Cybersecurity ethics : an introduction / Mary Manjikian.
Material type:
- text
- unmediated
- volume
- 9781032164991
- 9781032164977
- 005.8 23/eng/20221017
- TK5105.878 .M36 2023
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
![]() |
PAC UNIVERSITY General Stacks | Non-fiction | TK5105.878 .M36 2023 (Browse shelf(Opens below)) | C.1 | Available | 27583 | |||
![]() |
PAC UNIVERSITY General Stacks | Non-fiction | TK5105.878 .M36 2023 (Browse shelf(Opens below)) | C.2 | Available | 27584 |
Browsing PAC UNIVERSITY shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
TK 5105.7 .H63 2003 C.5 Local area network | TK 5105.7 .H63 2003 C.6 Local area network | TK 5105.7 .H63 2003 C.7 Local area network | TK5105.878 .M36 2023 Cybersecurity ethics : | TK5105.878 .M36 2023 Cybersecurity ethics : | TK 5105.888 .W5536 2006 The non-designer's Web book : | TK5105.8885.A63 R57 2005 Apache security / |
Includes bibliographical references and index.
"This textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI and big data. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, big data and cyberwarfare. The overall aims of the book are to: - provide ethical frameworks to aid decision making; - present the key ethical issues in relation to computer security; - highlight the connection between values and beliefs and the professional code of ethics. The textbook also includes three different features to aid students: 'Going Deeper' features provide background on individuals, events, and institutions in cybersecurity; 'Critical Issues' features contemporary case studies; and 'Tech Talks', which contain features that assume some familiarity with technological developments. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science"-- Provided by publisher.