Ethics for the Information Age, Global Edition (6e) : 9781292061238

Ethics for the Information Age, Global Edition (6e)

Published by
Pearson Higher Ed USA
Available on demand
Title type
Title type

In an era where information technology changes constantly, a thoughtful response to these rapid changes requires a basic understanding of IT history, an awareness of current issues, and a familiarity with ethics.

Ethics for the Information Age is unique in its balanced coverage of ethical theories used to analyse problems encountered by computer professionals in today’s environment. By presenting provocative issues such as social networking, government surveillance, and intellectual property from all points of view, this market-leading text challenges students to think critically and draw their own conclusions, which ultimately prepares them to become responsible, ethical users of future technologies.


Table of contents
  • 1 Catalysts for Change
  • 2 Introduction to Ethics
  • 3 Networked Communications
  • 4 Intellectual Property
  • 5 Information Privacy
  • 6 Privacy and the Government
  • 7 Computer and Network Security
  • 8 Computer Reliability
  • 9 Professional Ethics
  • 10 Work and Wealth
  • Appendix A: Plagiarism
  • Index

New to this edition

The sixth edition references many important recent developments; among them are:

  • Edward Snowden's revelations of longstanding National Security Agency access to telephone metadata, email messages, and live communications;
  • the privacy implications of Twitter, Foursquare, Instagram and other apps gathering information from address books stored on smartphones;
  • the controversy surrounding Microsoft's proposal for digital rights management on the Xbox One;
  • the activities of the “hacktivist" group Anonymous;
  • benefits and harms of tracking the movement of people through their smartphones;
  • the debate over the use of drones by police departments;
  • retailers using information collected from online sales to differentiate between customers and offer different prices to different people;
  • retailers using targeted direct marketing to win new customers;
  • the use of “crowdsourcing" by companies to improve products and services;
  • coverage of how cell phones are changing lives in developing countries;
  • predictive policing based on data mining;
  • massive open online courses (MOOCs) and implications for students from different socio-economic groups; and
  • the “Internet of things"–Internet-connected devices that can be controlled remotely.

Features & benefits

Encourage Critical Thinking

  • A balanced, impartial approach to ethical issues avoids biased arguments, encouraging students to consider and analyze issues for themselves.
  • Ethical theories are introduced early–The text surveys nine popular ethical theories in Chapter 2, and helps students understand why Kantianism, act utilitarianism, rule utilitarianism, social contract theory, and virtue ethics are the most useful bases for constructing persuasive moral arguments. In the remainder of the text, these theories are used to evaluate moral problems related to information technology.
    • NEW! The most significant change in the sixth edition is the new emphasis on virtue ethics. A completely new section on virtue ethics appears in Chapter 2, replacing the description of virtue ethics that formerly appeared in the chapter on professional ethics. In addition, analyses from the perspective of virtue ethics are included in the case studies appearing in Chapters 3, 5, and 7.
  • The provocative questions raised at the end of every chapter, together with dozens of in-class exercises, provide many opportunities for students to express their viewpoints.
  • End-of-chapter interviews with leaders from industry and academia provide important new insights and perspectives into ethical topics.
    • NEW! To increase the relevance and value of the “Further Reading and Viewing" sections, the references to scholarly tomes are replaced with lists of recent magazine and newspaper articles, television interviews, documentaries, and other videos available on the Internet. Most of the videos are only a few minutes long and could fuel interesting classroom discussions.
  • NEW! A table in Chapter 7 provides students with practical tips about how to choose good passwords.