Cybersecurity ethics : (Record no. 2884)

MARC details
000 -LEADER
fixed length control field 02982cam a22003978i 4500
001 - CONTROL NUMBER
control field 22741499
003 - CONTROL NUMBER IDENTIFIER
control field KWUST
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250312111352.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220808s2023 enk b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2022036730
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032164991
Qualifying information (hbk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032164977
Qualifying information (pbk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781003248828
Qualifying information (ebk)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.878
Item number .M36 2023
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23/eng/20221017
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Manjikian, Mary,
Relator term author.
Fuller form of name Manjikian, Mary
245 10 - TITLE STATEMENT
Title Cybersecurity ethics :
Remainder of title an introduction
Statement of responsibility, etc. Mary Manjikian.
250 ## - EDITION STATEMENT
Edition statement Second edition.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2303
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Abingdon, Oxon ;
-- New York, NY :
Name of producer, publisher, distributor, manufacturer Routeldge,
Date of production, publication, distribution, manufacture, or copyright notice 2023.
300 ## - PHYSICAL DESCRIPTION
Extent pages cm
Dimensions 25cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "This textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI and big data. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, big data and cyberwarfare. The overall aims of the book are to: - provide ethical frameworks to aid decision making; - present the key ethical issues in relation to computer security; - highlight the connection between values and beliefs and the professional code of ethics. The textbook also includes three different features to aid students: 'Going Deeper' features provide background on individuals, events, and institutions in cybersecurity; 'Critical Issues' features contemporary case studies; and 'Tech Talks', which contain features that assume some familiarity with technological developments. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Moral and ethical aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Moral and ethical aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Online version:
Main entry heading Manjikian, Mary.
Title Cybersecurity ethics
Edition Second edition
Place, publisher, and date of publication Abingdon, Oxon ; New York, NY : Routeldge, 2023
International Standard Book Number 9781003248828
Record control number (DLC) 2022036731
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Reference
Edition 2e
Classification part TK 5105.876
Item part .M36 2023
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     KWUST-Main Library KWUST-Main Library General Stacks 03/12/2025 Purchase 592/02-25   TK5105.878 .M36 2023 2025-0402 03/12/2025 C1 03/12/2025 Books
    Library of Congress Classification     KWUST-Main Library KWUST-Main Library General Stacks 03/12/2025 Purchase 591/02-25   TK5105.878 .M36 2023 2025-0403 03/12/2025 C1 03/12/2025 Books
Copyright: KWUST 2023
Kiriri Women's University of Science and Technology - Empowering Women Through Education
P.O. BOX 49274 – 00100 Nairobi, Kenya
Registrar and Admissions +254 (0) 789626819
Email info@kwust.ac.ke