Ethical and secure computing : (Record no. 1042)

MARC details
000 -LEADER
fixed length control field 03859nam a2200325 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220208071658.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220208s2019 sz a|||| b||| 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030039363
Qualifying information paperback
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaTKH
Language of cataloging eng
Transcribing agency EG-CaTKH
Description conventions rda
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.C66
Item number K59 2019
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 KI.E 2019
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kizza, Joseph Migga,
Relator term author.
245 10 - TITLE STATEMENT
Title Ethical and secure computing :
Remainder of title a concise module /
Statement of responsibility, etc. Joseph Migga Kizza.
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham, Switzerland :
Name of producer, publisher, distributor, manufacturer Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2019.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 285 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Undergraduate topics in computer science,
International Standard Serial Number 1863-7310
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Morality and the Law -- Ethics and Ethical Analysis -- Ethics and the Professions -- Anonymity, Security, Privacy, and Civil Liberties -- Intellectual Property Rights and Computer Technology -- Social Context of Computing -- Software Issues: Risks and Liabilities -- Computer Crimes -- Cyberbullying -- Artificial Intelligence, Virtualization, and Cyberspace -- Ethical, Privacy, and Security Issues in Social Network Ecosystems -- Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies.
520 ## - SUMMARY, ETC.
Summary, etc. This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today's rapidly-evolving computing technologies and ever-changing communication ecosystems. This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: Introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres Describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties Examines intellectual property rights in the context of computing, including the risks and liabilities associated with software Discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health Reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination Considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies Includes learning objectives, discussion questions and exercises throughout the book This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, and offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks. Dr. Joseph Migga Kizza is Professor and Associate Dean of the College of Engineering and Computer Science, and former Director of the Center for Information Security and Assurance, at the University of Tennessee at Chattanooga, USA. He is also the author of the successful Springer titlesEthical and Social Issues in the Information Age and Guide to Computer Network Security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
General subdivision Moral and ethical aspects.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Undergraduate topics in computer science,
International Standard Serial Number 1863-7310.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process P
First Date, FD (RLIN) 20220208
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 02/08/2022 648.19   005.8 KI.E 2019 190380 02/08/2022 02/08/2022 Books