Implementation of the Tournament Method for Finding max and secondLargest. Managing the Fringe Efficiently with a Priority Queue. Subclasses Extend the Capability of Their Superclass. Pearson offers affordable and accessible purchase options to meet the needs of your students.
Connect with us to learn more. Baase is a three-time recipient of the San Diego State University Alumni Association's Outstanding Faculty Award, and she has written a number of textbooks in the areas of algorithms, assembly language and social and ethical issues related to computing.
She earned her doctorate at the University of California, Berkeley. He received his Ph. We're sorry! We don't recognize your username or password. Please try again. The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning.
You have successfully signed out and will be required to sign back in should you need to download more resources. Description Drawing upon combined decades of teaching experience, Professors Sara Baase and Allen Van Gelder have extensively revised this best seller to make it the most current and accessible choice for any algorithms course. Helps students see and understand the implications and impacts of technology. Each chapter now features new, expanded, or revised content, including:.
Unwrapping the Gift. Important: To use the test banks below, you must download the TestGen software from the TestGen website.
If you need help getting started, read the tutorials on the TestGen site. Pearson offers affordable and accessible purchase options to meet the needs of your students.
Connect with us to learn more. Her textbooks in computer science have been translated into several languages. Baase received her doctoral degree from the University of California, Berkeley. Timothy M. He began his IT career as an officer in the U. Henry then switched over to education and taught mathematics and computer science courses at the U.
Coast Guard Academy. As his time there ended, he was offered a great opportunity to work with 'bleeding-edge' technology in a research and development environment and oversaw projects for law enforcement, first responders, healthcare, and education. For the next decade he continued to work as a project manager on large corporate- or state-wide information systems. He then returned to a university setting where he has been teaching ethics, programming, cybersecurity, and project management for over 15 years.
We're sorry! We don't recognize your username or password. Please try again. The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. You have successfully signed out and will be required to sign back in should you need to download more resources. Henry, New England Institute of Technology. TAA Award Winner! For courses in Computer Ethics and Computers and Society.
An objective study of technology ethics that inspires critical thinking and debate In Gift of Fire, A: Social, Legal, and Ethical Issues for Computing Technology , Sara Baase presents a balanced exploration of the social, legal, philosophical, ethical, political, constitutional, and economic implications of computing and the controversies they raise.
About the Book Helps students see and understand the implications and impacts of technology Focus on solutions to computer-related problems from technology and from markets, management, and law.
Discussion of how computers change established institutions and conventions. Comparison of the risks and problems of computer technology with other technologies and non-computerized alternatives. Each chapter now features new, expanded, or revised content. Incorporates a problem-solving approach, beginning with a description of what is happening in a particular area, then a discussion of why there are concerns and what the new problems are, and finally some commentary or perspective and some current and potential solutions to the problems.
Historical background on many issues. Coverage of current issues and controversies, from multiple perspectives. Problem-solving approach. Many examples from real incidents and cases. The Appendix features two professional codes of ethics for computer science professionals.
Shaded "boxes" that describe examples, cases, or historical background. Roughly exercises including review questions, essay questions, activities, and questions for class discussion. The extensive amount of exercises, many of which are based on real cases, provides a wealth of options for classroom discussion, term paper topics, and further study.
New to This Edition. Privacy implications of some social networking applications and social network company policies Sexting Ethics of leaking sensitive information with WikiLeaks and Climategate as examples Google's decision to no longer censor searches in China Role of social networking in the "Arab Spring" Shutting down cellphone service or access to social media by repressive governments and in democracies during riots or protests Box on plagiarism Cyberlockers Expanded section on DMCA new cases and updates on cases Expanded section on software-related patents Hacking by governments against other countries Expanded application of the Computer Fraud and Abuse Act New cases and laws related to cross-border differences in laws Ethics of employer background checks on applicants Use of social media and personal devices at work; firing people for social media content.
Table of Contents 1 Unwrapping the Gift 1 1. About the Author s. Previous editions. Sign In We're sorry! Username Password Forgot your username or password?
0コメント