Human Choice and Computers: Issues of Choice and Quality of Life in the Information SocietyKlaus Brunnstein, Jacques Berleur The developments of Information and Communication Technologies (ICT) are not always continuous but may be influenced and shaped by unforeseen events and are therefore difficult to predict and control. This applies especially to the impacts of September 11 (2001) events on how ICT is used in economic and public applications. But even under pressures of terrorist actions, it is essential that Human Choice dominate how Information and Communication Technologies are shaped, applied and used. Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society presents different views about how terrorist actions are influencing political and social discussions and decisions, and it covers questions related to legitimacy and power in the Information Society. Ethical principles are important guidelines for responsible behavior of IT professionals. But even under strong external pressure, long ranging aspects such as education and the roles of developing countries in the Information Society are important to discuss, especially to enable all to actively participate in information processes. The topics covered in this book include: -Quality of Life and Quality of Working Life; |
Contents
Critical Professional Discourses About Information and Communications Technologies and Social Life in the US | 1 |
Does the Internet Promote Democracy? | 21 |
Theoretical perspective on the interplay between ICT and Quality of life | 31 |
Using Technology to help the Citizen Enrollment | 43 |
Information and communication Technology and the Home Environment | 55 |
Some Great Myths of the History of Computing | 61 |
Roots of Computing in AustriaContributions of the IBM Vienna Laboratory and Changes of Paradigms and Priorities in Information Technology | 77 |
Content Legitimacy and Efficiency Governance and Ethics | 89 |
A Remedy Against Terrorist Attack? | 195 |
Passports Person Tracking and Fight Against Terror | 207 |
Preventing Privacy Attacks and CyberCrime in the Mobile Internet? | 221 |
Towards a Framework for Sustainable Knowledge Management in Organisations in Developing Countries | 225 |
A Perspective on IT Implementation in a Developing Country Context | 239 |
Content Practice and Management | 253 |
Information Processing Paradigm versus SelfOrganisation Theory | 265 |
Understanding the Process of Information Systems and ICT Curriculum Development Three Models | 275 |
Trust Corruption and Surveillance in the Electronic Workplace | 109 |
Ethics and LearningFrom State Regulation towards | 121 |
Computer Augmented Research and Scientific Misconduct | 131 |
The Security Aspect of Information Society as a Global Biocultural System | 147 |
The Delegation of Decision Making to Intelligent Software Agents | 163 |
From Academia to Practice | 171 |
Is The Enemy Us? New Threats to Privacy Freedom of Information and Civil Liberties in the Age of Terrorism | 183 |
Cultural Differences of Female Enrollment in Tertiary Education in Computer Science | 283 |
A Radical Scandinavian Øresundsk Approach to Inquiring Organizations A Critique of ICT in Knowledge Management | 293 |
Sustainable Development and the Information Society | 305 |
Information for All Programme | 317 |
Draft Recommendations Concerning the Promotion and Use of Multilingualism and Universal Access to Cyberspace | 319 |
329 | |
Other editions - View all
Common terms and phrases
academic action activities agents analysis antiterror biometrics Application Class authentication banks biometric applications complex computer science concept Conference context CPSR cultural models curriculum developing countries discourse discussion documents economy electronic Electronic Commerce engineering enrollment environment Ethics factors framework fraud Fuchs-Kittowski GBDe global human ICANN identify IFIP implementation important information and communication Information Society information systems information technology infrastructure institutional interaction Internet issues Kling Knowledge Management learning machine monitoring NIDS norms organisations organizations paper participation person PL/I plagiarism practice problem professionals programming language regulation responsibility risk Rob Kling role School scientific Scientific Misconduct sector self-regulation social informatics software agents specific surveillance technical terrorist theory trust UNESCO University USA PATRIOT Act users workplace