You are previewing ICT Ethics and Security in the 21st Century.
O'Reilly logo
ICT Ethics and Security in the 21st Century

Book Description

ICT Ethics and Security in the 21st Century: New Developments and Applications highlights ethical dilemmas and security challenges posed by the rise of more recent technologies along with ongoing challenges such as the digital divide, threats to privacy, and organizational security measures. This book comprises a valuable resource for ICT researchers, educators, students, and professionals along with both employers and employees of large organizations searching for resolutions to the everyday ethical and security dilemmas we must grapple with in our highly globalised and technologized world.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  5. Foreword
  6. Preface
    1. ORGANISATION OF THE BOOK
  7. Acknowledgment
  8. Section 1: Online Ethics
    1. Chapter 1: Understanding Trust in Virtual Communities
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. TRUST
      5. issues and discussion
      6. FuTURE rESEARCH dIRECTIONS
      7. Conclusion
    2. Chapter 2: Social Networks and Students’ Ethical Behavior
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. STudent ideas about social networking
      5. Social networking’s Effect on one’s ethical structure
      6. FuTURE rESEARCH dIRECTIONS
      7. Conclusion
    3. Chapter 3: The Ethics of Security of Personal Information upon Facebook
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND: THE HISTORY OF SOCIAL NETWORKING
      4. BACKGROUND TO THE FACEBOOK SOCIAL NETWORKING SITE
      5. FACEBOOK SECURITY AND PRIVACY EXAMPLES
      6. Information Loss
      7. Viruses, Malwares and Trojan Attacks
      8. Third Party Applications
      9. Organisational Impact
      10. The Right to Privacy?
      11. The Impact of Public Opinion: An Australian Case
      12. Online Harassment
      13. Facebook Security Issues Framework
      14. Solutions and Recommendations
      15. FuTURE rESEARCH dIRECTIONS
      16. Conclusion
    4. Chapter 4: Copyright and Ethical Issues in Emerging Models for the Digital Media Reporting of Sports News in Australia
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. SPORTS NEWS REPORTING and digital media
      5. FuTURE rESEARCH dIRECTIONS
      6. Conclusion
  9. Section 2: Ethical Concerns in the Handling and Delivery of Health and Safety Information
    1. Chapter 5: The Protocols of Privileged Information Handling in an E-Health Context
      1. ABSTRACT
      2. INTRODUCTION
      3. background
      4. RESEARCH DESIGN
      5. RIGHTS AND RESPONSIBILITIES
      6. THE NATURAL HOSPITAL ENVIRONMENT (NHE)
      7. PKI AND NASH
      8. IT SUPPORT
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
    2. Chapter 6: The Changing World of ICT and Health
      1. ABSTRACT
      2. Introduction
      3. The Patient as a consumer
      4. EMPOWERING THROUGH CONVERGING COMMUNICATIONS
      5. THE EVOLUTION OF COMMUNICATION MEDIUMS
      6. INTERNET PENETRATION vs. MOBILE PENETRATION
      7. Access to Health Information: Developing Country Perspective
      8. Future Research Directions
      9. Conclusion
    3. Chapter 7: The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services during Emergencies
      1. Abstract
      2. INTRODUCTION
      3. EMERGENCY MANAGEMENT IN AUSTRALIA
      4. The emergence of Location-based services SOLUTIONS
      5. Emergency warning and alerting methods in Australia
      6. Conclusion
  10. Section 3: Ethics and Security in Organisations
    1. Chapter 8: Monitoring Employee Actions in the Workplace
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SURVEILLANCE
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    2. Chapter 9: Policy and Issues in Deploying Automated Plagiarism Detection Systems in Academic Communities
      1. Abstract
      2. INTRODUCTION
      3. Policy and Issues
      4. Case Study: VeriGuide in CUHK
      5. FUTURE RESEARCH DIRECTIONS
      6. Conclusion
    3. Chapter 10: Security Technologies and Policies in Organisations
      1. ABSTRACT
      2. INTRODUCTION
      3. Information for managers
      4. Background
      5. CASE STUDY 0
      6. CASE STUDY 1
      7. Common Security Issues
      8. The Hacker ‘Ethic’
      9. The Duties of Security Staff
      10. CASE STUDY 2
      11. The Power to Move Mountains
      12. The Theft of the Intangible
      13. CASE STUDY 3
      14. Producing a consistent ethical Framework
      15. CONCLUSION
    4. Chapter 11: Critical Infrastructure Protection
      1. Abstract
      2. Introduction
      3. Background
      4. The Critical Infrastructure Protection Case Study
      5. Outlining the Ethical Dilemma
      6. Solutions and Recommendations
      7. FUTURE RESEARCH DIRECTIONS
      8. Conclusion
    5. Chapter 12: Effective Infrastructure Protection through Virtualization
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. TOPICS IN VIRTUALIZATION
      5. Solutions and Recommendations
      6. FUTURE RESEARCH DIRECTIONS
      7. Conclusion
    6. Chapter 13: Firewall Rulebase Management
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. FIREWALL RULEBASE MANAGEMENT
      5. CASE STUDY: ORPHANED RULE IDENTIFICATION AND PREVENTION
      6. FUTURE RESEARCH DIRECTIONS
      7. Conclusion
    7. Chapter 14: Integration of COBIT, Balanced Scorecard and SSE-CMM as an Organizational & Strategic Information Security Management (ISM) Framework
      1. Abstract
      2. Introduction
      3. PROBLEM & SIGNIFICANCE
      4. The need for a strategic ISM framework
      5. BACKGROUND & EXISTING RESEARCH
      6. Formulation of the integrated framework (methodology)
      7. JUSTIFICATION OF THE COMPONENTS (FINDINGS)
      8. Recommendations and Future Research
      9. Conclusion
  11. Compilation of References
  12. About the Contributors
  13. Index