READING LIST
CS 3K: Ethical and Social Aspects of Computing
Fall 2012

1) Friends, followers, and the future, Rory O'Connor, 2012
ISBN: 9780872865563
This book talks about how social media are changing politics which are threatening big brands and killing traditional media.
Ethical topics: Facebook stalking or social network data mining, in general,Security and theft of digital data
Review

2) Alif the Unseen, G. Willow Wilson, 2012
ISBN: 9780802120205
Fictional book set in the Middle East. A hacker falls in love with a woman who is engaged to a man who is hunting for him. Full of hacking technological situations and adventure.
Ethical topics: Security and theft of digital data
Review

3) Victory Lab, Sasha Issenberg, 2012
ISBN: 9780307954794
Discusses politics and strategies and influences that the modern age is having on elections campaigns.
Review

5) Liars and Outliers: Enabling the Trust that Society Needs to Thrive, Bruce Schneier, 2012
ISBN: 9781118143308
Discusses trust in a modern setting of both technology and environmental concerns.
Reviews

6) The Cyber Citizen's Guide Through the Legal Jungle - Internet Law for Your Professional Online Presence, Joy R. Butler, 2010
ISBN: 9780967294025
Disscusses online presence, staying legal, protecting yourself, ect.
Ethical topics: Music and video piracy, copyright infringement, plagiarism, Music and video piracy, copyright infringement, plagiarism, Music and video piracy, copyright infringement, plagiarism
Reviews

7) Digital assassination: protecting your reputation, brand, or business against online attacks, Torrenzano, Richard Davis, Mark W., 2011
ISBN: 9780312617912
Discusses personal image in the world of today. At any moment your reputation could be ruined by some blog post accusation, or fake image.
Ethical Topics: Facebook stalking or social network data mining, in general, Security and theft of digital data
Reviews

8) Who Controls the Internet?: Illusions of a Borderless World, Jack Goldsmith, 2006
ISBN: 9780195152661
Discusses laws and territorial law that influence control over the internet. Looks at specific cases for demonstrations.
Ethical topics: Music and video piracy, copyright infringement, plagiarism, DRM and other forms of vendor device control, Net neutrality
Review

9) The Master Switch: The Rise and Fall of Information Empires, Tim Wu, 2010
ISBN: 9780307269935
Discusses Corporate and government control over the internet and free markets in general. A cycle that eventually breaks starts again fresh.
Ethical topics: Net neutrality, Patent trolling
Review

10) Epic Win for Anonymous: How 4chan's Army Conquered the Web. Cole Stryker. September 1, 2011.
ISBN-10: 1590207106 This book is about the hactivist group Anonymous and how it began with 4chan users.
It deals with the ethitechnical problem of anonymity on the web.
http://bits.blogs.nytimes.com/2011/09/02/one-on-one-cole-stryker-author-of-epic-win-for-anonymous/

"4chan is the "Anti-Facebook," a site that radically encourages anonymity. It spawned the hacktivist group Anonymous, which famously defended WikiLeaks founder Julian Assange by bringing down MasterCard's and Visa's Web sites.[...] Epic Win is the first book to tell 4chan's story." -Amazon
Hacktivism
Review
Amazon

12) The Master Switch: The Rise and Fall of Information Empires. Tim Wu. November 29, 2011.
ISBN-13: 978-0307390998 This book focuses on AT&T and the historical life cycle of communication, from a freely accessible technology
to one closely monitored and controlled by an industry.
The issue involved here is control of technology.
http://www.nytimes.com/2010/12/12/books/review/Leonhardt-t.html?pagewanted=all

"Analyzing the strategic maneuvers of today's great information powers-Apple, Google, and an eerily resurgent AT&T-Wu uncovers a time-honored pattern in which invention begets industry and industry begets empire. He shows how a battle royale for Internet's future is brewing, and this is one war we dare not tune out" -Amazon
Net Neutrality, Wiretapping
Review
Amazon

13(a) Linked: The New Science of Networks. Albert-Laszlo Barabasi. May 15, 2002
This book analyzes the properties of networks and the changes that they have seen since the widespread use
of the Internet.
The issue this relates to is more how the dramatic increase in scale of something due to technology can
become a problem.
http://muse.jhu.edu/login?auth=0&type=summary&url=/journals/perspectives_in_biology_and_medicine/v047/47.2menke.html

13(b) Linked: How Everything Is Connected to Everything Else and What It Means
Albert-Laszlo Barabasi
April 29, 2003
ISBN-13: 978-0452284395
"Albert-László Barabási, the nation's foremost expert in the new science of networks, takes us on an intellectual adventure to prove that social networks, corporations, and living organisms are more similar than previously thought. Grasping a full understanding of network science will someday allow us to design blue-chip businesses, stop the outbreak of deadly diseases, and influence the exchange of ideas and information." -Amazon
Net neutrality, social networks, targetted advertising
Review
Amazon

14) The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yochai Benkler. May 16, 2006.
ISBN-13: 978-0300110562
This text discusses the rise of the networked information economy, the system of producing and consuming
informational goods conducted in non-typical market means and how this affects society.
This is loosely related to the ethitechnical issues of ownership of digital data.
"In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing–and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained–or lost–by the decisions we make today." -Amazon
Net neutrality, social network data mining
http://www.independent.org/publications/tir/article.asp?a=721
Review
Amazon

15) Silicon Snake Oil: Second Thoughts on the Information Highway. Clifford Stoll. March 1, 1996.
ISBN-13: 978-0385419949
This book covers the issue of technology and the Internet offering society a "silicon snake oil".
Snake oil is a term describing a magical cure-all substance, and Stoll raises questions about a technological snake oil solution, i.e. the Internet.
This book seems presents the issue of technology actually interfering with education.
"A cautionary tale about today's media darling, Silicon Snake Oil has sparked intense debate across the country about the merits--and foibles--of what's been touted as the entranceway to our future." -Amazon
Disadvantages of internet
http://scholar.lib.vt.edu/ejournals/JTE/v9n1/vestich.html
Review
Amazon

16) The Gutenberg Elegies: The Fate of Reading in an Electronic Age. Sven Birkerts. November 14, 2006.
ISBN-13: 978-0865479579
This text discusses reading and its place in a technological world.
This issue involves the new scale of technology and the consequences it has on previous ways of life.
"At once a celebration of the complex pleasures of reading and a bold challenge to the information technologies of today and tomorrow, The Gutenberg Elegies is an essential volume for anyone who cares about the past and the future of books." -Amazon
Piracy, new forms of media
http://www9.georgetown.edu/faculty/jod/texts/birkerts.review.html
Review
Amazon

17) War of the Worlds: Cyberspace and the High-Tech Assault on Reality. Mark Slouka. June 28, 1996.
ISBN-13: 978-0465004874
This book cautions readers of the potential dangers we may stumble upon as we move to a digital world and
the clash between the real world and the digital.
This is similar to the issue of gaming and addictive behavior, which is not an ethitechnical issue. The
concern lies in our addiction to new virtual worlds.
"Warning: A technological revolution is unfolding that promises, in the words of its creators, to redefine what it means to be human. Face-to-face communication ("F2F" to those in the know) is quickly becoming obsolete; already we turn to computers for information, entertainment, companionship–even love." -Amazon
Disadvantages of internet
http://www.techsoc.com/warwrlds.htm
Review
Amazon

18) The Public Domain: Enclosing the Commons of the Mind. James Boyle. December 9, 2008.
ISBN-13: 978-0300158342
This text explains the differences between public domain and intellectual property and the problems with
current legislation on the issues.
This book deals with the issue of ownership of information and copyright infringement.
"Boyle identifies as a major problem the widespread failure to understand the importance of the public domain–the realm of material that everyone is free to use and share without permission or fee. The public domain is as vital to innovation and culture as the realm of material protected by intellectual property rights, he asserts, and he calls for a movement akin to the environmental movement to preserve it." -Amazon
Intellectual Rights, Copyright Infringement, Patent trolls, Fair Use
http://www.thepublicdomain.org/
Review
Amazon

19) Title: Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Authors: Hal Abelson, Ken Ledeen, Harry Lewis
Pub. Date:
June 16 2008
ISBN: 0137135599 Retail
With the advancement of computers, it is now possible to store immense amounts of data and do enormous calculations on it. Blown to Bits explores this new power and how the government and other institutions are trying to manage these new possibilities.
Ethitechnical Issue(s): Government wiretapping due to new scale, social network data mining
Review
Class topics: Several
"The authors survey a broad swath of tech policy territory - privacy, search, encryption, free speech, copyright, spectrum policy - and provide the reader with a wonderful history and technology primer on each topic.... It is certainly something more than 'Internet Policy for Dummies.' It's more like 'Internet Policy for the Educated Layman': a nice mix of background, policy, and advice." -- Adam Thierer, review linked below
Review
Amazon
Wherever you go whatever you say, write, photograph, or buy whatever prescriptions you take, or ATM withdrawals you make you are generating information. That information can be captured, digitized, retrieved, and copied anywhere on Earth, instantly. Sophisticated computers can increasingly uncover meaning in those digital traces understanding, anticipating, and influencing you as never before. Full Synopsis
Deals with privacy invasion, cell phone monitoring, and browser history tracking
Review

20) Title: The Master Switch: The Rise and Fall of Information Empires
Author: Tim Wu
Pub. Date: November 29, 2011
ISBN: 0307390993 Retail
Past technological inventions such as telephone, radio, and film began with an innovative and competitive market as chaotic as the modern Internet industry. Tim Wu questions whether or not the Internet will follow a similar path the other technologies did where they are now dominated by a monopolist or cartel.

The author argues that, like radio and television before it, the internet has started out as an open and highly competitive environment, but could soon be transformed into yet another monopoly-dominated medium. To discourage this outcome, he proposes a sort of "separation of powers" among content providers, network infrastructure, and access tools.

Class topics: net neutrality
Ethitechnical Issue(s): Net neutrality
Review
Review
Amazon

21) Title: Here Comes Everybody: The Power of Organizing Without Organizations
Author: Clay Shirky
Pub. Date: February 24, 2009
ISBN: 0143114948 Retail
With the advent of the Internet, it is now possible for groups to organize themselves without the problem of distance, and while taking advantage of newer technologies. Activist groups and communities such as Wikipedia have benefited from these new advancements, which are explored in Here Comes Everybody.
Class topics: non-ethitechnical focus
Ethitechnical Issue(s): The digital divide
"Blogs, wikis and other Web 2.0 accoutrements are revolutionizing the social order, a development that's cause for more excitement than alarm, argues interactive telecommunications professor Shirky. He contextualizes the digital networking age with philosophical, sociological, economic and statistical theories and points to its major successes and failures." -- Publisher's Weekly, as quoted by Amazon Review
Review
Amazon

22) Title: Alone Together: Why We Expect More from Technology and Less from Each Other
Author: Sherry Turkle
Pub. Date: January 11, 2011
ISBN: 0465010210 Retail
Texting, smartphones, and tablets are all increasingly affecting the amount of face-to-face interaction we have with others. Turkle explores the possible pros and cons of the now common way we are interacting with each other.
Class topics: non-ethitechnical focus
Ethitechnical Issue(s): The digital divide, social networks
"Turkle explores the power of our new tools and toys to dramatically alter our social lives. It's a nuanced exploration of what we are looking for - and sacrificing - in a world of electronic companions and social networking tools, and an argument that, despite the hand-waving of today's self-described prophets of the future, it will be the next generation who will chart the path between isolation and connectivity." -- Amazon
Review
Amazon

23) Title: The Net Delusion: The Dark Side of Internet Freedom
Author: Evgeny Morozov
Pub. Date: January 4, 2011
ISBN: 1586488740 Retail
Although the Internet offers the ability to share information more openly and democratically, Morozov argues that the Internet can also be used to help dictators and authoritarian governments suppress information.
Ethitechnical Issue(s): Government wiretapping, net neutrality, DRM
Class topics: censorship

"For all of the talk in the West about the power of the Internet to democratize societies, regimes in Iran and China are as stable and repressive as ever. Social media sites have been used there to entrench dictators and threaten dissidents, making it harder - not easier - to promote democracy. Marshalling a compelling set of case studies, The Net Delusion shows why the cyber-utopian stance that the Internet is inherently liberating is wrong, and how ambitious and seemingly noble initiatives like the promotion of 'Internet freedom' are misguided and, on occasion, harmful." -- Amazon
Review
Review
Amazon

24) Title: Against the Machine: How the Web is Reshaping Culture and Commerce -- and Why it Matters
Author: Lee Siegel
Pub. Date: March 17, 2009
ISBN: 0385522665 Retail
The Web is now taking over as our primary means of communication, shopping, and playing. Siegel explores how the Web is now shaping our culture, and how we can embrace it.
Ethitechnical Issue(s): The digital divide, social networks

28. "The Shallows: What the Internet is Doing to Our Brains", Nicolas Carr 2010.
ISBN: 978-0393072228 Amazon
Summary: The book examines the negative effects that have risen from the expanding influence of the internet. These included a reduced attention span and a reduction in the depth of thought.
This book focuses on how the computer and more importantly the Internet is changing the way we think. He also describes this happening throughout history with examples like maps and the printing press.
How we are shaped by technology
Review
NYTimes Review
Amazon

29. "In The Plex: How Google Thinks, Works, and Shapes Our Lives", Steven Levy 2011.
ISBN: 978-1416596585 Amazon
Summary: This book gives a history of Google rise to prominence and the subsequent malaise that has gripped the company in recent years.
This book explores Google from the beginning to its more recent endeavors.
Review
The Wall Street Journal Review
Amazon

30. "The Filter Bubble: What the Internet Is Hiding from You", Eli Pariser 2011
ISBN: 978-1594203008 Amazon
Summary: The book's major premise is that the Internet is not an impartial tool that delivers random content to us as we generally assume it does.
"An eye-opening account of how the hidden rise of personalization on the Internet is controlling-and limiting-the information we consume."(Amazon)
Browser history tracking and targeted advertising
NYTimes Review Review
Amazon

31. "Who controls the internet? Illusions of a Borderless World", Jack Goldsmith and Tim Wu 2006
ISBN: 978-0195152661 Amazon
Summary: Starting with a discussion of the early vision of a borderless global community, the authors present some of the most prominent individuals, ideas and movements that have played key roles in developing the Internet.
Goldsmith and Wu provide an overview government regulation of the Internet and give specific examples of battles between powerful Internet companies and those in charge of countries. The authors suggest ways in which governments and Internet companies can work together to make themselves stronger.(Gale)
Security and theft of digital data
Review
politicalreviewnet.com

32. "Infotopia: How Many Minds Produce Knowledge", Cass R. Sunstein 2006
ISBN: 978-0195189285 Amazon
Summary: Despite the massive availability of information, it is now easier than ever to fall into an insulated bubble of information that only regurgitates the same comforting assertions.
"In this book, Cass R. Sunstein develops a deeply optimistic understanding of the human potential to pool information, and to use that knowledge to improve our lives."(Amazon)
Security and theft of digital data
Project Muse review
Amazon
Amazon

33. "Cyber War: The Next Threat to National Security and What to Do about It", Richard A. Clarke 2010
ISBN: 978-0061962233 Amazon
Summary: There is a growing problem surrounding cyber security in the world. This problem is a major concern for the military as well as civilians and the set of cyber problems is growing faster than the set of cyber solutions.
"Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. This is the first book about the war of the future -- cyber war -- and a convincing argument that we may already be in peril of losing it."(Amazon)
Security and theft of digital data
Review
NY Times Review

34. "Cyber Wars: Espionage on the Internet", Jean Guisnel 1999
ISBN: 978-0738202600 Amazon
Summary: The book examines "information warfare" and gives a (what is now) historical accounting of the first cyber-warriors
"Examining efforts to police on-line communication and content, Guisnel assesses the implications of pervasive surveillance for the inherently democratic medium of the Internet. As these issues are the focus of ongoing debates in government and the private sector, Cyberwars couldn't be more timely."(Amazon)
Security and theft of digital data
Review
Techsoc.com(Best review I could find)

35. "Ghost in the Wires: My Adventures as the World's Most Wanted Hacker", Kevin Mitnick 2011
ISBN: 978-0316037709 Amazon
Summary: This is a personal account of the hacking history of the author who had spent more than five years in prison for his crimes.
"Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information."(Amazon)
Security and theft of digital data
Review
NY Times Review

36. "Beyond Human: Living with Robots and Cyborgs", Gregory Benford and Elisabeth Malartre 2008
ISBN: 076531083X Amazon
Summary: This book gives an overview of developments in robotics and a look forward to the growing role of robotics and cybernetics.
"Written in a lively and provocative style, this is a readable book about the accumulation of small scientific advances that add up to something large and challenging."(Amazon)
The idea of an Android
Review
Huffington Post
Amazon

37) The Age of Access, Rifkin, 2001
ISBN: 1585420824
Rifkin argues in this book that we are shifting from buying things to buying the rights to use things. The concern is that this is leading to a lack of community and replacement of social obligations with contractual ones. This book intersects with many of the course problems - most notably Net Neutrality and Vendor device control.
Review: http://www.politicalreviewnet.com/polrev/reviews/MISR/R_1521_9488_012_20166.asp

Imagine waking up one day to find that virtually every activity you engage in outside your immediate family has become a "paid-for" experience. It's all part of a fundamental change taking place in the nature of business, contends Jeremy Rifkin. After several hundred years as the dominant organizing paradigm of civilization, the traditional market system is beginning to deconstruct. On the horizon looms the Age of Access, an era radically different from any we have known. (amazon.com)
Review

38) You Are Not a Gadget, Lanier, 2010
ISBN: 0307389979
This book covers a gamut of topics. Lanier accuses the anonymity of the internet as a crucial factor in the rampant hate and viciousness of the internet culture. He attacks internet piracy on multiple fronts, and also discusses the relationship to content providers.
Review: http://www.nytimes.com/2010/01/12/science/12tier.html?_r=0
Lanier discusses the technical and cultural problems that can grow out of poorly considered digital design and warns that our financial markets and sites like Wikipedia, Facebook, and Twitter are elevating the “wisdom” of mobs and computer algorithms over the intelligence and judgment of individuals. (amazon.com)
Review

39) The Singularity is Near
, Kurzweil, 2006
ISBN: 0670033847
Kurzeweil states in this book the case for the technological singularity and that we may be much closer than we expect. This does not cross into the problems stated for this course, but is interesting nonetheless.
Review:
http://www.nytimes.com/2005/10/03/books/03masl.html?pagewanted=print
For over three decades, Ray Kurzweil has been one of the most respected and provocative advocates of the role of technology in our future. In his classic The Age of Spiritual Machines, he argued that computers would soon rival the full range of human intelligence at its best. Now he examines the next step in this inexorable evolutionary process: the union of human and machine, in which the knowledge and skills embedded in our brains will be combined with the vastly greater capacity, speed, and knowledge-sharing ability of our creations. (amazon.com)
Review

40) Understanding Privacy
, Solove, 2010
ISBN: 0674035070
Here Solove attempts to find a definition for privacy, and explains the numerous failings of other attempts. Drawing on many different sources he shows where the presumptions are often wrong, and attempts to delineate where private life ends and public life begins.
Review:
http://www.cro2.org/default.aspx?page=reviewdisplay&pids=3539006
In this concise and lucid book, Daniel J. Solove offers a comprehensive overview of the difficulties involved in discussions of privacy and ultimately provides a provocative resolution. He argues that no single definition can be workable, but rather that there are multiple forms of privacy, related to one another by family resemblances. (amazon.com)
Review

41) The Privacy Advocates
, Bennett, 2010
ISBN: 0262514877
Bennett examines the various individuals and groups that are working to defend the rights of the individual in regards to privacy. Things like warrantless wiretapping, browser tracking, and data mining would be covered by this book.
Review:
http://mors.haas.berkeley.edu/research/pozner/The%20Privacy%20Advocates.pdf
In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society--without official sanction and with few resources, but surprisingly influential. (MIT press)
Review

42) The Cambridge handbook of information and computer ethics
, Floridi (ed.), 2010
 ISBN: 9780521717724
This handbook is a collection of essays to reinforce the editor’s perspective of an attempt to set up a kind of moral guideline that could be used to determine if a specific autonomous action is morally allowable or not.
Review:
http://ndpr.nd.edu/news/24495-the-cambridge-handbook-of-information-and-computer-ethics/
The Cambridge Handbook of Information and Computer Ethics, first published in 2010, provides an ambitious and authoritative introduction to the field, with discussions of a range of topics including privacy, ownership, freedom of speech, responsibility, technological determinism, the digital divide, cyber warfare, and online pornography. (amazon.com)
Review
The Cambridge Handbook of Information and Computer Ethics, first published in 2010, provides an ambitious and authoritative introduction to the field, with discussions of a range of topics including privacy, ownership, freedom of speech, responsibility, technological determinism, the digital divide, cyber warfare, and online pornography. It offers an accessible and thoughtful survey of the transformations brought about by ICTs and their implications for the future of human life and society, for the evaluation of behaviour, and for the evolution of moral values and rights. Full Synopsis
Deals with censorship, privacy, and the digital divide, and general computing ethics.
Review
This book discusses the problems of privacy, freedom of speech, and responsibility, among other things, associated with new technology. It also deals with the future of human life and the evolution of human behavior in response to technology.
This book matches the Warrant less wiretapping issue as well as Security of digital information.
Review

43) Access Denied: The Practice and Policy of Global Internet Filtering,
Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittain, 2008
ISBN:0262541963
The first in a three part series this book concerns itself with analyzing how governments are restricting access to online material. This coincides with warrantless wiretapping and net neutrality issues from the course material.
Review:
http://news.bbc.co.uk/2/hi/technology/7312327.stm
Access Denied documents and analyzes Internet filtering practices in more than three dozen countries, offering the first rigorously conducted study of an accelerating trend. (amazon.com)
Review
Many countries around the world block or filter Internet content, denying access to information--often about politics, but also relating to sexuality, culture, or religion--that they deem too sensitive for ordinary citizens. Access Denied documents and analyzes Internet filtering practices in over three dozen countries, offering the first rigorously conducted study of this accelerating trend. Full Synopsis
Deals extensively with net neutrality and censorship
Review
This book discusses the issue of internet filtering and what political, legal, cultural, and social effects it has. It looks at internet filtering around the world.
This book matches the Net Neutrality issue.
Review

44) The Facebook Effect: The Inside Story of the Company that is Connecting the World, David Kirkpatrick, 8 June 2010
ISBN: 1439102120
A look into how facebook was formed from the ground up. It covers business meetings, ideas, and coding sessions, but I am not sure it deals with any ethitechnical problems from the course.
Review: http://smallbiztrends.com/2010/07/the-facebook-effect.html
Kirkpatrick tells us how Facebook was created, why it has flourished, and where it is going next. He chronicles its successes and missteps, and gives readers the most complete assessment anywhere of founder and CEO Mark Zuckerberg, the central figure in the company’s remarkable ascent. This is the Facebook story that can be found nowhere else. (amazon.com)
Review
As Facebook spreads around the globe, it creates surprising effects even becoming instrumental in political protests from Colombia to Iran. Veteran technology reporter David Kirkpatrick had the full cooperation of Facebook's key executives in researching this fascinating history of the company and its impact on our lives. Full Synopsis
May or may not deal with Facebook stalking or social network data mining
Review
This book discusses the phenomenon known as facebook. Its humble beginnings and its fast growth to a social network giant.
This book im sure deals with the issue of Facebook stalking and social network data mining as well as the security of data.
Review

45) Blown to Bits : Your Life, Liberty, and Happiness After the Digital Explosion, Hal Abelson, Ken Ledeen, Harry Lewis, June 16, 2008
ISBN: 0137135599
This book appears to cover almost every single issue on the course list. It is a close examination of the current state of internet privacy and actions, and ways in which you can protect yourself.
Review: http://techliberation.com/2008/11/18/book-review-blown-to-bits-by-abelson-ledeen-lewis/
Can you control who sees all that personal information about you? Can email be truly confidential, when nothing seems to be private? Shouldn t the Internet be censored the way radio and TV are? Blown to Bits offers provocative answers to these questions and tells intriguing real-life stories. (Barnes and Noble)
Review
This book discusses how all this new digital technology is affecting our individual privacy, identity and free expression.
This book matches the issues of Facebook Stalking and Security of digital information.
Review

46) Internet Ethics, Robert Hauptman, Duncan Langford, ed.
New York: St. Martin's Press, 2000. xiv, 257 pp. $49.95.
http://www.amazon.com/Internet-Ethics-Duncan-Langford/dp/0333776267/ref=sr_1_1?s=books&ie=UTF8&qid=1352310620&sr=1-1&keywords=internet+ethics
Review: http://www.abdn.ac.uk/philosophy/endsandmeans/vol4no2/booknote.shtml
Summary (From amazon.com): Internet Ethics offers a comprehensive look at difficult issues facing internet users today. Covering sensitive topics such as censorship, data protection and the law, experts from the US, Australia and Europe have contributed to this fully integrated book. Views of other societies are also crucial to successful Internet use, and so additional comment on the contents of the book is provided from a global selection of specialists, from countries ranging from Botswana to Japan.
Ethitechnical Topics: Invasion of privacy, Software Engineering ethics (Compilation of several topics)
47) Computers, Ethics, and Society, M. David Ermann, Mary B. Williams, and Michele S. Shauf.
2d ed. New York: Oxford University Press, 1997. 340 pp. ISBN 0-19-510756-X.
http://www.amazon.com/Computers-Ethics-Society-David-Ermann/dp/019510756X/ref=sr_1_3?s=books&ie=UTF8&qid=1352307805&sr=1-3&keywords=david+ermann
Review: http://dl.acm.org/citation.cfm?id=549155

Summary (From Amazon.com): Computers can have both a positive and negative impact on our lives. As they become increasingly important, these machines have the potential to deprive us of our privacy and even the jobs we need to support ourselves. On the other hand, they can enhance the quality of human life by producing unimagined freedom from drudgery and want. Ideal for students in sociology, philosophy, and computer science courses, Computers, Ethics, and Society serves as a reminder that although technology has the potential to improve or undermine our quality of life, it is society which has the power to ultimately decide how computers will affect our lives.
Ethitechnical Topic: Invasion of privacy
Computers can have both a positive and negative impact on our lives. As they become increasingly important, these machines have the potential to deprive us of our privacy and even the jobs we need to support ourselves. On the other hand, they can enhance the quality of human life by producing unimagined freedom from drudgery and want. Ideal for students in sociology, philosophy, and computer science courses, Computers, Ethics, and Society serves as a reminder that although technology has the potential to improve or undermine our quality of life, it is society which has the power to ultimately decide how computers will affect our lives. Computers, Ethics, and Society, now in its second edition, provides a stimulating set of interdisciplinary readings specifically designed to understand these issues. The readings examine current computer problems, discussing them at a level that can explain future realities. Topics include the threat to privacy, computer wrong-doing and whistleblowing, and the questions of how to decide when and if a computer-related act is wrongful. In addition, the problems of unemployment and opportunities for international cooperation are considered in light of broader issues of justice and community. New chapters in the second edition deal with specific and timely issues such as the conflict over copyrights on the Internet; the influence and effect of computer technology on women, minorities, and third world societies; and the exploitations of Internet technology by right-wing militia groups and other underground organizations.
http://www.amazon.com/Computers-Ethics-Society-David-Ermann/dp/019510756X/ref=sr_1_1?s=books&ie=UTF8&qid=1352318954&sr=1-1&keywords=M.+David+Ermann%2C+Mary+B.+Williams%2C+and+Michele+S.+Shauf.

48) The Ethics of Computer Games by Miguel Sicart
http://www.amazon.com/Ethics-Computer-Games-Miguel-Sicart/dp/0262012650
Review: http://www.eludamos.org/index.php/eludamos/article/viewArticle/vol4no1-13/153
Summary (From Amazon.com): In this first scholarly exploration of the subject, Miguel Sicart addresses broader issues about the ethics of games, the ethics of playing the games, and the ethical responsibilities of game designers. He argues that computer games are ethical objects, that computer game players are ethical agents, and that the ethics of computer games should be seen as a complex network of responsibilities and moral duties. Players should not be considered passive amoral creatures; they reflect, relate, and create with ethical minds. The games they play are ethical systems, with rules that create gameworlds with values at play.
Ethitechnical issue: Software engineering ethics
Despite the emergence of computer games as a dominant cultural industry (and the accompanying emergence of computer games as the subject of scholarly research), we know little or nothing about the ethics of computer games. Considerations of the morality of computer games seldom go beyond intermittent portrayals of them in the mass media as training devices for teenage serial killers. In this first scholarly exploration of the subject, Miguel Sicart addresses broader issues about the ethics of games, the ethics of playing the games, and the ethical responsibilities of game designers. He argues that computer games are ethical objects, that computer game players are ethical agents, and that the ethics of computer games should be seen as a complex network of responsibilities and moral duties. Players should not be considered passive amoral creatures; they reflect, relate, and create with ethical minds. The games they play are ethical systems, with rules that create gameworlds with values at play. Drawing on concepts from philosophy and game studies, Sicart proposes a framework for analyzing the ethics of computer games as both designed objects and player experiences. After presenting his core theoretical arguments and offering a general theory for understanding computer game ethics, Sicart offers case studies examining single-player games (using Bioshock as an example), multiplayer games (illustrated by Defcon), and online gameworlds (illustrated by World of Warcraft) from an ethical perspective. He explores issues raised by unethical content in computer games and its possible effect on players and offers a synthesis of design theory and ethics that could be used as both analytical tool and inspiration in the creation of ethical gameplay.
http://www.amazon.com/Ethics-Computer-Games-Miguel-Sicart/dp/0262516624/ref=sr_1_1?ie=UTF8&qid=1352318593&sr=8-1&keywords=The+Ethics+of+Computer+Games

49) The Hacker Ethic by Pekka Himanen
http://www.amazon.com/Hacker-Ethic-Approach-Philosophy-Business/dp/037575878X/ref=sr_1_1?s=books&ie=UTF8&qid=1352308568&sr=1-1&keywords=the+hacker+ethic
Review: http://www.nytimes.com/books/01/03/04/reviews/010304.04johnsot.html
Summary (From Amazon.com): Hacking is a mind-set, a philosophy, based on the values of play, passion, sharing, and creativity, that has the potential to enhance every individual’s and company’s productivity and competitiveness. Now there is a greater need than ever for entrepreneurial versatility of the sort that has made hackers the most important innovators of our day. Pekka Himanen shows how we all can make use of this ongoing transformation in the way we approach our working lives.
Ethitechnical issue: Hacking
You may be a hacker and not even know it. Being a hacker has nothing to do with cyberterrorism, and it doesn’t even necessarily relate to the open-source movement. Being a hacker has more to do with your underlying assumptions about stress, time management, work, and play. It’s about harmonizing the rhythms of your creative work with the rhythms of the rest of your life so that they amplify each other. It is a fundamentally new work ethic that is revolutionizing the way business is being done around the world.
Without hackers there would be no universal access to e-mail, no Internet, no World Wide Web, but the hacker ethic has spread far beyond the world of computers. It is a mind-set, a philosophy, based on the values of play, passion, sharing, and creativity, that has the potential to enhance every individual’s and company’s productivity and competitiveness. Now there is a greater need than ever for entrepreneurial versatility of the sort that has made hackers the most important innovators of our day. Pekka Himanen shows how we all can make use of this ongoing transformation in the way we approach our working lives.
http://www.amazon.com/The-Hacker-Ethic-Approach-Philosophy/dp/037575878X/ref=sr_1_1?ie=UTF8&qid=1352318712&sr=8-1&keywords=The+Hacker+Ethic

50) Computer Network Security and Cyber Ethics by Joseph Migga Kizza
http://www.amazon.com/Computer-Network-Security-Cyber-Ethics/dp/0786449934/ref=sr_1_1?s=books&ie=UTF8&qid=1352308630&sr=1-1&keywords=computer+network+security+and+cyber+ethics
Review: http://muse.jhu.edu/login?auth=0&type=summary&url=/journals/portal_libraries_and_the_academy/v007/7.2cervone.html
Summary (From Amazon.com): This timely work focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our society. The nature and motives behind cyber attacks are investigated, as well as how they are committed and what efforts are being undertaken to prevent further acts from occurring.
Ethitechnical issue: Hacking
Cyber vandalism and identity theft represent enormous threats in a computer-driven world. This timely work focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our society. The nature and motives behind cyber attacks are investigated, as well as how they are committed and what efforts are being undertaken to prevent further acts from occurring. This new, updated, third edition explores security issues also in the world of social networks. General security protocols and best practices have been updated to reflect changes in the cyber world, and the changing business information security landscape is analyzed in detail.
http://www.amazon.com/Computer-Network-Security-Cyber-Ethics/dp/0786449934/ref=sr_1_1?s=books&ie=UTF8&qid=1352318782&sr=1-1&keywords=Computer+Network+Security+and+Cyber+Ethics

51) Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, by Herman T. Tavani
http://www.amazon.com/Ethics-Technology-Controversies-Questions-Strategies/dp/0470509503/ref=sr_1_1?s=books&ie=UTF8&qid=1352308676&sr=1-1&keywords=ethics+and+technology+controversies+questions+strategies
Review: http://www.powells.com/biblio/72-9780470509500-0
Summary (From Amazon.com): Information technology professionals must not only have a strong understanding of the latest technology, but they also need to be grounded in ethics. The third edition provides them with the information they need to succeed in the field.
Ethitechnical issue: Privacy and others (compilation)
Information technology professionals must not only have a strong understanding of the latest technology, but they also need to be grounded in ethics. The third edition provides them with the information they need to succeed in the field. Each chapter is updated with new case studies and scenarios to provide the most current information. Review and discussion questions are included to reinforce key concepts. The in-text citations and references are revised to offer additional resources. Updated material is also presented on online communities and democracy, globalization and job outsourcing, security for wireless networking, and international cybercrime legislation. This enables information technology professionals to apply the concepts with a focus on ethics.
http://www.amazon.com/Ethics-Technology-Controversies-Questions-Strategies/dp/0470509503/ref=sr_1_1?s=books&ie=UTF8&qid=1352318831&sr=1-1&keywords=Ethics+and+Technology%3A+Controversies%2C+Questions%2C+and+Strategies+for+Ethical+Computing

52) Cyber War: The Next Threat to National Security and What to Do About It, Richard A. Clarke and Robert K, Knake
http://www.amazon.com/Cyber-War-Threat-National-Security/dp/0061962244/ref=sr_1_1?s=books&ie=UTF8&qid=1352308745&sr=1-1&keywords=cyber+war+clarke+knake
Review: http://www.washingtonpost.com/wp-dyn/content/article/2010/05/21/AR2010052101860.html
Summary (From amazon.com): Cyber War is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. It explains clearly and convincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals.
Ethitechnical issue: Hacking
National security experts Richard A. Clark and Robert Knake offer an examination of "cyber warfare," what it means, and the threats it poses to the national security landscape. Cyber War: The Next Threat to National Security and What to Do About It explores the rise of cyberspace criminal activity and how it has become a major challenge to the country's safety. Written in straightforward prose, this volume also explains the risks of cyber warfare on issues of military science and economics and what can be done to avoid the dangers. Cyber War includes a glossary of terms.
http://bna.galegroup.com/bna/about_the_book/GALE|M1300169772

53) Say Everything: How Blogging Began, What It's Becoming, and Why It Matters, Scott Rosenberg
http://www.amazon.com/Say-Everything-Blogging-Becoming-Matters/dp/0307451372/ref=sr_1_1?s=books&ie=UTF8&qid=1352308778&sr=1-1&keywords=say+everything+how+blogging+began
Review: http://online.wsj.com/article/SB10001424052970203609204574312243528286998.html
Summary (From Amazon.com): Blogging pioneers were the first to face new dilemmas that have become common in the era of Google and Facebook, and their stories offer vital insights and warnings as we navigate the future. How much of our lives should we reveal on the Web? Is anonymity a boon or a curse? Which voices can we trust? What does authenticity look like on a stage where millions are fighting for attention, yet most only write for a handful? And what happens to our culture now that everyone can say everything?
Ethitechnical issue: Anonymity
In Say Everything: How Blogging Began, What It's Becoming, and Why It Matters, author Scott Rosenberg offers insight into the history of blogging, its mainstream success, and what the future holds for bloggers. Blogging is a global phenomenon that continues to grow in popularity. The appeal of blogging has captured the attention of the young, old, famous, and ordinary. With the increase of blogs, the world is less concerned with factual journalism and more intrigued by personal confessions and opinion-heavy commentary. In Say Anything, Rosenberg examines this new trend and its increasing allure with interviews of blogging pioneers, such as the creator of Blogger, the founder of Gawker, and the first recorded blogger. He analyzes how blogging started, how it has impacted politics, journalism, and business, and what the future of blogging looks like.
http://bna.galegroup.com/bna/about_the_book/GALE|M1300174610

54) Beyond Human: Living with Robots and Cyborgs, Gregory Benford
http://www.amazon.com/Beyond-Human-Living-Robots-Cyborgs/dp/076531083X/ref=sr_1_1?ie=UTF8&qid=1352308851&sr=8-1&keywords=beyond+human+living+with+robots
Review: http://muse.jhu.edu/login?auth=0&type=summary&url=/journals/technology_and_culture/v050/50.2.alac.html
Summary (From Amazon.com): Beyond Human treats the landscape of human self-change and robotic development as poles of the same phenomenon. Can we go too far in making ourselves machine-like or making machines resemble us? Once made, what will such creatures think about us? These questions will arise in myriad ways in the next few decades, as we press against boundaries that a short while ago existed only in works of the imagination.
Ethitechnical issue: Medical technology?
Explore the role robotics may play in the near future in Beyond Human: Living with Robots and Cyborgs. The book offers readers a detailed explanation of the ways robotics currently help people live more comfortable lives, and provides analysis of how the field might expand in the years to come. Benford and Malartre also tackle profound philosophical questions related to this emerging technology. The authors wonder if prolonging life through robotics is ethical, and question whether artificial intelligence could one day make humans obsolete. Gregory Benford is an author and a teacher at the University of California. Elisabeth Malartre is a biologist and environmentalist.
http://bna.galegroup.com/bna/about_the_book/GALE|M1300153124

55) The ethics of information technology and business, Richard T. De George, 2003
ISBN 0631214259 Amazon Link
The Ethics of Information Technology and Business is an examination of a wide range of ethical questions that arise from the use of information technology in business and the business of information technology itself. (from review by Norman Mooradian)
Problems Covered: Privacy, anonymity, intellectual property
Review
Buy from Amazon.com  |  Read a review
Explores marketing, privacy, and the protection of personal information; employees and communication privacy; intellectual property issues; the ethical issues of e-business; Internet-related business ethics problems; and the ethical dimension of information technology on society. Underlines the need for public discussion of these issues and argues that information technology has not developed in the most ethical manner possible.

56) Nanoethics: big ethical issues with small technology, Donal O'Mathuna, 2009
ISBN 9781847063953 Amazon Link
Donald O'Mathuna's Nanoethics: Big Ethical Issues with Small Technology attempts to make sense of the ethical issues surrounding nanotechnology. One of the issues covered is the risks associated with the use of nanotechnology in medical fields for various purposes.
Problems covered: Enhancement of human capabilities
Review
Buy from Amazon.com  |  Read a review: 1, 2.
Explores the ethical and social implications of nanotechnologies, such as microscopic surveillance devices, nanobots in medicinal and military applications, etc. Briefly covers the technologies themselves, then delves into the rising public concerns about privacy, danger, etc.

57) The End of Ethics in a Technological Society, Lawrence Schmidt and Scott Louis Marratto, 2008
ISBN 0773533362 Amazon Link
The End of Ethics in a Technological Society presents a case for the need for a new ethical approach to be developed to handle the questions that arise with regards to technology. It argues that this approach should include the idea that some possibilities in science ought not be pursued.
Problems covered: Genetic screening
Review
Buy from Amazon.com  |  Read a review
Argues that modern technology, ethics, and politics are all expressions of the enlightenment view that there are no principles of truth or goodness higher than the free human will. Technological advances are, on this view, merely extensions of the range of human freedom. Modern ethics thus fails to give voice to our often inchoate moral intuition that, in the realm of techno science, some possibilities simply ought not to be pursued.

58) The Information: A History, a Theory, a Flood, James Gleick, 2011
ISBN 0375423729 Amazon Link
The Information: A History, a Theory, a Flood looks at the history of information and communication. It examines different view on information, and how they have changed over time.
Review
Buy from Amazon.com  |  Read a review: 1, 2
Touches on just about everything - flies through the history of information technology and many of the important people along its path, the theories those people developed that shape today's technology and its concepts, and the immense flood of data moving throughout our known universe (genetic code, memes, big ideas, etc, etc). Does not really cover the ethical implications of any of this, but provides something of an overview for the common citizen to read.

59) The Man Who Lied to His Laptop: What Machines Teach Us About Human Relationships, Clifford Ivar Nass, 2010
ISBN 1617230014 Amazon Link
The Man Who Lied to His Laptop examines studies that suggest that we interact with our computers as we would other people. One of these found that when office workers use their own computers to provide feedback about the software they are using, they will pull their punches, as if afraid to offend the machine. Give them a separate "evaluation computer," and they're more likely to provide negative responses. (from the review by David Robinson)
Review
Buy from Amazon.com  |  Read a review: 1, 2
Recounts research on how people interact with their computers, and exposes that we can learn much of interpersonal relationships and behaviors from how people interact with their own computers. Draws many correlations between emotional bonds (one-way as they may be) with our computers to those with other human beings, and suggests that much behavior can be predicted by things such as a person's browser history.

60) Technopoly: The Surrender of Culture to Technology, Neil Postman, 1993
ISBN 0679745408 Amazon Link
Technopoly is a word coined by the author to describe a society that believes that "the primary, if not the only, goal of human labor and thought is efficiency, that technical calculation is in all respects superior to human judgment ... and that the affairs of citizens are best guided and conducted by experts." He suggests that the huge amount of context free information now available causes the information to lose some of its meaning. (from the review be Scott London)
Review
Buy from Amazon.com  |  Read a review
Discusses the increasing dependence upon technology, numerical quantification, and misappropriation of "Scientism" to all human affairs. Reaches into the pool of cultural norms that have been all but surrendered in the era of the personal computer, where correspondences are little more than hasty scrawls in an e-mail.

61) Wired for War: The Robotics Revolution and Conflict in the 21st Century, P. W. Singer, 2009
ISBN 0143116843 Amazon Link
Wired for War examines various robots and new weapons that are being created and refined for use in war. One type of robot disscused is one that is programmed to make kill decisions on its own, which raises a host of ethical issues.
Ethical issue: use of AIs in war scenarios
Review
Buy from Amazon.com  |  Read a review: 1, 2
Discusses how the transition to robotic warfare affects the costs, methods, and politics of warfare as a whole. Topics include unmanned drones, computer intelligence, and some more wild realizations of the steady movement towards Terminator-esque scenarios being possible.

62) Ethics for the Information Age, Michael J. Quinn, 2010
ISBN 0132133873 Amazon Link
Ethics for the Information Age is a comprehensive reference for students, librarians, or other information professionals for studying the social implications of new technologies in the twenty-first century. It is in the from of a textbook. (from review by Yijun Gao)
Ethical issues: many
Review

63) Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing, Tom Forester and Perry Morrison, 1993
ISBN 0262560739 Amazon Link
Computer ethics: cautionary tales and ethical dilemmas in computing looks at a number of problems caused by technology, and provides scenarios for the reader to consider the ethical dilemas involved.
Ethical Issues: privacy
Review
Buy from Amazon.com  |  Read a review
Includes anecdotes, revelations, and lively discussion of the ethical, social, and professional issues arising from the computer revolution, such as computer crime, software theft, hacking, viruses, and the invasion of privacy. Also mentions the THERAC-20 scenario and mishaps like it.
A discussion of the new problems created for society by our increasing reliance upon computers. The book asks questions about what should be done when things go wrong, how to prevent hackers disrupting our systems and how the creation of computer viruses should be treated. Full Synopsis
Deals with hacking, viruses, and general computing ethics, as well as theft of digital data and privacy invasion.
Review

65) The Handbook of Information and Computer Ethics, Kenneth Einar Himma, Herman T. Tavani, 27 May 2008
This handbook provides an accessible overview of the most important issues in information and computer ethics. It covers: foundational issues and methodological frameworks; theoretical issues affecting property, privacy, anonymity, and security; professional issues and the information-related professions; responsibility issues and risk assessment; regulatory issues and challenges; access and equity issues. Full Synopsis
Deals with digital property, and property, and general computing ethics
Review
This book discusses issues affecting the property, anonymity, and security. It also covers issues of responsibility and risk assessment. This book matches the DRM and music and video piracy issues.
Review

70) The Future Just Happened, Michael Lewis, 6 June 2002
The basis of a four-part prime-time BBC series, Michael Lewis' new book explores how digital technology, and the internet in particular, has changed the way we live. He argues that not only does our generation now have the easiest access to more information than ever before, but more importantly this has changed our attitudes to how we run our lives. Full Synopsis
There is no apparent ethitechnical issue which this book addresses.
Review
This book discusses how the internet has revolutionize the way we live. It takes a look at how the way we all think is affected by the influx of information the internet injects into our lives.
This book matches the issues of invasion of privacy and Net Neutrality.
Review

71) Delete: The Virtue of Forgetting in the Digital Age, Viktor Mayer-Schonberger, 1 October 2009
"Delete" looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget. Digital technology empowers us as never before, yet it has unforeseen consequences as well. Full Synopsis
Deals with social network data mining, browser history tracking and targeted advertising.
Review
This book discusses the issue of internet privacy and how many websites track everything that we do on them. It proposes that this causes issues because somethings are better fogotten.
This book matches the issues of Invasion of privacy and The ability to forget something if that is even possible anymore.
Review

72) Who Controls the Internet: Illusions of a Borderless World, Jack Goldsmith, Tim Wu, 17 March 2006
In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world. It's a book about the fate of one idea--that the Internet might liberate us forever from government, borders, and even our physical selves. Full Synopsis
Deals with net neutrality and censorship as well as privacy invasion from the government.
Review
This book discusses how various governments around the world have interacted with the internet. It ask the question of who is controlling who and what the future might hold.
This book matches the issue of Net Neutrality.
Review

73) Digital Barbarism: A Writer's Manifesto, Mark Helprin, 28 April 2009
Helprin attacks the position of copyright abolitionists by responding to specific anonymous online comments on a paper he wrote arguing for the extension of copyright laws. His stance is that copyright abolition is illogical and that the generation of the abolitionists generally feels entitled to the fruits of other people's labors, and that they have been raised with a collaborative attitude which denigrates the efforts of individuals.
Deals largely with music and video piracy, as well as copyright infringement and plagiarism.
Review
This book discusses the issues of copyright and how our new generation views it. It looks at how the new generation wishes to get rid of copyright and share media and software freely.
This book matches the issues of DRM and piracy.
Review

74) Steve Jobs: A Biography, Isaacson, Walter, 24 October 2011
Based on more than forty interviews with Jobs conducted over two years as well as interviews with more than a hundred family members, friends, adversaries, competitors, and colleagues, Walter Isaacson has written a riveting story of the roller-coaster life and searingly intense personality of a creative entrepreneur whose passion for perfection and ferocious drive revolutionized six industries: personal computers, animated movies, music, phones, tablet computing, and digital publishing. Full Synopsis
Deals with patent trolling.
Review
This book discusses the life of Steve Jobs. It goes into detail about his life and how he build some of the largest and most successful companies in the world.
This book matches issues that deal with the ethics of running a company.

Review