CyberEthics : (Record no. 5806)

LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2002072214
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0763700649
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number 303.48/34
MAIN ENTRY--PERSONAL NAME
Authors Spinello, Richard A.
TITLE STATEMENT
Title CyberEthics :
Subtitle morality and law in cyberspace /
Statement of responsibility, etc Richard A. Spinello.
EDITION STATEMENT
Edition 2nd ed.
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boston :
Publisher Jones and Bartlett Publishers,
Date c2003.
PHYSICAL DESCRIPTION
Extent xvi, 238 p. :
Other Details ill ;
Size 23 cm.
CONTENTS
Contents Machine generated contents note: CHAPTER ONE The Internet and Ethical Values 1 -- Introduction 1 -- Cyberethics and "The Law of the Horse" 2 -- An Iron Cage or a Gateway to Utopia? 8 -- Ethical Frameworks and the Digital Frontier 10 -- Utilitarianism 11 -- Contract Rights (Contractarianism) 13 -- Natural Rights 15 -- Moral Duty (Pluralism) 16 -- Postscript on Moral Theory 21 -- Normative Principles 23 -- The Principle of Autonomy 23 -- The Principle of Nonmaleficence 23 -- The Principle of Beneficence 24 -- The Principle of Justice 24 -- Discussion Questions 25 -- References 25 --CHAPTER TWO Regulating and Governing the Internet 29 -- Introduction 29 -- A Short History of the Internet 31 -- The Internet's Current Architecture 33 -- The World Wide Web 35 -- Electronic Commerce 37 -- Social Problems and Social Costs 40 -- The Invisible Hand 41 -- Regulating the Net: The Visible Hand 42 -- A "Bottoms-Up" Approach: The Sovereignty ot Code 45 -- Internet Governance 47 -- Net Regulation and Ethics 48 -- Discussion Questions 51 -- References 51 --CHAPTER THREE Free Speech and Content Control in Cyberspace 53 -- Introduction 53 -- Speech and Internet Architecture 55 -- Pornography in Cyberspace 56 -- The Communications Decency Act (CDA) 56 -- Child Online Protection Act (COPA) 59 -- Children's Interet Protection Act (CHIPA) 60 -- Automating Content Controls 62 -- Hate Speech and Online Threats 70 -- Anonymous Speech 73 -- Student Web Sites 75 -- Spam as Commercial Free Speech 77 -- Postscript 81 -- Discussion Questions 82 -- Cases: The Librarian's Dilemma 83 -- Spam or Free Speech at Intel? 84 -- L'Affair Yahoo 86 -- References 89 --CHAPTER FOUR Intelletdl Propery in Cyberspace 91 -- Part I: Background on Intellectual Property 91 -- Introduction 91 -- What Is Intellectual Property and Why Does It Matter? 93 -- Legal Protections for Intellectual Property 95 -- Copyright Laws 95 -- Patents 96 -- Trademarks 97 -- Moral Justification for Intellectual Property 98 -- Labor-Desert Theory 99 -- Personality Theory 100 -- Utilitarianism 100 -- Recent Legislation 102 -- The Digital Millenium Copyright Act (DMCA) 102 -- The Sonny Bono Copyright Term Extension Ad (CTEA) 103 -- Part II: Issues for the Interet 105 -- Copyright and the Digital Dilemma 105 -- Digital Music 105 -- The DeCSS Lawsuit 110 -- Software Ownership and the Open Source Code Movement 112 -- Digital Rights Architectures 117 -- Business Method Patents in Cyberspace 118 -- Domain Names and Interconnectivity Issues 121 -- Ownership of Domain Names 121 -- Linking and Framing 124 -- Metatags 127 -- Creative Integrity 129 -- Postscript 131 -- Discussion Questions 132 -- Cases: The wwwnga Domain Name Dispute 132 -- Patent War on the Web: Amazon vs. Barnes & Noble 133 -- Morpheus: The Next Napster? 135 -- References 137 -- CHAPTER FIVE Regulating nternet Prviacy 141 -- Introduction 141 -- Definition and Theory of Privacy 142 -- Personal Information on the Internet 145 -- Consumer Privacy on the Internet 147 -- Privacy-Invasive Technologies 147 -- Policy Considerations 152 -- Moral Considerations 155 -- The United States and Europe: Divergent Paths to Privacy Protection 159 -- Privacy Legislation in the U.S. 159 -- Privacy Protection in Europe 162 -- Privacy and Internet Architectures 166 -- A Prescription for Privacy 168 -- Privacy in the Workplace 170 -- Privacy Rights at Risk 170 -- Comparing U.S. and European Policies 171 -- The Case for E-Mail Privacy Rights 173 -- Discussion Questions 177 -- Cases: DoubleClick: The Ethics of Online Advertising 177 -- Amazon's New Privacy Policy 181 -- Newport Electronics 183 -- References 185 --CHAPTER SIX Securing the Electronic Frontier 189 -- Vulnerabilities of the Net 189 -- Cybercrime 192 -- Antipiracy Architectures 194 -- Trespass and Unauthorized Access in Cyberspace 196 -- Questionable Forms of Trespass 200 -- Security Measures in Cyberspace 203 -- The Encryption Controversy: A Public Policy Perspective 207 -- The Clipper Chip 20.
STUDY PROGRAM
Program name IACT918
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Internet
General Moral and ethical aspects.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computers and civilization.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Law and ethics.
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uowd.box.com/s/7shsw2ifqp1pvqkmk4w1c0e2h7u4k4te
Public note Location Map
MAIN ENTRY--PERSONAL NAME
-- 28590
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 42079
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 2393
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 1103
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2005-02-15 AMAUK 303.48 SP CY T0023873 2017-01-26 16.99 2017-01-26 REGULAR

Powered by Koha