Skip to:Content
|
Bottom
Cover image for Information assurance and security ethics in complex systems : interdisciplinary perspectives
Title:
Information assurance and security ethics in complex systems : interdisciplinary perspectives
Publication Information:
Hershey, PA : Information Science Reference, 2011
Physical Description:
xvii, 282 p. : ill. ; 29 cm.
ISBN:
9781616922450

9781616922467
Abstract:
"This book offers insight into social and ethical challenges presented by modern technology covering the rapidly growing field of information assurance and security"--Provided by publisher.

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010236713 QA76.9.A25 I545 2011 f Open Access Book Book
Searching...

On Order

Summary

Summary

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives offers insight into social and ethical challenges presented by modern technology. Aimed at students and practitioners in the rapidly growing field of information assurance and security, this book address issues of privacy, access, safety, liability and reliability in a manner that asks readers to think about how the social context is shaping technology and how technology is shaping social context and, in so doing, to rethink conceptual boundaries.


Reviews 1

Choice Review

This 11-chapter edited collection focuses on the interaction between technology and ethics, mostly related to such topics as privacy, access, safety, liability, and reliability. Contemporary emerging issues discussed include the impact of international cultures, right versus wrong group norms, peer-to-peer networks, software security, insider-threat monitoring, behavioral advertising, pharmacogenetic testing, public policy, and cyber trust. This reviewer particularly liked the attempt in chapter 3 to dissect a technologically driven ethical issue through a role-playing case study. Chapter 5 takes a very sharp turn to examine ethical issues underlying peer-to-peer networks. Whereas chapter 3 is very philosophical and theoretical, chapter 5 dives into technical details, observing that peer-to-peer networks, as well as other current electronic dissemination technologies, are the direct results of technical advances as well as economic benefits to all parties. However, these two chapters demonstrate what this reviewer considers a weakness of this book. To benefit from the broad range of discussion, readers need to be well versed in numerous topics, from theoretical philosophy of ethics through international cultures, legal and moral issues, private and government entities, and privacy to a fairly deep understanding of computer and communications technologies. Very few people--especially undergraduates--can demonstrate such sophistication and depth across so many subjects. Summing Up: Recommended. Graduate students and researchers/faculty. H. Levkowitz University of Massachusetts


Go to:Top of Page