Skip to main content Site map

Pandora's Box: Social and Professional Issues of the Information Age


Pandora's Box: Social and Professional Issues of the Information Age

Paperback by Adams, Andrew A. (University of Reading); McCrindle, Rachel J. (University of Reading)

Pandora's Box: Social and Professional Issues of the Information Age

WAS £50.95   SAVE £7.64

£43.31

ISBN:
9780470065532
Publication Date:
14 Dec 2007
Language:
English
Publisher:
John Wiley & Sons Inc
Pages:
672 pages
Format:
Paperback
For delivery:
Estimated despatch 6 - 8 May 2024
Pandora's Box: Social and Professional Issues of the Information Age

Description

Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society - it is embedded in, and affects, all aspects of life, from education to healthcare to war. Dealing with the implications of this is a major challenge, and one that can impact upon us, both personally and professionally. As a consequence, it is vital that all in the computing industry make wise decisions regarding their conduct. Using case studies and discussion topics drawn from entertaining real world examples, Pandora's Box examines the background of a wide range of vital contemporary issues, encouraging readers to examine the social, legal and ethical challenges they will face in their own careers. Written in an engaging style and packed with international examples, this book addresses topics which have come to the forefront of public consciousness in recent years, such as online crime, piracy and peer to peer file sharing. Comprehensive coverage is provided of digital entertainment, censorship and privacy issues, presenting a rich source of context in which to consider ethical matters. Suitable for students on computer science degree programmes, as well as those taking IT related modules on other courses which consider the impact of technology on 21st century living, Pandora's Box is an essential read and a unique and timely textbook.

Contents

Foreword xxi Preface xxv 1 Introduction 1 Lessig's Four Modalities Analysis 6 Prophet and Loss: Failing to Foresee the Future 7 Information System Partition 8 The Law is an Ass 10 Globalization 12 The Digital Divide 13 Servant or Master: Computers Making Decisions 15 Discussion Topics 17 Can Laws Be Immoral? 17 Genetically Modified Food, Technologically Modified Humans 17 The Haves and the Have-nots 18 Related Reading 19 2 Emergence and Convergence of Technologies 21 Introduction 21 Emergence 23 The Rise of Print Media 23 The Rise of the Telegraph and the Telephone 24 The Rise of Broadcast Media 28 The Rise of the Computing Industry 31 The Rise of the Content Industry 33 The Rise of the Internet 35 Convergence 39 Content Producers and Distributors 39 Platform Producers and Content Producers or Publishers 41 Corporate Production vs Individual Creativity 43 Market Sector Integration 44 Digitization 48 The Big Challenges Ahead 55 Discussion Topics 56 Fit for Purpose? 56 E-Tax 56 Competing with Free Beer 58 Related Reading 60 3 Digital Entertainment 61 Introduction 61 The Effects of Digital Entertainment Technology 64 Digital Entertainment-Friend or Foe? 64 The Toy Town Divide 64 Boys and Girls Come out to Play: Stereotyping 66 Health-Related Issues 69 Curse of the Couch-Potato Children 69 Physical Problems 71 Digital Equipment-Part of the Modern Family 72 Does Television Cause Adverse Social Behaviour? 74 Creating Monsters-Do Computer Games Make People Violent? 76 Do Computer Games Fuel Addiction and Gambling? 80 Power to the Player-Benefits of Computer Games 84 Harnessing the Power of the Brain 84 Education and Learning 86 The Silver Gamers 88 Game Development Grows up-the Hidden Agenda 88 Discussion Points 91 Should Computer Games Be Regulated? Rated? Censored? 91 Couch-Potato Syndrome 92 Online Gambling: Menace or Natural Progression? 93 Related Reading 95 4 Censorship and Freedom of Speech 97 Introduction 97 Reasons for Censorship 100 Censorship by States 101 Censorship of Speakers by Governments 107 Censorship of Listeners by Governments 109 Censorship by Private Actors 111 Censorship of Speakers by Private Actors 111 Censorship of Listeners by Private Actors 113 Technology for Expression 114 Technological Developments with Expressive Power 114 Censoring Internet Content 115 Client-Server and Peer-to-Peer Architectures 124 Conclusion 125 Discussion Topics 126 Yahoo! France Nazi Memorabilia 126 ISP Liability for Content 127 BT and the IWF 129 Related Reading 130 5 Sex and Technology 131 Introduction 131 The Nature of Sexual Material 132 One Man's Art. . . 132 The Medium and the Message 133 Use of Technology to (Re)Produce Sexual Material 133 Techno-Sex 134 Anonymity: Reality and Illusion 144 Anon Servers 146 Online Sex and Real Relationships 147 The Future of Online Sex: TeleDildonics? 148 Regulating Sex in Cyberspace 149 Not in Front of the Children: Protecting Children from Sex Online 152 Restricting Access to Broadcast Media 153 Surfing to a Naked Beach 154 'Satisfy Her in Bed': Sex Spam to Minors 157 Online Friendships 159 Child Pornography 161 Types of Material 162 Prohibition, Harm, Possession and Distribution 166 Jurisdictional Anomalies and Conflicts 168 Discovery, Defence and Mitigation 169 Discussion Topics 171 Freedom of Speech vs Censorship of Sexual Material 171 The Toby Studabaker Case 172 Related Reading 173 6 Governance of the Internet 175 Introduction 175 The Internet Protocols 176 The Origins of the Internet 178 Early Arguments 181 The Root of All Evil 185 Commercialization 185 Internet Corporation for Assigned Names and Numbers 186 ccTLDs 188 Alternative Root Servers 188 Commercialization, Ownership and Corporate Identity 189 Trade Marks 189 Trade Marks in Domain Names 191 The Uniform Dispute Resolution Process 196 The Nominet Dispute Resolution Process 198 Criticisms of Dispute Resolution 199 Do Trade Marks Matter in Domain Names or in URLs? 203 The Future of Internet Governance 204 ICANN, DoC, EU and ccTLDs 204 Wiring the World: Who Really Owns 'The Internet'? 205 Discussion Topics 206 Should Trade Marks Be Valid in Domain Names? 206 What Governance Should ICANN Have? 207 How Many Top-Level Domains Should There Be? 208 7 Privacy and Surveillance 211 Introduction 211 Cryptography and Steganography 212 Definition of Privacy 214 Communication Technology and Eavesdropping 215 Ways to Eavesdrop 215 Identity of Eavesdropper 217 Legality of Eavesdropping 218 The Whole Is Greater than the Sum of its Parts 220 Data Protection 222 Data Protection Issues in EU Law 223 Data Protection Issues in US Regulation 227 International Movement of Data 229 Data Protection, not an Impediment to Life 230 Big Brother is Watching You: Automated CCTV Processing 231 Privacy After 9/11 234 Technological Privacy and Surveillance 235 Discussion Topics 237 Leaving Little Trace: Anonymity in the Digital World? 237 Availability of Cryptography and Steganography 238 Data Retention by ISPs 239 Related Reading 241 8 Information Age Warfare 243 Introduction 243 History of Warfare 245 The Technology of War 248 War News 249 Cyber-Wars 250 Satellites-the View from Space 253 Star Wars Technology 254 Network-centric Warfare 255 The Battlefield 258 Robo-Soldier 258 Man or Machine? 259 The Unseen Enemy 260 Mobile Phones as Weapons 261 War Games 261 Information Dominance 263 Intelligence Gathering and Surveillance 265 Discussion Topics 267 Working for Arms Manufacturers 267 Cyberterrorism: Real Threat or Virtual Bogeyman? 268 Overall Benefit or Drain on Resources? 269 9 Technology and the Human Body 273 Introduction 273 Health Information Systems 275 Treatment 276 Electronic Patient Records 276 E-booking 278 E-prescribing 279 Intranets, the Internet and Call Centres 280 Factors for Success 281 Power to the Patient 283 The Internet and CDs 284 Television Programmes 286 Digital Television 287 Self-Diagnosis Kits 288 Online Pharmacies 290 Online Body Trafficking 291 Techno-Medicine 292 Telemedicine 293 Training and Supporting Nurses and Doctors 294 Virtual Therapy 297 Robots in Hospitals 298 Smart Monitoring 301 Computer Modelling 305 Assistive Technology and Rehabilitation 308 New Medical Technologies 309 Implants for Diagnosis and Healing 310 Implants and Prosthetics for Replacement and Reconstruction 311 Digital Flesh and Cyborgs 315 Discussion Topics 318 The Longevity and Social Justice Debate 318 Suggested Positions 319 Owning the Code of Life 319 What Is a Human? 320 Related Reading 321 10 Professionalism in IT 323 Introduction 323 Conduct 327 Practice 333 Whistleblowing 334 Vulnerability of E-mail 335 'Illegal' espionage 337 Consequences of 'Whistleblowing' 337 Due Diligence 338 Personal Responsibility 340 Discussion Topics 340 Self-Incrimination 340 Responsibility for DDoS Attacks 341 Whistleblowing Insecurity 343 11 Online Crime and Real Punishment 345 Introduction 345 A Brief History of Crime and Computers 347 Computer Fraud 348 Malware 351 A Taxonomy of Malware 351 Problems Caused by Malware 352 Malware Authors: Who, How and Why? 359 Hoaxes and Life Imitating Art 362 Computer Security: Cops and Robbers, Poachers and Gamekeepers 363 Historical Roots of Cracking 364 Who are the Crackers? 366 Vulnerability, Risk and Threat 370 Closed vs Open Security 373 Walking the Tightrope: Social Pressures on Security 379 How Much Security Is Necessary? 382 Poachers and Gamekeepers 386 Laws Against Computer Misuse 387 UK Computer Misuse Act 388 US Sequence of Laws 391 Council of Europe Convention on Cybercrime 393 The Growing Problem of Computer Crime 395 Discussion Topics 396 Grey Hat Cracking Should Be Legalized 396 Web Scrapers and Robot Denial Files 397 An Immune System for the Internet 399 Related Reading 400 12 Patents and Copyright 401 Introduction 401 Intellectual Property? 402 Trade mark 402 Patent 403 Copyright 404 The Philosophical Basis of Patents and Copyright 404 Patents 406 A Brief History of Patents 406 Modern Patent Systems 407 Business Methods and Software Patents 411 General Criticisms of Patents 414 Patent-Licensing Companies 417 Copyright 419 Origins and Development of Copyright 420 The Main Provisions of Modern Copyright Statutes 424 US Case Law for Copyright 428 The Current State of Play 434 The Music Industry and Higher Education 435 The Originator's Rights 436 Software Copyright 437 Copyright and the Architecture of Cyberspace 449 Free Culture 449 Discussion Topics 450 Is Copyright the Correct Way to Reward Artists? Does It Promote Artistic Activity? 450 Lack of Legitimate Downloads Caused the Rise of Peer-to-Peer File-Sharing 452 A New Basis for Copyright Law Is Required 453 Control and the Copyright Bargain 454 Related Reading 455 13 Unwanted Electronic Attentions 457 Introduction 457 Types of Unsolicited Communication 459 Static Visual Communication 459 Audio Communication 460 Types of Communication Media 461 Public Displays 461 Broadcast Non-Interactive Media 461 Broadcast Interactive Media 462 Telephonic Services 463 Internet Services 465 The Economics of Unsolicited Contacts 470 Sender Economics 470 Junk mail 471 Cold calling 472 Receiver Economics 474 Referral Economics 477 Social, Legal and Technological Discouragement 481 Malicious Unwanted Attentions 494 Online and Telephone Fraud 495 Electronic Stalking 496 Online Grooming 499 Discussion Topics 500 Tackling Spam at the Transport Layer 500 Opt-In, Opt-Out, Shake It All About 501 Freedom of Speech or Online Stalking 502 Related Reading 503 14 Education and Online Learning 505 Introduction 505 From the Chalkboard to the Virtual Classroom 507 Technology through the Years 507 Visual Aids to Learning 508 Audio Aids to Learning 510 Audio-Visual Aids to Learning 511 Developing E-Learning Environments 513 ICT and e-Learning in Further Education Colleges in England 515 e-Portfolio 516 Videoconferencing 517 Online Encyclopedia 518 Mobile Education (PDAs and Mobile Devices) 519 Electronic Books 521 Electronic Whiteboards 521 Online Marketing 522 Electronic Application and Admission Systems 523 Digital Library 523 Second Life 524 Web 2.0 525 Developing and Embracing e-Learning Resources 526 The Learner Perspective 527 The Teacher Perspective 529 Accessibility of Education in a Wired World 533 Cheating the System 535 Bogus Degrees 538 Discussion Topics 539 One Person's Plagiarism Is Another's Research 539 Overseas Education vs Distance Education 540 The Net of a Million Lies 542 Related Reading 543 15 Living and Working in a Wired World 545 Introduction 545 The Digital Lifestyle 547 Work, Skills and Roles 547 Teleworking 548 The Mobile Office: the 'Non-Office' Office Job 551 The New Role of the Office 552 Smarter Travel 552 Smarter Homes 555 Shopping 556 Buying Entertainment 561 The Sporting Life 562 Technology and the Individual 563 Education 563 Health 563 Crime 564 Religion 564 Communication 565 The Changing Face of Communication 565 The Global Village 573 The Digital Divide 574 The Digital Divide in the Industrialized World 577 E-Government 578 The Digital Divide Between the Nations 579 Discussion Topics 580 The Language of the Digital Age 580 Digital Relationships 581 Digital Divides 581 Related Reading 582 Appendix-Ethical Analysis 583 Introduction 583 Traditional Western Moral Philosophy 584 Rationalism 584 Locke vs Hobbes 585 Hume and Human Passion 587 Kant and the Categorical Imperative 587 Legality and Morality 587 Modern Ethical Theory 589 Utilitarian Ethics 589 Relativistic vs Universal Utiliarianism 590 New Utilitarianism: Singer 591 Computer Ethics 591 Metaphysical Foundations for Computer Ethics 593 Informed Consent Theory in Information Technology 594 Ethical Decisions: Using the Back of the Envelope 594 Information Ethics: ICT Professional Responsibility in the Information Environment 595 The Good Computer Professional Does not Cheat at Cards 596 Conclusion 596 Discussion Topics 597 General: The Death Penalty 597 ICT: Artificial Sentience Rights and Wrongs 598 General: Is Religion an Excuse for Discrimination? 599 ICT: Search Ethics 600 General: Lying to Tell the Truth? 601 ICT: Gender Presentation Online 601 General: Fair Fines 602 ICT: Should Internet Access be a Human Right? 603 General: Prediction of Harm 604 ICT: Programmer Responsibility 605 Related Reading 607 Index 609

Back

London Metropolitan University logo