Ethics in Information Technology

  • AUTHOR: George Reynolds
  • ISBN-13: 9781111534127 
  • Grade(s): 9 | 10 | 11 | 12
  • 480 Pages  Paperback 
  • 4th Edition  |  Previous Editions: 2010, 2007, 2003
  • ©2012     Published
  • Prices are valid only in the respective region


About The Product

Give your students a strong understanding of the legal, ethical, and societal implications of information technology with Reynolds' ETHICS IN INFORMATION TECHNOLOGY, 4E. The latest edition of this dynamic text provides the most up-to-date, thorough coverage of newsworthy technology developments and their impact on business today. Students examine issues surrounding professional codes of ethics, file sharing, and infringement of intellectual property, security risk assessment, Internet crime, identity theft, employee surveillance, privacy, compliance, social networking, and the ethics of IT corporations. This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals. Unlike typical introductory Information Systems books that provide only one chapter for ethics and IT and cannot cover the full scope of IT-related ethical issues, ETHICS IN INFORMATION TECHNOLOGY, 4E provides thorough coverage focused on preparing the individuals who are primarily responsible for addressing ethical issues in today's workplace. Future business managers and IT professionals learn how to examine the various ethical situations that typically arise in IT and gain experience from the book's practical advice for addressing the issues. Up-to-the-minute business vignettes and thought-provoking questions challenge students' knowledge; while features focused on decision making, such as this edition's updated Manager's Checklists, provide brief, critical points to consider in making key business decisions. Trust ETHICS IN INFORMATION TECHNOLOGY, 4E to equip your business decision makers with the understanding of ethics and IT needed for ongoing business success.


  • UNIQUE APPROACH MAKES THIS ONE OF THE FEW TECHNOLOGY-SPECIFIC ETHICS BOOKS AVAILABLE. This book has wide application in today's information technology where ethics are becoming more and more important. The author's unique focus helps your students better understand the legal, ethical, and societal implications of information technology today.
  • PRACTICAL BUSINESS INFORMATION FOR BUSINESS MANAGERS AND IT PROFESSIONALS EXAMINES ETHICAL SITUATIONS IN DEPTH. Instead of devoting a mere one chapter to ethics and IT like other books, this edition addresses a full scope of ethical issues related to IT. Information is directed specifically to the needs of the people who are primarily responsible for addressing ethical issues in the workplace; business managers and IT professionals. The author addresses different ethical situations that typically arise in IT and offers practical advice for addressing these issues.
  • EXCELLENT FOUNDATION EQUIPS STUDENTS FOR FUTURE DECISION MAKING. This book and the proven features it offers, such as Manager's Checklist, provide an exceptional, solid foundation for current and future business managers and IT professionals who are responsible for ethical decision-making.

About the Contributor

  • George Reynolds

    Professor George Reynolds brings a wealth of business, teaching, and writing experience to this book. His successful business career spans four decades of working in government, institutional, and business IS organizations. Professor Reynolds combines this business and industry experience with exceptional teaching skills to deliver a text that is both practical and focused on the needs of today's student. Professor Reynolds has taught IS at the University of Cincinnati, Xavier University (Ohio), Miami University (Ohio), the College of Mount St. Joseph, and Strayer University. He has held positions at the Manned Spacecraft Center in Houston, Texas; the Jet Propulsion Lab in Pasadena, California; and Procter & Gamble and Atos IT Services in Cincinnati, Ohio. Professor Reynolds has authored more than two dozen popular textbooks addressing various aspects of today’s information technology and business.

Table of Contents

1 An Overview of Ethics.
2 Ethics for IT Workers and IT Users.
3 Computer and Internet Crime.
4 Privacy.
5 Freedom of Expression.
6 Intellectual Property.
7 Software Development.
8 The Impact of Information Technology on Productivity
and Quality of Life.
9 Social Networking.
10 Ethics of IT Organizations 387.
Appendix A A Brief Introduction to Morality.
Appendix B Software Engineering Code of Ethics and Professional
Appendix C Association of Information Technology Professionals.
(Aitp) Code of Ethics and Standard of Conduct.
Appendix D Sysadm, Audit, Network, Security (Sans) IT Code of Ethics.
Appendix E Answers to Self-Assessment Questions.

New to this Edition

  • NEW, UP-TO-THE-MINUTE BUSINESS VIGNETTES AND THOUGHT-PROVOKING QUESTIONS BRING CONCEPTS TO LIFE. Engage your students while providing memorable, practical applications of the ethical concepts they are learning within this edition's new, contemporary business vignettes. New thought-provoking questions at the end of each chapter opener further highlight chapter topics.
  • ADDITIONAL, REVISED END-OF-CHAPTER EXERCISES PROVIDE VALUABLE PRACTICE. This edition offers an even greater variety and quantity of end-of-chapter exercises that encourage critical practice of chapter concepts. Students practice principles they've learned with this edition's revised Self-Assessment Questions, Discussion Questions, and What Would You Do scenarios. Updated Cases based on real business scenarios offer accompanying questions to check understanding.
  • UPDATED MANAGER'S CHECKLISTS EMPHASIZE KEY CONSIDERATIONS FOR MAKING STRONG BUSINESS DECISIONS. These useful Manager's Checklists offer your students brief, helpful reminders of practical key questions to ask and critical points to consider when determining key business decisions.
  • LATEST COVERAGE ADDRESSES EMERGING ETHICAL AND IT ISSUES. This edition provides increased coverage of computer crime and cyber terrorism. Students learn the security risks of cloud computing as well as smishing and vishing. Students see how computers can fight crime and study the use of geographic information systems, trustworthy computing, information technology risk assessment, the pros and cons of protecting government data and documents, the role of the Department of Homeland Security in securing cyberspace, computer forensics, 21 CFR risk assessment, and green IT.