This fully updated edition of the 2002 Choice Outstanding Academic Title opens with three chapters new to this edition introducing morality, ethics, and technology and value. The author demonstrates the central role of morality and ethics in the deliberations and decisions of people handling information technology. Also discussed in depth is the value technology adds and the role it plays in the decision-making process.
Like the first edition, this book focuses on security issues with the intent of increasing the public’s awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our societies. The goal is public understanding of the nature and motives of cyber acts, how such acts are committed, and the efforts being undertaken to prevent future occurrences.
Like the first edition, this book focuses on security issues with the intent of increasing the public’s awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our societies. The goal is public understanding of the nature and motives of cyber acts, how such acts are committed, and the efforts being undertaken to prevent future occurrences.