Ethics in Information Technology (EIT) – ITE302
  • There is no houres or category chosen or category doesn't contain any items

We have 90 guests and no members online

This Week
Last Week
This Month
Last Month
All days

Your IP:
Server Time: 2020-03-30 19:52:41

Request Here

Ethics in Information Technology (EIT) – ITE302

In oder to supplying the better references to students, lecturers and researchers; FPT Library and Information Center delighted to inform you about the subject guide for this subject: Ethics in IT.

Main book:Ethics in information technology


Author: George W. Reynolds . 3rd ed. – Boston : Course technology, Cengage Learning, 2010. – 451p. ; 23cm ISBN: 0538473096, 9780538473095 Call number: 174.900 4 R463 Ethics in information technology, 3rd ed. is a highly anticipated revision that will help readers understand the legal, ethical, and societal implications of information technology. The third edition offers updated and newsworthy coverage of issues such as file sharing, infringement of intellectual property, security risks, Internet crime, identity theft, employee surveillance, privacy, compliance, social networking, and ethics of IT corporations. This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.

Ethics in information technology


Author: Raynolds, George W . 2nd ed. – Boston : Thomson Course Technology, 2007. – 350tr. ; 23cm. ISBN: 1418836311, 9781418836313 Library code: FSE (05) Call number: 174.900 4 R463 Ethics in Information Technology, Second Edition is a timely offering with updated and brand new coverage of topical issues that we encounter in the news every day such as file sharing, infringement of intellectual property, security risks, Internet crime, identity theft, employee surveillance, privacy, and compliance.

Reference BooksThe ethical challenge : how to lead with unyielding integrity


Author: Noel M. Tichy, Andrew R. McGill, editors . 1st ed. – San Francisco : Jossey-Bass, 2003. – ix, 293 p. : ill. ; 24 cm ISBN: 078796767X Library code: FSB (01) Call number: 174/.4 T374 The Enron debacle, the demise of Arthur Andersen, questionable practices at Tyco, Qwest, WorldCom, and a seemingly endless list of others have pushed public regard for business and business leaders to new lows. The need for smart leaders with vision and integrity has never been greater. Things need to change— and it will not be easy. — We can take a first step toward producing better business leaders by changing some of our own ideas about what it means to “win.” Noel M. Tichy and Andrew R. McGill have brought together a stellar group of contributors from a variety of perspectives— including General Electric CEO Jeffrey Immelt, former Secretary of State James A. Baker III, and renowned management gurus Robert Quinn and C. K. Prahalad, among others— to offer insights that will help build better leaders, communities, and organizations. They show how to present a “Teachable Point of View” about business ethics that will help all leaders within an organization: Internalize core values Build a values-based culture across the organization Become engaged to teach the same values lessons to their staff Take action and raise the ethical bar Successful business leaders must be able to articulate their own unique Teachable Point of View on business ethics and drive it through their organization to ensure that everyone knows the ethical line and is neither shy nor silent if others risk crossing it.

Reference Ebooks (Books24x7)

Information Security and Ethics: Concepts, Methodologies, Tools, and Applications


Author: Hamid Nemati (ed) IGI Global © 2008 (4144 pages) Citation ISBN:9781599049373 Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information processing and management technologies. As technology continues to advance, the need for strong responses to these challenges, well centered on reliable research, becomes increasingly critical. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges. Compiling over 300 chapters representing the work of some 750 international experts, this comprehensive, six-volume collection examines a complete array of topics in this area, including authentication technologies, cyber-crime, cryptographic tools, monitoring systems, forensic computing, and confidentiality applications, and their relation to raising the level of security and ethical standards in technology-driven environments. Essential to the information science and technology collection of any library, this reference set will serve the needs of researchers in a variety of related fields, including business, e-commerce, government, law enforcement, and many more.

Computer Crime, Investigation, and the Law


Author: Chuck Easttom and Jeff Taylor ISBN: 9781435455320 One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys. If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. Next, the book walks you through the essentials of computer forensics. Litigation is also explored, such as depositions, expert reports, trials, and even how one can select an appropriate expert witness. Lastly, the book introduces you to the specific techniques that hackers use and even shows you some of the tricks they use to infiltrate computer systems to help you defend against such attacks. This section of the book also includes a discussion of communication techniques used by computer criminals, with an overview of encryption, stenography, and hacker slang language. Computer Crime, Investigation, and the Law is your gateway into the world of investigating computer crimes.

Contemporary Issues in Ethics and Information Technology


Author: Robert A. Schultz IGI Global © 2006 (228 pages) Citation ISBN: 9781591407799 Information technology has produced new ethical challenges and concerns in dealing with issues about privacy, security, piracy and professional ethics. Contemporary Issues in Ethics and Information Technology discusses these issues as well as other important ethical issues such as the outsourcing of high-level jobs and the value of IT itself. The main framework for ethical problems used in Contemporary Issues in Ethics and Information Technology is derived from the work of the late philosopher John Rawls. Rawls? contribution to ethics was a theory of justice rooted in the social contract theory of the Declaration of Independence and the U. S. Constitution. The author?s discussion of the value of IT also builds on the views of the philosopher, Martin Heidegger, on modern technology as an independent force in human existence with its own point-of-view. This book provides guidance for IT professionals and users for practical ethical problems.

Internet resources

UNESCO – Ethical Dimensions of the Information Society, 12-14 March 2008, Hanoi, Vietnam

Code of Ethics of the Information Processing Society of Japan

Thông tư 07 về quản lý blog – Vietnam

ACM - Software Engineering Code of Ethics and Professional Practice


магазин DVD фильмов
Battlefield 4 Beta обзоры, тесты, новости