MAMA on the Web: Ethical Considerations for Our Networked World

MAMA on the Web: Ethical Considerations for Our Networked World

Barbara A. Schuldt (Southeastern Louisiana University, USA)
Copyright: © 2004 |Pages: 22
DOI: 10.4018/978-1-59140-286-7.ch001
OnDemand PDF Download:
$37.50

Abstract

This chapter introduces ethical considerations that are especially relevant for the current networked world. It discusses the use of a mnemonic, MAMA — multicultural, adaptive, multifaceted, and archival — as a way to categorize ethical issues as we discover and discuss them today and in the future. By using these categories, the reader can evaluate how the Internet and, more specifically, the World Wide Web (Web) create new ethical concerns as information technology innovation and users drive new Web-based applications and discoveries. In addition, this chapter will pose key ethical questions that will help stimulate the reader to think about Web ethics. In thinking about these questions the reader will explore and hopefully discover his or her own past learned user behaviors and their potential for adverse ethical consequences to the individual and to society. It is through thinking and discussing the ethical consequences of Web-based applications that society will become aware of our own ethical norms and assess how we would respond before we electronically encounter ethical dilemmas.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Marian Quigley
Chapter 1
Barbara A. Schuldt
This chapter introduces ethical considerations that are especially relevant for the current networked world. It discusses the use of a mnemonic... Sample PDF
MAMA on the Web: Ethical Considerations for Our Networked World
$37.50
Chapter 2
Helen Partridge
This chapter will explore the human dimension of the digital divide. It argues that existing digital divide research takes primarily a... Sample PDF
Establishing the Human Dimension of the Digital Divide
$37.50
Chapter 3
Rasool Azari, James Pick
This chapter examines the influence of socio-economic factors on the employment, payroll, and number of enterprises of three technology sectors for... Sample PDF
Socio-economic Influence on Information Technology: The Case of California
$37.50
Chapter 4
Jack S. Cook, Laura Cook
Web accessibility is really not a technological issue but rather a cultural problem. A Web site is said to be Web accessible if anyone, regardless... Sample PDF
The Ethics of Web Design: Ensuring Access for Everyone
$37.50
Chapter 5
Alfreda Dudley-Sponaugle, Jonathan Lazar
When designing information systems, it is important to consider the needs of users with disabilities, including those with visual impairment... Sample PDF
Web Accessibility for Users with Disabilities: A Multi-faceted Ethical Analysis
$37.50
Chapter 6
Trisha Woolley, Craig Fisher
When designing information systems, it is important to consider the needs of users with disabilities, including those with visual impairment... Sample PDF
Internet Voting: Beyond Technology
$37.50
Chapter 7
Geoffrey A. Sandy
The Internet provides access to speech both conventional and unconventional. Some speech is considered harmful to minors. This chapter discusses the... Sample PDF
Protection of Minors from Harmful Internet Content
$37.50
Chapter 8
Marian Quigley
The rapid appropriation of mobile phone technology by young people is occurring at the same time as critics are debating the so-called demise of... Sample PDF
Mobile Communities and the "Generation that Beeps and Hums"
$37.50
Chapter 9
Laura Lally
In the post-9/11 environment, there has been an increasing awareness of the need for information security. This chapter presents an analysis of the... Sample PDF
Insights from Y2K and 9/11 for Enhancing IT Security
$37.50
Chapter 10
Leslie Leong, Andrzej T. Jarmoszko
The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks... Sample PDF
Cryptography: Deciphering Its Progress
$37.50
Chapter 11
Malcolm R. Pattinson
This chapter introduces a method of assessing the state of an organization’s information system security by evaluating the effectiveness of the... Sample PDF
A Method of Assessing Information System Security Controls
$37.50
Chapter 12
Neil F. Doherty, Heather Fulford
While the importance of the information security policy (ISP) is widely acknowledged in the academic literature, there has, to date, been little... Sample PDF
Information Security Policies in Large Organizations: The Development of a Conceptual Framework to Explore Their Impact
$37.50
Chapter 13
James E. Goldman, Vaughn R. Christie
This chapter introduces the Metrics Based Security Assessment (MBSA) as a means of measuring an organization’s information security maturity. It... Sample PDF
Metrics Based Security Assessment
$37.50
Chapter 14
Margherita Pagani
This chapter sets out to analyze the impact generated by the adoption of Digital Rights Management (DRM) processes on the typical Digital Media... Sample PDF
The Critical Role of Digital Rights Management Process
$37.50
About the Authors