Cybersecurity and Hacking Ethics

Author(s): Anne Foerst

Edition: 1

Copyright: 2022

Pages: 135

Choose Your Format

Choose Your Platform | Help Me Choose

Ebook

$87.10

ISBN 9798765727911

Details Electronic Delivery EBOOK 180 days

This book is mainly written for undergraduate students but might be of interest for any layperson interested in cybersecurity and its ethical ramifications. Throughout the book there are questions that are supposed to be discussed in small discussion groups; the results of the discussions are then shared with the whole class.

This book is to be used in conjunction with the New York Times (NYT) which offers free electronic subscriptions for college students. For most chapters, NYT articles will be used as supplements. They will provide examples of the topics discussed, and can be replaced by instructors with other articles which are more up-to-date. This way, students will see that the various topics in this book are not abstract reflections but present the actual risks of cybersecurity. 

For each chapter, homework is given which consists of students having to answer the questions interspersed throughout the various chapters that have already been discussed in class. In addition, they have to utilize the NYT to find examples for what was discussed in the respective chapter.

About the Author  

Introduction  

CHAPTER 1: Ancient Ethical Codes  

CHAPTER 2: A Brief Survey of Hacker Tricks  

CHAPTER 3: Hacker Culture  

CHAPTER 4: Privacy  

CHAPTER 5: The Internet of Things (IoT)  

CHAPTER 6: Information Theft  

CHAPTER 7: Truth and Falsehoods Online  

CHAPTER 8: Identity Theft and Identity Fraud  

CHAPTER 9: Ethical Project Management for Nerds

Anne Foerst

Anne Foerst has a PhD in Social Ethics and is Professor for Computer Science at St. Bonaventure University. 

This book is mainly written for undergraduate students but might be of interest for any layperson interested in cybersecurity and its ethical ramifications. Throughout the book there are questions that are supposed to be discussed in small discussion groups; the results of the discussions are then shared with the whole class.

This book is to be used in conjunction with the New York Times (NYT) which offers free electronic subscriptions for college students. For most chapters, NYT articles will be used as supplements. They will provide examples of the topics discussed, and can be replaced by instructors with other articles which are more up-to-date. This way, students will see that the various topics in this book are not abstract reflections but present the actual risks of cybersecurity. 

For each chapter, homework is given which consists of students having to answer the questions interspersed throughout the various chapters that have already been discussed in class. In addition, they have to utilize the NYT to find examples for what was discussed in the respective chapter.

About the Author  

Introduction  

CHAPTER 1: Ancient Ethical Codes  

CHAPTER 2: A Brief Survey of Hacker Tricks  

CHAPTER 3: Hacker Culture  

CHAPTER 4: Privacy  

CHAPTER 5: The Internet of Things (IoT)  

CHAPTER 6: Information Theft  

CHAPTER 7: Truth and Falsehoods Online  

CHAPTER 8: Identity Theft and Identity Fraud  

CHAPTER 9: Ethical Project Management for Nerds

Anne Foerst

Anne Foerst has a PhD in Social Ethics and is Professor for Computer Science at St. Bonaventure University.