Encyclopedia information ethics and security

697 191 0
Encyclopedia information ethics and security

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Free ebooks ==> www.Ebook777.com www.Ebook777.com Free ebooks ==> www.Ebook777.com Encyclopedia of Information Ethics and Security Marian Quigley Monash University, Australia InformatIon ScIence reference Hershey • New York www.Ebook777.com Acquisitions Editor: Development Editor: Senior Managing Editor: Managing Editor: Assistant Managing Editor: Copy Editor: Typesetter: Cover Design: Printed at: Kristin Klinger Kristin Roth Jennifer Neidig Sara Reed Diane Huskinson Maria Boyer Sara Reed Lisa Tosheff Yurchak Printing Inc Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-pub.com Web site: http://www.igi-pub.com/reference and in the United Kingdom by Information Science Reference (an imprint of IGI Global) Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 0609 Web site: http://www.eurospanonline.com Copyright © 2008 by IGI Global All rights reserved No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher Product or company names used in this set are for identification purposes only Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark Library of Congress Cataloging-in-Publication Data Encyclopedia of information ethics and security / Marian Quigley, Editor p cm Topics address a wide range of life areas affected by computer technology, including: education, the workplace, health, privacy, intellectual property, identity, computer crime, cyber terrorism, equity and access, banking, shopping, publishing, legal and political issues, censorship, artificial intelligence, the environment, communication Summary: “This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education It is a useful tool for students, academics, and professionals” Provided by publisher Includes bibliographical references and index ISBN 978-1-59140-987-8 (hardcover) ISBN 978-1-59140-988-5 (ebook) Information technology Social aspects Encyclopedias Information technology Moral and ethical aspects Encyclopedias Computer crimes-Encyclopedias Computer security Encyclopedias Information networks Security measures Encyclopedias I Quigley, Marian HM851.E555 2007 174’.900403 dc22 2007007277 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library All work contributed to this encyclopedia set is new, previously-unpublished material The views expressed in this encyclopedia set are those of the authors, but not necessarily of the publisher Editorial Advisory Board Kathy Blashki Deakin University, Australia Matthew Butler Monash University, Australia Heather Fulford The Robert Gordon University, UK James E Goldman Purdue University, USA Katina Michael University of Wollongong, Australia Bernd Carsten Stahl De Montfort University, UK Free ebooks ==> www.Ebook777.com List of Contributors Abdallah, Salam / Amman Arab University for Graduate Studies, Jordan .355 Abdolmohammadi, Mohammad / Bentley College, USA .440 Al-Fedaghi, Sabah S / Kuwait University, Kuwait 513, 631 Ali, Muhammed / Tuskegee University, USA 507 Arbore, Alessandro / Bocconi University, Italy 655 Averweg, Udo Richard / eThekwini Municipality and University of KwaZulu-Natal, South Africa 297 Barger, Robert N / University of Notre Dame, USA 445 Becker, Reggie / Emerson Electric, USA 451 Beggs, Christopher / Monash University, Australia .108 Blashki, Kathy / Deakin University, Australia 194 Bourlakis, Michael / Brunel University, UK .15 Boyle, Roger / University of Leeds, UK 208 Buchanan, Elizabeth / University of Wisconsin – Milwaukee, USA .397 Busuttil, T B / Deakin University, Australia 609 Butler, Matthew / Monash University, Australia 96 Cazier, Joseph A / Appalachian State University, USA 221 Chapple, Michael J / University of Notre Dame, USA 291 Chatterjee, Sutirtha / Washington State University, USA 201 Chen, Irene / University of Houston – Downtown, USA 130 Chen, Jengchung V / National Cheng Kung University, Taiwan 102 Chhanabhai, Prajesh / University of Otago, New Zealand 170 Chin, Amita Goyal / Virginia Commonwealth University, USA 273 Chu, Chao-Hsien / The Pennsylvania State University, USA 89 Cole, Robert J / Pennsylvania State University, USA 89 Cote, Jo Anne / Reginald J P Dawson Library, QC, Canada 136 Countermine, Terry / East Tennessee State University, USA 507 Crowell, Charles R / University of Notre Dame, USA 291, 445 Currier, Dianne / Columbia University, USA 384 Dark, Melissa / Purdue University, USA 507 Doherty, Neil / Loughborough University, UK 377 Douma, Michael / Institute for Dynamic Educational Advancement, USA .362 Drake, John R / Auburn University, USA .486 Du, Jianxia / Mississippi State University, USA 49 Dunkels, Elza / Umeå University, Sweden 403 Dyson, Laurel Evelyn / University of Technology Sydney, Australia 433 Ellis, Kirsten / Monash University, Australia 235 Engelbrecht, Judith / Massey University, New Zealand 534 www.Ebook777.com Enochsson, AnnBritt / Karlstad University, Sweden .403 Epstein, Richard / West Chester University, USA 507 Etter, Stephanie / Mount Aloysius College, USA 214 Fedorowicz, Jane / Bentley College, USA .440 Fulford, Heather / The Robert Gordon University, UK 377 Gamito, Eduard J / University of Colorado Health Sciences Center, USA 362 Gasmelseid, Tagelsir Mohamed / King Faisal University, Kingdom of Saudi Arabia 187 Gray, Kathleen / University of Melbourne, Australia .164 Grillo, Antonio / Università di Roma, Italy .55 Guan, Sheng-Uei / Brunel University, UK 556, 571 Gupta, Manish / State University of New York at Buffalo, USA .520 Gupta, Phalguni / Indian Institute of Technology Kanpur, India 478 Gurău, Călin / GSCM – Montpellier Business School, France .542 Halpert, Benjamin J / Nova Southeastern University, USA 492 Handy, Jocelyn / Massey University, New Zealand 534 Harter, Nathan / Purdue University, USA .507 Hiltbrand, Robert K / University of Houston, USA .411 Hirsch, Corey / Henley Management College, UK 370 Hocking, Lynley / Department of Education, Tasmania, Australia 470 Holt, Alec / University of Otago, New Zealand 170 Huang, ShaoYu F / National Cheng Kung University, Taiwan .102 Hunter, Inga / Massey University, New Zealand .534 Im, Seunghyun / University of Pittsburgh at Johnstown, USA .114 Irons, Alistair / Northumbria University, UK 208 Isenmann, Ralf / University of Bremen, Germany 622 Jasola, Sanjay / Indira Gandhi National Open University, New Delhi 594 Johnston, Allen C / University of Louisiana Monroe, USA 451 Jourdan, Zack / Auburn University, USA 68 Kamthan, Pankaj / Concordia University, Canada 266 Kao, Kai-Ti / Monash University, Australia 326 Kats, Yefim / Southwestern Oklahoma State University, USA 83 Kawash, Jalal / American University of Sharjah, UAE 527 Kiau, Bong Wee / Universiti Utara Malaysia, Malaysia 157 Kidd, Terry T / University of Texas Health Science Center, USA 130, 411 Korb, Kevin B / Monash University, Australia 279 Kotlarsky, Julia / University of Warwick, UK 370 LaBrie, Ryan C / Seattle Pacific University, USA 221 Lawler, James / Pace University, USA 549 Lazarus, Belinda Davis / University of Michigan – Dearborn, USA 241 LeDonne, Keith / Robert Morris University, USA 214 Lee, Zu-Hsu / Montclair State University, USA 229 Lentini, Alessandro / Università di Roma, Italy .55 Leonard, Lori N K / University of Tulsa, USA .260 Li, Koon-Ying Raymond / e-Promote Pty Ltd., Australia Loke, Seng / La Trobe University, Australia 463, 563 Mahmood, Omer / Charles Darwin University, Australia 143 Manly, Tracy S / University of Tulsa, USA .260 Marshall, Thomas E / Auburn University, USA .68 McNaught, Carmel / The Chinese University of Hong Kong, Hong Kong .342 Me, Gianluigi / Università di Roma, “Tor Vergata,” Italy 55, 418 Mehrotra, Hunny / Indian Institute of Technology Kanpur, India 478 Michael, Katina / University of Wollongong, Australia 312 Michael, M G / University of Wollongong, Australia 312 Mishra, Sushma / Virginia Commonwealth University, USA 273 Molinero, Ashli M / Robert Morris University, USA 214 Molluzzo, John C / Pace University, USA 549 Morales, Linda / Texas A&M Commerce, USA .507 Nestor, Susan J / Robert Morris University, USA 214 Ngo, Leanne / Deakin University, Australia 319 Nichol, Sophie / Deakin University, Australia 196 Nissan, Ephraim / Goldsmiths College, University of London, UK 30, 36, 42, 638 Oshri, Ilan / Rotterdam School of Management Erasmus, The Netherlands 370 Palaniappan, Ramaswamy / University of Essex, UK 335 Papagiannidis, Savvas / University of Newcastle upon Tyne, UK 15 Paperin, Gregory / Monash University, Australia 602 Park, Eun G / McGill University, Canada .136 Pate, George H / Mississippi State University, USA 49 Patnaik, Lalit M / Indian Institute of Science, India 335 Peterson, Richard / Montclair State University, USA .229 Phillips, Patricia G / Duquesne University, USA 214 Popova-Gosart, Ulia / Lauravetlan Information and Education Network of Indigenous Peoples of Russian Federation (LIENIP) and University of California in Los Angeles, USA 645 Power, Mark / Monash University, Australia Quigley, Marian / Monash University, Australia 235 Rainer Jr., R Kelly / Auburn University, USA 68 Ramim, Michelle M / Nova Southeastern University, USA 246 Ras, Zbigniew W / University of North Carolina at Charlotte, USA .114 Rattani, Ajita / Indian Institute of Technology Kanpur, India 478 Rose, Matt / Purdue University, USA 507 Roy, Jeffrey / Dalhousie University, Canada 585 Ruvinsky, Alicia I / University of South Carolina, USA 76 Schmidt, Mark B / St Cloud State University, USA 451, 579 Sharma, Ramesh C / Indira Gandhi National Open University, New Delhi 594 Sharman, Raj / State University of New York at Buffalo, USA .520 Shen, Yifeng / Monash University, Australia .7 Sherrod, Deneen / Mississippi State University, USA .49 Shetty, Pravin / Monash University, Australia 463, 563 Shiratuddin, Norshuhada / Universiti Utara Malaysia, Malaysia 157 Sixsmith, Alan / University of Technology Sydney, Australia 426 Skalicky Hanson, Jan / St Cloud State University, USA 579 Sofra, James / Monash University, Australia Srivastava, A / Monash University, Australia 179 Stafford, Thomas F / University of Memphis, USA 616 Stahl, Bernd Carsten / De Montfort University, UK 348 Sugden, Paul / Monash University, Australia 391 Third, Amanda / Monash University, Australia 326 Thomson, S B / Monash University, Australia 179 Tribunella, Heidi R / University of Rochester, USA .254 Tribunella, Thomas J / Rochester Institute of Technology, USA 254 Tyrväskylä, Pasi / University of Jyväskylä, Finland .285 Walker, Christopher H / The Pennsylvania State University, USA .150 Wang, John / Montclair State University, USA .229 Warren, M J / Deakin University, Australia 304, 609 Whiddett, Dick / Massey University, New Zealand 534 Wickramasinghe, Nilmini / Illinois Institute of Technology, USA 498 Xiang, Yang / Central Queensland University, Australia 121 Xue, Fei / Monash University, Australia 457 Yao, James / Montclair State University, USA 229 Yu, Wei-Chieh / Mississippi State University, USA 49 Yuan, Qing / East Tennessee State University, USA 507 Zhao, Wenbing / Cleveland State University, USA .23, 62 Zhou, Wanlei / Deakin University, Australia 121 Contents 3D Avatars and Collaborative Virtual Environments / Koon-Ying Raymond Li, James Sofra, and Mark Power Access Control for Healthcare / Yifeng Shen Advertising in the Networked Environment / Savvas Papagiannidis and Michael Bourlakis 15 Anonymous Peer-to-Peer Systems / Wenbing Zhao 23 Argumentation and Computing / Ephraim Nissan 30 Argumentation with Wigmore Charts and Computing / Ephraim Nissan 36 Artificial Intelligence Tools for Handling Legal Evidence / Ephraim Nissan 42 Barriers Facing African American Women in Technology / Jianxia Du, George H Pate, Deneen Sherrod, and Wei-Chieh Yu 49 B-POS Secure Mobile Payment System / Antonio Grillo, Alessandro Lentini, and Gianluigi Me 55 Building Secure and Dependable Information Systems / Wenbing Zhao 62 Classifying Articles in Information Ethics and Security / Zack Jourdan, R Kelly Rainer Jr., and Thomas E Marshall .68 Computational Ethics / Alicia I Ruvinsky 76 Computer Ethics and Intelligent Technologies / Yefim Kats .83 Computer Worms, Detection, and Defense / Robert J Cole and Chao-Hsien Chu 89 Conflicting Value of Digital Music Piracy / Matthew Butler 96 Content Filtering Methods for Internet Pornography / Jengchung V Chen and ShaoYu F Huang 102 Cyber-Terrorism in Australia / Christopher Beggs 108 Free ebooks ==> www.Ebook777.com Data Security and Chase / Zbigniew W Ras and Seunghyun Im 114 Defending against Distributed Denial of Service / Yang Xiang and Wanlei Zhou 121 Digital Divide Implications and Trends / Irene Chen and Terry T Kidd 130 Digital Rights Management Metadata and Standards / Jo Anne Cote and Eun G Park 136 Dilemmas of Online Identity Theft / Omer Mahmood .143 Document Security in the Ancient World / Christopher H Walker 150 DRM Practices in the E-Publication Industry / Bong Wee Kiau and Norshuhada Shiratuddin .157 Educational Technology Practitioner-Research Ethics / Kathleen Gray 164 E-Health and Ensuring Quality / Prajesh Chhanabhai and Alec Holt .170 Electronic Signatures and Ethics / A Srivastava and S B Thomson .179 Engineering Multi-Agent Systems / Tagelsir Mohamed Gasmelseid .187 Ethical Approach to Gathering Survey Data Online / Sophie Nichol and Kathy Blashki 194 Ethical Behaviour in Technology-Mediated Communication / Sutirtha Chatterjee 201 Ethical Concerns in Computer Science Projects / Alistair Irons and Roger Boyle 208 Ethical Debate Surrounding RFID The / Stephanie Etter, Patricia G Phillips, Ashli M Molinero, Susan J Nestor, and Keith LeDonne 214 Ethical Dilemmas in Data Mining and Warehousing / Joseph A Cazier and Ryan C LaBrie 221 Ethical Erosion at Enron / John Wang, James Yao, Richard Peterson, and Zu-Hsu Lee 229 Ethical Usability Testing with Children / Kirsten Ellis and Marian Quigley 235 Ethics and Access to Technology for Persons with Disabilities / Belinda Davis Lazarus 241 Ethics and Perceptions in Online Learning Environments / Michelle M Ramim 246 Ethics and Security under the Sarbanes-Oxley Act / Thomas J Tribunella and Heidi R Tribunella 254 Ethics Education for the Online Environment / Lori N K Leonard and Tracy S Manly 260 Ethics in Software Engineering / Pankaj Kamthan 266 Ethics in the Security of Organizational Information Systems / Sushma Mishra and Amita Goyal Chin 273 www.Ebook777.com Key Term Index certification authority 185 chase 120 chat 409 room 497 check 21 584 chief privacy officer 555 claim right 81 client 341 cloning identity theft 148 code of conduct 303 ethics 271, 303, 443 cognitive developmental theory of ethics 443 disability 245 collaborative virtual environment collateral fulfillment 22 commercialization 476 community 200 computational belief 81 ethical model 81 ethics 81 Computer ethics 88, 213 modeling 81 simulation 75 -based patient record (CPR) 540 -focused crime 296 -related crime 296 computing artifact 213 taught project 213 conceptual dependency 644 confidentiality 402, 540 consent 540 consequentialist school of ethics 207 consumer (user) profile 548 health informatics 178 value 228 Containment 95 content filtering 107 context awareness 193 contextual graph 469 contractarianism 491 convergence (technological) 22 cookie 107, 548 Copyright 290, 296, 396, 476, 652 corporate information resources 601 counter myth 228 credit freeze 456 criminal identity theft 148 critical infrastructure 113  critical research in information systems 353 critical theory 353 crosswalk 141 cryptography 163, 561, 608 cultural imperialism 333 Cuneiform 156 cyber terrorism 310 cyberethics 303, 402 cybernetics 318 cyber-squatting 526 cyberstalking 497 cybersuicide 389 cybertechnology 303 cyber-terrorism 113 cyborg 318 D data dictionary 141 message 185, 228, 540, 555, 592 mining 88 transport mechanism 601 warehousing 228, 555 decryption 608 defining issues test (DIT) 443 deindividuation 207 democratic divide 135 denial of service 129 deontic, deontology 35, 47 deontology/deontological ethics 512 dependability 67 developing nation 333 dialer 621 digital certificate 577 divide 135, 333, 660 native 410 object identifier (DOI) 163 rights management (DRM) 141, 163, 290 signature 193, 462 watermarking 163 discourse 333 dissociative identity disorder distributed chase 120 denial of service 129 DNS cache poisoning 526 spoofing 526 domain 29 hijacking 526 domain name system (DNS) 526 drive-by download 621 Key Term Index E F eavesdropping 608 ecological compatibility 630 economic right of ownership 476 e-consent Ssystem 540 E-CRM 548 educational technology 169 EduSat 601 egoism 283 e-government 592 e-health 178, 506, 540 e-learning platform 53 electroencephalogram (EEG) 341 electromyographic (EMG)-controlled prosthesis 245 electronic book (e-book) 163 commerce (e-commerce) 233, 578 health record (EHR) 14, 178, 540 medical record (EMR): T product code (EPC) 230 publishing (e-publishing) 163 electrophorus 318 elliptic curve integrated encryption scheme (ECIES) 61 emancipation 53 emoticon 6, 410 encrypted 584 encryption 141, 163, 608 enrollment 484 environment 200 environmental ethics 438 sustainability 438 equity 53 ethical agent 519, 637 category 637 consideration 200 framework 213, 431 patient 519, 637 principle 81 reviewer 213 system 81 theory 81 ethics 253, 278, 310, 353, 491, 512, 630 theory 81 Ethics Position Questionnaire (EPQ) 253 event data coding 644 evidence-based medicine 506 evidential reasoning 47 evil twin 456 existentialism 450 experimental simulation 75 extensible markup language (XML) 14 Factum Probandum 41 Probans 41 fair use 141 (Generic Concept) 290 (U.S Code) 290 design 290 False acceptance rate 484 matching error (FME) 341 non-matching error (FNME) 341 rejection rate 485 fault and intrusion tolerance 67 field experiment 75 study (with primary data) 75 study (with secondary data) 75 file sharing 100 filter 213 filtering 129 financial identity theft 148 fingerprinting 163 firewall 361, 601 first-person wiew flash worm 95 flexibility 561 forensic science 47 formal theory/literature review 75 framework 512 free market 333 function creep 592 functionalism 283 fusion 485 G games student 200 gender identity 53 generalization 35, 41, 47 generally accepted accounting principles (GAAPs) 233, 259 auditing standards (GAASs) 259 Generation Y 200 global conscience 333 digital divide 135 governance 592 group communication system 67 H hacker 278, 310, 615 hacking 113  Key Term Index hash function 185 health informatics (medical informatics) 178 Health Information Portability and Accountability Act (HIPAA) 506 Insurance Portability and Accountability Act of 1996 (HIPAA) 361 Level Seven (HL7) 14 healthcare actors 506 delivery 506 homeland 311 homo electricus 318 horizontal port scan 533 human compatibility 630 evolution 318 subjects research 169 -centered environmental ethics 438 humanoid robot 318 I ICD-9 506 idealism 450 idealistic 333 identification 485 identifier 141 identity fraud 149 management 592 theft 149, 456 ideology 353 impostor 341 in treal life (IRL) 410 independent-living skills 245 individual ethical philosophy 207 transition process 324 industrial property 652 industry-specific law 296 information and communication technology (ICT) 333 apartheid 660 communication technology (ICT) 113 ethics 107, 450, 519, 555, 637 integrity 506 poverty 660 security 193 awareness 278 breach 382 control 382 guidelines 382 incident 376 policy 383  dissemination 382 formulation 383 implementation 383 society 630 system(s) 278, 417 curricula 555 security 278, 417 technology 265 warfare 113 informed consent 169, 178, 240, 369, 548 insistent individualism 341 instant message (IM) 410 institutional leadership 341 review board (IRB) 369 integrating technology 53 integrity 67, 233, 562, 578 intellectual property (IP) 163, 169, 477, 652 law 296 rights (IPR) 163 intelligent agent 88, 548 query answering system 120 intergenerational environmental approach 438 internal control 259 Internet 107, 303, 310, 615 access 660 relay chat (IRC) 129 interoperability 592 interspecific environmental approach 438 intrinsic value 491 intrusion detection 417 system (IDS) 533 intuitionism 491 invisible information gathering 230 IPTv 22 Islam 361 IT professionals 444 security awareness 324 culture 325 management 325 policy 325 itinerant agent 462 ITSeCT (IT Security Culture Transition) Model 325 J Java2 Micro Edition (J2ME) 61 judgment task 75 jurisdiction 497 Key Term Index K key 185 distribution problem 608 keystroke logger 621 keyword filtering 107 kill function 230 knowledge asset 652 base 120 discovery system 120 L laboratory experiment 75 law of accelerating returns 318 leapfrogging 333 legal, social, ethical, and professional issues 213 liberty 81 right 81 license 141 life-centered environmental ethics 438 link analysis 47 M macro/micro-payment 61 malicious code software (e.g., trojan horse) 376 managed services 431 mandatory reporting 240 manual dexterity 245 market maker 233 MarshalPlan 41 masquerade 369 master patient index (MPI) 541 media richness 207 medical ethics 178 Internet ethics 178 MEDLINE 178 message board metadata 142 metaethics 450 metaphysics 450 microchip implant 318 Mixes 29 mobile agent 462, 562, 578 ambients 469 code 462 commerce (m-commerce) 578 marketing 22 payment 61 mobility 193 multiplier 333 Moral action 81 agent 283 development 512 dilemma 81 reasoning 444 rights 477 remedies 477 turing test 283 morality 354, 491, 512 MP3 100 MultiagentSystem 81, 193 -biometrics 485 -paragraph text in-depth understanding 644 multiple dipping 341 MySpace 100 myth 228 N Napster 101 narrative intelligence 644 Naruqqu society 156 national security 113 Net community 410 culture 410 network security scanner 417 society 333 telescope 95 networkable Windows operating system device 376 news story categorization 644 nonrepudiation 67 O objectivism 491 obligation 81 onion routing 29 online ACH payment gateway 584 ethics situation 265 grooming 497 learning system (OLS) 253 survey 200 ontology 120 organizational responsibility 234 outsourcing 431 P paper usage management 438 paperless office 439 partisan reports 644  Key Term Index passive defense cycle 129 tag 230 patch 376 patent 296 patient-Centric HCIS 506 payoff 424 pedophile 497 pedophilia 424 peer-to-peer 101 system (anonymous) 29 permission assignment (PA) 14 personal ethics 253 information 519, 637 ethics 519, 637 privacy 519, 637 security 637 personalization 22, 548 persuasion argument 35 pervasive computing 469 pharming 149, 456, 526 phishing 149, 456, 52, 584 physical disability 245 plagiarism 341 podcasting 22 point of sale (POS) 61 pornography 107 port 533 scan 533 practitioner research 169 pragmatism 450 principle-based theory 303 prisoner’s dilemma 81 privacy 228, 265, 354, 497, 555 broker agent (PB-agent) 369 contacts data (PB-contacts) 369 research study data (PB-study) 369 system (PBS) 369 concern 228 enhancing technology (PET) 230 procedural 48 -support system 48 professionalism 431 property 265 proprietor of personal information 519, 637 protocol 562 p-score or principled-score 444 pseudo identifier 29 psychological contract 431 Public Company Accounting Oversight Board (PCAOB) 259  public key cryptography 608 standards (PKCS12) 61 sphere 333 Q quality 271 aims 506 model 271 quantum communication 608 entanglement 608 mechanics 608 superposition 608 quarantine 95 Quran 361 R racial identity 53 rate limiting 95 rationalism 491 readonly tag 230 write tag 230 realism 450 recycling 439 reference information module (RIM) 14 related right 290 replay attack 578 replication (passive, active) 67 responsibility 81 responsible conduct of research 169 right 142 to refuse 240 risk 213, 376, 615 risk assessment 376 role-based access control (RBAC) 14 rule evaluator 570 repository 570 -based 570 S safe use guide 410 sample survey 75 Sarbanes-Oxley Act 259 scam 234 scholarship of teaching 169 Scumware 621 Scytale 156 secure channel 608 secure socket layer (SSL) 584 Securities and Exchange Commission (SEC) 259 Key Term Index security 67, 142, 311, 562, 578, 615 action 469 auditing 417 of communication 608 policy 376, 417, 469 seal 548 Seerah 361 seizure 425 Semantic Web 88 semantics 120 semiotics 271 session key 29 Shari’ah 361 sigillography 156 skimming 230 smart border 592 Smartcard 541 Smartphone 61 social compatibility 630 divide 135 engineering 601 attack 526 ethic 81 network presence 207 societal Value 228 Software agent 462 engineering 88, 272 failure 272 fault 272 Spam 456 spasticity 245 spear-phishing 456 special purposes entity (SPE) 234 Spyware 621 stakeholder theory 303 stealthy port scan 533 steganography 156 story generation 644 grammar 644 strategic equilibrium 81 streaming audio 101 subject 369 consent form 369 substantive 48 suicide 390 attempt 389 contagion 389 means restriction 389 pact 389 prevention 390 Sunnah 361 SuperIntelligence 283 sustainability 630 criteria 630 sustainable information society 630 symmetric cryptography 462 T technical protection means (TPM) 290 techno-illiterate 661 technological determinism 333, 396 technology education 54 protection measure 396 technophilia 333 telemedicine 178 teleological 35 template 485 terrorism 113, 311 text-to-speech synthesizer; speech reader 245 third world 334 -person view threat 67, 615 three-way-handshake 533 threshold 485 total information security system 601 Toulmin’s model 35 traceback 129 trade secret 296 trademark law 296 traditional ethics situation 271 knowledge 652 transhumanism 318 transition 325 trojan 621 Trust 88, 432 Turing Test 284 U unethical communicative behavior (dyadic) 207 universal Internet access 661 service 661 URL blocking 107 usability testing 240 use right 290 user assignment (UA) 14 Usul-al-Fiqh (Fiqh Science) 361 utilitarian 439 utilitarianism 284, 512 utility function 425  Key Term Index V value 491 verification 341, 485 virtual community private network (VPN) 61 virtue ethics 512 virus 95 visual evoked potential (VEP) 341 processing 245 Vodcasting 22 VoIP 22 voluntary participation 240 vulnerability 615 assessment 417 W Web bug 621 ontology 88 surfing 107 -based system 193 weight (evidential) 41 whistleblower 341 Wigmore Charts 35, 41, 48 work 477 workplace relationships 432 World Intellectual Property Organization (WIPO) 652 worldview 450 worm 95 X X.509 61   Index Symbols 3D avatar 1–6 9/11 585 A absolute anonymity 24 access control 7–14, 63 to technology 242 accessibility to technology 243 active defense cycle 124 adversary argument 31 advertising 15–22 African American women 49, 49–54 age-appropriate research design 236 agent -to-agent interaction 84 -to-human interaction 84 transport 575 ALIBI 43 American Accreditation Healthcare Commission (URAC) 175 Association of University Women 50 Civil Liberties Union (ACLU) 493 ancient world 150 anonymity 1–2, 23–24, 398 anonymous communication 24 peer-to-peer (P2P) system 23–29 ARA routing 26 Araucaria 31, 36–37 Arctic Monkeys 98 argument diagram 36 map 36 argumentation 30–35, 36 argument structure 31 ARPANET artificial intelligence (AI) 41, 42–48, 279, 638 tools 42 neural network (ANN) 105, 279 association rule mining 114 Australia 108–113 Australian computer systems 110 authenticated identity 11 authentication 56, 64 mechanism 565 authorization 64 automated clearinghouse (ACH) 580 transactions 579 autonomy 77 avatar technology 2–6 B Bayesianism 42 biometric 479 birthday paradox 419 blacklisting 92 Bluetooth Point of Sale (B-POS) 55–61 BPOS architecture 56 brain signals 335 budget 72 buffer-overflow attack 63 business problem domain 86 C CABARET 31 cache poisoning 523 Canada 585 Canadian government 585 Carneades 31–32 CaseMap 44 Copyright © 2008, IGI Global, distributing in print or electronic forms without written permission of IGI is prohibited Index categorical imperative 78 CATO 31 Chase 114–120 chat interview 403 Child Online Privacy Protection Act (COPPA) 294 child pornography (CP) 418 children 102–107, 235 chimeras ciphertext 62 claim right 77 classifying articles 68 cloning identity theft 143 code of cyberethics 297 of ethics 442 Code Red worm 89 collaborative virtual environment (CVE) 1–6 commercial focus 426 Committee on the Quality of Health Care in America 502 communication technology 602 communicative behavior 201 computational belief 78 ethical model 78 ethics 76–82 models 36 computer -mediated communication and information ethics 631 ethics 83–88 hacker 304 science projects 208 simulation 72, 76 tools 36 usage 50 worms 89 Computer Fraud and Abuse Act 293 conceptual -dependency 638 interaction model 145 confidentiality 62, 197, 398 consent 196 consequentialism 83 conservative 589 consumer value 222 content filtering 102–107 context -aware security 463 attribute 10 collector 565 condition 11 constraint 11 function 10 contextual meta-policy 464  contractarianism 487 convergence 17 copyright 97, 391, 645 debates 391 crawler component 105 crime analysis 42 networks 43 criminal identity theft 143 critical infrastructure 609 crowds 25–26 cryptography 72, 114 customer behavior 84 cybersecurity strategies 112 space 109 terrorism 108–113 terrorist 109, 306 cyberethics 297 cybersitter 618 cyberspace cybersuicide 386 cyborg 4, 312 D Daedalus 45 dark address space 90 DARPA agent markup language (DAML) 85 data flow 13 mining 114, 221, 549 textbooks 549 security 114 warehousing 221 DDoS attack 121 decrypt 62 defense approaches 92 Democratic divide, the 133 denial-of-service (DOS) attack 62–63 deontic logic 30 dependable systems 65 design ethics 83 detection 89 methods 92 developed countries 655 digital divide 130 implications 130 trends 130 music 96 piracy 96–101 music piracy 96 rights management 136, 158, 287 Index signature 193 Digital Millennium Copyright Act (DMCA) 292 dilemma 77 direct mailing 16, 20 dissociative identity disorder distributed active defense system (DADS) 125 denial of service 121 knowledge 116 discovery system (DKDS) 115 divine command ethical model 78 DivX 96 DNS software vulnerabilities 523 document lifecycle 150 security 150 DoD pirates 391 domain 29 hijacking 523 name system (DNS) 521 Doom dot.com era 15 DRM practices 157 E ebook 159 health 170 educational satellite networks 594 EEG 336 eggshell principle 527 Electronic Communications Privacy Act (ECPA) 293 Privacy Information Center (EPIC) 493 electronic advertising 19 check (e-check) 55 commerce (e-commerce) 68, 84 health information transactions 499 record (EHR) 11, 463, 534 information systems 535 mail (e-mail) 18 money (e-money) 55 payment 580 publishing (e-publishing) 157 Electrophorus 313 ELIZA 279 elliptic curve (EC) 59 embodied agents 640 energy consumption 434 Enron Corporation 229 EnronOnline (EOL) 230 environment 433 environmental ethics 433 impact 433 eThekwini Municipality 300 ethical AI 279 behavior 441 of corporate managers 256 challenges 246 development 507 dimension 508 reasoning 440 standards 231 status 30 usability testing 235 ethics 20, 76, 624 education 260 in higher education 250 in online learning systems 251 evidence 44 existentialism 447 extensible markup language (XML) F fabrication 62 face-space 43 fair use 285 design 288 expectations 286 fault-tolerant computing 62 federal information security law 291 Federal Trade Commission (FTC) 619 file sharing 96 filtering 102 financial identity theft 143 firewall 65 flash worm 91 forensic facial reconstruction 42 fragmentation-redundancy-scattering (FRS) 65 fusion 481 G Gazprom 110 gender 3, 49 Generation Y 194 GFI LANguard 415 globalization 85 Gnutella 23 Government Online (GOL) 585 H hacker 108, 304, 527 Health  Index Insurance Portability and Accountability Act (HIPAA) 273, 362, 498 Internet Ethics (Hi-Ethics) 175 Level Seven (HL7) 7–8 healthcare 7–14, 216 information systems 498 high-level security policy 595 hitlist 89 worm 91 Homo Electricus 312 human rights 656 HYPO 31 I idealism 445 identification number 59 identity 49 deception theft 451, 617 verification 335 ideology 348 independent choice logic (ICL) 44 index construction component 105 Indian Institute of Technology Kanpur, India 482 industrial property 645 information and communication technologies (ICTs) 108, 297, 350, 622 ethics 355, 513, 551 fusion 481 infrastructure (II) 609 integrity 501 security 188, 362, 609 and ethics (ISS/E) 68–75 audits 411 journal 69 law 291 policy 370, 377 society 623 systems (IS) 62–67, 68 technology education 86 warfare 108, 609 informed consent 238 instant messaging Institute of Electrical and Electronics Engineers (IEEE) 83 integrity protection 559 intellectual property (IP) 157, 645 law 291 legislation 285 intelligent agent 84 content analysis 102, 104  technologies 83–88 interaction 78 interception 62 Internal Security Standards 597 Internet 68, 85, 89, 97 access 655 attack 110 piracy 391 pornography 102 protocol television (IPTv) 18 relay chat (IRC) research ethics 397 usage 492 interruption 62 interviews 403 intrinsic value 488 intrusion detection 411 tolerance 65 intuitionism 487 investigation strategy 418 IP address 198 IPRadio 19 IPTv 18 Iraqi War 308 Islam 355 IT professional 440 security committee 596 culture 319 policy 595 students 440 J journals 68 jury research 43 K k-nearest neighbor (KNN) 105 key distribution problem 602 seed negotiation protocol 558 keyword filtering 102, 104 knowledge discovery system (KDS) 114 gap 68 loss 118 query and manipulation language (KQML) 571 sharing 115 L Lay, Kenneth 229 Index layered security model 598 LeCroy 371 legal evidence 42 narrative 44 liberty right 77 local knowledge 116 M m-commerce 571 managed services 426 managing information technology 486 marketing ‘bots’ 16 MarshalPlan 31, 36, 44 media characteristics 201, 203 message authentication code (MAC) 64 metadata 136 military 566 mimics 27 mindset change 426 minors 400 mixes 24–25 mobile agent 457, 571 data 556 marketing 16 payment (m-payment) 55–61 modification 62 monitoring rights 493 monitor Internet usage 492 moral agent 85 choices 486 development dimension 510 dilemma 77 patient 85 reductionism 84 morals 486 Morris Worm 89 MP3 96, 97 MPEG-21 138 multi-agent systems 187 multimodal biometric system 478 multiple identity 49 municipality 297 music sales 98 mutual anonymity 24 authentication 56 MySpace 96, 99 N Napster 23, 97 narratives 638 narrowcasting 19 National Telecommunications and Information Administration (NTIA) 131 natural language processing (NLP) 85, 105 net cultures 406 NetNanny 618 networkable device 370 Windows-based operating system (NWOS) 370 networked environment 15 network telescope 90, 92 NWOS devices 372 O objective ethics 486 objectivism 489 onion routing 24–25 online chat 403 data collection 542 environment 260 ethics 262 game identity theft 143 interview 403 learning environment 246 survey 194 ontology inference layer (OIL) 85 Web language (OWL) 85 open mobile alliance 138 organizational information systems 273 security initiatives 273 ownership of data 399 P parental rights 492 parenting 102 passive defense cycle 122 patent 292 patient -centric healthcare systems 503 medical information payments systems 579 PB-Agent 366 pedagogical framework 507 pedophile 418 peer-to-peer (P2P) communication 16 software 97 system 23–29  Index perfect worm 91 permission -based advertising 16 assignment (PA) permutation scanning 92 personal ethics 248 personal information ethics (PIE) 513,  631 personalization 15 personally identifying information 363 persons with disabilities 241 persuasion argument 31 pharming 520 attack designs 520 phishing 520 piracy 96,  96–101 plagiarism 342 Platform for Internet Content Selection (PICS) 102 podcasting 19 policy server 564 updating 379 pornography 102,  102–107 port scanning 527,  530 scan techniques 529 portability 60 practitioners 68 pragmatism 446 Print Revolution, The 645 prisoner’s dilemma (PD) 77 privacy 7,  65,  84,  261,  348,  499,  534,  542,  549,  631 broker 362 system (PBS) 364 debate 215 ethics 631 intrusion 515 policy 551 processing narratives 638 professional ethics 247 professionalism 427 profiling 17 propaganda 306 proposition development 202 protection algorithm 117 PS2 98 public 399 -key infrastructure (PKI) 64 health 384 key cryptography 603 publicity 306 public schools 51 publishing industry 157  Q quantum communication 604 physics 604 technology 602 quarantine 92 Quran 355 R race 49 radio 19 frequency identification (RFID) 214 rate limiting 92 rationalism 488 realism 446 Reason!Able 33 Recording Industry Association of America (RIAA) 96 reference information model (RIM) regulating e-health 174 reliability 62 representing narratives 638 requester anonymity 24 research agenda 377 strategy 69 researchers 68 resource description framework/schema (RDF/S) 85 responder anonymity 24 resting state brain signals 335 retail 217 RFID technology 218 RIAA 97 rights data dictionary 137 expression language 137 risk 546 assessment 72 robots 315 role-based access control (RBAC) routable scan 91 rule -based policies 563 evaluator 565 S Safeguard Against Privacy Invasion Act (SAPIA) 619 SafeSurf 102 sales 97 Sarbanes Oxley (SOX) Act 254,  273,  295 scanning 90 search engine 102 Index secure agent roaming 571 roaming agent for e-commerce (SAFE) 571 secured defense meetings 563 Securities and Exchange Commission (SEC) 254 security 7,  56,  62,  64,  68–75,  89,  108,  114–120,  254,   273,  319,  406,  499 architecture 564 culture 321 dilemma 585 dimension 508 management 70 model 594 policies 563 protection 609 risk 84 analysis (SRA) 609 Seerah 356 Semantic Web 83,  83–84 semiotic levels 267 sensors 566 sequential scan 91 server load 56 session key 29 shortest-path algorithm 43 signal conditioning 337 simple epidemic model (SEM) 90 mail transfer protocol (SMTP) 92 simulation modeling 76 situational crime prevention (SCP) 419 Slammer worm 92 smartphone 55–61 social class 49 contract 658 divide 133 engineering 84,  520 networking Web site 99 societal value 224 socioeconomic status 655 software engineering 83,  266 product quality 267 Software Principles Yielding Better Levels of Consumer Knowledge Act (SPYBLOCK) 619 solutions dimension 509 Soul Catcher chip 313 spamming 16 spyware 616 SQL Slammer 110 staff plagiarism 342 stakeholder theory 299 strategic equilibrium 78 suicide 384 prevention 386 Sunnah 356 SuperIntelligence (SI) 280 survey data online 194 sustainable development 623 information society 622,  625 system design 126 security audits 413 T target discovery methods 90 Tarzan 27 TCP 528 teachers 236 technical protection means (TPM) 287 technology -mediated communication 201 access 50 education 49,  51 gender gap 50 in the classroom 51 television 18 terrorism 108 theory of justice 658 threat model 63 trademark 292 traditional cryptography 602 knowledge 645 trust 427 U uniform scan worm 91 universal Internet access 655 URL blocking 103 usability 60 USA PATRIOT Act 293 use ethics 83 user assignment (UA) utilitarian 657 V value perceptions 225 virtual check 57 communication community (VC) environment 640 world virus 84  Index voice over IP (VoIP) 19 W Web publisher 102 rating 102 rating system 105 tracking devices 542 Wigmorean analysis 37 Wigmore Charts 31,  36,  36–41,  44 Wilco 98 WinWhatWhere 618 wireless transport layer security (WTLS) 56 women 49 in Technology 49 in technology 49 workplace 426 ethics 426 relationship relationships 428 World Intellectual Property Organization (WIPO) 645 War I 76 Wide Web 15 worm 89–95,  110 behavior 90 behavior modeling 90 X X-Box 98 Y young people 403  ... (ebook) Information technology Social aspects Encyclopedias Information technology Moral and ethical aspects Encyclopedias Computer crimes-Encyclopedias Computer security Encyclopedias Information. .. Articles in Information Ethics and Security / Zack Jourdan, R Kelly Rainer Jr., and Thomas E Marshall .68 Computational Ethics / Alicia I Ruvinsky 76 Computer Ethics and Intelligent... .348 Information Ethics from an Islamic Perspective / Salam Abdallah 355 Information Security and the “Privacy Broker” / Michael Douma and Eduard J Gamito 362 Information Security

Ngày đăng: 04/03/2019, 11:48

Mục lục

  • Title Page

  • List of Contributors

  • Contents

  • Preface

  • Acknowledgment

  • About the Editor

  • Access Control for Healthcare

  • Advertising in the Networked Environment

  • Anonymous Peer-to-Peer Systems

  • Argumentation and Computing

  • B-POS Secure Mobile Payment System

  • Computational Ethics

  • Computer Ethics and Intelligent Technologies

  • Computer Worms, Detection, and Defense

  • Conflicting Value of Digital Music Piracy

  • Cyber-Terrorism in Australia

  • Data Security and Chase

  • Digital Divide Implications and Trends

  • Dilemmas of Online Identity Theft

  • Document Security in the Ancient World

Tài liệu cùng người dùng

Tài liệu liên quan