logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Cybersecurity Ethics An Introduction Mary Manjikian

  • SKU: BELL-10590308
Cybersecurity Ethics An Introduction Mary Manjikian
$ 31.00 $ 45.00 (-31%)

4.1

60 reviews

Cybersecurity Ethics An Introduction Mary Manjikian instant download after payment.

Publisher: Routledge/Taylor & Francis
File Extension: PDF
File size: 3.95 MB
Pages: 328
Author: Mary Manjikian
ISBN: 9781138717497, 9781138717527, 9781351766555, 1138717495, 1138717525, 1351766554
Language: English
Year: 2017

Product desciption

Cybersecurity Ethics An Introduction Mary Manjikian by Mary Manjikian 9781138717497, 9781138717527, 9781351766555, 1138717495, 1138717525, 1351766554 instant download after payment.

This new textbook offers an accessible introduction to the topic of cybersecurity ethics. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks – virtue ethics, utilitarian ethics and communitarian ethics – and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, intellectual property and piracy, surveillance, and cyberethics in relation to military affairs. The third part concludes by exploring current codes of ethics used in cybersecurity. The overall aims of the book are to: provide ethical frameworks to aid decision making; present the key ethical issues in relation to computer security; highlight the connection between values and beliefs and the professional code of ethics. The textbook also includes three different features to aid students: ‘Going Deeper’ provides background information on key individuals and concepts; ‘Critical Issues’ features contemporary case studies; and ‘Applications’ examine specific technologies or practices which raise ethical issues. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science.

Related Products