Check nearby libraries
Buy this book
This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book
Showing 4 featured editions. View all 4 editions?
Edition | Availability |
---|---|
1 |
zzzz
|
2
Cyberethics: morality and law in cyberspace
2006, Jones and Bartlett Publishers
in English
- 3rd ed.
0763737836 9780763737832
|
zzzz
Libraries near you:
WorldCat
|
3
CyberEthics: morality and law in cyberspace
2003, Jones and Bartlett Publishers, Jones and Bartlett Publishers, Inc.
in English
- 2nd ed.
0763700649 9780763700645
|
aaaa
Libraries near you:
WorldCat
|
4
Cyberethics: morality and law in cyberspace
2000, Jones and Bartlett
in English
0763712698 9780763712693
|
zzzz
Libraries near you:
WorldCat
|
Book Details
Table of Contents
Machine generated contents note: CHAPTER ONE The Internet and Ethical Values 1
Introduction 1
Cyberethics and "The Law of the Horse" 2
An Iron Cage or a Gateway to Utopia? 8
Ethical Frameworks and the Digital Frontier 10
Utilitarianism 11
Contract Rights (Contractarianism) 13
Natural Rights 15
Moral Duty (Pluralism) 16
Postscript on Moral Theory 21
Normative Principles 23
The Principle of Autonomy 23
The Principle of Nonmaleficence 23
The Principle of Beneficence 24
The Principle of Justice 24
Discussion Questions 25
References 25
CHAPTER TWO Regulating and Governing the Internet 29
Introduction 29
A Short History of the Internet 31
The Internet's Current Architecture 33
The World Wide Web 35
Electronic Commerce 37
Social Problems and Social Costs 40
The Invisible Hand 41
Regulating the Net: The Visible Hand 42
A "Bottoms-Up" Approach: The Sovereignty ot Code 45
Internet Governance 47
Net Regulation and Ethics 48
Discussion Questions 51
References 51
CHAPTER THREE Free Speech and Content Control in Cyberspace 53
Introduction 53
Speech and Internet Architecture 55
Pornography in Cyberspace 56
The Communications Decency Act (CDA) 56
Child Online Protection Act (COPA) 59
Children's Interet Protection Act (CHIPA) 60
Automating Content Controls 62
Hate Speech and Online Threats 70
Anonymous Speech 73
Student Web Sites 75
Spam as Commercial Free Speech 77
Postscript 81
Discussion Questions 82
Cases: The Librarian's Dilemma 83
Spam or Free Speech at Intel? 84
L'Affair Yahoo 86
References 89
CHAPTER FOUR Intelletdl Propery in Cyberspace 91
Part I: Background on Intellectual Property 91
Introduction 91
What Is Intellectual Property and Why Does It Matter? 93
Legal Protections for Intellectual Property 95
Copyright Laws 95
Patents 96
Trademarks 97
Moral Justification for Intellectual Property 98
Labor-Desert Theory 99
Personality Theory 100
Utilitarianism 100
Recent Legislation 102
The Digital Millenium Copyright Act (DMCA) 102
The Sonny Bono Copyright Term Extension Ad (CTEA) 103
Part II: Issues for the Interet 105
Copyright and the Digital Dilemma 105
Digital Music 105
The DeCSS Lawsuit 110
Software Ownership and the Open Source Code Movement 112
Digital Rights Architectures 117
Business Method Patents in Cyberspace 118
Domain Names and Interconnectivity Issues 121
Ownership of Domain Names 121
Linking and Framing 124
Metatags 127
Creative Integrity 129
Postscript 131
Discussion Questions 132
Cases: The wwwnga Domain Name Dispute 132
Patent War on the Web: Amazon vs. Barnes & Noble 133
Morpheus: The Next Napster? 135
References 137
CHAPTER FIVE Regulating nternet Prviacy 141
Introduction 141
Definition and Theory of Privacy 142
Personal Information on the Internet 145
Consumer Privacy on the Internet 147
Privacy-Invasive Technologies 147
Policy Considerations 152
Moral Considerations 155
The United States and Europe: Divergent Paths to Privacy Protection 159
Privacy Legislation in the U.S. 159
Privacy Protection in Europe 162
Privacy and Internet Architectures 166
A Prescription for Privacy 168
Privacy in the Workplace 170
Privacy Rights at Risk 170
Comparing U.S. and European Policies 171
The Case for E-Mail Privacy Rights 173
Discussion Questions 177
Cases: DoubleClick: The Ethics of Online Advertising 177
Amazon's New Privacy Policy 181
Newport Electronics 183
References 185
CHAPTER SIX Securing the Electronic Frontier 189
Vulnerabilities of the Net 189
Cybercrime 192
Antipiracy Architectures 194
Trespass and Unauthorized Access in Cyberspace 196
Questionable Forms of Trespass 200
Security Measures in Cyberspace 203
The Encryption Controversy: A Public Policy Perspective 207
The Clipper Chip 208
Clipper II 210
Key Management Infrastructure (KMI) or Clipper III 211
Policy Reversal 213
Encryption Code, Privacy, and Free Speech 213
Discussion Questions 215
Cases: The Case of the Pretty Good Privacy (PGP) Encryption Program 215
eBay v. Bidder's Edge: Trespass or Legitimate Access? 217
References 219.
Edition Notes
Includes bibliographical references (p. 227-232) and index.
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?March 8, 2023 | Edited by MARC Bot | import existing book |
August 19, 2020 | Edited by ImportBot | import existing book |
August 1, 2020 | Edited by ImportBot | import existing book |
February 14, 2020 | Edited by MARC Bot | remove fake subjects |
October 17, 2009 | Created by WorkBot | add works page |