LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2002072214 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0763700649 |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Call number |
303.48/34 |
MAIN ENTRY--PERSONAL NAME |
Authors |
Spinello, Richard A. |
TITLE STATEMENT |
Title |
CyberEthics : |
Subtitle |
morality and law in cyberspace / |
Statement of responsibility, etc |
Richard A. Spinello. |
EDITION STATEMENT |
Edition |
2nd ed. |
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication |
Boston : |
Publisher |
Jones and Bartlett Publishers, |
Date |
c2003. |
PHYSICAL DESCRIPTION |
Extent |
xvi, 238 p. : |
Other Details |
ill ; |
Size |
23 cm. |
CONTENTS |
Contents |
Machine generated contents note: CHAPTER ONE The Internet and Ethical Values 1 -- Introduction 1 -- Cyberethics and "The Law of the Horse" 2 -- An Iron Cage or a Gateway to Utopia? 8 -- Ethical Frameworks and the Digital Frontier 10 -- Utilitarianism 11 -- Contract Rights (Contractarianism) 13 -- Natural Rights 15 -- Moral Duty (Pluralism) 16 -- Postscript on Moral Theory 21 -- Normative Principles 23 -- The Principle of Autonomy 23 -- The Principle of Nonmaleficence 23 -- The Principle of Beneficence 24 -- The Principle of Justice 24 -- Discussion Questions 25 -- References 25 --CHAPTER TWO Regulating and Governing the Internet 29 -- Introduction 29 -- A Short History of the Internet 31 -- The Internet's Current Architecture 33 -- The World Wide Web 35 -- Electronic Commerce 37 -- Social Problems and Social Costs 40 -- The Invisible Hand 41 -- Regulating the Net: The Visible Hand 42 -- A "Bottoms-Up" Approach: The Sovereignty ot Code 45 -- Internet Governance 47 -- Net Regulation and Ethics 48 -- Discussion Questions 51 -- References 51 --CHAPTER THREE Free Speech and Content Control in Cyberspace 53 -- Introduction 53 -- Speech and Internet Architecture 55 -- Pornography in Cyberspace 56 -- The Communications Decency Act (CDA) 56 -- Child Online Protection Act (COPA) 59 -- Children's Interet Protection Act (CHIPA) 60 -- Automating Content Controls 62 -- Hate Speech and Online Threats 70 -- Anonymous Speech 73 -- Student Web Sites 75 -- Spam as Commercial Free Speech 77 -- Postscript 81 -- Discussion Questions 82 -- Cases: The Librarian's Dilemma 83 -- Spam or Free Speech at Intel? 84 -- L'Affair Yahoo 86 -- References 89 --CHAPTER FOUR Intelletdl Propery in Cyberspace 91 -- Part I: Background on Intellectual Property 91 -- Introduction 91 -- What Is Intellectual Property and Why Does It Matter? 93 -- Legal Protections for Intellectual Property 95 -- Copyright Laws 95 -- Patents 96 -- Trademarks 97 -- Moral Justification for Intellectual Property 98 -- Labor-Desert Theory 99 -- Personality Theory 100 -- Utilitarianism 100 -- Recent Legislation 102 -- The Digital Millenium Copyright Act (DMCA) 102 -- The Sonny Bono Copyright Term Extension Ad (CTEA) 103 -- Part II: Issues for the Interet 105 -- Copyright and the Digital Dilemma 105 -- Digital Music 105 -- The DeCSS Lawsuit 110 -- Software Ownership and the Open Source Code Movement 112 -- Digital Rights Architectures 117 -- Business Method Patents in Cyberspace 118 -- Domain Names and Interconnectivity Issues 121 -- Ownership of Domain Names 121 -- Linking and Framing 124 -- Metatags 127 -- Creative Integrity 129 -- Postscript 131 -- Discussion Questions 132 -- Cases: The wwwnga Domain Name Dispute 132 -- Patent War on the Web: Amazon vs. Barnes & Noble 133 -- Morpheus: The Next Napster? 135 -- References 137 -- CHAPTER FIVE Regulating nternet Prviacy 141 -- Introduction 141 -- Definition and Theory of Privacy 142 -- Personal Information on the Internet 145 -- Consumer Privacy on the Internet 147 -- Privacy-Invasive Technologies 147 -- Policy Considerations 152 -- Moral Considerations 155 -- The United States and Europe: Divergent Paths to Privacy Protection 159 -- Privacy Legislation in the U.S. 159 -- Privacy Protection in Europe 162 -- Privacy and Internet Architectures 166 -- A Prescription for Privacy 168 -- Privacy in the Workplace 170 -- Privacy Rights at Risk 170 -- Comparing U.S. and European Policies 171 -- The Case for E-Mail Privacy Rights 173 -- Discussion Questions 177 -- Cases: DoubleClick: The Ethics of Online Advertising 177 -- Amazon's New Privacy Policy 181 -- Newport Electronics 183 -- References 185 --CHAPTER SIX Securing the Electronic Frontier 189 -- Vulnerabilities of the Net 189 -- Cybercrime 192 -- Antipiracy Architectures 194 -- Trespass and Unauthorized Access in Cyberspace 196 -- Questionable Forms of Trespass 200 -- Security Measures in Cyberspace 203 -- The Encryption Controversy: A Public Policy Perspective 207 -- The Clipper Chip 20. |
STUDY PROGRAM |
Program name |
IACT918 |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Heading |
Internet |
General |
Moral and ethical aspects. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Heading |
Computers and civilization. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Heading |
Law and ethics. |
ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://uowd.box.com/s/7shsw2ifqp1pvqkmk4w1c0e2h7u4k4te |
Public note |
Location Map |
MAIN ENTRY--PERSONAL NAME |
-- |
28590 |
SUBJECT ADDED ENTRY--TOPICAL TERM |
-- |
42079 |
SUBJECT ADDED ENTRY--TOPICAL TERM |
-- |
2393 |
SUBJECT ADDED ENTRY--TOPICAL TERM |
-- |
1103 |