Description |
xii, 187 pages : illustrations ; 22 cm |
Bibliography |
Includes bibliographical references and index. |
Contents |
Absent presence -- Advertising at school -- -- Amber alert -- Americans with disabilities act (ADA) and its impact -- Upon technology in schools -- -- Blogging : a tool for education and for free speech -- Bobby compatible -- Bride scams -- Camcorders, surveillance, and video voyeurism -- Cell phone rage -- Cell phones and driving -- Cell yell -- Censorship and filtering -- Cheating at school using cell phones cameras -- Child Online Protection Act and Children's Online Privacy Protection Act -- The Child Pornography Prevention Act -- Children's Internet Protection Act -- Computer addiction -- Computer security -- Crackers, lamers, and phreaks -- Creating an identity in a chat room -- Cyberbullying -- Cyberchondriacs -- Disinformation -- Disinhibition -- Distance learning content sharing -- Distributed computing -- Doctor-patient relationships -- Domain hijacking -- DRM -- eBay and online auction fraud -- Elder care and technology -- E-mail addresses and privacy -- Encryption -- E-waste -- File swapping -- Firewall -- Flame wars -- Flash mobs -- Google bombing -- Google book search -- Google stalking -- GPS and privacy -- Hackers, crackers, and hacking -- Hacktivism -- Hoaxes -- Identity theft and the Internet -- Internet pornography -- Internet user agreement and the library -- Keystroke logging -- Logging on as an administrator -- Logo abuse -- Marketing to children -- Media and cognitive development -- Modern day luddites -- Monitoring employees Internet use -- Movie duplication -- Multimedia manipulation -- Napster -- Network ubiquity -- $100 MIT laptop -- Online gambling -- Online protests -- Online pyramid schemes -- The Patriot Act -- Phishing -- Phreaking -- Plagiarism -- Podcasting -- Privacy and the Internet -- Project Gutenberg -- RFID -- Scare chains -- Script kiddies -- Slander, libel, and technology -- Social engineering -- Spam -- Splogs -- Spoofing -- Spyware or adware -- Steganography -- Surfer's voice -- Sympathy hoaxes -- Technology and knowledge management -- Technolust -- Trojan horses -- Turnitin.com -- Typosquatting -- Virtual offices -- Viruses and virus protection -- Warchalking -- Watching over children with high-tech tools -- WebXACT -- Wiki -- Wireless computers and security -- Worm. |
Subject |
Computers -- Moral and ethical aspects.
|
|
Computers -- Moral and ethical aspects. |
|
Internet -- Moral and ethical aspects.
|
|
Internet -- Moral and ethical aspects. |
|
Computers -- Social aspects.
|
|
Computers -- Social aspects. |
|
Internet -- Social aspects.
|
|
Internet -- Social aspects. |
|
Technology -- Moral and ethical aspects.
|
|
Technology -- Moral and ethical aspects. |
Added Author |
Ezell, Bobby.
|
|
Van Roekel, James L.
|
ISBN |
0789029537 case alkaline paper |
|
9780789029539 case alkaline paper |
|
0789029545 soft alkaline paper |
|
9780789029546 soft alkaline paper |
|