This streamlined discussion of ethical issues in the decision-making process supports and supplements any introduction to CIS or MIS textbook.Chapter One defines ethics. Chapter Two relates ethics to the use of technology. Chapter Three applies a four-step analysis process to an ethical dilemma, illustrating how to reach a defensible decision.The remaining chapters of 18 cases challenge the student to apply the knowledge gained in Chapters 1-3 to recognize, evaluate, and react responsibly to an ethical dilemma.The class-test cases are based on real business situations Case worksheets guide…mehr
This streamlined discussion of ethical issues in the decision-making process supports and supplements any introduction to CIS or MIS textbook.Chapter One defines ethics. Chapter Two relates ethics to the use of technology. Chapter Three applies a four-step analysis process to an ethical dilemma, illustrating how to reach a defensible decision.The remaining chapters of 18 cases challenge the student to apply the knowledge gained in Chapters 1-3 to recognize, evaluate, and react responsibly to an ethical dilemma.The class-test cases are based on real business situations Case worksheets guide students in the case analysis.This edition offers new and expanded coverage of the Internet, privacy, and the ACM code.The Instructor's Manual contains case objectives, key ethical issues, discussion ideas, guidelines assigning and evaluating cases, strategies for managing classroom discussion, and lessons to be learned.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
PART 1: APPROACHES TO ETHICAL DECISION MAKING CHAPTER 1: Ethics and Ethical Decision Making Why We Should Care About Ethics Computer Ethics and Regular Ethics Competing Factors that Affect Our Behavior Value Judgments The Types of Ethical Choices Making Defensible Decisions Summary Annotated References CHAPTER 2: Ethics and Information Technology New Technologies, New Problems Why is Ethical Computer Use a Special Challenge? What is Unethical Computer Use? Summary Annotated References CHAPTER 3: Solving Ethical Dilemmas: A Sample Case Exercise A Four step Analysis Process Sample Case: Too Much of a Good Thing Discovering the Four step Process Summary PART 2: THE CASES Case 1: Levity or Libel An E mail Effort Case 2: Credit Woes Credit Bureau Decisions Case 3: Something for Everyone Data Recombination Case 3A: Something for Everyone Role playing Case 4: Abort, Retry, Ignore: Data Recovery Case 5: Messages from All Over Who Controls E mail Case 6: A Job on the Side Part time Consulting Case 7: The New Job Offensive Graphics Case 7A: The New Job Role playing Version Case 8: The Buyout Inappropriately Acquired Data Case 9: Charades Stolen Password Case 10: Laccaria and Eagle Restrictive Trade Practices Case 11: Taking Bad with Good Bad Software Case 12: The Engineer and the Teacher Copyright Ethics Case 13: Test Data Confidential or Dummy Data Case 14: The Brain Pick Knowledge based System Case 15: Trouble in Sardonia Overseas Copyright Ethics Case 16: Bad Medicine Well intentioned software Case 17: Code Blue Patient Data Case 18: Virtual Success Games Invade the Real World Case 19: His Private Lab Student Computer Use APPENDIX A: Ethics Codes and Policies APPENDIX B: Worksheets for Four step Analysis Index
PART 1: APPROACHES TO ETHICAL DECISION MAKING CHAPTER 1: Ethics and Ethical Decision Making Why We Should Care About Ethics Computer Ethics and Regular Ethics Competing Factors that Affect Our Behavior Value Judgments The Types of Ethical Choices Making Defensible Decisions Summary Annotated References CHAPTER 2: Ethics and Information Technology New Technologies, New Problems Why is Ethical Computer Use a Special Challenge? What is Unethical Computer Use? Summary Annotated References CHAPTER 3: Solving Ethical Dilemmas: A Sample Case Exercise A Four step Analysis Process Sample Case: Too Much of a Good Thing Discovering the Four step Process Summary PART 2: THE CASES Case 1: Levity or Libel An E mail Effort Case 2: Credit Woes Credit Bureau Decisions Case 3: Something for Everyone Data Recombination Case 3A: Something for Everyone Role playing Case 4: Abort, Retry, Ignore: Data Recovery Case 5: Messages from All Over Who Controls E mail Case 6: A Job on the Side Part time Consulting Case 7: The New Job Offensive Graphics Case 7A: The New Job Role playing Version Case 8: The Buyout Inappropriately Acquired Data Case 9: Charades Stolen Password Case 10: Laccaria and Eagle Restrictive Trade Practices Case 11: Taking Bad with Good Bad Software Case 12: The Engineer and the Teacher Copyright Ethics Case 13: Test Data Confidential or Dummy Data Case 14: The Brain Pick Knowledge based System Case 15: Trouble in Sardonia Overseas Copyright Ethics Case 16: Bad Medicine Well intentioned software Case 17: Code Blue Patient Data Case 18: Virtual Success Games Invade the Real World Case 19: His Private Lab Student Computer Use APPENDIX A: Ethics Codes and Policies APPENDIX B: Worksheets for Four step Analysis Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497