- Researchers find critical vulnerabilities in popular game engines
- Pentagon clearance for iOS could open even more doors for Apple in the private sector
- Digital strongboxes won't solve whistleblower problem for journalists
- ACMA database keeps finger on Australia’s malware pulse
- Bit9, FireEye, Palo Alto Networks team to hit zero-day malware
Pandoras Box Social Issues of the Information Age
Using case studies and discussion topics drawn from entertaining real world examples, Pandora’s Box examines the background of a wide range of vital contemporary issues, encouraging readers to examine the social, legal and ethical challenges they will face in their own careers.
Written in an engaging style and packed with international examples, this book addresses topics which have come to the forefront of public consciousness in recent years, such as online crime, piracy and peer to peer file sharing. Comprehensive coverage is provided of digital entertainment, censorship and privacy issues, presenting a rich source of context in which to consider ethical matters.
Suitable for students on computer science degree programmes, as well as those taking IT related modules on other courses which consider the impact of technology on 21st century living, Pandora’s Box is an essential read and a unique and timely textbook.
Table of Contents
Lessig's Four Modalities Analysis.
Prophet and Loss: Failing to Foresee the Future.
Information System Partition.
The Law is an Ass.
The Digital Divide.
Servant or Master: Computers Making Decisions
Can Laws be Immoral?
Genetically Modified Food, Technologically Modified Humans.
The Haves and the Have-nots.
2. Emergence and Convergence of Technologies.
The Rise of Print Media.
The Rise of the Telegraph and Telephone.
The Rise of Broadcast Media.
The Rise of The Computing Industry.
The Rise of the Content Industry.
The Rise of the Internet.
Content Producers and Distributors.
Platform Producers and Content Producers or Publishers.
Corporate Production vs Individual Creativity.
Market Sector Integration
The Big Challenges Ahead.
Fit for Purpose?
Competing with Free Beer.
3. Digital Entertainment.
The Effects of Digital Entertainment Technology.
Digital Entertainment - Friend or Foe?
The Toy Town Divide.
Boys and Girls Come Out to Play: Stereotyping.
Health Related Issues.
Curse of the Couch Potato Children.
Digital Equipment - Part of the Modern Family.
Does Television Cause Adverse Social Behaviour?
Creating Monsters - Do Computer Games Make People Violent?
Do Computer Games Fuel Addiction and Gambling.
Power to the Player - Benefits of Computer Games.
Harnessing the Power of the Brain.
Education and Learning.
The Silver Gamers.
Game Development Grows Up - The Hidden Agenda.
Should Computer Games be Regulated? Rated? Censored?
Couch Potato Syndrome.
Online Gambling: Menace or Natural Progression?
4. Censorship and Freedom of Speech.
Reasons for Censorship.
Censorship By States.
Censorship of Speakers by Governments.
Censorship of Listeners by Governments.
Censorship by Private Actors.
Censorship of Speakers by Private Actors.
Censorship of Listeners by Private Actors.
Technology for Expression.
Technological Developments with Expressive Power.
Censoring Internet Content.
Client-Server and Peer-to-Peer.
Yahoo! France Nazi Memorabilia.
ISP Liability for Content.
BT and the IWF.
5. Sex and Technology.
The Nature of Sexual Material.
One Man's Art....
The Medium and the Message.
Use of Technology to (Re)Produce Sexual Material.
Anonymity: Reality and Illusion.
Online Sex and Real Relationships.
The Future of Online Sex: TeleDildonics?
Regulating Sex in Cyberspace.
Not in Front of the Children; Protecting Children from Sex Online.
Surfing to a Naked Beach.
'Satisfy Her in Bed': Sex Spam to Minors.
Types of Material.
Prohibition, Harm, Possession and Distribution.
Jurisdictional Anomalies and Conflicts.
Discovery, Defence and Mitigation.
Freedom of Speech v Censorship of Sexual Material.
The Toby Studabaker Case.
6. Governance of the Internet.
The Internet Protocols.
The Origins of the Internet.
The Root of All Evil.
Alternative Root Servers.
Commercialization, Ownership and Corporate Identity.
Trademarks in Domain Names.
The Uniform Dispute Resolution Process.
The Nominet Dispute Resolution Process.
Criticisms of Dispute Resolution.
Do Trademarks Matter in Domain Names? In URLs?
The Future of Internet Governance.
ICANN, DoC, EU and ccTLDs.
Wiring the World: Who Really Owns 'The Internet'?
Should trademarks be valid in domain names?
What governance should ICANN have? UN-based, US-based, EU-based, anarchy?
What and how many top-level domains should there be? .
7. Privacy and Surveillance.
Cryptography and Steganography.
Definition of Privacy.
Communication Technology and Eavesdropping.
Identity of Eavesdropper and Legality of Eavesdropping.
Data Protection Issues in EU Law.
Data Protection Issues in US Regulation.
International Movement of Data.
Data Protection Not Impediment to Life.
Big Brother is Watching You: CCTV.
Big Brother in the Making? Automated CCTV Processing.
Technological Privacy and Surveillance.
Leaving Little Trace: Anonymity in the Digital World?
Availability of Cryptography and Steganography.
Data Retention by ISPs.
8. Information Age Warfare.
History of Warfare.
The Technology of War.
Satellites - The View from Space.
Star Wars Technology.
Robo - Soldier.
Man or Machine.
The Unseen Enemy.
Mobile Phones as Weapons.
Intelligence Gathering and Surveillance.
Working for Arms Manufacturers.
Cyberterrorism: Real Threat or Virtual Bogeyman?
Overall Benefit or Drain on Resources?
9. Technology and the Human Body.
Health Information Systems.
Electronic Patient Records.
Intranets, Internet, and Call Centres.
Factors for Success.
Power to the Patient.
Internet, CD and Games.
Online Body Trafficking.
Training and Supporting Nurses & Doctors.
Robots in Hospitals.
Assistive Technology and Rehabilitation.
New Medical Technologies.
Implants for Diagnosis and Healing.
Implants and Prosthetics for Replacement and Reconstruction.
Digital Flesh & Cyborgs.
The Longevity and Social Justice Debate.
Owning the Code of Life.
What is a Human?
10. Professionalism in IT.
Vulnerability of E-mail.
Consequences of ‘Whistleblowing’.
Responsibility for DDoS Attacks.
11. Online Crime and Real Punishment.
A Very Brief History of Crime and Computers.
A Taxonomy of Malware.
Problems Caused by Malware.
Malware Authors: Who, How and Why?
Hoaxes and Life Imitating Art.
Computer Security: Cops and Robbers, Poachers and Gamekeepers.
Who are the Crackers?
Vulnerability, Risk and Threat.
The Closed vs Open Security Debate.
Walking the Tightrope: Social Pressures on Security.
How Much Security Should be Necessary?
Poachers and Gamekeepers.
Laws Against Computer Misuse.
UK Computer Misuse Act.
US Sequence of Laws.
Council of Europe Convention on Cybercrime.
The Growing Problem of Computer Crime.
White Hat Cracking Should Be Legalized.
Web Scrapers and Robot Denial Files.
An Immune System for the Internet.
12. Patents and Copyright.
The Philosophical Basis of Patents and Copyright.
A Brief History of Patents.
Modern Patent Systems.
Business Method and Software Patents.
User Friendly Cartoon 005277.
General Criticisms of Patents.
Patent Licensing Companies.
Origins and Development of Copyright.
The Main Provisions of Modern Copyright Statutes.
The Main Case Law of Copyright in the US.
The State of Play.
Copyright and the Architecture of Cyberspace.
Is copyright the correct way to reward artists?
Does it actually promote artistic activity?
Lack of Legitimate Downloads Caused the Rise of Napster et al.
A New Basis for Copyright Law is Required.
Control and the Copyright Bargain.
13. Unwanted Electronic Attentions.
Types of Unsolicited Communication.
Static Visual Communication.
Types of Communication Media.
Broadcast Non-Interactive Media.
Broadcast Interactive Media.
The Economics of Unsolicited Contacts.
Social, Legal and Technological Discouragement.
Malicious Unwanted Attentions.
Online and Telephone Fraud.
Tackling Spam at the Transport Layer.
Opt-In, Opt-Out, Shake It All About.
Freedom of Speech or Online Stalking.
14. Education and Online Learning.
From the Chalkboard to the Virtual Classroom.
Technology through the Years.
Visual Aids to Learning.
Audio Aids to Learning.
Audio–Visual Aids to Learning.
Developing E-Learning Environments.
ICT and e-Learning in Further Education Colleges in England.
Mobile Education (PDAs and Mobile Devices).
Electronic Application and Admission Systems.
Developing and Embracing e-Learning Resources.
The Learner Perspective.
The Teacher Perspective.
Accessibility of Education in a Wired World.
Cheating the System.
One Person's Plagiarism is Another's Research.
Overseas Education vs Distance Education.
The Net of a Million Lies.
15. Living and Working in a Wired World.
The Digital Lifestyle.
Work, Skills and Roles.
The Mobile Office: the ‘Non-Office’ Office Job.
The New Role of the Office
Smarter Travel. .
The Sporting Life.
Technology and the Individual.
The Changing Face of Communication.
The Global Village.
The Digital Divide.
The Digital Divide in the Industrialized World.
The Digital Divide Between the Nations.
The Language of the Digital Age.
Traditional Western Moral Philosophy.
Locke vs Hobbes.
Hume and Human Passion.
Kant and the Categorical Imperative.
Legality and Morality.
Modern Ethical Theory.
Relativistic vs Universal Utiliarianism.
New Utilitarianism: Singer.
Metaphysical Foundations for Computer Ethics.
Informed Consent Theory in Information Technology.
Ethical Decisions: Using the Back of the Envelope.
Information Ethics: ICT Professional Responsibility in the
The Good Computer Professional Does not Cheat at Cards.
General: The Death Penalty.
ICT: Artificial Sentience Rights and Wrongs.
General: Is Religion an Excuse for Discrimination?
ICT: Search Ethics.
General: Lying to Tell the Truth?
ICT: Gender Presentation Online.
General: Fair Fines.
ICT: Should Internet Access be a Human Right?
General: Prediction of Harm.
ICT: Programmer Responsibility.
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Gadwin Web Snapshot will effectively capture the entire page including all design elements when capturing web pages. It makes an image of the browser’s content ...
Cloud computing promises to help midmarket companies reduce cost and complexity in the IT equation – and gain the flexibility and agility they need to thrive. Yet charting a clear course to the cloud isn’t always easy. In this paper, we aim to clear the clouds. We examine different cloud computing models, discuss the types of requirements that each can best address, and consider what midmarket businesses should look for in a cloud solutions provider.
- FTTest Analyst (MS Environment) .netNSW
- FTTest EngineerVIC
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTechnical Consulting ManagerNSW
- FTTest Analyst (MS Environment) .netNSW
- FTR&D EngineerSA
- FTWeb Developer- Drupal and PHP. Exciting new position- #2 in Dev team.$100k+SuperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
- FT1st Line Support EngineerNSW
- FTQuality ManagerSA
- FTSenior Python Web Applications DeveloperNSW
- Commonwealth Bank leads four Australian brands in the 2013 top 100 Global brands list
- More Australians are using mobiles to connect to social media: report
- Oo.com.au partners with Responsys to overhaul digital customer strategy
- Coles Flybuys wins over Aussie consumers in new customer loyalty schemes report
- Tablet advertising exceeds smartphone spend in March quarter: IAB