Reychele’s Blog
Just another WordPress.com weblog

Archive for the ‘Uncategorized’ Category

References:

April 17, 2009

http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci213303,00.html http://googlewebmastercentral.blogspot.com/2009/02/best-practices-against-hacking.html http://72.14.235.132/search?q=cache:Wy5qqk9dFz8J:pcworld.about.com/news/Apr022001id45726.htm+hack+hacker&cd=3&hl=tl&ct=clnk&gl=ph&client=firefox-a http://72.14.235.132/search?q=cache:1kr3ldqA268J:www.thocp.net/reference/hacking/hacking.htm+hack+hacker&cd=10&hl=tl&ct=clnk&gl=ph&client=firefox-a http://en.wikipedia.org/wiki/Risk http://www.palgrave-journals.com/rm/index.html http://textus.diplomacy.edu/textusbin/env/scripts/Pool/GetBin.asp?IDPool=626 http://72.14.235.132/search?q=cache:3pKjAY1e_pMJ:www.gdrc.org/icts/i-overload/infoload.html+information+overload&cd=3&hl=tl&ct=clnk&gl=ph&client=firefox-a http://en.wikipedia.org/wiki/Information http://en.wikipedia.org/wiki/E-mail_spam http://www.plagiarism.org/learning_center/what_is_plagiarism.html http://209.85.175.132/search?q=cache:F2CqBgdmtIgJ:oreilly.com/catalog/peertopeer/chapter/ch01.html+peer-to-peer+networks.&cd=3&hl=tl&ct=clnk&gl=ph&client=firefox-a http://209.85.175.132/search?q=cache:tdr6BIRz_esJ:en.wikipedia.org/wiki/Censorship+Censorship&cd=1&hl=tl&ct=clnk&gl=ph&client=firefox-a http://72.14.235.132/search?q=cache:2UTP4yX6UvYJ:www.bookrags.com/essay/Censorship+essay+about+Censorship&cd=4&hl=tl&ct=clnk&gl=ph&client=firefox-a http://209.85.175.132/search?q=cache:pXDwD7d1ORMJ:www.euro-libris.ro/carte/handbook-of-information-and-computer-ethics–i3092+Gender+Agenda+in+Computer+Ethics+%5C&cd=11&hl=tl&ct=clnk&gl=ph&client=firefox-a http://209.85.175.132/search?q=cache:rd9cnkG909kJ:www.globalissues.org/issue/2/causes-of-poverty+poverty&cd=9&hl=tl&ct=clnk&gl=ph&client=firefox-a http://72.14.235.132/search?q=cache:ypyI-yvUAukJ:www.capurro.de/iie.html+intercultural+information&cd=1&hl=tl&ct=clnk&gl=ph&client=firefox-a

Chapter Title: The Practitioner from Within: Revisiting the Virtues

April 17, 2009

Chapter Title: The Practitioner from Within: Revisiting the Virtues Name of the Book: Cyber Ethics Library Reference: N/A Amazon Link: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “If there is such thing as the truth about the subject matter of ethics..Why is there any expectation that is should be simple? In particular, why should it be conceptually simple, using one […]

Chapter Title: Ethical Issues in Business Computing

April 17, 2009

Chapter Title: Ethical Issues in Business Computing Name of the Book: Cyber Ethics Library Reference: N/A Amazon Link: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “I believe that in case of business computer ethics, specifically concerned not with academic theory but the real world it is particularly important to be pragmatic.” Learning Expectations: 1. To know what is business computing. […]

Chapter Title: Subsumption Ethics

April 17, 2009

Chapter Title: Subsumption Ethics Name of the Book: Cyber Ethics Library Reference: N/A Amazon Link: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “Act in such a way that it is possible for one to will that the maxim of one’s action should be become the universal law.” Learning Expectations: 1. To know what is Subsumption ethics. 2. To know the […]

Chapter Title: No, PAPA: Why Incomplete Codes of Ethics are Worse than none at All

April 17, 2009

Chapter Title: No, PAPA: Why Incomplete Codes of Ethics are Worse than none at All Name of the Book: Cyber Ethics Library Reference: N/A Amazon Link: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “The possible danger to life of weapons systems and whether it might be increased or reduced by a new system being developed is no addressed in any […]

Chapter Title: Software Engineering Code of Ethics: Approved

April 17, 2009

Chapter Title: Software Engineering Code of Ethics: Approved Name of the Book: Cyber Ethics Library Reference: N/A Amazon Link: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “In all these judgments concern for the health, safety and welfare of the public is primary; that is, the ‘public interest’ is central to this code.” Learning Expectations: 1. To know the software engineering […]

Chapter Title: Ethical Considerations for the Information Professions

April 17, 2009

Chapter Title: Ethical Considerations for the Information Professions Name of the Book: Cyber Ethics Library Reference: N/A Amazon Link: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “Ethics is the study of morality; the study of what we do. Morality could exist without ethics but there cannot be ethics without morality …morality is like eating; it is an inevitable part of […]

Chapter Title: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace

April 17, 2009

Chapter Title: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace Name of the Book: Cyber Ethics Library Reference: N/A Amazon Link: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “One recent form of criminal activity that seems potentially to border on computer crime is a criminal act involving the act of digital telephony. Basse points out that […]

Chapter Title: Security in Cyber Space

April 17, 2009

Chapter Title: Security in Cyber Space Name of the Book: Cyber Ethics Library Reference: N/A Amazon Link: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “It is important to note that in information and communication technology context, the term security is often used in ambiguously and sometime equivocally.” Learning Expectations: 1. To know what is Security in Cyber Space. 2. To […]

Chapter Title: Privacy and Varieties of Informational Wrongdoing

April 17, 2009

Chapter Title: Privacy and Varieties of Informational Wrongdoing Name of the Book: Cyber Ethics Library Reference: N/A Amazon Link: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “In professional relations and the world of work, a man operates, and his activities come up for criticism, under a variety of professional or technical titles, such as miner or agricultural laborer. The technical […]