책 이미지

책 정보
· 분류 : 외국도서 > 컴퓨터 > 정보통신기술(IT)
· ISBN : 9781475754292
· 쪽수 : 336쪽
· 출판일 : 2013-03-05
목차
Acknowledgements. Preface. 1. Quality of Life and Quality of Working Life No. 1. Critical Professional Discourses About Information and Communications Technologies and Social Life in the U.S.; R. Kling. Does the Internet Promote Democracy? C.C. Gotlieb. 2. Quality of Life and Quality of Working Life No. 2. Theoretical Perspective on the Interplay Between ICT and Quality of Life; G. Bradley. Using Technology to Help the Citizen Enrollment; M.C. Pessoa, et al. Information and Communication Technology and the Home Environment; A. Sloane. 3. History of Computing. Some Great Myths of the History of Computing; J.A.N Lee. Roots of Computing in Austria - Contributions of the IBM Vienna Laboratory and Changes of Paradigms and Priorities in Information Technology; K. Walk. 4. Ethics and Social Accountability in the Information Society No. 1. Self-regulation: Content, Legitimacy and Efficiency - Governance and Ethics; J. Berleur, et al. Trust, Corruption, and Surveillance in the Electronic Workplace; J. Wecker. Ethics and Learning - From State Regulation towards Reflexive Self-Regulation of the Information Society; T. Dedeurwaerdere. 5. Ethics and Social Accountability in the Information Society No. 2. Computer Augmented Research and Scientific Misconduct; W. Coy. The Security Aspect of Information Society as a Global Biocultural System; L.Z. Karvalics. Choice and Responsibility: The Delegation of Decision Making to Intelligent Software Agents; C. Dowling, P. Nicholson. 6. Responsibility of IT Professionals. Responsibility and the Work of IT-Professionals: From Academia to Practice; P. Bittner, E. Hornecker. 7. Legitimacy, Legality and Power in the Information Society: September 11 Fallout: Social Implications of Terrorist Attacks. Is the Enemy Us? &endash; New Threats to Privacy, Freedom of Information and Civil Liberties in the Age of Terrorism; R.S. Rosenberg. National Identification Schemes (Nids): A Remedy Against Terrorist Attack? A. Clement, et al. A Classification of Biometric Applications Wanted by Politics: Passports, Person Tracking and Fight Against Terror; A. Broemme. 8. Panel Discussion. Preventing Privacy Attacks and CyberCrime in the Mobile Internet? S. Fischer-Huebner, et al. 9.Roles of Developing Countries in the Information Society. Towards a Framework for Sustainable Knowledge Management in Organisations in Developing Countries; A. Okunoye. Adapting Global Practices Locally: A Perspective on IT Implementation in a Developing Country Context; A. Bada, et al. Technology and Learning Societies in the New Millennium (Indian Context): Content, Practice and Management; M.P. Thapliyal, K. Subramanian. 10. Education and Social Impact. Quality of Working Life, Knowledge-Intensive Work Processes and Creative Learning Organisations: Information Processing. Paradigm versus Self-Organisation Theory; K. Fuchs-Kittowski, F. Fuchs-Kittowski. Understanding the Process of Information systems and ICT Curriculum development. Three Models; A. Tatnall, B. Davey. Cultural Differences of Female Enrollment in Tertiary Education in Computer Science; B. Schinzel. 11. New Horizons of the Information Society. A Radical Scandinavian ('Øresundsk') Approach to Inquiring Organizations &endash; A Critique of ICT in Knowledge Management; M.S. Lundin, L.B. Rasmussen. Sustainable Development and the Information Society; L. Hilty. 12.