User talk:Sjviviana

Table of Contents

An Overview of Ethics Ethics for IT Professionals Computer and Internet Crime Privacy Freedom of Expression Intellectual Property Software Development The Impact of Information Technology on the Quality of Life Social Networking Ethics of IT Organizations

Ethics : According to The American Heritage Dictionary ethics is a principal of right or good conduct or a body of such principals. 2 A system of moral principals or values. 3 The rules or standards governing the conduct of the members of a profession.

Aristotle refers to ethics that the subject matter in ethics is practical choice, character, and action. Ethics is a practical art; it is better not to call it a science. It is more like navigation than astronomy. It aims at wisdom about what to do and how to live. We always act in some particular situation or other, so ethics must pay attention to particulars as well as universals. Therefore, we “must be content with indicating the truth in broad, general outline” and look only “for precision as the nature of the subject allows”

G.W.F. Hegel says the reason must become ethics. Hegel says morality must be found in reason, not desire. Reason, moreover, gives us universal laws telling us what our duties are. And to do one’s duty is to act in a way that is both autonomous and free.

The stage of morality is supplanted by what Hegel calls ethics. Ethics is the next dialectical step in the objectification of spirit. What is required for spirit to become what is – fully rational, self conscious, and free – is for it to be able to recognize itself in its cultural expressions. So the next step, ethics, is the recognition of rationality in institutions – in property, contracts, the family, and the state. Spirit alienated from its products by setting itself apart from them, must reappropriate them, see itself in them, express itself in the social dimension – but now critically, rationally, freely.

For Hegel, ethics is virtually indistinguishable from social and political philosophy. Or rather, it is not philosophy at all, but the realization of philosophy in an actual community. As he says, “the system of right is the realm of freedom made actual, the world of mind brought forth out of itself like a second nature”. For Hegel an individual must be thought of as socially shaped and constructed. The relation between an individual and the community is more like that between a leg and the body it belongs to. If the leg were to say, “I am an independent entity, and I will go my own way”, this would be manifestly absurd. It is no less absurd for individuals to consider themselves distinct from the community that nourishes, educates, shapes and form them. Indeed, an individual per se is an abstraction from the whole. As separate from the community, a person lacks reality. It is the community, which Hegel calls the State, that is the bearer of the objective reality of spirit and as such is “higher” than the individual.

Ethics for IT Professionals : Companies can take several of the following actions when creating an IT usage policy: Establishing Guidelines for Use of Company Software – Company IT managers must provide clear rules that govern the use of home computers and associated software. Some companies negotiate contracts with software manufacturers and provide PCs and software so that IT users can work at home. Other companies help employees buy hardware and software at corporate discount rates. The goal should be to ensure that employees have legal copies of all the software they need to be effective, regardless of whether they work in an office, on the road, or at home.

Defining and Limiting the Appropriate USE of IT Resources – Companies must develop, communicate, and enforce written guidelines that encourage employees to respect corporate IT resource and use them to enhance their job performance. Effective guidelines allow some level of personal use while prohibiting employees from visiting objectionable Internet sites or using company email to send offensive or harassing message.

Structuring Information Systems to Protect Data and Information – Organization must implement systems and procedures that limit data access to just those employees who need it. For example, sales managers may have total access to sales and promotion database through a company network, but their access should be limited to products for which they are responsible. Furthermore, they should be prohibited from accessing data about research and development results, products formulas, and staffing projection if they don’t need it to do their jobs.

Installing and Maintaining a Corporate Firewall – A firewall is hardware or software device that serves as a barrier between an organization’s network and the internet; a firewall also limits access to the company’s network based on the organization’s internet usage policy. The firewall can be configure to serve as an effective deterrent to unauthorized web surfing by blocking access to specific objectionable websites. The fire wall can also serve as an effective barrier to incoming email from certain websites, companies, or users. It can even be programmed to block email with certain kinds of attachment, which reduces the risk of harmful computer viruses.

Computer and Internet Crime : In today’s computing environment of increasing complexity, higher user expectations, expanding and exchanging systems, and increased reliance on software with known vulnerabilities, it is why the number, variety, and impact of security incident are increasing dramatically.

Increasing Complexity Increases Vulnerability – The computing environment has become enormously complex. Networks, computers, operating systems, applications, websites, switches, routers, and gateways are interconnected and driven by hundreds of millions of line codes. This environment continues to increase in complexity every day. The number of possible entry points to a network expands continually as more devices are added, increasing the possibility of security breaches.

Higher Computer User Expectations – Today, time means money, and the faster computer users can solve a problem, the sooner they can be productive. As a result, computer desk are under intense pressure to respond very quickly to user’s questions. Under duress, help desk personnel sometimes forget to verify user’s identities or to check whether they are authorized to perform a requested action. In addition, even though they have been warned against doing so, some computer users share their login ID and password with other coworkers who have forgotten their own passwords. This can enable workers to gain access to information systems and data for which they are not authorized.

Expanding and Changing Systems Introduce New Risks – Business has moved from an era of stand-alone computers, in which critical data was stored on an isolated mainframe computer in a locked room, to an era in which personal computers connect to networks with millions of other computers, all capable of sharing information. Business have moved quickly into ecommerce, mobile computing, collaborative work groups, global business, and interorganizational information systems. Information technology has become ubiquitous and is a necessary tool for organizations to achieve their goals. However, it is increasingly difficult to keep up with the peace of technology change, successfully perform an ongoing assessment of new security risks, and implement approaches for dealing with them.

Increasing Reliance on Commercial Software with Known Vulnerabilities – In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability. Often this attack is due to poor system design or implementation. Once the vulnerability is discovered, software developers quickly create and issue a fix or patch, to eliminate the problem. Any delay in installing the patch exposes the user to a security breach.

There are many types of exploits use is internet crime. These exploits are not limited just to computers but to smart-phones, iPods, and Blackberry. Some types of exploit are:

Viruses – is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Worms - is a harmful program that resides in the active memory of the computer and duplicates itself. Trojan horse – is a program in which malicious code is hidden inside a seemingly harmless program.

Logic Bomb – is another type of Trojan horse which executes when is triggered by a specific event.

Botnet – is a large group of computers controlled from one or more remote locations by hackers, without knowledge or consent of their owners.

Distributed Denial of Service (DDoS) Attacks – is one in which a malicious hacker takes over computers on the internet and causes them to flood a target site with demands for data and other small tasks.

Rootkit - is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators.

Spam – is the abuse of email systems to send unsolicited email to large numbers of people. Spam can also be used to deliver harmful worms or other malware.

Phishing – is the act of using email fraudulently to try to get the recipient to reveal personal data.

 Privacy : According to The American Heritage Dictionary 1. Privacy is the condition of being secluded from others. 2. Secrecy.

The right to privacy was added in the Fourth Amendment when debates on the adoption of the United States Constitution, some of the drafters expressed concern that a powerful government would intrude on the privacy of individual citizens.

After the constitution when into effect in 1789, several amendments were proposed that would spell out the rights of individuals. Ten of these proposed amendments were ultimately ratified and became known as the Bill of Rights. The Supreme Court has stated that American citizens are protected by the Fourth Amendment when there is a reasonable expectation of privacy. Amendment IV : The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violates, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Information Privacy – A broad definition of the right of privacy is “the right to be left alone – the most comprehensive of rights, and the right most valued by free people” Another concept of privacy that is particularly useful in discussing the impact of IT on privacy is the term information privacy is the combination of communication privacy (the ability to communicate with others without those communications being monitored by other persons or organizations) and data privacy ( the ability to limit access to one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use) There are several legislative acts passed over the past of 40 years that affect a person’s privacy. However, most of these actions address invasion of privacy by the government, legislation that protects people from data privacy abuses by corporations is almost nonexistent.

Financial Data Privacy Acts :

Fair Credit Reporting Act (1970) – Regulates the operations of credit-reporting bureaus, including how they collect, store, and use credit information.

Gramm-leach-Bliley Act (1999) – Known as the Financial Service Modernization Glass-Steagall. Glass-Steagall prohibited any one institution from offering investment, commercial banking, and insurance services; individuals companies were only allowed to offer one of those types of financial service products. GLBA enable such entities to merge. GLBA alos included three hey rules that affect personal privacy: Financial Privacy Rule, Safeguards Rules, Pretexting Rule.

Health Privacy Act :

Health Insurance Portability and Accountability Act of 1996 – was designed to improve the portability and continuity of health insurance coverage; to reduce fraud, waste, and abuse in health insurance and healthcare delivery; and to simplify the administration of health insurance.

Children’s Privacy Act :

Children’s Online Privacy Protection Act (1998) – any website that caters to children must offer comprehensive privacy policies, notify parents or guardians about its data—collection practices, and receive parental consent before collecting any personal information from children under 13 years of age. COPPA is meant to give parents control over the collection, use, and disclosure of their children’s personal information; it does not cover the dissemination of information to children.

Electronic Surveillance :

Communication Act of 1934 – established the Federal communication Commission broad and gave it responsibility for regulating all non-federal-government use of radio and television broadcasting and all interstate telecommunication – including wire, satellite, and cable- as well as all international communications that originate or terminate in the United States.

Title III of the Omnibus Crime Control and Safe Streets Act (1968, amended 1986) – Also known as the Wiretap Act, regulates the interception of wire (telephone) and oral communications. It allows states and federal law enforcement officials to use wiretapping an electronic eavesdropping, but only under strict limitations.

Foreign Intelligence surveillance Act (1978) – describes procedures for the electronic surveillance and collection of foreign intelligence information in communications between foreign powers and the agents of foreign powers.

Electronic Communications Privacy Act (1986) – deals with three main issues: 1) the protection of communication while in transfer from sender to receiver. 2) the protection of communication held in electronic storage. 3) the prohibition of devices to record dialing, routing, addressing, and signaling information without a search warrant.

Communications Assistance for Law enforcement Act (1994) – was passed by Congress in 1994 and amend both the Wiretap Act and ECPA. CALEA was a hotly debated law because it required the telecommunication industry to build tools into its products that deferral investigators could use after obtaining a court order to eavesdrop on conversations and intercept electronic communications.

USA Patriot ACT (2001) – was passed just after the terrorist attacks of September 11, 2001. It gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, email, medical, financial, and other records.

Export of Personal Data :

Organizations for economic Co-operation and Development Fair Information Practices (1980) – Another agency concerned with privacy is the OECD, and international organization consisting of 30 member countries, including Australia, Canada, France, Germany, Italy, Japan, Mexico, new Zealand, the United Kingdom, and the United States. Its goal is to set policy and come to agreement on topics for which multilateral consensus is necessary for individual countries to make progress in a global economy.

European Union Data Protection Directive (1998) – requires any company doing business within the borders of 15 western European nations to implement a set of privacy directives on the fair and appropriate use of information. Basically, this directive requires member countries to ensure that data transferred to non-European Union countries is protected.

Access to Government Records :

Freedom of Information Act (FOIA) (1966 amended 1974) – passed in 1996 and amended in 1974, grants citizens the right to access certain information and records of the federal government upon request.

Privacy Act of 1974 – prohibits US governments from concealing the existence of any personal data record keeping system. Under this law, any agency that maintains such a system must publicly describe both the kinds of information in it and the manner in which the information will be used. The CIA and law enforcement agencies are excluded from this act; in addition, it does not cover the actions of private industry.

Freedom of Expression : The First Amendment protects American’s rights to freedom of religion and freedom of expression. This amendment has been interpreted by the Supreme Court as applying to the entire federal government, even though it only expressly refers to Congress.

Amendment I : Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for redress of grievances.

Numerous court decisions have broadened the definition of speech to include nonverbal, visual and symbolic forms of expression, such as flag burning, dance movements, and hand gestures. Sometimes the speech at issue is unpopular or highly offensive to a majority of people; however, the Bill of Rights provides protection for minority views. The Supreme Court has also ruled that the First Amendment protects the right to speak anonymously as part of the guarantee of free speech.

The Supreme Court has held that the following types of speech are not protected by the First Amendment and may be forbidden by the government: perjury, fraud, defamation, obscene speech, incitement of panic, incitement to crime, “fighting words”, and sedition (incitement of discontent or rebellion against a government).

Two of these types of speech – obscene speech and defamation – are particularly relevant to information technology.

Freedom of expression: Key Issues There are clear and convincing arguments to support freedom of speech online, the issue is complicated by the ease with which children can access the Internet. Even some advocates of free speech acknowledge the need to restrict children’s Internet access, but it is difficult to restrict their access without also restricting adult’s access

The US government has passed laws, and software manufacturers have invented special software to block access to objectionable material.

Communication Decency Act (1996) - Its purpose was to allow freer competition among phone, cable, and TV companies. Embedded d in the telecommunications Act was the CDA, aimed at protecting children from pornography.

Child Online Protection Act (1998) – The law states that “whoever knowingly and with knowledge of the character of the material, in interstate or foreign commerce by means of the World Wide Web, makes any communication for commercial purposes that is available to any minor that includes any material that is harmful to minors shall be fined not more than $50,000 imprisoned not more than six months, or both.

Internet Filtering – Is software that can be used to block access to certain Websites that contain material deemed inappropriate or offensive. The best internet filtering uses a combination of URL, keywords, and dynamic content filtering.

Children’s Internet Protection Act (2000) – The act required federally financed schools and libraries to use some form of technological protection to block computer access to obscene material, pornography, and anything else considered harmful to minors.

Intellectual Property : Is a term used to describe works of the mind -such as art, books, films, formulas, inventions, music, and processes- that are distinct, and owned or crested by a single person or group. Intellectual property is protected through copyright, patent, and trade secret laws.

Copyright law protects authored works such as art, books, and music.

Patent law protects invention.

Trade secret laws helps safeguard information that is critical to an organization’s success.

Together, copyright, patent, and trade secret legislation forms a complex body of law that addresses the ownership of intellectual property.

A Copyright – is the exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the work. Copyright protection is granted to the creators of original works of authorship in any tangible medium of expression, now known or later developed from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine device.

A Patent – Is a grant of a property right issued by the United States Patent and Trademark Office to an inventor. A patent permits its owner to exclude the public from making, using, or selling a protected invention, and it allows for legal actions against violators. Unlike copyright, a patent prevents independent creations as well as copying.

Trade Secrets – Trade secret protection begins by identifying all the information that must be protected from undisclosed patent application to market research and business plans, and developing a comprehensive strategy for keeping the information secure. Trade secret laws protects only against the misappropriation of trade secrets.

Key Intellectual Properties Issues – There are several issues with intellectual property such as plagiarism, reverse engineering, open source code, competitive intelligence, and cybersquating.

Plagiarism – Is the act of stealing someone’s ideas or words and passing them off as one’s own.

Reverse Engineering – Is the process of taking something apart in order to understand it, build a copy of it, or improve it.

Open Source Code – Is any program whose source code is made available for use or modification, as users or other developers see fit. The basic premise behind open source code is that when many programmers can read, redistribute, and modify a program’s code, the software improves. Programs with open source code can be adaptable to meet new needs, and bugs can be rapidly identify and fixed. Competitive Intelligence – Is legally obtained information that is gathered to help a company gain an advantage over its rivals.

Cybersquatting – Registered domain names for famous trademarks or company names to which they had no connection, with the people that the trademark’s owner would eventually buy the domain name for a large sum of money.

Software Development : High quality software systems are easy to learn and use because they perform quickly and efficiently; they meet their user’s needs; and they operate safely and reliably so that systems downtime is kept to a minimum. Such software has long been required to support the fields of air traffic control, nuclear power, automobile safety, health care, military and defense, and space exploration. Now that computers and software have become integral parts of almost every business, the demand for high quality software is increasing. End user cannot afford system crashes, lost work, or lower productivity, nor can they tolerate security holes through which intruders can spread viruses, steal data, or shut down Websites.

Software manufacturers face economic, ethical, and organizations challenges associated with improving the quality of their software.

Software Quality – is the degree to which a software product meets the needs of its users.

Quality management - focuses on defining, measuring, and refining the quality of the development process and the products developed during its various stages. These products including statements of requirements, flowcharts, and user documentation, are known as deliverables.

Software Development Process – Developing information system software is not simple process; it requires completing many complex activities, with many dependencies among the various activities. System analyst, programmers, architects, database specialists, trainers, and testers are all involved in large software projects. Each of these groups has a role to play, and has specific responsibilities and tasks. In addition, each group makes decisions that can affect the software’s quality and the ability of an organization or an individual to use it effectively. Software development methodology - is a standard, proven work process that enables systems analysts, programmers, projects managers, and others to make controlled and orderly progress in developing high-quality software. A methodology defines activities in the software development process, and the individual and group responsibilities for accomplishing these activities. It also recommends specific techniques for accomplishing the various activities, such as using a flowchart to document the logic of a computer program. A methodology offers guidelines for managing the quality of software during the various stages of development.

Quality assurance (QA) - refers to methods within the development cycle design to guarantee reliable operation of the product. Ideally, these methods are applied at each stage of the development cycle.

Several types of tests are used in software development.

Dynamic Software Testing – Software is developed in units called subroutines or programs. These units, in turn, are combined to form large systems. One approach to QA is to test the code for a completed unit of software by actually entering test data and comparing the results to the expected results. This is called Dynamic testing. There are two forms of dynamic testing:


 * Black-box testing – involves viewing the software unit as a device that has expected input and output behaviors but whose internal working are unknown (a black box)


 * White-box testing – treats the software unit as a device that has expected input and output behaviors but whose internal workings, unlike the unit in black-box testing, are known.

Others types of Software Testing
 * Static testing – Special software programs called static analyzers are run against the new code. Rather than reviewing input and output, the static analyzer looks for suspicious patterns in programs that might indicate a defect.


 * Integration testing – After successful unit testing, the software units are combined into an integrated subsystem that undergoes rigorous testing to ensure that the linkage among the various subsystems work successfully.


 * User acceptance testing – Independent testing performed by trained end users to ensure that the system operates as they expect.

 The Impact of Information Technology on the Quality of Life : Industrialized nations tend to have a higher standard of living than developing countries. In the United States and in most developed countries, the standard of living has been improving over time. However, its rate varies as a result of business cycles that affect prices, wages, employment levels, and the production of goods and services.

IT Investment and Productivity

Productivity – is defined as the amount of output produced per unit of input, and it is measured in many different ways. Innovation is a key factor in productivity improvement, and IT has played an important role in enabling innovation. Progressive management teams use IT, as well as other new technology and capital investment, to implement innovations in products, processes, and services.

Telework – also known as telecommuting, is a work from home arrangement in which an employee works away from the office, - at home, at a client’s office, in a hotel- literally, anywhere.

The Digital Divide – is another indicator of the standard of living is the availability of technology. The digital divide is a term used to describe the gulf between those who do and those who don’t have access to modern information and communications technology such as cell phones, personal computers, and the internet.

E-Rate Program – was created through the Telecommunications Act 1996. One of E-Rate’s goal is to help schools and libraries obtain access to state of the art services and technologies at discount rates.

Ed-tech Program – The goal of No Child left Behind Act which was signed into law in 2002, is to end the achievement gap between rich and poor students and between white and minority students, while improving the academic performance of all students. Recognizing that the ability to use computers and access the Internet is a requirement for succeeding in the US educational system and the global workforce, NCLB requires each state to have an Enhancing Education Through Technology program.

Social Networking : A social networking website is a site whose purpose is to create an online community of internet users that enables members to break down barriers created by time, distance, and cultural differences.

Social networking Websites allow people to interact with others online by sharing opinions, insights, information, interest, and experiences. Members of an online social network may use the site to interact with friends, family members, and colleagues, but they may also wish to develop new personal and professional relationships.

Social Networking Advertising – involves the use of social networks to inform, promote, and communicate the benefits of products and services.

Vital Marketing – encourages individuals to pass along a marketing message to others, thus creating the potential for exponential growth in the message’s exposure and influence as one person tells two people, each of those two people tell two or three more people and so on.

The Use of Social Networks in the Hiring Process – Employers can and do look at the social networking profiles of job candidates when making hiring decision. According to a recent survey by CareerBuilder.com, 22 percent of hiring managers use social networking Websites as a source of information about candidates, and additional 9 percent are planning to do so.

Social Shopping Websites – brings shoppers and sellers together in a social networking environment online. Thus, these sites combine two highly popular online activities –shopping and social networking.

Social Networking Ethical Issues – Some of the common ethical issues that arise for members of social networking websites are cyberbullying, cyberstalking, encounters with sexual predators, and uploading of inappropriate material.

Cyberbullying – is the harassment, torment, humiliation, or threatening of one minor by another minor or group of minors via the internet or cell phone.

Cyberstalking – is threatening behavior or unwanted advances directed at an adult using the internet or other forms of online and electronic communications; it is the adult version of cyberbulling. Online stalking can be a serious problem for victims, terrifying them and causing mental anguish.

Encounter with Sexual Predators – Some social networking webites have been critized for not doing enough to protect minors from encounters with sexual predators. Almost one hundred thousand convicted sex offenders mixing with children on MySpace…is absolutely appalling and totally unacceptable, stated Attorney General Richard Blumenthal of Connecticut, who is pishing networking websites to adopt stronger safety measures.

Ethics of IT Organizations : Facing a likely long-term shortage of trained and experienced workers, employers are increasingly turning to nontraditional sources to find IT workers with skills that meet their needs; these sources include contingent workers, H-1B workers, and outsourced offshore workers. Employers face ethical decisions about whether to recruit new and more skilled workers from these sources or to develop their own staff to meet the needs of their business.

Contingent work – is a job situation in which an individual does not have an explicit or implicit contract for long term employment. The contingent workforce includes independent contractors, temporary workers hired through employment agencies, on-call or day labors, and on-site workers whose services are provided by contract firms.

A firm is likely to use contingent IT workers if it experiences pronounced fluctuations in its technical staffing needs. Workers are often hired on a contingent basis as consultants on an organizational restructuring project, as technical experts on a product development team, and as supplemental staff for many other short-term projects.

H-1B Workers – is a temporary work visa granted by the US Citizen and Immigration Services for people who work in specialty occupations. Many companies turn to H-1B workers to meet critical business needs or to obtain essential technical skills and knowledge that cannot be readily found in the United States.

Outsourcing – is a long term business arrangement in which a company contracts for services with an outside organization that has expertise in providing a specific function. Coemployment legal problems with outsourcing are minimal, because the company that contracts for the services does not generally supervise or control the contractor’s employees. The primary rationale for outsourcing is lower cost, but companies also use it to obtain strategic flexibility and to keep their staff focused on the company’s core competencies.

Offshore Outsourcing – is a form of outsourcing in which the services are provided by and organization whose employees are in a foreign country. Any work done at a relatively high cost in the United States may become a candidate for offshore outsourcing.

Whistle-Blowing – Like the subject of contingent workers, whistle- blowing is a significant topic in any discussion of ethics in IT. Both issues raise ethical questions and have social and economic implication.

Whistle-blowing – is an effort to attract public attention to a negligent, illegal, unethical, abusive, or dangerous act by a company or some other organization. It is an important ethical issue for individuals and organizations. How does one safely and effectively report misconduct, and how should managers handle a whistle-blowing incident?

Protection for Whistle-Blowers – Whistle-blower protection laws allow employees to alert the proper authorities to employer action that are unethical, illegal, or unsafe, or that violate specific policies. Unfortunately, no comprehensive federal law protects all whistle-blowers from retaliators acts. Instead, numerous laws protect a certain class of specific whistle-blowing acts in various industries.

Green Computing – many computer manufacturers today are talking about building a “green PC” by which they usually mean one that uses less electricity to run than the standard computer; thus, its carbon footprint on the planet is smaller. However, to manufacturer a truly green PC, hardware companies must also reduce the amount of hazardous materials used and dramatically increase the amount of reusable or recyclable materials used. The manufacturers must also help consumers dispose of their product in an environmentally safe manner at the end of their useful life.

References : The American Heritage Dictionary, The Great Conversation Volume I and II, Ethics in Information Technology Third Edition,