Coverart for item
The Resource Encyclopedia of information ethics and security, Marian Quigley [editor]

Encyclopedia of information ethics and security, Marian Quigley [editor]

Label
Encyclopedia of information ethics and security
Title
Encyclopedia of information ethics and security
Statement of responsibility
Marian Quigley [editor]
Contributor
Subject
Genre
Language
eng
Summary
"This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher
Action
digitized
Cataloging source
N$T
Dewey number
174/.900403
Illustrations
illustrations
Index
index present
LC call number
HM851
LC item number
.E555 2008eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Quigley, Marian
http://library.link/vocab/subjectName
  • Information technology
  • Information technology
  • Computer crimes
  • Computer security
  • Information networks
  • Technologie de l'information
  • Technologie de l'information
  • Criminalité informatique
  • Sécurité informatique
  • Réseaux d'information
  • BUSINESS & ECONOMICS
  • Computer crimes
  • Computer security
  • Information networks
  • Information technology
  • Information technology
  • Informationstechnik
  • Computersicherheit
  • Ethik
Label
Encyclopedia of information ethics and security, Marian Quigley [editor]
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and indexes
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Argumentation and Computing
  • ICT Leapfrogging policy and development in the third world
  • Amanda Third, Kaiti Kao
  • Identity Verification Using Resting State Brain Signals
  • Ramaswamy Palaniappan, Lalit M. Patnaik
  • Individual & Institutional Responses to Staff Plagiarism
  • Carmel McNaught
  • Information Ethics as Ideology
  • Bernd Carsten Stahl
  • Information Ethics from an Islamic Perspective
  • Salam Abdallah
  • Ephraim Nissan
  • Information Security and the "Privacy Broker"
  • Michael Douma, Eduard J. Gamito
  • Information Security Policies for Networkable Devices
  • Julia Kotlarsky, Ilan Oshri, Corey Hirsch
  • Information Security Policy Research Agenda
  • Heather Fulford, Neil Doherty
  • Internet and suicide
  • Dianne Currie
  • Internet Piracy and copyright debates
  • Paul Thomas Sugden
  • Argumentation with Wigmore Charts and Computing
  • Internet Research Ethics Questions and Considerations
  • Elizabeth A. Buchanan
  • Interviews with Young People using Online Chat
  • Elza Dunkels
  • AnnBritt Enochsson
  • Intrusion Detection & Information Security Audits
  • Terry T. Kidd
  • Robert K. Hiltbrand
  • Investigation strategy for the small paedophiles world
  • Gianluigi Me
  • Ephraim Nissan
  • Managed Services and Changing Workplace Ethics
  • Alan Sixsmith
  • Managing The Environmental Impact of Information Technology
  • Laurel Evelyn Dyson
  • Measuring Ethical Reasoning of IT Professional and Students
  • Jane Fedorowicz, Mohammad Abdolmohammadi
  • Meta View of Information Ethics
  • Charles R. Crowell, Robert N. Barger
  • Mitigation of Identity Theft in the Information Age
  • Mark B. Schmidt, Reggie Becker, Allen C. Johnston
  • Artificial Intelligence tools for Handling Legal Evidence
  • Mobile Agents and Security
  • Fei Xue
  • Modelling Context-Aware Security for Electronic Health Records
  • Pravin Shetty, Seng Loke
  • Moral Rights in the Australian Public Sector
  • Lynley Hocking
  • Multimodal Biometric System
  • Ajita Rattani, Hunny Mehrotra Phalguni Gupta
  • Objective Ethics for Managing Information Technology
  • John R. Drake
  • Ephraim Nissan
  • Parental Rights to Monitor Internet Usage
  • Benjamin J. Halpert
  • Patient Centric Healthcare Information Systems in the US
  • Nilmini Wickramasinghe
  • Pedagogical Framework for Ethical Development
  • Melissa Dark [and others]
  • Personal Information Ethics
  • Sabah S. AlFedaghi
  • Pharming Attack Designs
  • Manish Gupta, Raj Sharman
  • Barriers facing African American women in technology
  • Port Scans
  • Jalal Kawash
  • Privacy and Access to Electronic Health Records
  • Richard Whiddett [and others]
  • Privacy and Online Data Collection
  • Calin Gurau
  • Privacy in Data Mining Textbooks
  • James Lawler, John C. Molluzzo
  • Protection of Mobile Agent Data
  • Steven Sheng-Ue Guan
  • Jianxia Du [and others]
  • Rule Based Policies for Secured Defence Meetings
  • Pravin Shetty, Seng Loke
  • Secure Agent Roaming under M-Commerce
  • Steven Sheng-Ue Guan
  • Secure Automated Clearing House Transactions
  • Mark B. Schmidt, Jan Skalicky Hanson
  • Security Dilemmas for Canada's New Government
  • Jeffrey Roy
  • Security Model for Educational Satellite Networks
  • Ramesh C. Sharma, Sanjay Jasola
  • B-POS secure mobile payment system
  • Security of Communication and Quantum Technology
  • Greg Paperin
  • Security Protection for Critical Infrastructure
  • M.J. Warren, T.B. Busuttil
  • Spyware
  • Thomas F. Stafford
  • Sustainable Information Society
  • Ralf Isenmann
  • Taxonomy of Computer and Information Ethics
  • Sabah S. Al-Fedaghi
  • Gianluigi Me, Antonio Grillo
  • Tools for Representing and Processing Narratives
  • Ephraim Nissan
  • Traditional Knowledge and Intellectual property
  • Ulia Popova-Gosart
  • Universal Internet Access Under an Ethical Lens
  • Alessandro Arbore
  • 3D Avatars and collaborative virtual environments
  • Building Secure and Dependable Information Systems
  • Wenbing Zhao
  • Classifying articles in information ethics and security
  • Zack Jourdan, R. Kelly Rainer, Jr., Thomas E Marshall
  • Computational Ethics
  • Alicia I. Ruvinsky
  • Computer ethics and intelligent technologies
  • Yefim Kats
  • Computer Worms Detection and Defense
  • Robert J. Cole, Chao-Hsien Chu
  • KoonYing Raymond Li, James Sofra, Mark Power
  • Conflicting value of digital music piracy
  • Matthew Butler
  • Content filtering methods for internet pornography
  • Jengchung V. Chen, ShaoYu F. Huang
  • Cyber-Terrorism in Australia
  • Christopher Beggs
  • Data Security and Chase
  • Zbigniew W. Ras, Seunghyun Im
  • Defending against distributed denial of service
  • Yang Xiang, Wanlei Zhou
  • Access control model for healthcare system
  • Digital Divide Implications and Trends
  • Terry T. Kidd, Irene Chen
  • Digital Rights Management Metadata and Standards
  • Eun G. Park, Jo Anne Cote
  • Dilemmas of online identity theft
  • Omer Mahmood
  • Document Security in the Ancient World
  • Christopher H. Walker
  • DRM Practices in ePublication Industry
  • Bong Wee Kiau, Norshuhada Shiratuddin
  • Yifeng Shen
  • Educational Technology Practitioner Research Ethics
  • Kathleen Gray
  • E-health and quality assurance
  • Prajesh Chhanabhai, Alec Holt
  • Electronic Signatures and Ethics
  • A. Srivastava, B. Thomson
  • Engineering multiagent systems
  • Tagelsir Mohamed Gasmelseid
  • Ethical approach to gathering survey data online
  • Sophie Nicho, Kathy Blashki
  • Advertising in the networked environment
  • Ethical Behaviour in Technology Mediated Communication
  • Sutirtha Chatterjee
  • Ethical concerns in computer science projects
  • Alastair Irons
  • Ethical Debate Surrounding RFID
  • Stephanie Etter [and others]
  • Ethical Dilemmas in Data Mining and Warehousing
  • Joseph A. Cazier, Ryan C. LaBrie
  • Ethical Erosion at Enron
  • John Wang
  • Savvas Papagiannidis, Michael Bourlakis
  • James Yao
  • Richard Peterson, Zu-Hsu Lee
  • Ethical usability testing with children
  • Kirsten Ellis, Marian Quigley
  • Ethics and Access to Technology for Persons with Disabilities
  • Belinda Davis Lazarus
  • Ethics and Perceptions in Online Learning Environments
  • Michelle M. Ramim
  • Ethics and Security under the Sarbanes-Oxley Act
  • Thomas J. Tribunella, Heidi R. Tribunella
  • Anonymous Peer-to-Peer Systems
  • Ethics Education for the Online Environment
  • Lori N.K. Leonard, Tracy S. Manly
  • Ethics in Software Engineering
  • Pankaj Kamthan
  • Ethics in the Security of Organizational Information Systems
  • Sushma Mishra, Amita Goyal Chin
  • Ethics of AI
  • Kevin B. Korb
  • Fair Use
  • Pasi Tyrväinen
  • Wenbing Zhao
  • Federal Information Security Law
  • Charles R. Crowell
  • Formulating a Code of Cyberethics for a Municipality
  • Udo Richard Averweg
  • Hackers and Cyber Terrorists
  • M.J. Warren, S. Leitch
  • Homo electricus and the continued speciation of humans
  • Katina Michael, M.G. Michael
  • I.T. Security Culture Transition Process
  • Leanne Ngo
Control code
ocn166151683
Dimensions
unknown
Extent
1 online resource (1 volume (various pagings))
File format
unknown
Form of item
online
Isbn
9781591409885
Lccn
2007007277
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
System control number
  • (Sirsi) o166151683
  • (OCoLC)166151683
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Label
Encyclopedia of information ethics and security, Marian Quigley [editor]
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and indexes
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Argumentation and Computing
  • ICT Leapfrogging policy and development in the third world
  • Amanda Third, Kaiti Kao
  • Identity Verification Using Resting State Brain Signals
  • Ramaswamy Palaniappan, Lalit M. Patnaik
  • Individual & Institutional Responses to Staff Plagiarism
  • Carmel McNaught
  • Information Ethics as Ideology
  • Bernd Carsten Stahl
  • Information Ethics from an Islamic Perspective
  • Salam Abdallah
  • Ephraim Nissan
  • Information Security and the "Privacy Broker"
  • Michael Douma, Eduard J. Gamito
  • Information Security Policies for Networkable Devices
  • Julia Kotlarsky, Ilan Oshri, Corey Hirsch
  • Information Security Policy Research Agenda
  • Heather Fulford, Neil Doherty
  • Internet and suicide
  • Dianne Currie
  • Internet Piracy and copyright debates
  • Paul Thomas Sugden
  • Argumentation with Wigmore Charts and Computing
  • Internet Research Ethics Questions and Considerations
  • Elizabeth A. Buchanan
  • Interviews with Young People using Online Chat
  • Elza Dunkels
  • AnnBritt Enochsson
  • Intrusion Detection & Information Security Audits
  • Terry T. Kidd
  • Robert K. Hiltbrand
  • Investigation strategy for the small paedophiles world
  • Gianluigi Me
  • Ephraim Nissan
  • Managed Services and Changing Workplace Ethics
  • Alan Sixsmith
  • Managing The Environmental Impact of Information Technology
  • Laurel Evelyn Dyson
  • Measuring Ethical Reasoning of IT Professional and Students
  • Jane Fedorowicz, Mohammad Abdolmohammadi
  • Meta View of Information Ethics
  • Charles R. Crowell, Robert N. Barger
  • Mitigation of Identity Theft in the Information Age
  • Mark B. Schmidt, Reggie Becker, Allen C. Johnston
  • Artificial Intelligence tools for Handling Legal Evidence
  • Mobile Agents and Security
  • Fei Xue
  • Modelling Context-Aware Security for Electronic Health Records
  • Pravin Shetty, Seng Loke
  • Moral Rights in the Australian Public Sector
  • Lynley Hocking
  • Multimodal Biometric System
  • Ajita Rattani, Hunny Mehrotra Phalguni Gupta
  • Objective Ethics for Managing Information Technology
  • John R. Drake
  • Ephraim Nissan
  • Parental Rights to Monitor Internet Usage
  • Benjamin J. Halpert
  • Patient Centric Healthcare Information Systems in the US
  • Nilmini Wickramasinghe
  • Pedagogical Framework for Ethical Development
  • Melissa Dark [and others]
  • Personal Information Ethics
  • Sabah S. AlFedaghi
  • Pharming Attack Designs
  • Manish Gupta, Raj Sharman
  • Barriers facing African American women in technology
  • Port Scans
  • Jalal Kawash
  • Privacy and Access to Electronic Health Records
  • Richard Whiddett [and others]
  • Privacy and Online Data Collection
  • Calin Gurau
  • Privacy in Data Mining Textbooks
  • James Lawler, John C. Molluzzo
  • Protection of Mobile Agent Data
  • Steven Sheng-Ue Guan
  • Jianxia Du [and others]
  • Rule Based Policies for Secured Defence Meetings
  • Pravin Shetty, Seng Loke
  • Secure Agent Roaming under M-Commerce
  • Steven Sheng-Ue Guan
  • Secure Automated Clearing House Transactions
  • Mark B. Schmidt, Jan Skalicky Hanson
  • Security Dilemmas for Canada's New Government
  • Jeffrey Roy
  • Security Model for Educational Satellite Networks
  • Ramesh C. Sharma, Sanjay Jasola
  • B-POS secure mobile payment system
  • Security of Communication and Quantum Technology
  • Greg Paperin
  • Security Protection for Critical Infrastructure
  • M.J. Warren, T.B. Busuttil
  • Spyware
  • Thomas F. Stafford
  • Sustainable Information Society
  • Ralf Isenmann
  • Taxonomy of Computer and Information Ethics
  • Sabah S. Al-Fedaghi
  • Gianluigi Me, Antonio Grillo
  • Tools for Representing and Processing Narratives
  • Ephraim Nissan
  • Traditional Knowledge and Intellectual property
  • Ulia Popova-Gosart
  • Universal Internet Access Under an Ethical Lens
  • Alessandro Arbore
  • 3D Avatars and collaborative virtual environments
  • Building Secure and Dependable Information Systems
  • Wenbing Zhao
  • Classifying articles in information ethics and security
  • Zack Jourdan, R. Kelly Rainer, Jr., Thomas E Marshall
  • Computational Ethics
  • Alicia I. Ruvinsky
  • Computer ethics and intelligent technologies
  • Yefim Kats
  • Computer Worms Detection and Defense
  • Robert J. Cole, Chao-Hsien Chu
  • KoonYing Raymond Li, James Sofra, Mark Power
  • Conflicting value of digital music piracy
  • Matthew Butler
  • Content filtering methods for internet pornography
  • Jengchung V. Chen, ShaoYu F. Huang
  • Cyber-Terrorism in Australia
  • Christopher Beggs
  • Data Security and Chase
  • Zbigniew W. Ras, Seunghyun Im
  • Defending against distributed denial of service
  • Yang Xiang, Wanlei Zhou
  • Access control model for healthcare system
  • Digital Divide Implications and Trends
  • Terry T. Kidd, Irene Chen
  • Digital Rights Management Metadata and Standards
  • Eun G. Park, Jo Anne Cote
  • Dilemmas of online identity theft
  • Omer Mahmood
  • Document Security in the Ancient World
  • Christopher H. Walker
  • DRM Practices in ePublication Industry
  • Bong Wee Kiau, Norshuhada Shiratuddin
  • Yifeng Shen
  • Educational Technology Practitioner Research Ethics
  • Kathleen Gray
  • E-health and quality assurance
  • Prajesh Chhanabhai, Alec Holt
  • Electronic Signatures and Ethics
  • A. Srivastava, B. Thomson
  • Engineering multiagent systems
  • Tagelsir Mohamed Gasmelseid
  • Ethical approach to gathering survey data online
  • Sophie Nicho, Kathy Blashki
  • Advertising in the networked environment
  • Ethical Behaviour in Technology Mediated Communication
  • Sutirtha Chatterjee
  • Ethical concerns in computer science projects
  • Alastair Irons
  • Ethical Debate Surrounding RFID
  • Stephanie Etter [and others]
  • Ethical Dilemmas in Data Mining and Warehousing
  • Joseph A. Cazier, Ryan C. LaBrie
  • Ethical Erosion at Enron
  • John Wang
  • Savvas Papagiannidis, Michael Bourlakis
  • James Yao
  • Richard Peterson, Zu-Hsu Lee
  • Ethical usability testing with children
  • Kirsten Ellis, Marian Quigley
  • Ethics and Access to Technology for Persons with Disabilities
  • Belinda Davis Lazarus
  • Ethics and Perceptions in Online Learning Environments
  • Michelle M. Ramim
  • Ethics and Security under the Sarbanes-Oxley Act
  • Thomas J. Tribunella, Heidi R. Tribunella
  • Anonymous Peer-to-Peer Systems
  • Ethics Education for the Online Environment
  • Lori N.K. Leonard, Tracy S. Manly
  • Ethics in Software Engineering
  • Pankaj Kamthan
  • Ethics in the Security of Organizational Information Systems
  • Sushma Mishra, Amita Goyal Chin
  • Ethics of AI
  • Kevin B. Korb
  • Fair Use
  • Pasi Tyrväinen
  • Wenbing Zhao
  • Federal Information Security Law
  • Charles R. Crowell
  • Formulating a Code of Cyberethics for a Municipality
  • Udo Richard Averweg
  • Hackers and Cyber Terrorists
  • M.J. Warren, S. Leitch
  • Homo electricus and the continued speciation of humans
  • Katina Michael, M.G. Michael
  • I.T. Security Culture Transition Process
  • Leanne Ngo
Control code
ocn166151683
Dimensions
unknown
Extent
1 online resource (1 volume (various pagings))
File format
unknown
Form of item
online
Isbn
9781591409885
Lccn
2007007277
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic reproduction.
Sound
unknown sound
Specific material designation
remote
System control number
  • (Sirsi) o166151683
  • (OCoLC)166151683
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

Library Locations

    • Waubonsee: Sugar Grove Campus - Todd LibraryBorrow it
      Collins Hall 2nd Floor Waubonsee Community College Route 47 at Waubonsee Drive, Sugar Grove, IL, 60554-9454, US
      41.7974 -88.45785
Processing Feedback ...