- Table View
- List View
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
by Joseph Migga KizzaThis textbook highlights the essential need for a strong ethical framework in our approach to teaching of and working in computer, information and engineering sciences.Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly evolving computing technologies and ever-changing communication ecosystems.This thoroughly revised and updated third edition features revised chapters with new and updated content and hardened the ethical framework. To cope with the rapidly changing computing and telecommunication ecosystem, a new chapter, Ethics and Social Responsibility in the Metaverse, has been added. The interface between our current universe and the evolving metaverse presents a security quagmire. The discussion throughout the book is candid and intended to ignite students’ and professionals’ interest and active participation in discussions of the issues we are facing now and those likely to emerge in the near future. Topics and features—including fully updated content:Introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheresDescribes the impact of computer technology on issues of security, privacy, anonymity, and civil libertiesDiscusses the security and ethical quagmire in the platforms of the developing metaverse (NEW chapter)Examines intellectual property rights in the context of computing, including the risks and liabilities associated with softwareDiscusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental healthReviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discriminationConsiders the ethical challenges arising from online social networks, mobile telecommunication technologies, virtual reality, the Internet of Things and 5G technologiesIncludes learning objectives, discussion questions and exercises throughoutThis concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, as well as offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks.
Ethical and Social Issues in the Information Age
by Joseph Migga KizzaThe frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual's social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations' strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.
Ethical and Social Issues in the Information Age (Texts in Computer Science)
by Joseph Migga KizzaThis textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology—ranging from the Internet, over to the cross-platforms consisting of ubiquitous portable and wearable devices to the eagerly anticipated metaverse—and how we can responsibly access and use these spaces. The text emphasizes the need for a strong ethical framework for all applications of computer science and engineering in our professional and personal life.This comprehensive seventh edition features thoroughly revised chapters with new and updated content, hardened by the bedrock ethical and moral values. Because of the rapidly changing computing and telecommunication ecosystem, a new chapter on Ethics and Social Responsibility in the Metaverse has been added. The interface between our current universe and the evolving metaverse presents a security quagmire. The discussion throughout the book is candid and intended to ignite students' interest and participation in class discussions and beyond. Topics and features:Establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativismOffers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discriminationDiscusses the security and ethical quagmire in the platforms of the developing metaverseProvides exercises, objectives, and issues for discussion with every chapterExamines the ethical, cultural and economic realities of mobile telecommunications, computer social network ecosystems, and virtualization technologyReviews issues of property rights, responsibility and accountability relating to information technology and softwareExplores the evolution of electronic crime, network security, and computer forensicsIntroduces the new frontiers of ethics: virtual reality, artificial intelligence, and the InternetThis extensive textbook/reference addresses the latest curricula requirements for understanding the cultural, social, legal, and ethical issues in computer science and related fields, and offers invaluable advice for industry professionals wishing to put such principles into practice.
Ethical and Social Issues in the Information Age (Texts in Computer Science)
by Joseph Migga KizzaThis new edition examines the ethical, social, and policy challenges stemming from computing and telecommunication technology, and mobile information-enabling devices. Features: establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativism; offers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discrimination; examines the new ethical, cultural and economic realities of computer social networks; reviews issues of property rights, responsibility and accountability relating to IT and software; discusses how virtualization technology informs ethical behavior; introduces the frontiers of ethics in VR, AI, and the Internet; surveys the social, moral and ethical value systems in mobile telecommunications; explores the evolution of electronic crime, network security, and computer forensics; provides exercises, objectives, and issues for discussion in every chapter.
Ethical and Social Issues in the Information Age, 4th Edition
by Joseph Migga KizzaThe frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been advocating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the centerpiece of an individual’s social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations’ strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.
Ethical and Social Issues in the Information Age, 5th Edition
by Joseph Migga KizzaThis new edition examines the ethical, social, and policy challenges stemming from computing and telecommunication technology, and mobile information-enabling devices. Features: establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativism; offers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discrimination; examines the new ethical, cultural and economic realities of computer social networks; reviews issues of property rights, responsibility and accountability relating to IT and software; discusses how virtualization technology informs ethical behavior; introduces the frontiers of ethics in VR, AI, and the Internet; surveys the social, moral and ethical value systems in mobile telecommunications; explores the evolution of electronic crime, network security, and computer forensics; provides exercises, objectives, and issues for discussion in every chapter.
Ethical Artificial Intelligence from Popular to Cognitive Science: Trust in the Age of Entanglement
by Jordan Richard SchoenherrThis book offers a unique interdisciplinary perspective on the ethics of 'artificial intelligence' – autonomous, intelligent, (and connected) systems, or AISs, applying principles of social cognition to understand the social and ethical issues associated with the creation, adoption, and implementation of AISs. As humans become entangled in sociotechnical systems defined by human and artificial agents, there is a pressing need to understand how trust is created, used, and abused. Compounding the difficulty in answering these questions, stakeholders directly or indirectly affected by these systems differ in their motivations, understanding, and values. This volume provides a comprehensive resource to help stakeholders understand ethical issues of designing and implementing AISs using an ethical sensemaking approach. Starting with the general technical affordances of AIS, Dr. Jordan Richard Schoenherr considers the features of system design relating data integrity, selection and interpretation of algorithms, and the evolution processes that drive AISs innovation as a sociotechnological system. The poles of technophobia (algorithmic aversion) and technophilia (algorithmic preference) in the public perception of AISs are then described and considered against existing evidence, including issues ranging from the displacement and re-education needs of the human workforce, the impact of use of technology on interpersonal accord, and surveillance and cybersecurity. Ethical frameworks that provide tools for evaluating the values and outcomes of AISs are then reviewed, and how they can be aligned with ethical sensemaking processes identified by psychological science is explored. Finally, these disparate threads are brought together in a design framework. Also including sections on policies and guideline, gaming and social media, and Eastern philosophical frameworks, this is fascinating reading for students and academics in psychology, computer science, philosophy, and related areas, as well as professionals such as policy makers and those working with AI systems.
Ethical Considerations of Virtual Reality in the College Classroom: Cross-Disciplinary Case Studies of Immersive Technology Implementation
by Melody Bowdon Kevin Yee William DornerEthical Considerations of Virtual Reality in the College Classroom collects case studies that address both pedagogical and ethical foundations of extended reality tools in postsecondary learning environments across disciplines. With today’s institutional programs and faculty leveraging cutting-edge virtual, augmented, and mixed reality opportunities to teach and promote achievement goals, it is imperative that new research into these technologies speaks directly to their challenges and affordances within broad academic settings. This book showcases real-world examples of faculty members who chronicle and develop their use of VR tools across learning contexts and student populations by creating their own digital experiences, adapting open-source tools, integrating commercial products, amplifying crucial course content, analyzing outcomes data, and more. Nontechnical readers will come away with a new understanding of key terms and concepts associated with virtual reality and essential heuristics for evaluating the ethical implications of immersive approaches.
Ethical Data and Information Management: Concepts, Tools and Methods
by Katherine O'Keefe Daragh O BrienInformation and how we manage, process and govern it is becoming increasingly important as organizations ride the wave of the big data revolution. Ethical Data and Information Management offers a practical guide for people in organizations who are tasked with implementing information management projects. It sets out, in a clear and structured way, the fundamentals of ethics, and provides practical and pragmatic methods for organizations to embed ethical principles and practices into their management and governance of information. Written by global experts in the field, Ethical Data and Information Management is an important book addressing a topic high on the information management agenda. Key coverage includes how to build ethical checks and balances into data governance decision making; using quality management methods to assess and evaluate the ethical nature of processing during design; change methods to communicate ethical values; how to avoid common problems that affect ethical action; and how to make the business case for ethical behaviours.
Ethical Digital Technology in Practice
by Simon RogersonThis is an important book. Ethics is not an easy topic, and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . . . Use this book as a practical resource, an informative and educational source of material in developing expertise, but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady, President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan, develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines, professional journals and online blogs. These are synthesised into a blueprint which addresses, in a practical manner, the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology, which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15, became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners, academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world, of what has happened and what might happen as digital technology continues to pervade.
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
by Kushantha GunawardanaDive into privacy, security, and online anonymity to safeguard your identityKey FeaturesLeverage anonymity to completely disappear from the public viewBe a ghost on the web, use the web without leaving a trace, and master the art of invisibilityBecome proactive to safeguard your privacy while using the webBook DescriptionAs the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to use the web without risking your privacy. This book will take you on a journey to become invisible and anonymous while using the web.You will start the book by understanding what anonymity is and why it is important. After understanding the objective of cyber anonymity, you will learn to maintain anonymity and perform tasks without disclosing your information. Then, you'll learn how to configure tools and understand the architectural components of cybereconomy. Finally, you will learn to be safe during intentional and unintentional internet access by taking relevant precautions.By the end of this book, you will be able to work with the internet and internet-connected devices safely by maintaining cyber anonymity.What you will learnUnderstand privacy concerns in cyberspaceDiscover how attackers compromise privacyLearn methods used by attackers to trace individuals and companiesGrasp the benefits of being anonymous over the webDiscover ways to maintain cyber anonymityLearn artifacts that attackers and competitors are interested inWho this book is forThis book is targeted at journalists, security researchers, ethical hackers, and anyone who wishes to stay anonymous while using the web. This book is also for parents who wish to keep their kid's identities anonymous on the web.
The Ethical Hack: A Framework for Business Value Penetration Testing
by James S. TillerThis book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address the processes and rules of engagement for successful tests. The text examines testing from a strategic perspective to show how testing ramifications affect an entire organization. Security practitioners can use this book to reduce their exposure and deliver better service, while organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gather from testing with their business objectives.
Ethical Hacking: A Hands-on Introduction to Breaking In
by Daniel GrahamA hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you&’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You&’ll begin with the basics: capturing a victim&’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you&’ll deploy reverse shells that let you remotely run commands on a victim&’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you&’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you&’ll use to traverse a private network. You&’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like: • Deploying the Metasploit framework&’s reverse shells and embedding them in innocent-seeming files • Capturing passwords in a corporate Windows network using Mimikatz • Scanning (almost) every device on the internet to find potential victims • Installing Linux rootkits that modify a victim&’s operating system • Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you&’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you&’ll be able to think like an ethical hacker: someone who can carefully analyze systems and creatively gain access to them.
Ethical Hacking And Countermeasures: Secure Network Operating Systems and Infrastructures (Second Edition)
by EC-CouncilThe EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C|EH certification exam from EC-Council.
Ethical Hacking and Countermeasures: Web Applications and Data Servers (Book #3)
by EC-Council StaffThe EC-Council - Press Ethical Hacking and Countermeasures series is intended for those studying to become security officers, auditors, security professionals, site administrators, and anyone who is concerned about or responsible for the integrity of the network infrastructure. The series includes a broad base of topics in offensive network security, ethical hacking, as well as network defense and countermeasures. Web Applications and Data Servers provides an overview of session hijacking, how to hack Web servers and database servers, as well as password-cracking techniques and Web application vulnerabilities.
Ethical Hacking and Penetration Testing Guide
by Rafay BalochRequiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
Ethical Hacking: Techniques, Tools, and Countermeasures
by Michael G. Solomon Sean-Philip OriyanoEthical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices.
Ethical IT Innovation: A Value-Based System Design Approach
by Sarah SpiekermannExplaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains.The book explores the latest thinking on computer ethics, inc
Ethical Programs: Hospitality And The Rhetorics Of Software
by James J. BrownLiving in a networked world means never really getting to decide in any thoroughgoing way who or what enters your "space" (your laptop, your iPhone, your thermostat . . . your home). With this as a basic frame-of-reference, James J. Brown's Ethical Programs examines and explores the rhetorical potential and problems of a hospitality ethos suited to a new era of hosts and guests. Brown reads a range of computational strategies and actors, from the general principles underwriting the Transmission Control Protocol (TCP), which determines how packets of information can travel through the internet, to the Obama election campaign's use of the power of protocols to reach voters, harvest their data, incentivize and, ultimately, shape their participation in the campaign. In demonstrating the kind of rhetorical spaces networked software establishes and the access it permits, prevents, and molds, Brown makes a significant contribution to the emergent discourse of software studies as a major component of efforts in broad fields including media studies, rhetorical studies, and cultural studies.
Ethical Reasoning in Big Data
by Jeff Collmann Sorin Adam MateiThis book springs from a multidisciplinary, multi-organizational, and multi-sector conversation about the privacy and ethical implications of research in human affairs using big data. The need to cultivate and enlist the public's trust in the abilities of particular scientists and scientific institutions constitutes one of this book's major themes. The advent of the Internet, the mass digitization of research information, and social media brought about, among many other things, the ability to harvest - sometimes implicitly - a wealth of human genomic, biological, behavioral, economic, political, and social data for the purposes of scientific research as well as commerce, government affairs, and social interaction. What type of ethical dilemmas did such changes generate? How should scientists collect, manipulate, and disseminate this information? The effects of this revolution and its ethical implications are wide-ranging. This book includes the opinions of myriad investigators, practitioners, and stakeholders in big data on human beings who also routinely reflect on the privacy and ethical issues of this phenomenon. Dedicated to the practice of ethical reasoning and reflection in action, the book offers a range of observations, lessons learned, reasoning tools, and suggestions for institutional practice to promote responsible big data research on human affairs. It caters to a broad audience of educators, researchers, and practitioners. Educators can use the volume in courses related to big data handling and processing. Researchers can use it for designing new methods of collecting, processing, and disseminating big data, whether in raw form or as analysis results. Lastly, practitioners can use it to steer future tools or procedures for handling big data. As this topic represents an area of great interest that still remains largely undeveloped, this book is sure to attract significant interest by filling an obvious gap in currently available literature.
Ethical Tech Startup Guide (Synthesis Lectures on Professionalism and Career Advancement for Scientists and Engineers)
by Ron BaeckerThis book draws on almost five decades of entrepreneurial experience and innovation and offers a broad perspective on ethical tech startups. It approaches the subject on two fronts by considering both the business of ethical technology as well as the challenges of tech startups with an imperative to behave ethically. The book provides readers with the tools to ethically frame and construct their startup ventures whether or not their core business is rooted in a technology meant to serve a social good. Incorporating ethical business practices both in knowledge and action, this book leads readers through the process of shaping an incipient startup idea all the way through the long-term operating stages. Using real-world case studies, the book explores key factors in successfully planning, framing, launching, leading, managing, and financing startups. This book is essential reading for researchers, academics, and students as well as industry professionals who have an idea or technology they want to get out into the world. Whether readers are seasoned in the field, employees of existing startups looking for better approaches, or new idealistic innovators who want to learn where to start, this guidebook explains and explores the road to launching the next great ethical tech startup.
The Ethical Treatment of Depression
by Paul BieglerWhile we have been preoccupied with the latest i-gadget from Apple and with Google's ongoing expansion, we may have missed something: the fundamental transformation of whole firms and industries into giant information-processing machines. Today, more than eighty percent of workers collect and analyze information (often in digital form) in the course of doing their jobs. This book offers a guide to the role of information in modern business, mapping the use of information within work processes and tracing flows of information across supply-chain management, product development, customer relations, and sales. The emphasis is on information itself, not on information technology. Information, overshadowed for a while by the glamour and novelty of IT, is the fundamental component of the modern corporation. In Information and the Modern Corporation, longtime IBM manager and consultant James Cortada clarifies the differences among data, facts, information, and knowledge and describes how the art of analytics has all but eliminated decision making based on gut feeling, replacing it with fact-based decisions. He describes the working style of "road warriors," whose offices are anywhere their laptops and cell phones are and whose deep knowledge of a given topic becomes their medium of exchange. Information is the core of the modern enterprise, and the use of information defines the activities of a firm. This essential guide shows managers and employees better ways to leverage information--by design and not by accident.
Ethics and Data Science
by Mike Loukides Hilary Mason Dj PatilAs the impact of data science continues to grow on society there is an increased need to discuss how data is appropriately used and how to address misuse. Yet, ethical principles for working with data have been available for decades. The real issue today is how to put those principles into action. With this report, authors Mike Loukides, Hilary Mason, and DJ Patil examine practical ways for making ethical data standards part of your work every day.To help you consider all of possible ramifications of your work on data projects, this report includes:A sample checklist that you can adapt for your own proceduresFive framing guidelines (the Five C’s) for building data products: consent, clarity, consistency, control, and consequencesSuggestions for building ethics into your data-driven cultureNow is the time to invest in a deliberate practice of data ethics, for better products, better teams, and better outcomes. Get a copy of this report and learn what it takes to do good data science today.
Ethics and Educational Technology: Reflection, Interrogation, and Design as a Framework for Practice
by Stephanie L. Moore Heather K. Tillberg-WebbEthics and Educational Technology explores the creation and implementation of learning technologies through an applied ethical lens. The success of digital tools and platforms in today’s multi-faceted learning and performance contexts is dependent not only on effective design and pedagogical principles but, further, on an awareness of these technologies’ interactions with and implications for users and social systems. This first-of-its-kind book provides an evidence-based, process-oriented model for ethics in technology-driven instructional design and development, one that necessitates intentional reflective practice, a critical and theoretically informed interrogation of technology, and a participatory approach to technology design and applications. Rich with real-world ethics examples and design cases, supported by reflection questions and applied activities, and attentive to ethical codes among preeminent educational technology organizations, this is an ideal resource for students, faculty, researchers, and professionals across educational technology, instructional design, learning sciences, learning engineering, organizational training, and other disciplines.
Ethics and Governance in Project Management: Small Sins Allowed and the Line of Impunity (Best Practices in Portfolio, Program, and Project Management #26)
by Eduardo Victor Lopez Alicia MedinaThis book shows executive, project, program, and portfolio managers how ethical behavior can ensure that an organization has proper governance. Improper governance and unethical behavior have led to such well-known financial disasters as Enron and Madoff Investments. The book arms managers with two important tools: Small Sins Allowed (SSA) and Line of Impunity (LoI), which together can be the foundation for renewed and vigorous corporate governance. SSA is a powerful tool that helps managers establish a level above which adherence to ethical standards is expected. LoI aids managers in identifying ethical fault lines that may exist in a company and helps to keep unethical behavior in check.