Tagelsir Mohamed Gasmelseid Ethical Approach to Gathering Survey Data Online/Sophie Nichol and KathyBlashki Ethical Behaviour in Technology-Mediated Communication/Sutirtha Chatterjee Ethical Concerns in Computer Science Projects/Alistair Irons and Roger Boyle Ethical Debate Surrounding RFID The/Stephanie Etter, Patricia G. Phillips, AshliM. Molinero, Susan J. Nestor, and Keith LeDonne Ethical Dilemmas in Data Mining and Warehousing/Joseph A. Cazier and Ryan C.LaBrie Ethical Erosion at Enron/John Wang, James Yao, Richard Peterson, and Zu-HsuLee Ethical Usability Testing with Children/Kirsten Ellis and Marian Quigley Ethics and Access to Technology for Persons with Disabilities/Belinda DavisLazarus Ethics and Perceptions in Online Learning Environments/Michelle M. Ramim Ethics and Security under the Sarbanes-Oxley Act/Thomas J. Tribunella andHeidi R. Tribunella Ethics Education for the Online Environment/Lori N. K. Leonard and Tracy S.Manly Ethics in Software Engineering/Pankaj Kamthan Ethics in the Security of Organizational Information Systems/Sushma Mishraand Amita Goyal Chin Ethics of AI/Kevin B. Korb Fair Use/Pasi Tyrväskylä Federal Information Security Law/Michael J. Chapple and Charles R. Crowell Formulating a Code of Cyberethics for a Municipality/Udo Richard Averweg Hackers and Cyber Terrorists/M. J. Warren Homo Electricus and the Continued Speciation of Humans/Katina Michael and M.G. Michael IT Security Culture Transition Process/Leanne Ngo ICT Leapfrogging Policy and Development in the Third World/Amanda Third andKai-Ti Kao Identity Verification using Resting State Brain Signals/Ramaswamy Palaniappanand Lalit M. Patnaik Individual and Institutional Responses to Staff Plagiarism/Carmel McNaught Information Ethics as Ideology/Bernd Carsten Stahl Information Ethics from an Islamic Perspective/Salam Abdallah Information Security and the ―Privacy Broker‖/Michael Douma and Eduard J.Gamito Information Security Policies for Networkable Devices/Julia Kotlarsky, IlanOshri, and Corey Hirsch Information Security Policy Research Agenda/Heather Fulford and Neil Doherty Internet and Suicide/Dianne Currier Internet Piracy and Copyright Debates/Paul Sugden Internet Research Ethics Questions and Considerations/Elizabeth Buchanan Interviews with Young People using Online Chat/Elza Dunkels and AnnBrittEnochsson Intrusion Detection and Information Security Audits/Terry T. Kidd and Robert K.Hiltbrand Investigation Strategy for the Small Pedophiles World/Gianluigi Me Managed Services and Changing Workplace Ethics/Alan Sixsmith Managing the Environmental Impact of Information Technology/Laurel EvelynDyson Measuring Ethical Reasoning of IT Professionals and Students/MohammadAbdolmohammadi and Jane Fedorowicz Meta View of Information Ethics/Charles R. Crowell and Robert N. Barger Mitigation of Identity Theft in the Information Age/Reggie Becker, Mark B.Schmidt, and Allen C. Johnston Mobile Agents and Security/Fei Xue Modelling Context-Aware Security for Electronic Health Records/Pravin Shettyand Seng Loke Moral Rights in the Australian Public Sector/Lynley Hocking Multimodal Biometric System/Ajita Rattani, Hunny Mehrotra, and PhalguniGupta Objective Ethics for Managing Information Technology/John R. Drake Parental Rights to Monitor Internet Usage/Benjamin J. Halpert Patient Centric Healthcare Information Systems in the U.S./NilminiWickramasinghe Pedagogical Framework for Ethical Development/Melissa Dark, Richard Epstein,Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, andNathan Harter Personal Information Ethics/Sabah S. Al-Fedaghi Pharming AttackDesigns/Manish Gupta and Raj Sharman Port Scans/Jalal Kawash Privacy and Access to Electronic Health Records/Dick Whiddett, Inga Hunter,Judith Engelbrecht, and Jocelyn Handy Privacy and Online Data Collection/Cãlin Gurãu Privacy in Data Mining Textbooks/James Lawler and John C. Molluzzo Protection of Mobile Agent Data/Sheng-Uei Guan Rule-Based Policies for Secured Defense Meetings/Pravin Shetty and Seng Loke Secure Agent Roaming under M-Commerce/Sheng-Uei Guan Secure Automated Clearing House Transactions/Jan Skalicky Hanson and MarkB. Schmidt Security Dilemmas for Canada‘s New Government/Jeffrey Roy Security Model for Educational Satellite Networks/Sanjay Jasola and Ramesh C.Sharma Security of Communication and Quantum Technology/Gregory Paperin Security Protection for Critical Infrastructure/M. J. Warren and T. B. Busuttil Spyware/Thomas F. Stafford Sustainable Information Society/Ralf Isenmann Taxonomy of Computer and Information Ethics/Sabah S. Al-Fedaghi Tools for Representing and Processing Narratives/Ephraim Nissan Traditional Knowledge and Intellectual Property/Ulia Popova-Gosart Universal Internet Access under an Ethical Lens/Alessandro Arbore
dc.language English
dc.publisher Anadolu University, Eskisehir
dc.relation http://tojde.anadolu.edu.tr/tojde29/pdf/review_1.pdf
dc.relation https://doaj.org/toc/1302-6488
dc.source The Turkish Online Journal of Distance Education, Vol 9, Iss 1, Pp 233-236 (2008)
dc.subject
dc.subject
dc.subject Special aspects of education
dc.subject LC8-6691
dc.subject Education
dc.subject L
dc.subject DOAJ:Education
dc.subject DOAJ:Social Sciences
dc.subject Special aspects of education
dc.subject LC8-6691
dc.subject Education
dc.subject L
dc.subject DOAJ:Education
dc.subject DOAJ:Social Sciences
dc.subject Special aspects of education
dc.subject LC8-6691
dc.subject Education
dc.subject L
dc.subject Special aspects of education
dc.subject LC8-6691
dc.subject Education
dc.subject L
dc.subject Special aspects of education
dc.subject LC8-6691
dc.subject Education
dc.subject L
dc.title Encyclopedia of Information Ethics and Security
dc.type article


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Think! Evidence


Browse

My Account