Pandora's Box: Social and Professional Issues of the Information Age / Edition 1

Pandora's Box: Social and Professional Issues of the Information Age / Edition 1

ISBN-10:
0470065532
ISBN-13:
9780470065532
Pub. Date:
01/29/2008
Publisher:
Wiley
ISBN-10:
0470065532
ISBN-13:
9780470065532
Pub. Date:
01/29/2008
Publisher:
Wiley
Pandora's Box: Social and Professional Issues of the Information Age / Edition 1

Pandora's Box: Social and Professional Issues of the Information Age / Edition 1

Paperback

$75.75 Current price is , Original price is $75.75. You
$75.75 
  • SHIP THIS ITEM
    Temporarily Out of Stock Online
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.

Temporarily Out of Stock Online


Overview

Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to healthcare to war. Dealing with the implications of this is a major challenge, and one that can impact upon us, both personally and professionally. As a consequence, it is vital that all in the computing industry make wise decisions regarding their conduct.

Using case studies and discussion topics drawn from entertaining real world examples, Pandora’s Box examines the background of a wide range of vital contemporary issues, encouraging readers to examine the social, legal and ethical challenges they will face in their own careers.

Written in an engaging style and packed with international examples, this book addresses topics which have come to the forefront of public consciousness in recent years, such as online crime, piracy and peer to peer file sharing. Comprehensive coverage is provided of digital entertainment, censorship and privacy issues, presenting a rich source of context in which to consider ethical matters.

Suitable for students on computer science degree programmes, as well as those taking IT related modules on other courses which consider the impact of technology on 21st century living, Pandora’s Box is an essential read and a unique and timely textbook.


Product Details

ISBN-13: 9780470065532
Publisher: Wiley
Publication date: 01/29/2008
Pages: 672
Product dimensions: 7.50(w) x 9.30(h) x 1.42(d)

About the Author

Dr. Andrew Adams is a lecturer in the School of Systems Engineering at the University of Reading. Dr. Rachel McCrindle is a senior lecturer and Head of Ambient & Pervasive Intelligence Research Group in the School of Systems Engineering at the University of Reading.  Both Dr. Adams and Dr. McCrindle teach on the third year undergraduate module "Social, Legal & Ethical Aspects of Computer Science, Information Technology & Electronic Engineering" and have published numerous articles in peer-reviewed journals within their subject area. www.wileyeurope.com/college/adams

Read an Excerpt

Click to read or download

Table of Contents

Foreword xxi

Preface xxv

1 Introduction 1

Lessig’s Four Modalities Analysis 6

Prophet and Loss: Failing to Foresee the Future 7

Information System Partition 8

The Law is an Ass 10

Globalization 12

The Digital Divide 13

Servant or Master: Computers Making Decisions 15

Discussion Topics 17

Can Laws Be Immoral? 17

Genetically Modified Food, Technologically Modified Humans 17

The Haves and the Have-nots 18

Related Reading 19

2 Emergence and Convergence of Technologies 21

Introduction 21

Emergence 23

The Rise of Print Media 23

The Rise of the Telegraph and the Telephone 24

The Rise of Broadcast Media 28

The Rise of the Computing Industry 31

The Rise of the Content Industry 33

The Rise of the Internet 35

Convergence 39

Content Producers and Distributors 39

Platform Producers and Content Producers or Publishers 41

Corporate Production vs Individual Creativity 43

Market Sector Integration 44

Digitization 48

The Big Challenges Ahead 55

Discussion Topics 56

Fit for Purpose? 56

E-Tax 56

Competing with Free Beer 58

Related Reading 60

3 Digital Entertainment 61

Introduction 61

The Effects of Digital Entertainment Technology 64

Digital Entertainment—Friend or Foe? 64

The Toy Town Divide 64

Boys and Girls Come out to Play: Stereotyping 66

Health-Related Issues 69

Curse of the Couch-Potato Children 69

Physical Problems 71

Digital Equipment—Part of the Modern Family 72

Does Television Cause Adverse Social Behaviour? 74

Creating Monsters—Do Computer Games Make People Violent? 76

Do Computer Games Fuel Addiction and Gambling? 80

Power to the Player—Benefits of Computer Games 84

Harnessing the Power of the Brain 84

Education and Learning 86

The Silver Gamers 88

Game Development Grows up—the Hidden Agenda 88

Discussion Points 91

Should Computer Games Be Regulated? Rated? Censored? 91

Couch-Potato Syndrome 92

Online Gambling: Menace or Natural Progression? 93

Related Reading 95

4 Censorship and Freedom of Speech 97

Introduction 97

Reasons for Censorship 100

Censorship by States 101

Censorship of Speakers by Governments 107

Censorship of Listeners by Governments 109

Censorship by Private Actors 111

Censorship of Speakers by Private Actors 111

Censorship of Listeners by Private Actors 113

Technology for Expression 114

Technological Developments with Expressive Power 114

Censoring Internet Content 115

Client–Server and Peer-to-Peer Architectures 124

Conclusion 125

Discussion Topics 126

Yahoo! France Nazi Memorabilia 126

ISP Liability for Content 127

BT and the IWF 129

Related Reading 130

5 Sex and Technology 131

Introduction 131

The Nature of Sexual Material 132

One Man’s Art. . . 132

The Medium and the Message 133

Use of Technology to (Re)Produce Sexual Material 133

Techno-Sex 134

Anonymity: Reality and Illusion 144

Anon Servers 146

Online Sex and Real Relationships 147

The Future of Online Sex: TeleDildonics? 148

Regulating Sex in Cyberspace 149

Not in Front of the Children: Protecting Children from Sex Online 152

Restricting Access to Broadcast Media 153

Surfing to a Naked Beach 154

‘Satisfy Her in Bed’: Sex Spam to Minors 157

Online Friendships 159

Child Pornography 161

Types of Material 162

Prohibition, Harm, Possession and Distribution 166

Jurisdictional Anomalies and Conflicts 168

Discovery, Defence and Mitigation 169

Discussion Topics 171

Freedom of Speech vs Censorship of Sexual Material 171

The Toby Studabaker Case 172

Related Reading 173

6 Governance of the Internet 175

Introduction 175

The Internet Protocols 176

The Origins of the Internet 178

Early Arguments 181

The Root of All Evil 185

Commercialization 185

Internet Corporation for Assigned Names and Numbers 186

ccTLDs 188

Alternative Root Servers 188

Commercialization, Ownership and Corporate Identity 189

Trade Marks 189

Trade Marks in Domain Names 191

The Uniform Dispute Resolution Process 196

The Nominet Dispute Resolution Process 198

Criticisms of Dispute Resolution 199

Do Trade Marks Matter in Domain Names or in URLs? 203

The Future of Internet Governance 204

ICANN, DoC, EU and ccTLDs 204

Wiring the World: Who Really Owns ‘The Internet’? 205

Discussion Topics 206

Should Trade Marks Be Valid in Domain Names? 206

What Governance Should ICANN Have? 207

How Many Top-Level Domains Should There Be? 208

7 Privacy and Surveillance 211

Introduction 211

Cryptography and Steganography 212

Definition of Privacy 214

Communication Technology and Eavesdropping 215

Ways to Eavesdrop 215

Identity of Eavesdropper 217

Legality of Eavesdropping 218

The Whole Is Greater than the Sum of its Parts 220

Data Protection 222

Data Protection Issues in EU Law 223

Data Protection Issues in US Regulation 227

International Movement of Data 229

Data Protection, not an Impediment to Life 230

Big Brother is Watching You: Automated CCTV Processing 231

Privacy After 9/11 234

Technological Privacy and Surveillance 235

Discussion Topics 237

Leaving Little Trace: Anonymity in the Digital World? 237

Availability of Cryptography and Steganography 238

Data Retention by ISPs 239

Related Reading 241

8 Information Age Warfare 243

Introduction 243

History of Warfare 245

The Technology of War 248

War News 249

Cyber-Wars 250

Satellites—the View from Space 253

Star Wars Technology 254

Network-centric Warfare 255

The Battlefield 258

Robo-Soldier 258

Man or Machine? 259

The Unseen Enemy 260

Mobile Phones as Weapons 261

War Games 261

Information Dominance 263

Intelligence Gathering and Surveillance 265

Discussion Topics 267

Working for Arms Manufacturers 267

Cyberterrorism: Real Threat or Virtual Bogeyman? 268

Overall Benefit or Drain on Resources? 269

9 Technology and the Human Body 273

Introduction 273

Health Information Systems 275

Treatment 276

Electronic Patient Records 276

E-booking 278

E-prescribing 279

Intranets, the Internet and Call Centres 280

Factors for Success 281

Power to the Patient 283

The Internet and CDs 284

Television Programmes 286

Digital Television 287

Self-Diagnosis Kits 288

Online Pharmacies 290

Online Body Trafficking 291

Techno-Medicine 292

Telemedicine 293

Training and Supporting Nurses and Doctors 294

Virtual Therapy 297

Robots in Hospitals 298

Smart Monitoring 301

Computer Modelling 305

Assistive Technology and Rehabilitation 308

New Medical Technologies 309

Implants for Diagnosis and Healing 310

Implants and Prosthetics for Replacement and Reconstruction 311

Digital Flesh and Cyborgs 315

Discussion Topics 318

The Longevity and Social Justice Debate 318

Suggested Positions 319

Owning the Code of Life 319

What Is a Human? 320

Related Reading 321

10 Professionalism in IT 323

Introduction 323

Conduct 327

Practice 333

Whistleblowing 334

Vulnerability of E-mail 335

‘Illegal’ espionage 337

Consequences of ‘Whistleblowing’ 337

Due Diligence 338

Personal Responsibility 340

Discussion Topics 340

Self-Incrimination 340

Responsibility for DDoS Attacks 341

Whistleblowing Insecurity 343

11 Online Crime and Real Punishment 345

Introduction 345

A Brief History of Crime and Computers 347

Computer Fraud 348

Malware 351

A Taxonomy of Malware 351

Problems Caused by Malware 352

Malware Authors: Who, How and Why? 359

Hoaxes and Life Imitating Art 362

Computer Security: Cops and Robbers, Poachers and Gamekeepers 363

Historical Roots of Cracking 364

Who are the Crackers? 366

Vulnerability, Risk and Threat 370

Closed vs Open Security 373

Walking the Tightrope: Social Pressures on Security 379

How Much Security Is Necessary? 382

Poachers and Gamekeepers 386

Laws Against Computer Misuse 387

UK Computer Misuse Act 388

US Sequence of Laws 391

Council of Europe Convention on Cybercrime 393

The Growing Problem of Computer Crime 395

Discussion Topics 396

Grey Hat Cracking Should Be Legalized 396

Web Scrapers and Robot Denial Files 397

An Immune System for the Internet 399

Related Reading 400

12 Patents and Copyright 401

Introduction 401

Intellectual Property? 402

Trade mark 402

Patent 403

Copyright 404

The Philosophical Basis of Patents and Copyright 404

Patents 406

A Brief History of Patents 406

Modern Patent Systems 407

Business Methods and Software Patents 411

General Criticisms of Patents 414

Patent-Licensing Companies 417

Copyright 419

Origins and Development of Copyright 420

The Main Provisions of Modern Copyright Statutes 424

US Case Law for Copyright 428

The Current State of Play 434

The Music Industry and Higher Education 435

The Originator’s Rights 436

Software Copyright 437

Copyright and the Architecture of Cyberspace 449

Free Culture 449

Discussion Topics 450

Is Copyright the Correct Way to Reward Artists? Does It Promote Artistic Activity? 450

Lack of Legitimate Downloads Caused the Rise of Peer-to-Peer File-Sharing 452

A New Basis for Copyright Law Is Required 453

Control and the Copyright Bargain 454

Related Reading 455

13 Unwanted Electronic Attentions 457

Introduction 457

Types of Unsolicited Communication 459

Static Visual Communication 459

Audio Communication 460

Types of Communication Media 461

Public Displays 461

Broadcast Non-Interactive Media 461

Broadcast Interactive Media 462

Telephonic Services 463

Internet Services 465

The Economics of Unsolicited Contacts 470

Sender Economics 470

Junk mail 471

Cold calling 472

Receiver Economics 474

Referral Economics 477

Social, Legal and Technological Discouragement 481

Malicious Unwanted Attentions 494

Online and Telephone Fraud 495

Electronic Stalking 496

Online Grooming 499

Discussion Topics 500

Tackling Spam at the Transport Layer 500

Opt-In, Opt-Out, Shake It All About 501

Freedom of Speech or Online Stalking 502

Related Reading 503

14 Education and Online Learning 505

Introduction 505

From the Chalkboard to the Virtual Classroom 507

Technology through the Years 507

Visual Aids to Learning 508

Audio Aids to Learning 510

Audio–Visual Aids to Learning 511

Developing E-Learning Environments 513

ICT and e-Learning in Further Education Colleges in England 515

e-Portfolio 516

Videoconferencing 517

Online Encyclopedia 518

Mobile Education (PDAs and Mobile Devices) 519

Electronic Books 521

Electronic Whiteboards 521

Online Marketing 522

Electronic Application and Admission Systems 523

Digital Library 523

Second Life 524

Web 2.0 525

Developing and Embracing e-Learning Resources 526

The Learner Perspective 527

The Teacher Perspective 529

Accessibility of Education in a Wired World 533

Cheating the System 535

Bogus Degrees 538

Discussion Topics 539

One Person’s Plagiarism Is Another’s Research 539

Overseas Education vs Distance Education 540

The Net of a Million Lies 542

Related Reading 543

15 Living and Working in a Wired World 545

Introduction 545

The Digital Lifestyle 547

Work, Skills and Roles 547

Teleworking 548

The Mobile Office: the ‘Non-Office’ Office Job 551

The New Role of the Office 552

Smarter Travel 552

Smarter Homes 555

Shopping 556

Buying Entertainment 561

The Sporting Life 562

Technology and the Individual 563

Education 563

Health 563

Crime 564

Religion 564

Communication 565

The Changing Face of Communication 565

The Global Village 573

The Digital Divide 574

The Digital Divide in the Industrialized World 577

E-Government 578

The Digital Divide Between the Nations 579

Discussion Topics 580

The Language of the Digital Age 580

Digital Relationships 581

Digital Divides 581

Related Reading 582

Appendix—Ethical Analysis 583

Introduction 583

Traditional Western Moral Philosophy 584

Rationalism 584

Locke vs Hobbes 585

Hume and Human Passion 587

Kant and the Categorical Imperative 587

Legality and Morality 587

Modern Ethical Theory 589

Utilitarian Ethics 589

Relativistic vs Universal Utiliarianism 590

New Utilitarianism: Singer 591

Computer Ethics 591

Metaphysical Foundations for Computer Ethics 593

Informed Consent Theory in Information Technology 594

Ethical Decisions: Using the Back of the Envelope 594

Information Ethics: ICT Professional Responsibility in the Information Environment 595

The Good Computer Professional Does not Cheat at Cards 596

Conclusion 596

Discussion Topics 597

General: The Death Penalty 597

ICT: Artificial Sentience Rights and Wrongs 598

General: Is Religion an Excuse for Discrimination? 599

ICT: Search Ethics 600

General: Lying to Tell the Truth? 601

ICT: Gender Presentation Online 601

General: Fair Fines 602

ICT: Should Internet Access be a Human Right? 603

General: Prediction of Harm 604

ICT: Programmer Responsibility 605

Related Reading 607

Index 609 

What People are Saying About This

From the Publisher

'I.T. has triggered complex social, political, economic and ethical issues that need urgent action if we are to survive the coming decades of unprecedented technological change. This book is a must-read for all those who want to understand the issues or, more important, want to help in their resolution.'

James Burke

 

‘This book provides a breath of fresh air in the subject... with numerous examples.  Further, it provides a nice link between ethical behaviour, professionalism and the law’

Karl Jones, Liverpool John Moores University

From the B&N Reads Blog

Customer Reviews