MARC details
000 -LEADER |
fixed length control field |
03002cam a22003978i 4500 |
001 - CONTROL NUMBER |
control field |
22741499 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
PACU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240306103713.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220808s2023 enk b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2022036730 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781032164991 |
Qualifying information |
(hbk) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781032164977 |
Qualifying information |
(pbk) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781003248828 |
Qualifying information |
(ebk) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
PAC University |
Modifying agency |
PAC University |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.878 |
Item number |
.M36 2023 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23/eng/20221017 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Manjikian, Mary, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cybersecurity ethics : |
Remainder of title |
an introduction / |
Statement of responsibility, etc. |
Mary Manjikian. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
2303 |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Abingdon, Oxon ; |
-- |
New York, NY : |
Name of producer, publisher, distributor, manufacturer |
Routeldge, |
Date of production, publication, distribution, manufacture, or copyright notice |
2023. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 263p. : |
Other physical details |
ill. ; |
Dimensions |
25cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"This textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI and big data. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, big data and cyberwarfare. The overall aims of the book are to: - provide ethical frameworks to aid decision making; - present the key ethical issues in relation to computer security; - highlight the connection between values and beliefs and the professional code of ethics. The textbook also includes three different features to aid students: 'Going Deeper' features provide background on individuals, events, and institutions in cybersecurity; 'Critical Issues' features contemporary case studies; and 'Tech Talks', which contain features that assume some familiarity with technological developments. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science"-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet |
General subdivision |
Moral and ethical aspects. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures |
-- |
Moral and ethical aspects. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Online version: |
Main entry heading |
Manjikian, Mary. |
Title |
Cybersecurity ethics |
Edition |
Second edition |
Place, publisher, and date of publication |
Abingdon, Oxon ; New York, NY : Routeldge, 2023 |
International Standard Book Number |
9781003248828 |
Record control number |
(DLC) 2022036731 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
General books |
Classification part |
TK5105.878 |
Item part |
.M36 2023 |