Pandora's Box: Social and Professional Issues of the Information Age / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $28.30
Usually ships in 1-2 business days
(Save 61%)
Other sellers (Paperback)
  • All (12) from $28.30   
  • New (6) from $52.57   
  • Used (6) from $28.30   


Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to healthcare to war. Dealing with the implications of this is a major challenge, and one that can impact upon us, both personally and professionally. As a consequence, it is vital that all in the computing industry make wise decisions regarding their conduct.

Using case studies and discussion topics drawn from entertaining real world examples, Pandora’s Box examines the background of a wide range of vital contemporary issues, encouraging readers to examine the social, legal and ethical challenges they will face in their own careers.

Written in an engaging style and packed with international examples, this book addresses topics which have come to the forefront of public consciousness in recent years, such as online crime, piracy and peer to peer file sharing. Comprehensive coverage is provided of digital entertainment, censorship and privacy issues, presenting a rich source of context in which to consider ethical matters.

Suitable for students on computer science degree programmes, as well as those taking IT related modules on other courses which consider the impact of technology on 21st century living, Pandora’s Box is an essential read and a unique and timely textbook.

Read More Show Less

What People Are Saying

From the Publisher
'I.T. has triggered complex social, political, economic and ethical issues that need urgent action if we are to survive the coming decades of unprecedented technological change. This book is a must-read for all those who want to understand the issues or, more important, want to help in their resolution.'

James Burke

‘This book provides a breath of fresh air in the subject... with numerous examples.  Further, it provides a nice link between ethical behaviour, professionalism and the law’

Karl Jones, Liverpool John Moores University

Read More Show Less

Product Details

  • ISBN-13: 9780470065532
  • Publisher: Wiley
  • Publication date: 1/28/2008
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 666
  • Product dimensions: 7.46 (w) x 9.37 (h) x 1.45 (d)

Meet the Author

Dr. Andrew Adams is a lecturer in the School of Systems Engineering at the University of Reading.  Dr. Rachel McCrindle is a senior lecturer and Head of Ambient & Pervasive Intelligence Research Group in the School of Systems Engineering at the University of Reading.  Both Dr. Adams and Dr. McCrindle teach on the third year undergraduate module “Social, Legal & Ethical Aspects of Computer Science, Information Technology & Electronic Engineering” and have published numerous articles in peer-reviewed journals within their subject area.
Read More Show Less

Table of Contents

Preface xxi

1 Introduction 1

Lessig's Four Modalities Analysis 6

Prophet and Loss: Failing to Foresee the Future 7

Information System Partition 8

The Law is an Ass 10

Globalization 12

The Digital Divide 13

Servant or Master: Computers Making Decisions 15

2 Emergence and Convergence of Technologies 21

Introduction 21

Emergence 23

Convergence 39

The Big Challenges Ahead 55

3 Digital Entertainment 61

Introduction 61

The Effects of Digital Entertainment Technology 64

Health-Related Issues 69

Power to the Player—Benefits of Computer Games 84

4 Censorship and Freedom of Speech 97

Introduction 97

Censorship by States 101

Censorship by Private Actors 111

Technology for Expression 114

5 Sex and Technology 131

Introduction 131

The Nature of Sexual Material 132

Regulating Sex in Cyberspace 149

Not in Front of the Children: Protecting Children from Sex Online 152

Child Pornography 161

6 Governance of the Internet 175

Introduction 175

The Root of All Evil 185

Commercialization, Ownership and Corporate Identity 189

The Future of Internet Governance 204

7 Privacy and Surveillance 211

Introduction 211

Communication Technology and Eavesdropping 215

Data Protection 222

Big Brother is Watching You: Automated CCTV Processing 231

Privacy After 9/11 234

Technological Privacy and Surveillance 235

8 Information Age Warfare 243

Introduction 243

History of Warfare 245

The Technology of War 248

The Battlefield 258

Information Dominance 263

9 Technology and The Human Body 273

Introduction 273

Health Information Systems 275

Power to the Patient 283

Online Body Trafficking 291

Techno-Medicine 292

New Medical Technologies 309

10 Professionalism In IT 323

Introduction 323

Conduct 327

Practice 333

Whistleblowing 334

Due Diligence 338

Personal Responsibility 340

11 Online Crime and Real Punishment 345

Introduction 345

Malware 351

Computer Security: Cops and Robbers, Poachers and Gamekeepers 363

Laws Against Computer Misuse 387

The Growing Problem of Computer Crime 395

12 Patents and Copyright 401

Introduction 401

Intellectual Property? 402

The Philosophical Basis of Patents and Copyright 404

Patents 406

Copyright 419

Copyright and the Architecture of Cyberspace 449

Free Culture 449

13 Unwanted Electronic Attentions 457

Introduction 457

Types of Unsolicited Communication 459

Types of Communication Media 461

The Economics of Unsolicited Contacts 470

Malicious Unwanted Attentions 494

14 Education and Online Learning 505

Introduction 505

From the Chalkboard to the Virtual Classroom 507

Developing E-Learning Environments 513

Developing and Embracing e-Learning Resources 526

Accessibility of Education in a Wired World 533

Cheating the System 535

15 Living and Working in a Wired World 545

Introduction 545

The Digital Lifestyle 547

Technology and the Individual 563

Communication 565

The Digital Divide 574

Appendix—Ethical Analysis 583

Introduction 583

Traditional Western Moral Philosophy 584

Modern Ethical Theory 589

Computer Ethics 591

Conclusion 596

Discussion Topics 597

Related Reading 607

Index 609

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)