Encyclopedia of Information Ethics and Security, 1st Edition

  • Editor: Marian Quigley [Monash University (Australia)]
  • Published By:
  • ISBN-10: 1591409888
  • ISBN-13: 9781591409885
  • Grade Level Range: College Freshman - College Senior
  • 661 Pages | eBook
  • Original Copyright 2007 | Published/Released October 2007
  • This publication's content originally published in print form: 2007

  • Price:  Sign in for price



Rapid technological advancement has given rise to new ethical dilemmas and security threats, while the development of appropriate ethical codes and security measures fail to keep pace, which makes the education of computer users and professionals crucial.

The Encyclopedia of Information Ethics and Security is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool includes topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. This encyclopedia is a useful tool for students, academics, and professionals.

Key features include:

  • Authoritative contributions by 150 of the world's leading experts
  • A single source for comprehensive information on an expansive field
  • In-depth definitions for more than 700 key terms
  • Organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals
  • More than 2,000 comprehensive references to existing literature and research on ethical and security issues relating to the latest technologies
  • Cross-referencing of key terms, figures, and information pertinent to information ethics and security

  • Contributors


    • Marian Quigley [Monash University (Australia)]

    Table of Contents

    Front Cover.
    Title Page.
    Copyright Page.
    Editorial Advisory Board.
    List of Contributors.
    About the Editor.
    1: 3D Avatars and Collaborative Virtual Environments.
    2: Access Control for Healthcare.
    3: Advertising in the Networked Environment.
    4: Anonymous Peer-to-Peer Systems.
    5: Argumentation and Computing.
    6: Argumentation with Wigmore Charts and Computing.
    7: Artificial Intelligence Tools for Handling Legal Evidence.
    8: Barriers Facing African American Women in Technology.
    9: B-POS Secure Mobile Payment System.
    10: Building Secure and Dependable Information Systems.
    11: Classifying Articles in Information Ethics and Security.
    12: Computational Ethics.
    13: Computer Ethics and Intelligent Technologies.
    14: Computer Worms, Detection, and Defense.
    15: Conflicting Value of Digital Music Piracy.
    16: Content Filtering Methods for Internet Pornography.
    17: Cyber-Terrorism in Australia.
    18: Data Security and Chase.
    19: Defending Against Distributed Denial of Service.
    20: Digital Divide Implications and Trends.
    21: Digital Rights Management Metadata and Standards.
    22: Dilemmas of Online Identity Theft.
    23: Document Security in the Ancient World.
    24: DRM Practices in the E-Publication Industry.
    25: Educational Technology Practitioner-Research Ethics.
    26: E-Health and Ensuring Quality.
    27: Electronic Signatures and Ethics.
    28: Engineering Multi-Agent Systems.
    29: Ethical Approach to Gathering Survey Data Online.
    30: Ethical Behaviour in Technology-Mediated Communication.
    31: Ethical Concerns in Computer Science Projects.
    32: The Ethical Debate Surrounding RFID.
    33: Ethical Dilemmas in Data Mining and Warehousing.
    34: Ethical Erosion at Enron.
    35: Ethical Usability Testing with Children.
    36: Ethics and Access to Technology for Persons with Disabilities.
    37: Ethics and Perceptions in Online Learning Environments.
    38: Ethics and Security under the Sarbanes-Oxley Act.
    39: Ethics Education for the Online Environment.
    40: Ethics in Software Engineering.
    41: Ethics in the Security of Organizational Information Systems.
    42: Ethics of AI.
    43: Fair Use.
    44: Federal Information Security Law.
    45: Formulating a Code of Cyberethics for a Municipality.
    46: Hackers and Cyber Terrorists.
    47: Homo Electricus and the Continued Speciation of Humans.
    48: IT Security Culture Transition Process.
    49: ICT Leapfrogging Policy and Development in the Third World.
    50: Identity Verification using Resting State Brain Signals.
    51: Individual and Institutional Responses to Staff Plagiarism.
    52: Information Ethics as Ideology.
    53: Information Ethics from an Islamic Perspective.
    54: Information Security and the “Privacy Broker”.
    55: Information Security Policies for Networkable Devices.
    56: Information Security Policy Research Agenda.
    57: Internet and Suicide.
    58: Internet Piracy and Copyright Debates.
    59: Internet Research Ethics Questions and Considerations.
    60: Interviews with Young People using Online Chat.
    61: Intrusion Detection and Information Security Audits.
    62: Investigation Strategy for the Small Pedophiles World.
    63: Managed Services and Changing Workplace Ethics.
    64: Managing the Environmental Impact of Information Technology.
    65: Measuring Ethical Reasoning of IT Professionals and Students.
    66: Meta View of Information Ethics.
    67: Mitigation of Identity Theft in the Information Age.
    68: Mobile Agents and Security.
    69: Modelling Context-Aware Security for Electronic Health Records.
    70: Moral Rights in the Australian Public Sector.
    71: Multimodal Biometric System.
    72: Objective Ethics for Managing Information Technology.
    73: Parental Rights to Monitor Internet Usage.
    74: Patient Centric Healthcare Information Systems in the U.S..
    75: Pedagogical Framework for Ethical Development.
    76: Personal Information Ethics.
    77: Pharming Attack Designs.
    78: Port Scans.
    79: Privacy and Access to Electronic Health Records.
    80: Privacy and Online Data Collection.
    81: Privacy in Data Mining Textbooks.
    82: Protection of Mobile Agent Data.
    83: Rule-Based Policies for Secured Defense Meetings.
    84: Secure Agent Roaming under M-Commerce.
    85: Secure Automated Clearing House Transactions.
    86: Security Dilemmas for Canada’s New Government.
    87: Security Model for Educational Satellite Networks.
    88: Security of Communication and Quantum Technology.
    89: Security Protection for Critical Infrastructure.
    90: Spyware.
    91: Sustainable Information Society.
    92: Taxonomy of Computer and Information Ethics.
    93: Tools for Representing and Processing Narratives.
    94: Traditional Knowledge and Intellectual Property.
    95: Universal Internet Access under an Ethical Lens.
    Key Term Index.