An edition of Cyberethics (2000)

CyberEthics

morality and law in cyberspace

2nd ed.
  • 6 Want to read
  • 1 Currently reading
  • 2 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 6 Want to read
  • 1 Currently reading
  • 2 Have read

Buy this book

Last edited by MARC Bot
March 8, 2023 | History
An edition of Cyberethics (2000)

CyberEthics

morality and law in cyberspace

2nd ed.
  • 6 Want to read
  • 1 Currently reading
  • 2 Have read

This edition doesn't have a description yet. Can you add one?

Publish Date
Language
English
Pages
238

Buy this book

Edition Availability
Cover of: Cyberethics
Cyberethics
2017, Jones & Bartlett Learning
Cover of: Cyberethics
Cyberethics: morality and law in cyberspace
2006, Jones and Bartlett Publishers
in English - 3rd ed.
Cover of: CyberEthics
CyberEthics: morality and law in cyberspace
2003, Jones and Bartlett Publishers, Jones and Bartlett Publishers, Inc.
in English - 2nd ed.
Cover of: Cyberethics
Cyberethics: morality and law in cyberspace
2000, Jones and Bartlett
in English

Add another edition?

Book Details


Table of Contents

Machine generated contents note: CHAPTER ONE The Internet and Ethical Values 1
Introduction 1
Cyberethics and "The Law of the Horse" 2
An Iron Cage or a Gateway to Utopia? 8
Ethical Frameworks and the Digital Frontier 10
Utilitarianism 11
Contract Rights (Contractarianism) 13
Natural Rights 15
Moral Duty (Pluralism) 16
Postscript on Moral Theory 21
Normative Principles 23
The Principle of Autonomy 23
The Principle of Nonmaleficence 23
The Principle of Beneficence 24
The Principle of Justice 24
Discussion Questions 25
References 25
CHAPTER TWO Regulating and Governing the Internet 29
Introduction 29
A Short History of the Internet 31
The Internet's Current Architecture 33
The World Wide Web 35
Electronic Commerce 37
Social Problems and Social Costs 40
The Invisible Hand 41
Regulating the Net: The Visible Hand 42
A "Bottoms-Up" Approach: The Sovereignty ot Code 45
Internet Governance 47
Net Regulation and Ethics 48
Discussion Questions 51
References 51
CHAPTER THREE Free Speech and Content Control in Cyberspace 53
Introduction 53
Speech and Internet Architecture 55
Pornography in Cyberspace 56
The Communications Decency Act (CDA) 56
Child Online Protection Act (COPA) 59
Children's Interet Protection Act (CHIPA) 60
Automating Content Controls 62
Hate Speech and Online Threats 70
Anonymous Speech 73
Student Web Sites 75
Spam as Commercial Free Speech 77
Postscript 81
Discussion Questions 82
Cases: The Librarian's Dilemma 83
Spam or Free Speech at Intel? 84
L'Affair Yahoo 86
References 89
CHAPTER FOUR Intelletdl Propery in Cyberspace 91
Part I: Background on Intellectual Property 91
Introduction 91
What Is Intellectual Property and Why Does It Matter? 93
Legal Protections for Intellectual Property 95
Copyright Laws 95
Patents 96
Trademarks 97
Moral Justification for Intellectual Property 98
Labor-Desert Theory 99
Personality Theory 100
Utilitarianism 100
Recent Legislation 102
The Digital Millenium Copyright Act (DMCA) 102
The Sonny Bono Copyright Term Extension Ad (CTEA) 103
Part II: Issues for the Interet 105
Copyright and the Digital Dilemma 105
Digital Music 105
The DeCSS Lawsuit 110
Software Ownership and the Open Source Code Movement 112
Digital Rights Architectures 117
Business Method Patents in Cyberspace 118
Domain Names and Interconnectivity Issues 121
Ownership of Domain Names 121
Linking and Framing 124
Metatags 127
Creative Integrity 129
Postscript 131
Discussion Questions 132
Cases: The wwwnga Domain Name Dispute 132
Patent War on the Web: Amazon vs. Barnes & Noble 133
Morpheus: The Next Napster? 135
References 137
CHAPTER FIVE Regulating nternet Prviacy 141
Introduction 141
Definition and Theory of Privacy 142
Personal Information on the Internet 145
Consumer Privacy on the Internet 147
Privacy-Invasive Technologies 147
Policy Considerations 152
Moral Considerations 155
The United States and Europe: Divergent Paths to Privacy Protection 159
Privacy Legislation in the U.S. 159
Privacy Protection in Europe 162
Privacy and Internet Architectures 166
A Prescription for Privacy 168
Privacy in the Workplace 170
Privacy Rights at Risk 170
Comparing U.S. and European Policies 171
The Case for E-Mail Privacy Rights 173
Discussion Questions 177
Cases: DoubleClick: The Ethics of Online Advertising 177
Amazon's New Privacy Policy 181
Newport Electronics 183
References 185
CHAPTER SIX Securing the Electronic Frontier 189
Vulnerabilities of the Net 189
Cybercrime 192
Antipiracy Architectures 194
Trespass and Unauthorized Access in Cyberspace 196
Questionable Forms of Trespass 200
Security Measures in Cyberspace 203
The Encryption Controversy: A Public Policy Perspective 207
The Clipper Chip 208
Clipper II 210
Key Management Infrastructure (KMI) or Clipper III 211
Policy Reversal 213
Encryption Code, Privacy, and Free Speech 213
Discussion Questions 215
Cases: The Case of the Pretty Good Privacy (PGP) Encryption Program 215
eBay v. Bidder's Edge: Trespass or Legitimate Access? 217
References 219.

Edition Notes

Includes bibliographical references (p. 227-232) and index.

Published in
Boston

Classifications

Dewey Decimal Class
303.48/34
Library of Congress
TK5105.875.I57 S68 2003, TK5105.875.I57S68

The Physical Object

Pagination
xvi, 238 p. :
Number of pages
238

ID Numbers

Open Library
OL3569733M
ISBN 10
0763700649
LCCN
2002072214
Goodreads
1430513

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
March 8, 2023 Edited by MARC Bot import existing book
August 19, 2020 Edited by ImportBot import existing book
August 1, 2020 Edited by ImportBot import existing book
February 14, 2020 Edited by MARC Bot remove fake subjects
October 17, 2009 Created by WorkBot add works page