Wonder Club world wonders pyramid logo
×

Pandora's Box: Social and Professional Issues of the Information Age Book

Pandora's Box: Social and Professional Issues of the Information Age
Pandora's Box: Social and Professional Issues of the Information Age, Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to heal, Pandora's Box: Social and Professional Issues of the Information Age has a rating of 3.5 stars
   2 Ratings
X
Pandora's Box: Social and Professional Issues of the Information Age, Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to heal, Pandora's Box: Social and Professional Issues of the Information Age
3.5 out of 5 stars based on 2 reviews
5
0 %
4
50 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Pandora's Box: Social and Professional Issues of the Information Age
  • Written by author Andrew A. Adams
  • Published by Wiley, John & Sons, Incorporated, January 2008
  • Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to heal
  • Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education t
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Preface.

1. Introduction.

Lessig's Four  Modalities Analysis.

Prophet and Loss: Failing to Foresee the Future.

Information System Partition.

The Law is an Ass.

Globalization.

The Digital Divide.

Servant or Master: Computers Making Decisions

Discussion Topics:.

Can Laws be Immoral?

Genetically Modified Food, Technologically Modified Humans.

The Haves and the Have-nots.

Related Reading

2. Emergence and Convergence of Technologies.

Introduction.  

Emergence.

The Rise of Print Media.

The Rise of the Telegraph and Telephone.

The Rise of Broadcast Media.

The Rise of The Computing Industry.

The Rise of the Content Industry.

The Rise of the Internet.

Convergence.

Content Producers and Distributors.

Platform Producers and Content Producers or Publishers.

Corporate Production vs Individual Creativity.

Market Sector Integration

Digitization. 

The Big Challenges Ahead.

Discussion Topics.

Fit for Purpose?

E-Tax.

Competing with Free Beer.

Related Reading.

3. Digital Entertainment.

Introduction.

The Effects of Digital Entertainment Technology.

Digital Entertainment - Friend or Foe?

The Toy Town Divide.

Boys and Girls Come Out to Play: Stereotyping.

Health Related Issues.

Curse of the Couch Potato Children.

Physical Problems.

Digital Equipment - Part of the Modern Family.

Does Television Cause Adverse Social Behaviour?

Creating Monsters - Do Computer Games Make People Violent?

Do Computer Games Fuel Addiction and Gambling.

Power to the Player- Benefits of Computer Games.

Harnessing the Power of the Brain.

Education and Learning.

The Silver Gamers.

Game Development Grows Up - The Hidden Agenda.

Discussion Points.

Should Computer Games be Regulated? Rated? Censored?

Couch Potato Syndrome.

Online Gambling: Menace or Natural Progression?

Related Reading.

4. Censorship and Freedom of Speech.

Introduction.

Reasons for Censorship. 

Censorship By States.

Censorship of Speakers by Governments.

Censorship of Listeners by Governments.

Censorship by Private Actors.

Censorship of Speakers by Private Actors.

Censorship of Listeners by Private Actors.

Technology for Expression.

Technological Developments with Expressive Power.

Censoring Internet Content.

Client-Server and Peer-to-Peer.

Discussion Topics.

Yahoo! France Nazi Memorabilia.

ISP Liability for Content.

BT and the IWF.

Related Reading.

5. Sex and Technology.

Introduction.

The Nature of Sexual Material.

One Man's Art....

The Medium and the Message.

Use of Technology to (Re)Produce Sexual Material.

Techno-Sex. 

Anonymity: Reality and Illusion.

Anon Servers.

Online Sex and Real Relationships.

The Future of Online Sex: TeleDildonics?

Regulating Sex in Cyberspace.

Not in Front of the Children; Protecting Children from Sex Online.

Surfing to a Naked Beach.

'Satisfy Her in Bed': Sex Spam to Minors.

Online Friendships.

Child Pornography.

Types of Material.

Prohibition, Harm, Possession and Distribution.

Jurisdictional Anomalies and Conflicts.

Discovery, Defence and Mitigation.

Discussion Topics.

Freedom of Speech v Censorship of Sexual Material.

The Toby Studabaker Case.

Related Reading.

6. Governance of the Internet.

Introduction.

The Internet Protocols.

The Origins of the Internet.

Early Arguments.

The Root of All Evil.

Commercialization.

Alternative Root Servers.

Commercialization, Ownership and Corporate Identity.

Trademarks.

Trademarks in Domain Names.

The Uniform Dispute Resolution Process.

The Nominet Dispute Resolution Process.

Criticisms of Dispute Resolution.

Do Trademarks Matter in Domain Names? In URLs?

The Future of Internet Governance.

ICANN,  DoC, EU and ccTLDs.

Wiring the World: Who Really Owns 'The Internet'?

Discussion Topics.

Should trademarks be valid in domain names?

What governance should ICANN have? UN-based, US-based, EU-based, anarchy?

What and how many top-level domains should there be? .

Related Reading.

7. Privacy and Surveillance.

Introduction.

Cryptography and Steganography.

Definition of Privacy.

Communication Technology and Eavesdropping.

Identity of Eavesdropper and Legality of Eavesdropping. 

Data Protection.

Data Protection Issues in EU Law.

Data Protection Issues in US Regulation.

International Movement of Data.

Data Protection Not Impediment to Life.

Big Brother is Watching You: CCTV.

Big Brother in the Making? Automated CCTV Processing.

Privacy Post-9/11.

Technological Privacy and Surveillance.

Discussion Topics.

Leaving Little Trace: Anonymity in the Digital World?

Availability of Cryptography and Steganography.

Data Retention by ISPs.

Related Reading.

8. Information Age Warfare.

Introduction.

History of Warfare.

The Technology of War.

War News.

Cyber Wars.

Satellites - The View from Space.

Star Wars Technology.

Network-centric warfare.

The Battlefield.

Robo - Soldier.

Man or Machine.

The Unseen Enemy.

Mobile Phones as Weapons.

War Games.

Information dominance.

Intelligence Gathering and Surveillance.

Discussion Topics.

Working for Arms Manufacturers.

Cyberterrorism: Real Threat or Virtual Bogeyman?

Overall Benefit or Drain on Resources?

Related reading.

9. Technology and the Human Body.

Introduction.

Health Information Systems.

Treatment.

Electronic Patient Records.

E-booking.

E-prescribing.

Intranets, Internet, and Call Centres.

Factors for Success.

Power to the Patient.

Internet, CD and Games.

Television Programmes.

Digital Television.

Self-diagnosis Kits.

Online Pharmacies.

Online Body Trafficking.

Techno-Medicine.

Telemedicine.

Training and Supporting Nurses & Doctors.

Virtual Therapy.

Robots in Hospitals.

Smart Monitoring.

Computer Modelling. 

Assistive Technology and Rehabilitation.

New Medical Technologies.

Implants for Diagnosis and Healing.

Implants and Prosthetics for Replacement and Reconstruction.

Digital Flesh & Cyborgs.

Discussion Topics.

The Longevity and Social Justice Debate.

Suggested Positions.

Owning the Code of Life.

What is a Human?

Related Reading.

10. Professionalism in IT.

Introduction.

Conduct.

Practice.

Whistleblowing.

Vulnerability of E-mail.

‘Illegal’ espionage.

Consequences of ‘Whistleblowing’.

Due Diligence.

Personal Responsibility.

Discussion Topics.

Self-Incrimination.

Responsibility for DDoS Attacks.

Whistleblowing Insecurity.

11. Online Crime and Real Punishment.

Introduction.

A Very Brief History of Crime and Computers.

Computer Fraud.

Malware.

A Taxonomy of Malware.

Problems Caused by Malware.

Malware Authors: Who, How and Why?

Hoaxes and Life Imitating Art.

Computer Security: Cops and Robbers, Poachers and Gamekeepers.

Who are the Crackers?

Vulnerability, Risk and Threat.

The Closed vs Open Security Debate.

Walking the Tightrope: Social Pressures on Security.

How Much Security Should be Necessary?

Poachers and Gamekeepers.

Laws Against Computer Misuse.

UK Computer Misuse Act.

US Sequence of Laws.

Council of Europe Convention on Cybercrime.

The Growing Problem of Computer Crime.

Discussion Topics.

White Hat Cracking Should Be Legalized.

Web Scrapers and Robot Denial Files.

An Immune System for the Internet.

Related Reading.

12. Patents and Copyright.

Introduction.

Intellectual Property?

The Philosophical Basis of Patents and Copyright.

Patents.

A Brief History of Patents.

Modern Patent Systems.

Business Method and Software Patents.

User Friendly Cartoon 005277.

General Criticisms of Patents.

Patent Licensing Companies.

Copyright.

Origins and Development of Copyright.

The Main Provisions of Modern Copyright Statutes.

The Main Case Law of Copyright in the US.

The State of Play.

Software Copyright.

Copyright and the Architecture of Cyberspace.

Free Culture.

Discussions Topics.

Is copyright the correct way to reward artists?

Does it actually promote artistic activity?

Lack of Legitimate Downloads Caused the Rise of Napster et al.

A New Basis for Copyright Law is Required.

Control and the Copyright Bargain.

Related Reading.

13. Unwanted Electronic Attentions.

Introduction.

Types of Unsolicited Communication.

Static Visual Communication.

Audio Communication.

Types of Communication Media.

Public Displays.

Broadcast Non-Interactive Media.

Broadcast Interactive Media.

Telephonic Services.

Internet Services.

The Economics of Unsolicited Contacts.

Sender Economics.

Junk mail.

Cold calling.

Receiver Economics.

Referral Economics.

Social, Legal and Technological Discouragement.

Malicious Unwanted Attentions.

Online and Telephone Fraud.

Electronic Stalking.

Online Grooming.

Discussion Topics.

Tackling Spam at the Transport Layer.

Opt-In, Opt-Out, Shake It All About.

Freedom of Speech or Online Stalking.

Related Reading.

14. Education and Online Learning.

Introduction.

From the Chalkboard to the Virtual Classroom.

Technology through the Years.

Visual Aids to Learning.

Audio Aids to Learning.

Audio–Visual Aids to Learning.

Developing E-Learning Environments.

ICT and e-Learning in Further Education Colleges in England.

e-Portfolio.

Videoconferencing.

Online Encyclopedia.

Mobile Education (PDAs and Mobile Devices).

Electronic Books.

Electronic Whiteboards.

Online Marketing.

Electronic Application and Admission Systems.

Digital Library.

Second Life.

Web 2.0.

Developing and Embracing e-Learning Resources.

The Learner Perspective.

The Teacher Perspective.

Accessibility of Education in a Wired World.

Cheating the System.

Bogus Degrees.

Discussion Topics.

One Person's Plagiarism is Another's Research.

Overseas Education vs Distance Education.

The Net of a Million Lies.

Related Reading.

15. Living and Working in a Wired World.

Introduction.

The Digital Lifestyle.

Work, Skills and Roles.

Teleworking.

The Mobile Office: the ‘Non-Office’ Office Job.

The New Role of the Office

Smarter Travel. .

Smarter Homes.

Shopping.

Buying Entertainment. 

The Sporting Life.

Technology and the Individual.

Education.

Health.

Crime.

Religion.

Communication.

The Changing Face of Communication.

The Global Village.

The Digital Divide.

The Digital Divide in the Industrialized World.

The Digital Divide Between the Nations.

Discussion Topics.

The Language of the Digital Age.

Digital Relationships.

Digital Divides.

Related Reading.

Appendix—Ethical Analysis.

Introduction.

Traditional Western Moral Philosophy.

Rationalism.

Locke vs Hobbes.

Hume and Human Passion.

Kant and the Categorical Imperative.

Legality and Morality.

Modern Ethical Theory.

Utilitarian Ethics.

Relativistic vs Universal Utiliarianism.

New Utilitarianism: Singer.

Computer Ethics.

Metaphysical Foundations for Computer Ethics.

Informed Consent Theory in Information Technology.

Ethical Decisions: Using the Back of the Envelope.

Information Ethics: ICT Professional Responsibility in the

Information Environment.

The Good Computer Professional Does not Cheat at Cards.

Conclusion.

Discussion Topics.

General: The Death Penalty.

ICT: Artificial Sentience Rights and Wrongs.

General: Is Religion an Excuse for Discrimination?

ICT: Search Ethics.

General: Lying to Tell the Truth?

ICT: Gender Presentation Online.

General: Fair Fines.

ICT: Should Internet Access be a Human Right?

General: Prediction of Harm.

ICT: Programmer Responsibility.

Related Reading.

Index.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Pandora's Box: Social and Professional Issues of the Information Age, Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to heal, Pandora's Box: Social and Professional Issues of the Information Age

X
WonderClub Home

This item is in your Collection

Pandora's Box: Social and Professional Issues of the Information Age, Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to heal, Pandora's Box: Social and Professional Issues of the Information Age

Pandora's Box: Social and Professional Issues of the Information Age

X
WonderClub Home

This Item is in Your Inventory

Pandora's Box: Social and Professional Issues of the Information Age, Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to heal, Pandora's Box: Social and Professional Issues of the Information Age

Pandora's Box: Social and Professional Issues of the Information Age

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: