You now
Someone else 2 hrs ago
Someone else 15 hrs ago
Someone else 22 hrs ago
Someone else 1 day ago
Someone else 1 day ago
Someone else 1 day ago
Someone else 2 days ago
Someone else 2 days ago
Someone else 2 days ago
Someone else 3 days ago
NEW - IT-ETHIC
Seatworks/ Assignments:
Profitable Until Deemed Illegal
Student Auction off Virginity
10 Commandments of Computer Ethics
IEEE Code of Ethics
Gandhi's Issue
Youtube's January Fare Use Massacre
Satire versus Parody
What is a Christian Nation
Chapter 2 - Ethical Concepts & Ethical Theories
Patent Troll
Chap. 4
Noblesse Oblige
SOX
Starbucks vs. Smart
CEMEX Case Study
DNS Tunnelling
TOR
BCS Code of Conduct
IEEE Code of Ethics
AnnaPurna Salt Case Study
International Association of Microsoft Certified Partners (IAMCP) Code of Ethics
Privacy and Encryption
Will You Be The Next Social Entrepreneur?
Yahoo! Seal
Jaipur Foot
Hindustan Lever Limited
A BOP Assessment on CHIPS
Integrative Q&As:
Tough times call for more CSR
Profitable Until Deemed Illegal
Contemporary Moral Problems:
James Rachels: Egoism and Moral Sceptism
John Arthur: Religion, Morality and Conscience
Friedrich Nietzsche: Master and Slavery Morality
Mary Midgley: Trying Out One's New Sword
John Stuart Mill: Utilitarianism
James Rachels: The Debate over Utilitarianism
Immanuel Kant: The Categorical Imperative
Aristotle: Happiness and Values
Joel Feinberg: The Nature and Value of Rights
Ronald Dworkin: Taking Rights Seriously
John Rawls: A Theory of Justice
Annette Baier: The Need for More Than Justice
BOOK REVIEWS:
The Fortune at the Bottom of the Pyramid
1. The Market at the Bottom of the Pyramid
2. Products and Services for the BOP
3. BOP: A Global Opportunity
4. The Ecosystem for Wealth Creation
5. Reducing Corruption: Transaction Governance Capacity
6. Development as Social Transformation
The Handbook of Information and Computer Ethics
1. Foundations of Information Ethics
2. Milestones in the History of Information and Computer Ethics
3. Moral Methodology and Information Technology
4. Value Sensitive Design and Information Systems
5. Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property
6. Informational Privacy: Concepts, Theories, and Controversies
7. Online Anonymity
8. Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterkacking
9. Information Ethics and the Library Profession
10. Ethical Interest in Free and Open Source Software
11. Internet Research Ethics: The Field and Its Critical Issues
12. Health Information Technology: Challenges in Ethics, Science, and Uncertainty
13. Ethical Issues of Information and Business
14. Responsibilities for Information on the Internet
15. Virtual Reality and Computer Simulation
16. Genetic Information: Epistemological and Ethical Issues
17. The Ethics of Cyber Conflict
18. A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection
19. Regulation and Governance of the Internet
20. Information Overload
21. Email Spam
22. The Matter of Plagiarism: What, Why, and If
23. Intellectual Property: Legal and Moral Challenges of Online File Sharing
24. Censorship and Access to Expression
25. The Gender Agenda in Computer Ethics
26. The Digital Divide: A Perspective for the Future
27. Intercultural Information Ethics
Cyber Ethics
1. Ethics and the Information Revolution
2. Ethics On-Line
3. Reason, Relativity, and Responsibility in Computer Ethics
4. Disclosive Computer Ethics
5. Gender and Computer Ethics
6. Is the Global Information Infrastructure a Democratic Technology
7. Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key Problems and Challenges
8. Just Consequentialism and Computing
9. The Internet as Public Space: Concepts, Issues, and Implications in Public Policy
10. The Laws of Cyberspace
11. Of Black Holes and Decentralized Law-Making in Cyberspace
12. Fahrenheit 451 2: Is Cyberspace Burning
13. Filtering the Internet in the USA: Free Speech Denied
14. Censorship, the Internet, and the Child Pornography Law of 1996: A Critique
15. PICS: Internet Access Controls Without Censorship
16. Internet Service Providers and Defamation: New Standards of Liability
17. Digital Millennium Copyright Act
18. Note on the DeCSS Trial
19. A Politics of Intellectual Property: Environmentalism for the Net
20. Intellectual Property, Information, and the Common Good
21. Is Copyright Ethical An Examination of the Theories, Laws, and Practices Regarding the Private
22. On the Web, Plagiarism Matters More Than Copyright Piracy
23. An Ethical Evaluation of Web Site Linking
24. The Cathedral and the Bazaar
25. Towards A Theory of Piracy for the Information Age
26. The Structure of Rights in Directive 95 46 EC
27. Privacy Protection, Control of Information, and Privacy-Enhancing Technologies
28. Toward an Approach to Privacy in Public: Challenges of Information Technology
29. KDD, Privacy, Individuality, and Fairness
30. Data Mining and Privacy
31. Workplace Surveillance, Privacy, and Distributive Justice
32. Privacy and Varieties of Informational Wrongdoing
33. PICS: Internet Access Controls Without Censorship
34. Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace
35. Terrorism or Civil Disobedience: Toward a Hacktivist Ethic
36. Web Security and Privacy: An American Perspective
37. The Meaning of Anonymity in an Information Age
38. Written on the Body: Biometrics and Identity
39. Ethical Considerations for the Information Professions
40. Software Engineering Code of Ethics: Approved
41. No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All
42. Subsumption Ethics
43. Ethical Issues in Business Computing
44. The Practitioner from Within: Revisiting The Virtues
VERTSOL
A Vertical Market Solutions Reader
VERTSOL READER (.pdf)
VERTSOL READER (Scribd)
Questions? Click here to get help.
Comments (0)
You don't have permission to comment on this page.