MARC details
000 -LEADER |
fixed length control field |
03859nam a2200325 i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220208071658.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220208s2019 sz a|||| b||| 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783030039363 |
Qualifying information |
paperback |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
EG-CaTKH |
Language of cataloging |
eng |
Transcribing agency |
EG-CaTKH |
Description conventions |
rda |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.C66 |
Item number |
K59 2019 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 KI.E 2019 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kizza, Joseph Migga, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Ethical and secure computing : |
Remainder of title |
a concise module / |
Statement of responsibility, etc. |
Joseph Migga Kizza. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Cham, Switzerland : |
Name of producer, publisher, distributor, manufacturer |
Springer, |
Date of production, publication, distribution, manufacture, or copyright notice |
2019. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xv, 285 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Undergraduate topics in computer science, |
International Standard Serial Number |
1863-7310 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Morality and the Law -- Ethics and Ethical Analysis -- Ethics and the Professions -- Anonymity, Security, Privacy, and Civil Liberties -- Intellectual Property Rights and Computer Technology -- Social Context of Computing -- Software Issues: Risks and Liabilities -- Computer Crimes -- Cyberbullying -- Artificial Intelligence, Virtualization, and Cyberspace -- Ethical, Privacy, and Security Issues in Social Network Ecosystems -- Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today's rapidly-evolving computing technologies and ever-changing communication ecosystems. This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: Introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres Describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties Examines intellectual property rights in the context of computing, including the risks and liabilities associated with software Discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health Reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination Considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies Includes learning objectives, discussion questions and exercises throughout the book This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, and offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks. Dr. Joseph Migga Kizza is Professor and Associate Dean of the College of Engineering and Computer Science, and former Director of the Center for Information Security and Assurance, at the University of Tennessee at Chattanooga, USA. He is also the author of the successful Springer titlesEthical and Social Issues in the Information Age and Guide to Computer Network Security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computers |
General subdivision |
Moral and ethical aspects. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Undergraduate topics in computer science, |
International Standard Serial Number |
1863-7310. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
P |
First Date, FD (RLIN) |
20220208 |