Professionalizing the Nation's Cybersecurity Workforce?

Download Professionalizing the Nation's Cybersecurity Workforce? PDF Online Free

Author :
Publisher : National Academies Press
ISBN 13 : 0309291054
Total Pages : 65 pages
Book Rating : 4.3/5 (92 download)

DOWNLOAD NOW!


Book Synopsis Professionalizing the Nation's Cybersecurity Workforce? by : Committee on Professionalizing the Nation's Cybersecurity Workforce: Criteria for Future Decision-Making

Download or read book Professionalizing the Nation's Cybersecurity Workforce? written by Committee on Professionalizing the Nation's Cybersecurity Workforce: Criteria for Future Decision-Making and published by National Academies Press. This book was released on 2013-10-15 with total page 65 pages. Available in PDF, EPUB and Kindle. Book excerpt: Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This report examines workforce requirements for cybersecurity and the segments and job functions in which professionalization is most needed; the role of assessment tools, certification, licensing, and other means for assessing and enhancing professionalization; and emerging approaches, such as performance-based measures. It also examines requirements for the federal (military and civilian) workforce, the private sector, and state and local government. The report focuses on three essential elements: (1) understanding the context for cybersecurity workforce development, (2) considering the relative advantages, disadvantages, and approaches to professionalizing the nation's cybersecurity workforce, and (3) setting forth criteria that can be used to identify which, if any, specialty areas may require professionalization and set forth criteria for evaluating different approaches and tools for professionalization. Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making characterizes the current landscape for cybersecurity workforce development and sets forth criteria that the federal agencies participating in the National Initiative for Cybersecurity Education—as well as organizations that employ cybersecurity workers—could use to identify which specialty areas may require professionalization and to evaluate different approaches and tools for professionalization.

Protecting Our Future, Volume 2

Download Protecting Our Future, Volume 2 PDF Online Free

Author :
Publisher : Hudson Whitman/ ECP
ISBN 13 : 0989845176
Total Pages : 234 pages
Book Rating : 4.9/5 (898 download)

DOWNLOAD NOW!


Book Synopsis Protecting Our Future, Volume 2 by : Jane LeClair

Download or read book Protecting Our Future, Volume 2 written by Jane LeClair and published by Hudson Whitman/ ECP. This book was released on 2015-07-07 with total page 234 pages. Available in PDF, EPUB and Kindle. Book excerpt: Protecting Our Future, Volume 2, completes the comprehensive examination of the cybersecurity threats to our nation’s sixteen Critical Infrastructure Sectors begun in Protecting Our Future, Volume 1. Subject matter experts offer an in-depth analysis of operational needs and suggest best practices within the remaining sectors: IT, the chemical industry, commercial facilities, manufacturing, water systems and dams, emergency services, food and agriculture, and transportation. Used separately or together, these two volumes are an excellent foundational resource, and will enable cybersecurity practitioners, students, and employers to gain ground-level insight from experienced professionals, and to develop top-of-mind awareness in the areas most directly impacting the future of our nation’s security.

Protecting Our Future

Download Protecting Our Future PDF Online Free

Author :
Publisher : Hudson Whitman/ ECP
ISBN 13 : 1626526397
Total Pages : 178 pages
Book Rating : 4.6/5 (265 download)

DOWNLOAD NOW!


Book Synopsis Protecting Our Future by : Jane LeClair

Download or read book Protecting Our Future written by Jane LeClair and published by Hudson Whitman/ ECP. This book was released on 2013-12-15 with total page 178 pages. Available in PDF, EPUB and Kindle. Book excerpt: In the world of technology, cybersecurity is, without a doubt, one of the most dynamic topics of our times. Protecting Our Future brings together a range of experts from across the cybersecurity spectrum and shines a spotlight on operational challenges and needs across the workforce: in military, health care, international relations, telecommunications, finance, education, utilities, government, small businesses, and nonprofits. Contributors offer an assessment of strengths and weaknesses within each subfield, and, with deep subject-matter expertise, they introduce practitioners, as well as those considering a future in cybersecurity, to the challenges and opportunities when building a cybersecurity workforce.

Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning

Download Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning PDF Online Free

Author :
Publisher :
ISBN 13 : 9781983066306
Total Pages : 97 pages
Book Rating : 4.0/5 (663 download)

DOWNLOAD NOW!


Book Synopsis Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning by : Department of Homeland Security

Download or read book Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning written by Department of Homeland Security and published by . This book was released on 2018-06-03 with total page 97 pages. Available in PDF, EPUB and Kindle. Book excerpt: Book 1: Cybersecurity Capability Maturity Model White Paper - Cybersecurity is a leading national security challenge facing this country today. An emerging topic of importance is how organizations track, assess, grow, and shape their workforce. Many organizations have turned to workforce planning as a way to understand their current cybersecurity human capital skills and abilities as well as potential infrastructure needs. The National Initiative for Cybersecurity Education (NICE) evolved from the Comprehensive National Cybersecurity Initiative (CNCI), Initiative 8 - Expand Cyber Education, to develop a technologically-skilled and cyber-savvy workforce with the right knowledge and skills. Towards these ends, Component 3 of NICE is focused on the cybersecurity Workforce Structure - specifically talent management and the role of workforce planning in developing the national cybersecurity workforce. NICE has initiated discussions and issued guidance on workforce planning for cybersecurity best practices. In spring 2012, NICE published a white paper titled: Best Practices for Planning a Cybersecurity Workforce1, which introduces workforce planning methodologies for cybersecurity. This White Paper introduces a qualitative management tool, a Cybersecurity Workforce Planning Capability Maturity Model, to help organizations apply the best practice elements of workforce planning in analyzing their cybersecurity workforce requirements and needs. Contents * EXECUTIVE SUMMARY * THE CYBERSECURITY LANDSCAPE: NOW'S THE TIME TO PLAN * MAKING THE CASE: A NEED FOR CYBER WORKFORCE PLANNING CAPABILITY * The Practice of Workforce Planning * The Benefits of Workforce Planning * INTRODUCTION TO THE NICE CMM DEFINING WORKFORCE CMMS * Existing Models * Components of the NICE CMM * Criteria Areas * Maturity Levels * DETAILED OVERVIEW OF THE NICE CMM Process and Analytics * Integrated Governance * Skilled Practitioners and Enabling Technology * ACHIEVING MATURITY * Differing Maturity Goals * Assessing Current Capability * Step One: Gather Data * Step Two: Analyze Data and Determine Current Maturity * Step Three: Progressing in Maturity * BENEFITS OF ACHIEVING CYBERSECURITY WORKFORCE PLANNING MATURITY * CONCLUSION Book 2: Best Practices for Planning a Cybersecurity Workforce White Paper - The Nation's cybersecurity workforce is at the forefront of protecting critical infrastructure and computer networks from attack by foreign nations, criminal groups, hackers, and terrorist organizations. Organizations must have a clear understanding of their cybersecurity human capital skills and abilities as well as potential infrastructure needs to ensure protection against threats to information systems. Today, the cybersecurity community has evolved enough to define a National Cybersecurity Workforce Framework for understanding specialty areas of cybersecurity work and workforce needs. As a result, the field has reached a maturity level that enables organizations to inventory current capabilities. Next, as the nation seeks to build a skilled cybersecurity workforce, it will be necessary for organizations to mature further and begin forecasting future demand for the cybersecurity workforce. B2-A * INTRODUCTION * B2-B * BACKGROUND * B2-C * APPROACH * B2-D * CYBERSECURITY REQUIREMENTS * B2-E * CONCLUSION

Global Cyber Security Labor Shortage and International Business Risk

Download Global Cyber Security Labor Shortage and International Business Risk PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1522559280
Total Pages : 447 pages
Book Rating : 4.5/5 (225 download)

DOWNLOAD NOW!


Book Synopsis Global Cyber Security Labor Shortage and International Business Risk by : Christiansen, Bryan

Download or read book Global Cyber Security Labor Shortage and International Business Risk written by Christiansen, Bryan and published by IGI Global. This book was released on 2018-10-05 with total page 447 pages. Available in PDF, EPUB and Kindle. Book excerpt: Global events involving cybersecurity breaches have highlighted the ever-growing dependence on interconnected online systems in international business. The increasing societal dependence on information technology has pushed cybersecurity to the forefront as one of the most urgent challenges facing the global community today. Poor cybersecurity is the primary reason hackers are able to penetrate safeguards in business computers and other networks, and the growing global skills gap in cybersecurity simply exacerbates the problem. Global Cyber Security Labor Shortage and International Business Risk provides emerging research exploring the theoretical and practical aspects of protecting computer systems against online threats as well as transformative business models to ensure sustainability and longevity. Featuring coverage on a broad range of topics such as cybercrime, technology security training, and labor market understanding, this book is ideally designed for professionals, managers, IT consultants, programmers, academicians, and students seeking current research on cyber security’s influence on business, education, and social networks.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Download A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1498739970
Total Pages : 540 pages
Book Rating : 4.4/5 (987 download)

DOWNLOAD NOW!


Book Synopsis A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) by : Dan Shoemaker

Download or read book A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) written by Dan Shoemaker and published by CRC Press. This book was released on 2016-03-23 with total page 540 pages. Available in PDF, EPUB and Kindle. Book excerpt: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST’s cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF’s identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Practical Cloud Security

Download Practical Cloud Security PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1315353164
Total Pages : 175 pages
Book Rating : 4.3/5 (153 download)

DOWNLOAD NOW!


Book Synopsis Practical Cloud Security by : Melvin B. Greer, Jr.

Download or read book Practical Cloud Security written by Melvin B. Greer, Jr. and published by CRC Press. This book was released on 2016-08-05 with total page 175 pages. Available in PDF, EPUB and Kindle. Book excerpt: Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today’s enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features • Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned • Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies • Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements

Research Anthology on Advancements in Cybersecurity Education

Download Research Anthology on Advancements in Cybersecurity Education PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1668435551
Total Pages : 578 pages
Book Rating : 4.6/5 (684 download)

DOWNLOAD NOW!


Book Synopsis Research Anthology on Advancements in Cybersecurity Education by : Management Association, Information Resources

Download or read book Research Anthology on Advancements in Cybersecurity Education written by Management Association, Information Resources and published by IGI Global. This book was released on 2021-08-27 with total page 578 pages. Available in PDF, EPUB and Kindle. Book excerpt: Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. From banking to medical records to e-commerce, sensitive data has never before been at such a high risk of misuse. As such, organizations now have a greater responsibility than ever to ensure that their stakeholder data is secured, leading to the increased need for cybersecurity specialists and the development of more secure software and systems. To avoid issues such as hacking and create a safer online space, cybersecurity education is vital and not only for those seeking to make a career out of cybersecurity, but also for the general public who must become more aware of the information they are sharing and how they are using it. It is crucial people learn about cybersecurity in a comprehensive and accessible way in order to use the skills to better protect all data. The Research Anthology on Advancements in Cybersecurity Education discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data. Providing information on a range of topics from cybersecurity education requirements, cyberspace security talents training systems, and insider threats, it is ideal for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.

The Cybersecurity Dilemma

Download The Cybersecurity Dilemma PDF Online Free

Author :
Publisher : Oxford University Press
ISBN 13 : 0190694807
Total Pages : pages
Book Rating : 4.1/5 (96 download)

DOWNLOAD NOW!


Book Synopsis The Cybersecurity Dilemma by : Ben Buchanan

Download or read book The Cybersecurity Dilemma written by Ben Buchanan and published by Oxford University Press. This book was released on 2017-02-01 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

Cybersecurity Workforce

Download Cybersecurity Workforce PDF Online Free

Author :
Publisher : Nova Snova
ISBN 13 : 9781536158182
Total Pages : 0 pages
Book Rating : 4.1/5 (581 download)

DOWNLOAD NOW!


Book Synopsis Cybersecurity Workforce by : Maximilian Biermann

Download or read book Cybersecurity Workforce written by Maximilian Biermann and published by Nova Snova. This book was released on 2019 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: The security of federal information systems and data is critical to the nation's safety, prosperity, and well-being. However, federal systems and networks are inherently at risk because of their complexity, technological diversity, and geographic dispersion. Further, threats to federal information technology (IT) infrastructure continue to grow in number and sophistication, posing a risk to the reliable functioning of our government. A key component of the government's ability to mitigate and respond to cybersecurity threats is having a qualified, well-trained cybersecurity workforce. The objectives of chapter 1 are to determine the extent to which federal agencies have assigned work roles for positions performing IT, cybersecurity, or cyber-related functions and describe the steps federal agencies took to identify work roles of critical need. As reported in chapter 2, DHS has identified, categorized, and assigned employment codes to its cybersecurity positions and identified its cybersecurity workforce areas of critical need. Chapter 3 assessed whether: OPM developed a coding structure and procedures for assigning codes to cybersecurity positions and submitted a progress report to Congress; CFO Act agencies submitted complete, reliable baseline assessments of their cybersecurity workforces; and CFO Act agencies established procedures to assign codes to cybersecurity positions.

Recoverability as a First-Class Security Objective

Download Recoverability as a First-Class Security Objective PDF Online Free

Author :
Publisher : National Academies Press
ISBN 13 : 0309483735
Total Pages : 61 pages
Book Rating : 4.3/5 (94 download)

DOWNLOAD NOW!


Book Synopsis Recoverability as a First-Class Security Objective by : National Academies of Sciences, Engineering, and Medicine

Download or read book Recoverability as a First-Class Security Objective written by National Academies of Sciences, Engineering, and Medicine and published by National Academies Press. This book was released on 2018-10-01 with total page 61 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class Security Objective on February 8, 2018, in Washington, D.C. The workshop featured presentations from several experts in industry, research, and government roles who spoke about the complex facets of recoverabilityâ€"that is, the ability to restore normal operations and security in a system affected by software or hardware failure or a deliberate attack. This publication summarizes the presentations and discussions from the workshop.

Software Update as a Mechanism for Resilience and Security

Download Software Update as a Mechanism for Resilience and Security PDF Online Free

Author :
Publisher : National Academies Press
ISBN 13 : 0309462916
Total Pages : 97 pages
Book Rating : 4.3/5 (94 download)

DOWNLOAD NOW!


Book Synopsis Software Update as a Mechanism for Resilience and Security by : National Academies of Sciences, Engineering, and Medicine

Download or read book Software Update as a Mechanism for Resilience and Security written by National Academies of Sciences, Engineering, and Medicine and published by National Academies Press. This book was released on 2017-09-25 with total page 97 pages. Available in PDF, EPUB and Kindle. Book excerpt: Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop.

Cyber Workforce Retention

Download Cyber Workforce Retention PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 0 pages
Book Rating : 4.:/5 (137 download)

DOWNLOAD NOW!


Book Synopsis Cyber Workforce Retention by : William E. Parker IV

Download or read book Cyber Workforce Retention written by William E. Parker IV and published by . This book was released on 2022 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Cybersecurity Games

Download Cybersecurity Games PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 48 pages
Book Rating : 4.6/5 (957 download)

DOWNLOAD NOW!


Book Synopsis Cybersecurity Games by : Jessica Gulick

Download or read book Cybersecurity Games written by Jessica Gulick and published by . This book was released on 2020-10-09 with total page 48 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cyber competitions are venues, both physical and online, where participants perform in closed environments to defend the assets of an Information Technology (IT) network. Like any competition, cyber competitions are both instructional and gratifying for its participants. Within the National Institute for Standards and Technology (NIST), the Competitions subgroup (NICEWG) set an objective in early 2016 to explore the concepts, design strategies, and pursue actions that advance the role that competitions play in cybersecurity education, training, and workforce development.

Cybersecurity in Our Digital Lives

Download Cybersecurity in Our Digital Lives PDF Online Free

Author :
Publisher : Hudson Whitman/ ECP
ISBN 13 : 0989845141
Total Pages : 263 pages
Book Rating : 4.9/5 (898 download)

DOWNLOAD NOW!


Book Synopsis Cybersecurity in Our Digital Lives by : Jane LeClair

Download or read book Cybersecurity in Our Digital Lives written by Jane LeClair and published by Hudson Whitman/ ECP. This book was released on 2015-03-02 with total page 263 pages. Available in PDF, EPUB and Kindle. Book excerpt: Did you know your car can be hacked? Your medical device? Your employer’s HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of how and why they happen, or if they have been professionally or personally compromised. In Cybersecurity in Our Digital Lives, twelve experts provide much-needed clarification on the technology behind our daily digital interactions. They explain such things as supply chain, Internet of Things, social media, cloud computing, mobile devices, the C-Suite, social engineering, and legal confidentially. Then, they discuss very real threats, make suggestions about what can be done to enhance security, and offer recommendations for best practices. An ideal resource for students, practitioners, employers, and anyone who uses digital products and services.

Beginner's Guide to Developing a High School Cybersecurity Program - For High School Teachers, Counselors, Principals, Homeschool Families, Parents and Cybersecurity Education Advocates - Developing a Cybersecurity Program for High School Students

Download Beginner's Guide to Developing a High School Cybersecurity Program - For High School Teachers, Counselors, Principals, Homeschool Families, Parents and Cybersecurity Education Advocates - Developing a Cybersecurity Program for High School Students PDF Online Free

Author :
Publisher : Lulu.com
ISBN 13 : 0359829465
Total Pages : 86 pages
Book Rating : 4.3/5 (598 download)

DOWNLOAD NOW!


Book Synopsis Beginner's Guide to Developing a High School Cybersecurity Program - For High School Teachers, Counselors, Principals, Homeschool Families, Parents and Cybersecurity Education Advocates - Developing a Cybersecurity Program for High School Students by : Heather Monthie, PhD

Download or read book Beginner's Guide to Developing a High School Cybersecurity Program - For High School Teachers, Counselors, Principals, Homeschool Families, Parents and Cybersecurity Education Advocates - Developing a Cybersecurity Program for High School Students written by Heather Monthie, PhD and published by Lulu.com. This book was released on 2019-08-05 with total page 86 pages. Available in PDF, EPUB and Kindle. Book excerpt: As our lives become increasingly digital, we are open to cybersecurity vulnerabilities in almost everything we touch. Whether itÕs our smart homes, autonomous vehicles, or medical devices designed to save lives, we need a well-educated society who knows how to protect themselves, their families, and their businesses from life-altering cyber attacks. Developing a strong cybersecurity workforce is imperative for those working with emerging technologies to continue to create and innovate while protecting consumer data and intellectual property. In this book, Dr. Heather Monthie shares with cybersecurity education advocates how to get started with developing a high school cybersecurity program.

Computing and Technology Ethics

Download Computing and Technology Ethics PDF Online Free

Author :
Publisher : MIT Press
ISBN 13 : 0262374277
Total Pages : 505 pages
Book Rating : 4.2/5 (623 download)

DOWNLOAD NOW!


Book Synopsis Computing and Technology Ethics by : Emanuelle Burton

Download or read book Computing and Technology Ethics written by Emanuelle Burton and published by MIT Press. This book was released on 2023-02-14 with total page 505 pages. Available in PDF, EPUB and Kindle. Book excerpt: A new approach to teaching computing and technology ethics using science fiction stories. Should autonomous weapons be legal? Will we be cared for by robots in our old age? Does the efficiency of online banking outweigh the risk of theft? From communication to travel to medical care, computing technologies have transformed our daily lives, for better and for worse. But how do we know when a new development comes at too high a cost? Using science fiction stories as case studies of ethical ambiguity, this engaging textbook offers a comprehensive introduction to ethical theory and its application to contemporary developments in technology and computer science. Computing and Technology Ethics: Engaging through Science Fiction first introduces the major ethical frameworks: deontology, utilitarianism, virtue ethics, communitarianism, and the modern responses of responsibility ethics, feminist ethics, and capability ethics. It then applies these frameworks to many of the modern issues arising in technology ethics including privacy, computing, and artificial intelligence. A corresponding anthology of science fiction brings these quandaries to life and challenges students to ask ethical questions of themselves and their work. Uses science fiction case studies to make ethics education engaging and fun Trains students to recognize, evaluate, and respond to ethical problems as they arise Features anthology of short stories from internationally acclaimed writers including Ken Liu, Elizabeth Bear, Paolo Bacigalupi, and T. C. Boyle to animate ethical challenges in computing technology Written by interdisciplinary author team of computer scientists and ethical theorists Includes a robust suite of instructor resources, such as pedagogy guides, story frames, and reflection questions