@ This collection of 42 high-quality, well-researched case studies on information and computer ethics addresses the most salient ethical issues of the information age, and illustrates the key concerns of computer specialists and information managers today. It engages readers who are novices in computer issues—and those who are more involved—in an exciting discovery process. The cases encompass areas such as privacy, free speech, intellectual property, Internet access, and policy discussions—and feature the Microsoft trial, the Napster case, the FBI's Carnivore technology, and the AOL Time Warner merger. For managers, executives, and IT professionals who work in the field of computer technology, and for use in corporate management education programs.
Case Studies in Information Technology Ethics, Second Edition, is a versatile learning tool that offers a collection of diverse cases to help students and managers reflect on the multi-faceted ethical dilemmas that are emerging in the networked world. This book contains forty-two high-quality and well-researched case studies that address areas such as cybercrime, privacy, intellectual property, and equitable access. Many of these cases illustrate the interplay of strategic objectives with law, public policy. and ethical norms. The text is designed to appeal to all student levels—it is neither too technical for the novice in information technology issues, nor is it too simplistic for those with a more sophisticated background.
New to this Edition - Twenty-two new cases along with new chapters on free speech and interconnectivity issues such as the proper use of hyperlinks and metatags.
- All cases have been updated where necessary to reflect changes in laws or policies.
- There is a focus on policy issues, featuring cases on the information infrastructure, open access to the Internet, and the digital divide.
- There are cases on controversial and current topics such as the Microsoft antitrust trial, Napster and digital music, the AOL Time Warner merger, the FBI's Carnivore technology, and the use of encryption software.