According to the study conducted, ethics and technology can be termed as a text book on ethical issues in cyber science. This is regarding the computer communications and sciences. These ethics involve philosophy, sociology, and library science students. He starts with introducing cyber ethics to readers. These ethics will provide concepts and perspectives according to the methodological framework. This frame work enables user and reader to examine the structure in detail. This examining will be possible in the practical approach of the structure and frame work. The practical approach is the specialty of the as that type is not available in many books. The practical approach of the book gives questions at the end of the chapter as simple as applying in practical situations. At the same time, they concentrate on analysis and judgment. The analysis and judgment combined with practicality will give a complete idea about computer ethics to readers. This can establish a moral system that can contemplate using ethics and for reviewing the consequences. This will deal with duty contract and character based theories. The readers may feel that the good start in the first chapter is not maintained in the second chapter due to a rise of new ground. They may consider that the chapter three is better than chapter two because of the presence of critical thinking, logical argument, and the problems with fallacious arguments. The fourth chapter will be interesting due to the presence of professional ethics. The ethics in the profession will result in good practices at work and learning. These ethics will even result in good business practices and can avoid fraudulent activities to maximum extent. After the ethical practices, the practice about privacy is considered in the fifth chapter. This is regarding phishing attacks and encountering spy ware. The privacy is considered as very much important in the computer applications and in this book due to the fact that in present and future, one cannot expect a computer without internet.
The lack of privacy is due to the cyber crime and this is discussed in chapter seven.