Asia Pacific University Library catalogue


Ethics and technology : controversies, questions, and strategies for ethical computing / Herman T. Tavani, Rivier College

By: Tavani, Herman TMaterial type: TextTextPublication details: Hoboken, NJ : John Wiley & Sons, c2013Edition: 4th edDescription: xxx, 424 p. : ill. ; 24 cmISBN: 9781118281727 (pbk.)Subject(s): Computer networks -- Moral and ethical aspectsDDC classification: 175 LOC classification: TK5105.5 | .T38 2013Summary: "Deliberately constructed provocative scenarios and selected controversial cases convey the severity of the ethical issues under consideration - Sample arguments are included in many chapters and are intended to illustrate some of the rationales that have been put forth by various interest groups to defend policies and laws affecting privacy, security, property, and so forth, in cyberspace "--
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
General Circulation General Circulation APU Library
Open Shelf
Book TK5105.5 .T38 2013 c.1 (Browse shelf (Opens below)) 1 Available (No use restrictions) 00032479
General Circulation General Circulation APU Library
Open Shelf
Book TK5105.5 .T38 2013 c.2 (Browse shelf (Opens below)) 2 Available (No use restrictions) 00032480
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
TK5105.5 .T36 2014 c.1 Computer networks / TK5105.5 .T38 2004 c.1 Ethics and technology : TK5105.5 .T38 2013 c.1 Ethics and technology : TK5105.5 .T38 2013 c.2 Ethics and technology : TK5105.5 .T39 1998 c.1 Encyclopedia of network blueprints / TK5105.5 .T43 2008 c.1 Designing for Cisco internetwork solutions (DESGN) / TK5105.5 .T45 2017 c.1 Mobile payment systems :

Includes bibliographical references and index.

"Deliberately constructed provocative scenarios and selected controversial cases convey the severity of the ethical issues under consideration - Sample arguments are included in many chapters and are intended to illustrate some of the rationales that have been put forth by various interest groups to defend policies and laws affecting privacy, security, property, and so forth, in cyberspace "--

There are no comments on this title.

to post a comment.