SlideShare a Scribd company logo
1 of 24
Alfreda Dudley
Towson University, USA
James Braman
Towson University, USA
Giovanni Vincenti
Towson University, USA
Investigating Cyber Law
and Cyber Ethics:
Issues, Impacts and Practices
Investigating cyber law and cyber ethics: issues, impacts and
practices / Alfreda Dudley, James Braman and Giovanni
Vincenti, editors.
p. cm.
Includes bibliographical references and index.
Summary: “This book discusses the impact of cyber ethics and
cyber law on information technologies and society,
featuring current research, theoretical frameworks, and case
studies”--Provided by publisher.
ISBN 978-1-61350-132-0 (hardcover) -- ISBN 978-1-61350-
133-7 (ebook) -- ISBN 978-1-61350-134-4 (print & perpetual
access) 1. Internet--Law and legislation. 2. Computer crimes.
3. Internet--Social aspects. 4. Internet--Moral and ethical
aspects. I. Dudley, Alfreda, 1957- II. Braman, James, 1981- III.
Vincenti, Giovanni, 1978-
K4345.I58 2011
345’.0268--dc23
2011022933
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available
from the British Library.
All work contributed to this book is new, previously-
unpublished material. The views expressed in this book are
those of the
authors, but not necessarily of the publisher.
Senior Editorial Director: Kristin Klinger
Director of Book Publications: Julia Mosemann
Editorial Director: Lindsay Johnston
Acquisitions Editor: Erika Carter
Development Editor: Myla Harty
Production Editor: Sean Woznicki
Typesetters: Lisandro Gonzalez, Adrienne Freeland
Print Coordinator: Jamie Snavely
Cover Design: Nick Newcomer
Published in the United States of America by
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: [email protected]
Web site: http://www.igi-global.com
Copyright © 2012 by IGI Global. All rights reserved. No part
of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including
photocopying, without written permission from the publisher.
Product or company names used in this set are for identification
purposes only. Inclusion of the names of the products or
companies does not indicate a claim of ownership by IGI Global
of the trademark or registered trademark.
Library of Congress Cataloging-in-Publication Data
Editorial Advisory Board
Doris Lidtke, Towson University, USA
Gabriele Meiselwitz, Towson University, USA
Donna Tupper, Community College of Baltimore County
Maryland, USA
Yuanqiong Wang, Towson University, USA
Cecelia Wright Brown, University of Baltimore, USA
List of Reviewers
Charles Dierbach
Mary Hackley
Dennis Hamilton
Doris Lidtke
Gabriele Meiselwitz
Juliette Townsend
Donna Tupper
Yuanqiong Wang
Cecelia Wright Brown
Table of Contents
Foreword
...............................................................................................
.............................................. xiii
Preface
...............................................................................................
................................................... xv
Acknowledgment
...............................................................................................
................................. xix
Section 1
Legal and Jurisdictional Issues Regarding Cyberspace
Chapter 1
Responsibility, Jurisdiction, and the Future of “Privacy by
Design” ..................................................... 1
Ugo Pagallo, University of Turin, Italy
Chapter 2
Hacking: Legal and Ethical Aspects of an Ambiguous Activity
........................................................... 21
Gráinne Kirwan, Dun Laoghaire Institute of Art, Design and
Technology, Ireland
Andrew Power, Dun Laoghaire Institute of Art, Design and
Technology, Ireland
Chapter 3
Emerging Cybercrime Trends: Legal, Ethical, and Practical
Issues ..................................................... 37
Sean M. Zadig, Nova Southeastern University, USA
Gurvirender Tejay, Nova Southeastern University, USA
Chapter 4
Law and Technology at Crossroads in Cyberspace: Where Do
We Go From Here? ............................ 57
Anteneh Ayanso, Brock University, Canada
Tejaswini Herath, Brock University, Canada
Chapter 5
Cyber Law, Cyber Ethics and Online Gambling
.................................................................................. 78
Lee Gillam, University of Surrey, UK
Anna Vartapetiance, University of Surrey, UK
Section 2
Legal and Ethical Implications Involving Social Networks and
Virtual Worlds
Chapter 6
An Overview of Child Abuses in 3D Social Networks and
Online Video Games ............................. 101
Miguel A. Garcia-Ruiz, University of Colima, Mexico
Miguel Vargas Martin, University of Ontario Institute of
Technology, Canada
Patrik Olsson, University of Ontario Institute of Technology,
Canada
Chapter 7
Ethics and Legal Aspects of Virtual Worlds
....................................................................................... 117
Andrew Power, Dun Laoghaire Institute of Art, Design and
Technology, Ireland
Gráinne Kirwan, Dun Laoghaire Institute of Art, Design and
Technology, Ireland
Chapter 8
Narbs as a Measure and Indicator of Identity Narratives
................................................................... 132
Ananda Mitra, Wake Forest University, USA
Chapter 9
Cloud Based Social Network Sites: Under Whose Control?
.............................................................. 147
Jean-Philippe Moiny, University of Namur, Belgium
Section 3
Legal and Ethical Implications in Cyberspace: An International
Perspective
Chapter 10
Al-Qaeda on Web 2.0: Radicalization and Recruitment
Strategies .................................................... 221
Anne Gerdes, University of Southern Denmark, Denmark
Chapter 11
Google in China: Corporate Responsibility on a Censored
Internet ................................................... 239
Richard A. Spinello, Boston College, USA
Chapter 12
All’s WELL that Ends WELL: A Comparative Analysis of the
Constitutional
and Administrative Frameworks of Cyberspace and the United
Kingdom ........................................ 254
Jonathan Bishop, Swansea University, UK
Chapter 13
A UK Law Perspective: Defamation Law as it Applies on the
Internet ............................................. 264
Sam De Silva, Manches LLP, UK
Chapter 14
The Hellenic Framework for Computer Program Copyright
Protection Following
the Implementation of the Relative European Union Directives
........................................................ 280
Eugenia Alexandropoulou-Egyptiadou, University of
Macedonia, Greece
Chapter 15
Internet Advertising: Legal Aspects in the European Union
.............................................................. 288
Radomír Jakab, University of P. J. Safarik, Slovakia
About the Contributors
............................................................................................. ..
..................... 311
Index
...............................................................................................
.................................................... 317
Detailed Table of Contents
Foreword
...............................................................................................
............................................... xii
Preface
...............................................................................................
.................................................. xiv
Acknowledgment
...............................................................................................
...............................xviii
Section 1
Legal and Jurisdictional Issues Regarding Cyberspace
Chapter 1
Responsibility, Jurisdiction, and the Future of “Privacy by
Design” ..................................................... 1
Ugo Pagallo, University of Turin, Italy
As the amount of personal information and data on global
networks increase, systems allow for a more
granular control over privacy settings by letting users define
how much information to divulge. Some-
times the systems suffice for the needs of the users as-is; other
times they require a significant tailoring
to fulfill one’s expectations. The concept of “privacy by design”
is built into the majority of IT services
today, placing itself at the intersection between the regulations
of national legal systems relevant to
data protection and personal control. Pagallo’s chapter explores
in detail the balance between these two
realities, focusing on the views generated by the legal systems.
Chapter 2
Hacking: Legal and Ethical Aspects of an Ambiguous Activity
........................................................... 21
Gráinne Kirwan, Dun Laoghaire Institute of Art, Design and
Technology, Ireland
Andrew Power, Dun Laoghaire Institute of Art, Design and
Technology, Ireland
The practice of hacking conceals a large array of motivations,
generated by intents that may or may not
be malicious in nature. Some argue that this traditionally
questionable practice can be very well utilized
for positive purposes, when directed towards the welfare of the
systems and data by looking for potential
vulnerabilities without necessarily exploiting them. The
majority of the uninformed population does attach
a negative connotation to any form of hacking. This chapter
reviews this widespread practice through
a wide overview, then approaches the discussion of its
ethicality. The authors also offers a perspective
given by international legal systems.
Chapter 3
Emerging Cybercrime Trends: Legal, Ethical, and Practical
Issues ..................................................... 37
Sean M. Zadig, Nova Southeastern University, USA
Gurvirender Tejay, Nova Southeastern University, USA
A natural consequence to the shifting of every-day operations
from a brick-and-mortar paradigm to one
that lives completely in cyberspace also entails that the
typically associated aspect of crime will also
follow this radical change. As more and more crimes committed
on Information Systems and computer
hardware are reported in the news, affecting sensitive
information about millions of people and often
involving significant amount of money, the techniques of
committing these crimes as well as their coun-
teractions have to evolve continually. This chapter explores the
methodologies through which perpetra-
tors often carry on their illegal activities against sensitive data
of various natures, focusing especially
on the employment of large networks of compromised
computers, or botnets. The authors also offer
perspectives given by practitioners, law enforcement, and
researchers who made cybercrime the focus
of their attention.
Chapter 4
Law and Technology at Crossroads in Cyberspace: Where Do
We Go From Here? ............................ 57
Anteneh Ayanso, Brock University, Canada
Tejaswini Herath, Brock University, Canada
The variety of computer crimes along with the complexity of the
environments in which they take place,
compounds the problem of devising a mechanism that can
effectively addresses these types of criminal
activities. It is extremely important for organizations and
governments to understand computer crimes
and to establish frameworks and other active measures in order
to be proactive in reducing computer
based crime. In this chapter the authors discuss these important
topics along with a review of academic
literature, industry reports, and information from the media, in
identifying various types of computer
crime and discuss the counter strategies to deal with such
crimes in a legal, technological, and organi-
zational context.
Chapter 5
Cyber Law, Cyber Ethics and Online Gambling
.................................................................................. 78
Lee Gillam, University of Surrey, UK
Anna Vartapetiance, University of Surrey, UK
Perhaps one of the most profitable applications of a real-life
practice carried online, gambling is a phe-
nomenon that affects users across cultures, often reaching
pathological levels that cannot be sustained
without external help. The significant relevance of this topic
becomes even more intricate as we observe
the seam that exists in the interaction between gambling in real
life and the one that exists on comput-
ers alone. This chapter observes the difficulties posed by the
variations of the laws, which affect either
the physical world or the virtual one. The authors then go on
and discuss the possibility of creating
systems that embed adherence to laws, providing support for
ethics in an effort of protecting unwary
or ill-informed users.
Section 2
Legal and Ethical Implications Involving Social Networks and
Virtual Worlds
Chapter 6
An Overview of Child Abuses in 3D Social Networks and
Online Video Games ............................. 101
Miguel A. Garcia-Ruiz, University of Colima, Mexico
Miguel Vargas Martin, University of Ontario Institute of
Technology, Canada
Patrik Olsson, University of Ontario Institute of Technology,
Canada
The advent of Internet-based technologies has sprung many
different initiatives aimed at replicating
features of the real world through the cybernetic medium. At
times the physical environment in which
we live is enhanced through technology through augmented or
virtual reality; other times instead it is
completely paralleled and often exacerbated. The idea of multi-
user virtual environments contains a
potential that is barely tapped: few educators still use it; virtual
tourism is often limited by the small
amount of real-life destinations reproduced through this
window. Aspects of sexuality though have been
developed significantly enough to also have brought perversions
and illegal activities to virtual worlds,
sometimes replicating flawlessly the morbidity associated with
them. This chapter analyzes child pornog-
raphy through multi-user virtual environments, reviewing
ethical and legal issues that revolve around it.
Chapter 7
Ethics and Legal Aspects of Virtual Worlds
....................................................................................... 117
Andrew Power, Dun Laoghaire Institute of Art, Design and
Technology, Ireland
Gráinne Kirwan, Dun Laoghaire Institute of Art, Design and
Technology, Ireland
Any time we wish to visit new places, we usually consider the
physical displacement associated with
the journey. Often times, in addition to the necessity of
reaching the location we wish to visit, we also
need to take into consideration aspects that reach different laws
and regulations when we decide to
cross national borders, visiting new countries. The lines are not
so clear, if they are visible at all, when
we interact with virtual worlds and virtual spaces. This chapter
reviews ethical implications, technical
solutions and the privatization of legal remedies of the still
underdeveloped realm of the legal system
in user-driven virtual environments.
Chapter 8
Narbs as a Measure and Indicator of Identity Narratives
................................................................... 132
Ananda Mitra, Wake Forest University, USA
With the increased usage of social networks and the abundance
of information we reveal in contribut-
ing to our online personas, these narrative bits of information
can be used to create a composite of an
individual. In this chapter, the author discusses in detail these
“narrative bits,” or narbs that encapsulate
measurable attributes - content, authorship, frequency of
appearance and spatial information about the
user. Certain characteristics of narbs can be measured though a
narb weight and matrix for each indi-
vidual user to reveal certain information. As social networking
tools become more common place, it is
important to gauge the types of information we reveal and how
such information can be used.
Chapter 9
Cloud Based Social Network Sites: Under Whose Control?
.............................................................. 147
Jean-Philippe Moiny, University of Namur, Belgium
The projection of one’s life in cyberspace does not necessarily
have to go through 3-dimensional virtual
environments. The massive advent of social networking sites
has enabled users of any age, culture, and
creed to share information about themselves and their lives with
anyone who is willing to connect with
them. This concept brings a significant stress on the policies
that govern what should and shouldn’t be
shared with others through these social services. The author
focuses on four main themes: privacy, data
protection, confidentiality of electronic communications, and
the unauthorized access to computers. The
main subject of this work includes how American and European
(in particular Belgian) laws empower
users in the process of recovering the control over the global
availability of their data through social
networks. These two legal systems are compared, utilizing
similarities as well as differences as terms
of comparison and evaluation.
Section 3
Legal and Ethical Implications in Cyberspace: An International
Perspective
Chapter 10
Al-Qaeda on Web 2.0: Radicalization and Recruitment
Strategies .................................................... 221
Anne Gerdes, University of Southern Denmark, Denmark
As most aspects of life are moving towards their embedding in
the global technological infrastructure
offered by the Internet, also dangerous and controversial aspects
of life such as terrorism seem to follow.
This shift towards a highly technological avenue of information
allows for a more capillary distribu-
tion of untainted and unaltered credos and documents,
potentially increasing the recruiting pool in the
eyes of those who actively participate in these practices. This
chapter evaluates in detail the strategy
of proselytism utilized by Al-Qaeda and potentially other terror-
based organizations in modern days.
The author points out the essential components that are missing
from this campaign, which are inherent
characteristics of the Web 2.0 approach to technology and
modern diffusion of ideas.
Chapter 11
Google in China: Corporate Responsibility on a Censored
Internet ................................................... 239
Richard A. Spinello, Boston College, USA
Tracing the path that information takes from its origin to the
end-user is often difficult in today’s age of
open networks and news services. The process of harnessing,
controlling, and filtering such information
is yet more complex, as it seriously undermines the freedom
that is the basic foundation to the major-
ity of online communications in today’s day and age. The mix
of these concepts with strict regulations
often inflicted to its people by strict governments creates a
series of arguments that are of extreme im-
portance. The author analyzes the root causes of disagreements
between what should be published and
what should be available to the end-user, arguing that a
proactive self-regulation may very well establish
a firm foundation towards a more successful collaboration
between information-providing agencies and
government-supervised communications media.
Chapter 12
All’s WELL that Ends WELL: A Comparative Analysis of the
Constitutional
and Administrative Frameworks of Cyberspace and the United
Kingdom ........................................ 254
Jonathan Bishop, Swansea University, UK
Understanding where the legal regulations of one country end
and the other begins is relatively simple
in the real world, where we can place physical boundaries
between these two different political enti-
ties, and monitor the grounds to ensure the enforcement of laws.
When we move our discussion to the
Internet, we are not as easily able to identify the shifting
between governments. This chapter illustrates,
through cases and discussion, the importance as well as the
difficulties involved in translating rules and
regulations typical of the physical world into the digital one
represented by websites, flow of informa-
tion, and services.
Chapter 13
A UK Law Perspective: Defamation Law as it Applies on the
Internet ............................................. 264
Sam De Silva, Manches LLP, UK
The act of defamation is one of the many emergent phenomena
associated with social and societal
aspects of the Internet’s predisposition to world-wide
communications. The ease with which messages
and information travel over great distances has made the
defense against defamation even more crucial.
This chapter reviews significant legal achievements such as the
Defamation Act and the E-Commerce
Directive in light of these new trends, focusing in particular on
the case of the United Kingdom’s legal
system. The discussions here are applicable and important in
many contexts where defamation and
reputation are involved.
Chapter 14
The Hellenic Framework for Computer Program Copyright
Protection Following
the Implementation of the Relative European Union Directives
........................................................ 280
Eugenia Alexandropoulou-Egyptiadou, University of
Macedonia, Greece
As issues of computer piracy have plagued software developers
worldwide, legislators have been faced
with the challenge to create regulations in the effort to stop
such activities at many levels, both nationally
and internationally. This chapter focuses on the presentation of
the current Hellenic legal framework on
computer program copyright protection following the relative
E.U. Directives. Piracy rates, protection
of right holders, specific cases, and consequences of copyright
infringement are discussed along with
recommendations from the author. In a world where software
can be easily copied, the topics discussed
are important to consider.
Chapter 15
Internet Advertising: Legal Aspects in the European Union
.............................................................. 288
Radomír Jakab, University of P. J. Safarik, Slovakia
Often, when we are exposed to something over and over, we
barely pay attention to it any more. In many
cases advertising takes this very characteristic, leading us to
ignoring it while we really should pay atten-
tion, especially if the manner in which it takes place is legal.
Internet-based ads, along with all the other
kinds of publicity, are subject to regulations that often are not
followed entirely or even ignored. This
chapter explores in detail the European regulations that affect
advertising (in many shapes), prompting
for very interesting discussions about these topics well beyond
the areas of application discussed here.
About the Contributors
...............................................................................................
..................... 311
Index
...............................................................................................
.................................................... 317
xiii
Foreword
Everyday each one of us face choices that call for decisions;
some major and others minor. These deci-
sions are often influenced by a set of guidelines, adherence to
laws, our morals and/or ethics. In most
situations these guidelines are straightforward (at least
perceivably) for each situation we encounter. In
today’s information rich and technology dependent culture,
many of the lines are blurred when it comes
to how we interact and use technology- making informed
decisions more difficult. The devices, software
and other technology designed to make our lives easier, have in
many situations made our lives more
complicated when it comes to ethics and laws. Issues that did
not exist in the past, now must be addressed
and scrutinized, and new laws developed. In many instances
however, old crimes and social issues have
been reinvented or exacerbated by these new technologies. A
cyber criminal can be hiding in one part
of the world committing crimes in another part using someone
else’s identity. Not only does the crime
itself need to be analyzed, but also the laws that are being
violated and the country. What may be legal
or ethically sound for one location may be illegal in another.
Other such issues arise from organizations
and businesses not fully understanding their vulnerabilities, or
computer based crime and/or their re-
sponsibilities to protect their data. Social networks have also
changed the legal landscape by adding new
dimensions of vulnerability and social engineering through the
creation of our online digital selves. We
spend so much time constructing our online representation, but
forget that the information we post on-
line can sometimes be used against us. These types of problems
are just a few mentioned in this book
as it aims to highlight many mainstream global ethical and legal
problems caused or amplified by tech-
nology.
With this book, Investigating Cyber Law and Cyber Ethics:
Issues, Impacts and Practices, observa-
tions can be made about the impact of technology, software and
the Internet through a legal and ethical
point of view. Three main sections provide the framework for
the book, which include: Section 1: Legal
and Jurisdictional Issues Regarding Cyberspace, Section 2:
Legal and Ethical Implications involving
Social Networks and Virtual Worlds; and Section 3: Legal and
Ethical Implications in Cyberspace – An
International Perspective. Through these divisions, a unique
collection of articles, research initiatives,
essays and discussions are presented with the objective to
provided readers with an international view
of current trends in these growing areas of importance.
Today cyber technologies have significant impact on privacy,
security and individual rights. IT
professionals and educators must have a working knowledge of
the professional, ethical, legal, security
and social issues and responsibilities associated with these
technologies. They must be aware of and
adhere to the ethical standards of the profession as they
formulate solutions to meet user needs in an
organizational and societal context. The nature of their
involvement with implementing and managing
xiv
information and communication technologies requires IT
professionals to be aware of relevant legal
statutes and procedures including computer crime rules of
evidence, evidence seizure and handling, as
well as court presentation.
Scott Hilberg
Towson University, March 2010
Scott Hilberg is the Assistant Director for Center for Applied
Information Technology (CAIT), the Director of the
undergraduate
Information Technology program, and Clinical Assistant
Professor in the Department of Computer and Information
Sciences
at Towson University. His academic background includes an
Ed.D. in Innovation & Leadership from Wilmington University
and a M.A.S. in Management Information Technology from
Johns Hopkins University. He has taught programming, system
development, and project management. In addition, he has 15+
years of industry experience as a programmer, systems analyst,
and IT manager.
xv
Preface
Computer technologies have continually and rapidly changed
and advanced in the last two decades. The
impacts of these rapid changes are affecting the use and
applications of computer technologies in soci-
ety. These impacts bring about new focus and scrutiny. One of
the fundamental changes in the last decade
has been the realization that the context in which computer
technologies are used must take into account
the ethical implications associated with their use. Examples of
computing ethical issues include, but are
not limited to: cyberterrorism; security and privacy
responsibilities; intellectual property rights; online
piracy; blogger litigation; data recovery; data protection;
wireless computing; computer crime; et cetera.
Another fundamental change is the increased importance of the
legal impacts that new computer tech-
nologies introduce. However, these changes do not necessarily
correspond to the changes in the com-
puter technology itself.
Ethics, when applied to technology-related issues, are also
recognized as cyberethics (Tavani, 2010).
There is a plethora of viewpoints regarding the subject of
cyberethics. For instance, one major ques-
tion that many professionals both inside and outside the
computer community consider: Are cybereth-
ics different from “regular” ethics? Regular ethics are defined
as ethics that apply across all contexts
(i.e., medical, legal, business, and religious). In some instances,
this question can be answered with a
definite yes. However, many theorists would state that there are
differences between regular ethics and
cyberethics. They base their arguments on the fact that
cyberethics is based on the impact of computing
technologies on individuals and society. However, this does not
indicate that computing technologies
have introduced new ethical issues. Therefore, some would
argue that there are no differences between
regular ethics and cyberethics. Their arguments are based on the
fact that computing technologies only
bring a new dimension to existing ethical issues. A major
problem is the practice and application of
ethics in computing environments by computing professionals
and users.
In the computing culture, professionals and organizations put
emphasis on proper or improper design
procedures and practices. While this is definitely important,
increasing awareness of the ethical behavioral
practices of the computing professional and organization is
becoming crucial. Computing technology is
pervasive in all areas of society; …
PICOT Statement
(P) In-patients in acute care units and acute rehabilitation unit.
(I) –Implementation of adequate nurse-to-patient staffing ratios
(C) –Disproportional nurse-to-patient staffing ratios
(O) –Improvement in quality of patient care
(T) Throughout hospitalization period
(P) For in-patients in acute care units and acute rehabilitation
units(I)will implementation
of adequate nurse-to-patient staffing ratio(C)against
disproportional nurse-to-patient
staffing ratio(O)improves the quality of patient
care(T)throughout the period of the
hospitalization?
My project capstone topic
The Effects of Disproportionate Nurse to Patient Staffing
Ratios on the quality of Patient Care
Courtney, M. (2017). The Effects of Short Staffing on Patient
Outcomes. Retrieved from
https://digitalcommons.murraystate.edu/scholarsweek/Fall2017/
ClinicalHealthcare/10/
Cho, S. H., Lee, J. Y., June, K. J., Hong, K. J., & Kim, Y.
(2016). Nurse staffing levels and proportion of hospitals and
clinics meeting the legal standard for nurse staffing for 1996~
2013. Journal of Korean Academy of Nursing Administration,
22(3), 209-219.
Cho E, Sloane DM, Kim EY, et al (2015). Effects of nurse
staffing, work environments, and education on patient mortality:
an observational study. Int J Nurs Stud. 2015;52(2):535–542.
doi: 10.1016/j.ijnurstu.2014.08.006
Olley, R., Edwards, I., Avery, M., & Cooper, H. (2019). A
systematic review of the evidence related to mandated nurse
staffing ratios in acute hospitals. Retrieved from
https://www.ncbi.nlm.nih.gov/pubmed/29661270
Johnson, E. (2018). Nursing Staffing and Patient Outcomes.
Integrated Studies.
https://digitalcommons.murraystate.edu/bis437/130
Needleman, J. (2017). Nursing skill mix and patient
outcomes. BMJ.
https://qualitysafety.bmj.com/content/26/7/525.full
Shin, S., Park, J. H., & Bae, S. H. (2018). Nurse staffing and
nurse outcomes: A systematic review and meta-analysis.
Retrieved from https://www.ncbi.nlm.nih.gov/pubmed/29685321
Song, Y., Hoben, M., Norton, P., & Estabrooks, C. A. (2020).
Association of Work Environment with Missed and Rushed Care
Tasks Among Care Aides in Nursing Homes. doi:
10.1001/jamanetworkopen.2019.20092.

More Related Content

Similar to Alfreda DudleyTowson University, USAJames BramanTo.docx

The change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidiliThe change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidiliVidili
 
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docxWeek 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docxjessiehampson
 
Racism Today Essay.pdf
Racism Today Essay.pdfRacism Today Essay.pdf
Racism Today Essay.pdfJenny Jones
 
3 Ways To Write An Essay On Sociology - WikiHow
3 Ways To Write An Essay On Sociology - WikiHow3 Ways To Write An Essay On Sociology - WikiHow
3 Ways To Write An Essay On Sociology - WikiHowCarol
 
Cyber-Terrorism Finding a Common Starting Point By Je
Cyber-Terrorism Finding a Common Starting Point By JeCyber-Terrorism Finding a Common Starting Point By Je
Cyber-Terrorism Finding a Common Starting Point By JeOllieShoresna
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docxjackiewalcutt
 
RAND_TR293.pdf
RAND_TR293.pdfRAND_TR293.pdf
RAND_TR293.pdfAnatolii8
 
The Internet of Things: An Overview
The Internet of Things: An OverviewThe Internet of Things: An Overview
The Internet of Things: An OverviewAli Babaoglan Blog
 
Isoc io t-overview-20151014-0
Isoc io t-overview-20151014-0Isoc io t-overview-20151014-0
Isoc io t-overview-20151014-0Nguyen Thanh
 
giáo trình chương 1 (1).pdf
giáo trình chương 1 (1).pdfgiáo trình chương 1 (1).pdf
giáo trình chương 1 (1).pdfNguynThMinhL7
 
Word Essay Professional Writin. Online assignment writing service.
Word Essay Professional Writin. Online assignment writing service.Word Essay Professional Writin. Online assignment writing service.
Word Essay Professional Writin. Online assignment writing service.Debra Perea
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Data mining and homeland security rl31798
Data mining and homeland security rl31798Data mining and homeland security rl31798
Data mining and homeland security rl31798Daniel John
 

Similar to Alfreda DudleyTowson University, USAJames BramanTo.docx (20)

The change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidiliThe change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
The change of_surveillance_and_its_issues_chiara_artini&alessia_vidili
 
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docxWeek 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
Week 2 Assignment 2 Presentation TopicsSubmit Assignment· Due.docx
 
Racism Today Essay
Racism Today EssayRacism Today Essay
Racism Today Essay
 
Racism Today Essay.pdf
Racism Today Essay.pdfRacism Today Essay.pdf
Racism Today Essay.pdf
 
Big Data Social Network Analysis
Big Data Social Network AnalysisBig Data Social Network Analysis
Big Data Social Network Analysis
 
Usenix 10.pdf
Usenix 10.pdfUsenix 10.pdf
Usenix 10.pdf
 
3 Ways To Write An Essay On Sociology - WikiHow
3 Ways To Write An Essay On Sociology - WikiHow3 Ways To Write An Essay On Sociology - WikiHow
3 Ways To Write An Essay On Sociology - WikiHow
 
Rand rr1751
Rand rr1751Rand rr1751
Rand rr1751
 
Cyber-Terrorism Finding a Common Starting Point By Je
Cyber-Terrorism Finding a Common Starting Point By JeCyber-Terrorism Finding a Common Starting Point By Je
Cyber-Terrorism Finding a Common Starting Point By Je
 
Computing security
Computing securityComputing security
Computing security
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx
 
Thesis
ThesisThesis
Thesis
 
RAND_TR293.pdf
RAND_TR293.pdfRAND_TR293.pdf
RAND_TR293.pdf
 
The Internet of Things: An Overview
The Internet of Things: An OverviewThe Internet of Things: An Overview
The Internet of Things: An Overview
 
Isoc io t-overview-20151014-0
Isoc io t-overview-20151014-0Isoc io t-overview-20151014-0
Isoc io t-overview-20151014-0
 
giáo trình chương 1 (1).pdf
giáo trình chương 1 (1).pdfgiáo trình chương 1 (1).pdf
giáo trình chương 1 (1).pdf
 
Word Essay Professional Writin. Online assignment writing service.
Word Essay Professional Writin. Online assignment writing service.Word Essay Professional Writin. Online assignment writing service.
Word Essay Professional Writin. Online assignment writing service.
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Data mining and homeland security rl31798
Data mining and homeland security rl31798Data mining and homeland security rl31798
Data mining and homeland security rl31798
 

More from ADDY50

American History paper on Explain what transcendentalism is and how .docx
American History paper on Explain what transcendentalism is and how .docxAmerican History paper on Explain what transcendentalism is and how .docx
American History paper on Explain what transcendentalism is and how .docxADDY50
 
AMobile devices have become the de facto standard for communic.docx
AMobile devices have become the de facto standard for communic.docxAMobile devices have become the de facto standard for communic.docx
AMobile devices have become the de facto standard for communic.docxADDY50
 
Amy Tan is an American writer whose novels examine family rela.docx
Amy Tan is an American writer whose novels examine family rela.docxAmy Tan is an American writer whose novels examine family rela.docx
Amy Tan is an American writer whose novels examine family rela.docxADDY50
 
America” by Claude McKay  and We Wear the Mask” by Paul Laurence D.docx
America” by Claude McKay  and We Wear the Mask” by Paul Laurence D.docxAmerica” by Claude McKay  and We Wear the Mask” by Paul Laurence D.docx
America” by Claude McKay  and We Wear the Mask” by Paul Laurence D.docxADDY50
 
American Police Departments have evolved through several eras in whi.docx
American Police Departments have evolved through several eras in whi.docxAmerican Police Departments have evolved through several eras in whi.docx
American Police Departments have evolved through several eras in whi.docxADDY50
 
American Greed AnalysisPrepare both a presentation (PowerPoint).docx
American Greed AnalysisPrepare both a presentation (PowerPoint).docxAmerican Greed AnalysisPrepare both a presentation (PowerPoint).docx
American Greed AnalysisPrepare both a presentation (PowerPoint).docxADDY50
 
American Management Association • www.amanet.orgHas this.docx
American Management Association • www.amanet.orgHas this.docxAmerican Management Association • www.amanet.orgHas this.docx
American Management Association • www.amanet.orgHas this.docxADDY50
 
Ambush Predation of Stingless Bees (Tetragoniscaangustula) b.docx
Ambush Predation of Stingless Bees (Tetragoniscaangustula) b.docxAmbush Predation of Stingless Bees (Tetragoniscaangustula) b.docx
Ambush Predation of Stingless Bees (Tetragoniscaangustula) b.docxADDY50
 
Amazon HQ2 Research Project, BUS 163Professor Cuadra, Tacoma Commu.docx
Amazon HQ2 Research Project, BUS 163Professor Cuadra, Tacoma Commu.docxAmazon HQ2 Research Project, BUS 163Professor Cuadra, Tacoma Commu.docx
Amazon HQ2 Research Project, BUS 163Professor Cuadra, Tacoma Commu.docxADDY50
 
Always Fresh allows external users, such as vendors and business par.docx
Always Fresh allows external users, such as vendors and business par.docxAlways Fresh allows external users, such as vendors and business par.docx
Always Fresh allows external users, such as vendors and business par.docxADDY50
 
Alvin Ailey Revelations AnalysisThe purpose of this assignment.docx
Alvin Ailey Revelations AnalysisThe purpose of this assignment.docxAlvin Ailey Revelations AnalysisThe purpose of this assignment.docx
Alvin Ailey Revelations AnalysisThe purpose of this assignment.docxADDY50
 
AMMS company they have an issue with closing petty cash every month .docx
AMMS company they have an issue with closing petty cash every month .docxAMMS company they have an issue with closing petty cash every month .docx
AMMS company they have an issue with closing petty cash every month .docxADDY50
 
AmicableDeviousDissonanceEffaceGarrulousImmutabl.docx
AmicableDeviousDissonanceEffaceGarrulousImmutabl.docxAmicableDeviousDissonanceEffaceGarrulousImmutabl.docx
AmicableDeviousDissonanceEffaceGarrulousImmutabl.docxADDY50
 
An American psychologistRobert V. Guthrie, one of the most inf.docx
An American psychologistRobert V. Guthrie, one of the most inf.docxAn American psychologistRobert V. Guthrie, one of the most inf.docx
An American psychologistRobert V. Guthrie, one of the most inf.docxADDY50
 
Amazon is one of the worlds most popular online retailers. The co.docx
Amazon is one of the worlds most popular online retailers. The co.docxAmazon is one of the worlds most popular online retailers. The co.docx
Amazon is one of the worlds most popular online retailers. The co.docxADDY50
 
American Academy of Political and Social Science Woun.docx
American Academy of Political and Social Science  Woun.docxAmerican Academy of Political and Social Science  Woun.docx
American Academy of Political and Social Science Woun.docxADDY50
 
American Apparel Submit your completed strategy and change ma.docx
American Apparel Submit your completed strategy and change ma.docxAmerican Apparel Submit your completed strategy and change ma.docx
American Apparel Submit your completed strategy and change ma.docxADDY50
 
American Government Policy PaperThis project is an opportuni.docx
American Government Policy PaperThis project is an opportuni.docxAmerican Government Policy PaperThis project is an opportuni.docx
American Government Policy PaperThis project is an opportuni.docxADDY50
 
American Greetings Case1. What is going on at American Greetin.docx
American Greetings Case1. What is going on at American Greetin.docxAmerican Greetings Case1. What is going on at American Greetin.docx
American Greetings Case1. What is going on at American Greetin.docxADDY50
 
Although ADHD is often associated with children, this disorder is di.docx
Although ADHD is often associated with children, this disorder is di.docxAlthough ADHD is often associated with children, this disorder is di.docx
Although ADHD is often associated with children, this disorder is di.docxADDY50
 

More from ADDY50 (20)

American History paper on Explain what transcendentalism is and how .docx
American History paper on Explain what transcendentalism is and how .docxAmerican History paper on Explain what transcendentalism is and how .docx
American History paper on Explain what transcendentalism is and how .docx
 
AMobile devices have become the de facto standard for communic.docx
AMobile devices have become the de facto standard for communic.docxAMobile devices have become the de facto standard for communic.docx
AMobile devices have become the de facto standard for communic.docx
 
Amy Tan is an American writer whose novels examine family rela.docx
Amy Tan is an American writer whose novels examine family rela.docxAmy Tan is an American writer whose novels examine family rela.docx
Amy Tan is an American writer whose novels examine family rela.docx
 
America” by Claude McKay  and We Wear the Mask” by Paul Laurence D.docx
America” by Claude McKay  and We Wear the Mask” by Paul Laurence D.docxAmerica” by Claude McKay  and We Wear the Mask” by Paul Laurence D.docx
America” by Claude McKay  and We Wear the Mask” by Paul Laurence D.docx
 
American Police Departments have evolved through several eras in whi.docx
American Police Departments have evolved through several eras in whi.docxAmerican Police Departments have evolved through several eras in whi.docx
American Police Departments have evolved through several eras in whi.docx
 
American Greed AnalysisPrepare both a presentation (PowerPoint).docx
American Greed AnalysisPrepare both a presentation (PowerPoint).docxAmerican Greed AnalysisPrepare both a presentation (PowerPoint).docx
American Greed AnalysisPrepare both a presentation (PowerPoint).docx
 
American Management Association • www.amanet.orgHas this.docx
American Management Association • www.amanet.orgHas this.docxAmerican Management Association • www.amanet.orgHas this.docx
American Management Association • www.amanet.orgHas this.docx
 
Ambush Predation of Stingless Bees (Tetragoniscaangustula) b.docx
Ambush Predation of Stingless Bees (Tetragoniscaangustula) b.docxAmbush Predation of Stingless Bees (Tetragoniscaangustula) b.docx
Ambush Predation of Stingless Bees (Tetragoniscaangustula) b.docx
 
Amazon HQ2 Research Project, BUS 163Professor Cuadra, Tacoma Commu.docx
Amazon HQ2 Research Project, BUS 163Professor Cuadra, Tacoma Commu.docxAmazon HQ2 Research Project, BUS 163Professor Cuadra, Tacoma Commu.docx
Amazon HQ2 Research Project, BUS 163Professor Cuadra, Tacoma Commu.docx
 
Always Fresh allows external users, such as vendors and business par.docx
Always Fresh allows external users, such as vendors and business par.docxAlways Fresh allows external users, such as vendors and business par.docx
Always Fresh allows external users, such as vendors and business par.docx
 
Alvin Ailey Revelations AnalysisThe purpose of this assignment.docx
Alvin Ailey Revelations AnalysisThe purpose of this assignment.docxAlvin Ailey Revelations AnalysisThe purpose of this assignment.docx
Alvin Ailey Revelations AnalysisThe purpose of this assignment.docx
 
AMMS company they have an issue with closing petty cash every month .docx
AMMS company they have an issue with closing petty cash every month .docxAMMS company they have an issue with closing petty cash every month .docx
AMMS company they have an issue with closing petty cash every month .docx
 
AmicableDeviousDissonanceEffaceGarrulousImmutabl.docx
AmicableDeviousDissonanceEffaceGarrulousImmutabl.docxAmicableDeviousDissonanceEffaceGarrulousImmutabl.docx
AmicableDeviousDissonanceEffaceGarrulousImmutabl.docx
 
An American psychologistRobert V. Guthrie, one of the most inf.docx
An American psychologistRobert V. Guthrie, one of the most inf.docxAn American psychologistRobert V. Guthrie, one of the most inf.docx
An American psychologistRobert V. Guthrie, one of the most inf.docx
 
Amazon is one of the worlds most popular online retailers. The co.docx
Amazon is one of the worlds most popular online retailers. The co.docxAmazon is one of the worlds most popular online retailers. The co.docx
Amazon is one of the worlds most popular online retailers. The co.docx
 
American Academy of Political and Social Science Woun.docx
American Academy of Political and Social Science  Woun.docxAmerican Academy of Political and Social Science  Woun.docx
American Academy of Political and Social Science Woun.docx
 
American Apparel Submit your completed strategy and change ma.docx
American Apparel Submit your completed strategy and change ma.docxAmerican Apparel Submit your completed strategy and change ma.docx
American Apparel Submit your completed strategy and change ma.docx
 
American Government Policy PaperThis project is an opportuni.docx
American Government Policy PaperThis project is an opportuni.docxAmerican Government Policy PaperThis project is an opportuni.docx
American Government Policy PaperThis project is an opportuni.docx
 
American Greetings Case1. What is going on at American Greetin.docx
American Greetings Case1. What is going on at American Greetin.docxAmerican Greetings Case1. What is going on at American Greetin.docx
American Greetings Case1. What is going on at American Greetin.docx
 
Although ADHD is often associated with children, this disorder is di.docx
Although ADHD is often associated with children, this disorder is di.docxAlthough ADHD is often associated with children, this disorder is di.docx
Although ADHD is often associated with children, this disorder is di.docx
 

Recently uploaded

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscapingDr. M. Kumaresan Hort.
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
Scopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsScopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsISCOPE Publication
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint23600690
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 

Recently uploaded (20)

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Scopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsScopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS Publications
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 

Alfreda DudleyTowson University, USAJames BramanTo.docx

  • 1. Alfreda Dudley Towson University, USA James Braman Towson University, USA Giovanni Vincenti Towson University, USA Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices Investigating cyber law and cyber ethics: issues, impacts and practices / Alfreda Dudley, James Braman and Giovanni Vincenti, editors. p. cm. Includes bibliographical references and index. Summary: “This book discusses the impact of cyber ethics and cyber law on information technologies and society, featuring current research, theoretical frameworks, and case studies”--Provided by publisher. ISBN 978-1-61350-132-0 (hardcover) -- ISBN 978-1-61350- 133-7 (ebook) -- ISBN 978-1-61350-134-4 (print & perpetual access) 1. Internet--Law and legislation. 2. Computer crimes. 3. Internet--Social aspects. 4. Internet--Moral and ethical aspects. I. Dudley, Alfreda, 1957- II. Braman, James, 1981- III. Vincenti, Giovanni, 1978-
  • 2. K4345.I58 2011 345’.0268--dc23 2011022933 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously- unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. Senior Editorial Director: Kristin Klinger Director of Book Publications: Julia Mosemann Editorial Director: Lindsay Johnston Acquisitions Editor: Erika Carter Development Editor: Myla Harty Production Editor: Sean Woznicki Typesetters: Lisandro Gonzalez, Adrienne Freeland Print Coordinator: Jamie Snavely Cover Design: Nick Newcomer Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2012 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
  • 3. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Editorial Advisory Board Doris Lidtke, Towson University, USA Gabriele Meiselwitz, Towson University, USA Donna Tupper, Community College of Baltimore County Maryland, USA Yuanqiong Wang, Towson University, USA Cecelia Wright Brown, University of Baltimore, USA List of Reviewers Charles Dierbach Mary Hackley Dennis Hamilton Doris Lidtke Gabriele Meiselwitz Juliette Townsend Donna Tupper Yuanqiong Wang Cecelia Wright Brown Table of Contents Foreword ............................................................................................... .............................................. xiii
  • 4. Preface ............................................................................................... ................................................... xv Acknowledgment ............................................................................................... ................................. xix Section 1 Legal and Jurisdictional Issues Regarding Cyberspace Chapter 1 Responsibility, Jurisdiction, and the Future of “Privacy by Design” ..................................................... 1 Ugo Pagallo, University of Turin, Italy Chapter 2 Hacking: Legal and Ethical Aspects of an Ambiguous Activity ........................................................... 21 Gráinne Kirwan, Dun Laoghaire Institute of Art, Design and Technology, Ireland Andrew Power, Dun Laoghaire Institute of Art, Design and Technology, Ireland Chapter 3 Emerging Cybercrime Trends: Legal, Ethical, and Practical Issues ..................................................... 37 Sean M. Zadig, Nova Southeastern University, USA Gurvirender Tejay, Nova Southeastern University, USA Chapter 4 Law and Technology at Crossroads in Cyberspace: Where Do We Go From Here? ............................ 57
  • 5. Anteneh Ayanso, Brock University, Canada Tejaswini Herath, Brock University, Canada Chapter 5 Cyber Law, Cyber Ethics and Online Gambling .................................................................................. 78 Lee Gillam, University of Surrey, UK Anna Vartapetiance, University of Surrey, UK Section 2 Legal and Ethical Implications Involving Social Networks and Virtual Worlds Chapter 6 An Overview of Child Abuses in 3D Social Networks and Online Video Games ............................. 101 Miguel A. Garcia-Ruiz, University of Colima, Mexico Miguel Vargas Martin, University of Ontario Institute of Technology, Canada Patrik Olsson, University of Ontario Institute of Technology, Canada Chapter 7 Ethics and Legal Aspects of Virtual Worlds ....................................................................................... 117 Andrew Power, Dun Laoghaire Institute of Art, Design and Technology, Ireland Gráinne Kirwan, Dun Laoghaire Institute of Art, Design and Technology, Ireland
  • 6. Chapter 8 Narbs as a Measure and Indicator of Identity Narratives ................................................................... 132 Ananda Mitra, Wake Forest University, USA Chapter 9 Cloud Based Social Network Sites: Under Whose Control? .............................................................. 147 Jean-Philippe Moiny, University of Namur, Belgium Section 3 Legal and Ethical Implications in Cyberspace: An International Perspective Chapter 10 Al-Qaeda on Web 2.0: Radicalization and Recruitment Strategies .................................................... 221 Anne Gerdes, University of Southern Denmark, Denmark Chapter 11 Google in China: Corporate Responsibility on a Censored Internet ................................................... 239 Richard A. Spinello, Boston College, USA Chapter 12 All’s WELL that Ends WELL: A Comparative Analysis of the Constitutional and Administrative Frameworks of Cyberspace and the United Kingdom ........................................ 254 Jonathan Bishop, Swansea University, UK
  • 7. Chapter 13 A UK Law Perspective: Defamation Law as it Applies on the Internet ............................................. 264 Sam De Silva, Manches LLP, UK Chapter 14 The Hellenic Framework for Computer Program Copyright Protection Following the Implementation of the Relative European Union Directives ........................................................ 280 Eugenia Alexandropoulou-Egyptiadou, University of Macedonia, Greece Chapter 15 Internet Advertising: Legal Aspects in the European Union .............................................................. 288 Radomír Jakab, University of P. J. Safarik, Slovakia About the Contributors ............................................................................................. .. ..................... 311 Index ............................................................................................... .................................................... 317 Detailed Table of Contents Foreword
  • 8. ............................................................................................... ............................................... xii Preface ............................................................................................... .................................................. xiv Acknowledgment ............................................................................................... ...............................xviii Section 1 Legal and Jurisdictional Issues Regarding Cyberspace Chapter 1 Responsibility, Jurisdiction, and the Future of “Privacy by Design” ..................................................... 1 Ugo Pagallo, University of Turin, Italy As the amount of personal information and data on global networks increase, systems allow for a more granular control over privacy settings by letting users define how much information to divulge. Some- times the systems suffice for the needs of the users as-is; other times they require a significant tailoring to fulfill one’s expectations. The concept of “privacy by design” is built into the majority of IT services today, placing itself at the intersection between the regulations of national legal systems relevant to data protection and personal control. Pagallo’s chapter explores in detail the balance between these two realities, focusing on the views generated by the legal systems. Chapter 2 Hacking: Legal and Ethical Aspects of an Ambiguous Activity
  • 9. ........................................................... 21 Gráinne Kirwan, Dun Laoghaire Institute of Art, Design and Technology, Ireland Andrew Power, Dun Laoghaire Institute of Art, Design and Technology, Ireland The practice of hacking conceals a large array of motivations, generated by intents that may or may not be malicious in nature. Some argue that this traditionally questionable practice can be very well utilized for positive purposes, when directed towards the welfare of the systems and data by looking for potential vulnerabilities without necessarily exploiting them. The majority of the uninformed population does attach a negative connotation to any form of hacking. This chapter reviews this widespread practice through a wide overview, then approaches the discussion of its ethicality. The authors also offers a perspective given by international legal systems. Chapter 3 Emerging Cybercrime Trends: Legal, Ethical, and Practical Issues ..................................................... 37 Sean M. Zadig, Nova Southeastern University, USA Gurvirender Tejay, Nova Southeastern University, USA A natural consequence to the shifting of every-day operations from a brick-and-mortar paradigm to one that lives completely in cyberspace also entails that the typically associated aspect of crime will also follow this radical change. As more and more crimes committed on Information Systems and computer
  • 10. hardware are reported in the news, affecting sensitive information about millions of people and often involving significant amount of money, the techniques of committing these crimes as well as their coun- teractions have to evolve continually. This chapter explores the methodologies through which perpetra- tors often carry on their illegal activities against sensitive data of various natures, focusing especially on the employment of large networks of compromised computers, or botnets. The authors also offer perspectives given by practitioners, law enforcement, and researchers who made cybercrime the focus of their attention. Chapter 4 Law and Technology at Crossroads in Cyberspace: Where Do We Go From Here? ............................ 57 Anteneh Ayanso, Brock University, Canada Tejaswini Herath, Brock University, Canada The variety of computer crimes along with the complexity of the environments in which they take place, compounds the problem of devising a mechanism that can effectively addresses these types of criminal activities. It is extremely important for organizations and governments to understand computer crimes and to establish frameworks and other active measures in order to be proactive in reducing computer based crime. In this chapter the authors discuss these important topics along with a review of academic literature, industry reports, and information from the media, in identifying various types of computer crime and discuss the counter strategies to deal with such crimes in a legal, technological, and organi- zational context.
  • 11. Chapter 5 Cyber Law, Cyber Ethics and Online Gambling .................................................................................. 78 Lee Gillam, University of Surrey, UK Anna Vartapetiance, University of Surrey, UK Perhaps one of the most profitable applications of a real-life practice carried online, gambling is a phe- nomenon that affects users across cultures, often reaching pathological levels that cannot be sustained without external help. The significant relevance of this topic becomes even more intricate as we observe the seam that exists in the interaction between gambling in real life and the one that exists on comput- ers alone. This chapter observes the difficulties posed by the variations of the laws, which affect either the physical world or the virtual one. The authors then go on and discuss the possibility of creating systems that embed adherence to laws, providing support for ethics in an effort of protecting unwary or ill-informed users. Section 2 Legal and Ethical Implications Involving Social Networks and Virtual Worlds Chapter 6 An Overview of Child Abuses in 3D Social Networks and Online Video Games ............................. 101 Miguel A. Garcia-Ruiz, University of Colima, Mexico Miguel Vargas Martin, University of Ontario Institute of
  • 12. Technology, Canada Patrik Olsson, University of Ontario Institute of Technology, Canada The advent of Internet-based technologies has sprung many different initiatives aimed at replicating features of the real world through the cybernetic medium. At times the physical environment in which we live is enhanced through technology through augmented or virtual reality; other times instead it is completely paralleled and often exacerbated. The idea of multi- user virtual environments contains a potential that is barely tapped: few educators still use it; virtual tourism is often limited by the small amount of real-life destinations reproduced through this window. Aspects of sexuality though have been developed significantly enough to also have brought perversions and illegal activities to virtual worlds, sometimes replicating flawlessly the morbidity associated with them. This chapter analyzes child pornog- raphy through multi-user virtual environments, reviewing ethical and legal issues that revolve around it. Chapter 7 Ethics and Legal Aspects of Virtual Worlds ....................................................................................... 117 Andrew Power, Dun Laoghaire Institute of Art, Design and Technology, Ireland Gráinne Kirwan, Dun Laoghaire Institute of Art, Design and Technology, Ireland Any time we wish to visit new places, we usually consider the physical displacement associated with the journey. Often times, in addition to the necessity of reaching the location we wish to visit, we also
  • 13. need to take into consideration aspects that reach different laws and regulations when we decide to cross national borders, visiting new countries. The lines are not so clear, if they are visible at all, when we interact with virtual worlds and virtual spaces. This chapter reviews ethical implications, technical solutions and the privatization of legal remedies of the still underdeveloped realm of the legal system in user-driven virtual environments. Chapter 8 Narbs as a Measure and Indicator of Identity Narratives ................................................................... 132 Ananda Mitra, Wake Forest University, USA With the increased usage of social networks and the abundance of information we reveal in contribut- ing to our online personas, these narrative bits of information can be used to create a composite of an individual. In this chapter, the author discusses in detail these “narrative bits,” or narbs that encapsulate measurable attributes - content, authorship, frequency of appearance and spatial information about the user. Certain characteristics of narbs can be measured though a narb weight and matrix for each indi- vidual user to reveal certain information. As social networking tools become more common place, it is important to gauge the types of information we reveal and how such information can be used. Chapter 9 Cloud Based Social Network Sites: Under Whose Control? .............................................................. 147
  • 14. Jean-Philippe Moiny, University of Namur, Belgium The projection of one’s life in cyberspace does not necessarily have to go through 3-dimensional virtual environments. The massive advent of social networking sites has enabled users of any age, culture, and creed to share information about themselves and their lives with anyone who is willing to connect with them. This concept brings a significant stress on the policies that govern what should and shouldn’t be shared with others through these social services. The author focuses on four main themes: privacy, data protection, confidentiality of electronic communications, and the unauthorized access to computers. The main subject of this work includes how American and European (in particular Belgian) laws empower users in the process of recovering the control over the global availability of their data through social networks. These two legal systems are compared, utilizing similarities as well as differences as terms of comparison and evaluation. Section 3 Legal and Ethical Implications in Cyberspace: An International Perspective Chapter 10 Al-Qaeda on Web 2.0: Radicalization and Recruitment Strategies .................................................... 221 Anne Gerdes, University of Southern Denmark, Denmark As most aspects of life are moving towards their embedding in the global technological infrastructure offered by the Internet, also dangerous and controversial aspects
  • 15. of life such as terrorism seem to follow. This shift towards a highly technological avenue of information allows for a more capillary distribu- tion of untainted and unaltered credos and documents, potentially increasing the recruiting pool in the eyes of those who actively participate in these practices. This chapter evaluates in detail the strategy of proselytism utilized by Al-Qaeda and potentially other terror- based organizations in modern days. The author points out the essential components that are missing from this campaign, which are inherent characteristics of the Web 2.0 approach to technology and modern diffusion of ideas. Chapter 11 Google in China: Corporate Responsibility on a Censored Internet ................................................... 239 Richard A. Spinello, Boston College, USA Tracing the path that information takes from its origin to the end-user is often difficult in today’s age of open networks and news services. The process of harnessing, controlling, and filtering such information is yet more complex, as it seriously undermines the freedom that is the basic foundation to the major- ity of online communications in today’s day and age. The mix of these concepts with strict regulations often inflicted to its people by strict governments creates a series of arguments that are of extreme im- portance. The author analyzes the root causes of disagreements between what should be published and what should be available to the end-user, arguing that a proactive self-regulation may very well establish a firm foundation towards a more successful collaboration between information-providing agencies and
  • 16. government-supervised communications media. Chapter 12 All’s WELL that Ends WELL: A Comparative Analysis of the Constitutional and Administrative Frameworks of Cyberspace and the United Kingdom ........................................ 254 Jonathan Bishop, Swansea University, UK Understanding where the legal regulations of one country end and the other begins is relatively simple in the real world, where we can place physical boundaries between these two different political enti- ties, and monitor the grounds to ensure the enforcement of laws. When we move our discussion to the Internet, we are not as easily able to identify the shifting between governments. This chapter illustrates, through cases and discussion, the importance as well as the difficulties involved in translating rules and regulations typical of the physical world into the digital one represented by websites, flow of informa- tion, and services. Chapter 13 A UK Law Perspective: Defamation Law as it Applies on the Internet ............................................. 264 Sam De Silva, Manches LLP, UK The act of defamation is one of the many emergent phenomena associated with social and societal aspects of the Internet’s predisposition to world-wide communications. The ease with which messages
  • 17. and information travel over great distances has made the defense against defamation even more crucial. This chapter reviews significant legal achievements such as the Defamation Act and the E-Commerce Directive in light of these new trends, focusing in particular on the case of the United Kingdom’s legal system. The discussions here are applicable and important in many contexts where defamation and reputation are involved. Chapter 14 The Hellenic Framework for Computer Program Copyright Protection Following the Implementation of the Relative European Union Directives ........................................................ 280 Eugenia Alexandropoulou-Egyptiadou, University of Macedonia, Greece As issues of computer piracy have plagued software developers worldwide, legislators have been faced with the challenge to create regulations in the effort to stop such activities at many levels, both nationally and internationally. This chapter focuses on the presentation of the current Hellenic legal framework on computer program copyright protection following the relative E.U. Directives. Piracy rates, protection of right holders, specific cases, and consequences of copyright infringement are discussed along with recommendations from the author. In a world where software can be easily copied, the topics discussed are important to consider. Chapter 15 Internet Advertising: Legal Aspects in the European Union .............................................................. 288
  • 18. Radomír Jakab, University of P. J. Safarik, Slovakia Often, when we are exposed to something over and over, we barely pay attention to it any more. In many cases advertising takes this very characteristic, leading us to ignoring it while we really should pay atten- tion, especially if the manner in which it takes place is legal. Internet-based ads, along with all the other kinds of publicity, are subject to regulations that often are not followed entirely or even ignored. This chapter explores in detail the European regulations that affect advertising (in many shapes), prompting for very interesting discussions about these topics well beyond the areas of application discussed here. About the Contributors ............................................................................................... ..................... 311 Index ............................................................................................... .................................................... 317 xiii Foreword Everyday each one of us face choices that call for decisions; some major and others minor. These deci- sions are often influenced by a set of guidelines, adherence to
  • 19. laws, our morals and/or ethics. In most situations these guidelines are straightforward (at least perceivably) for each situation we encounter. In today’s information rich and technology dependent culture, many of the lines are blurred when it comes to how we interact and use technology- making informed decisions more difficult. The devices, software and other technology designed to make our lives easier, have in many situations made our lives more complicated when it comes to ethics and laws. Issues that did not exist in the past, now must be addressed and scrutinized, and new laws developed. In many instances however, old crimes and social issues have been reinvented or exacerbated by these new technologies. A cyber criminal can be hiding in one part of the world committing crimes in another part using someone else’s identity. Not only does the crime itself need to be analyzed, but also the laws that are being violated and the country. What may be legal or ethically sound for one location may be illegal in another. Other such issues arise from organizations and businesses not fully understanding their vulnerabilities, or computer based crime and/or their re- sponsibilities to protect their data. Social networks have also changed the legal landscape by adding new dimensions of vulnerability and social engineering through the creation of our online digital selves. We spend so much time constructing our online representation, but forget that the information we post on- line can sometimes be used against us. These types of problems are just a few mentioned in this book as it aims to highlight many mainstream global ethical and legal problems caused or amplified by tech- nology. With this book, Investigating Cyber Law and Cyber Ethics:
  • 20. Issues, Impacts and Practices, observa- tions can be made about the impact of technology, software and the Internet through a legal and ethical point of view. Three main sections provide the framework for the book, which include: Section 1: Legal and Jurisdictional Issues Regarding Cyberspace, Section 2: Legal and Ethical Implications involving Social Networks and Virtual Worlds; and Section 3: Legal and Ethical Implications in Cyberspace – An International Perspective. Through these divisions, a unique collection of articles, research initiatives, essays and discussions are presented with the objective to provided readers with an international view of current trends in these growing areas of importance. Today cyber technologies have significant impact on privacy, security and individual rights. IT professionals and educators must have a working knowledge of the professional, ethical, legal, security and social issues and responsibilities associated with these technologies. They must be aware of and adhere to the ethical standards of the profession as they formulate solutions to meet user needs in an organizational and societal context. The nature of their involvement with implementing and managing xiv information and communication technologies requires IT professionals to be aware of relevant legal statutes and procedures including computer crime rules of evidence, evidence seizure and handling, as well as court presentation.
  • 21. Scott Hilberg Towson University, March 2010 Scott Hilberg is the Assistant Director for Center for Applied Information Technology (CAIT), the Director of the undergraduate Information Technology program, and Clinical Assistant Professor in the Department of Computer and Information Sciences at Towson University. His academic background includes an Ed.D. in Innovation & Leadership from Wilmington University and a M.A.S. in Management Information Technology from Johns Hopkins University. He has taught programming, system development, and project management. In addition, he has 15+ years of industry experience as a programmer, systems analyst, and IT manager. xv Preface Computer technologies have continually and rapidly changed and advanced in the last two decades. The impacts of these rapid changes are affecting the use and applications of computer technologies in soci- ety. These impacts bring about new focus and scrutiny. One of the fundamental changes in the last decade has been the realization that the context in which computer technologies are used must take into account the ethical implications associated with their use. Examples of computing ethical issues include, but are not limited to: cyberterrorism; security and privacy responsibilities; intellectual property rights; online piracy; blogger litigation; data recovery; data protection;
  • 22. wireless computing; computer crime; et cetera. Another fundamental change is the increased importance of the legal impacts that new computer tech- nologies introduce. However, these changes do not necessarily correspond to the changes in the com- puter technology itself. Ethics, when applied to technology-related issues, are also recognized as cyberethics (Tavani, 2010). There is a plethora of viewpoints regarding the subject of cyberethics. For instance, one major ques- tion that many professionals both inside and outside the computer community consider: Are cybereth- ics different from “regular” ethics? Regular ethics are defined as ethics that apply across all contexts (i.e., medical, legal, business, and religious). In some instances, this question can be answered with a definite yes. However, many theorists would state that there are differences between regular ethics and cyberethics. They base their arguments on the fact that cyberethics is based on the impact of computing technologies on individuals and society. However, this does not indicate that computing technologies have introduced new ethical issues. Therefore, some would argue that there are no differences between regular ethics and cyberethics. Their arguments are based on the fact that computing technologies only bring a new dimension to existing ethical issues. A major problem is the practice and application of ethics in computing environments by computing professionals and users. In the computing culture, professionals and organizations put emphasis on proper or improper design procedures and practices. While this is definitely important, increasing awareness of the ethical behavioral
  • 23. practices of the computing professional and organization is becoming crucial. Computing technology is pervasive in all areas of society; … PICOT Statement (P) In-patients in acute care units and acute rehabilitation unit. (I) –Implementation of adequate nurse-to-patient staffing ratios (C) –Disproportional nurse-to-patient staffing ratios (O) –Improvement in quality of patient care (T) Throughout hospitalization period (P) For in-patients in acute care units and acute rehabilitation units(I)will implementation of adequate nurse-to-patient staffing ratio(C)against disproportional nurse-to-patient staffing ratio(O)improves the quality of patient care(T)throughout the period of the hospitalization? My project capstone topic The Effects of Disproportionate Nurse to Patient Staffing Ratios on the quality of Patient Care Courtney, M. (2017). The Effects of Short Staffing on Patient Outcomes. Retrieved from https://digitalcommons.murraystate.edu/scholarsweek/Fall2017/ ClinicalHealthcare/10/ Cho, S. H., Lee, J. Y., June, K. J., Hong, K. J., & Kim, Y. (2016). Nurse staffing levels and proportion of hospitals and clinics meeting the legal standard for nurse staffing for 1996~ 2013. Journal of Korean Academy of Nursing Administration,
  • 24. 22(3), 209-219. Cho E, Sloane DM, Kim EY, et al (2015). Effects of nurse staffing, work environments, and education on patient mortality: an observational study. Int J Nurs Stud. 2015;52(2):535–542. doi: 10.1016/j.ijnurstu.2014.08.006 Olley, R., Edwards, I., Avery, M., & Cooper, H. (2019). A systematic review of the evidence related to mandated nurse staffing ratios in acute hospitals. Retrieved from https://www.ncbi.nlm.nih.gov/pubmed/29661270 Johnson, E. (2018). Nursing Staffing and Patient Outcomes. Integrated Studies. https://digitalcommons.murraystate.edu/bis437/130 Needleman, J. (2017). Nursing skill mix and patient outcomes. BMJ. https://qualitysafety.bmj.com/content/26/7/525.full Shin, S., Park, J. H., & Bae, S. H. (2018). Nurse staffing and nurse outcomes: A systematic review and meta-analysis. Retrieved from https://www.ncbi.nlm.nih.gov/pubmed/29685321 Song, Y., Hoben, M., Norton, P., & Estabrooks, C. A. (2020). Association of Work Environment with Missed and Rushed Care Tasks Among Care Aides in Nursing Homes. doi: 10.1001/jamanetworkopen.2019.20092.