Normal view MARC view ISBD view

CyberEthics : morality and law in cyberspace /

By: Spinello, Richard A
Material type: BookPublisher: Boston : Jones and Bartlett Publishers, c2003.Edition: 2nd ed.Description: xvi, 238 p. : ill ; 23 cm.ISBN: 0763700649Program: IACT918Subject(s): Internet -- Moral and ethical aspects | Computers and civilization | Law and ethicsDDC classification: 303.48/34 Online resources: Location Map
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
303.48 SP CY (Browse shelf) Available T0023873
Total holds: 0

Includes bibliographical references (p. 227-232) and index.

Machine generated contents note: CHAPTER ONE The Internet and Ethical Values 1 -- Introduction 1 -- Cyberethics and "The Law of the Horse" 2 -- An Iron Cage or a Gateway to Utopia? 8 -- Ethical Frameworks and the Digital Frontier 10 -- Utilitarianism 11 -- Contract Rights (Contractarianism) 13 -- Natural Rights 15 -- Moral Duty (Pluralism) 16 -- Postscript on Moral Theory 21 -- Normative Principles 23 -- The Principle of Autonomy 23 -- The Principle of Nonmaleficence 23 -- The Principle of Beneficence 24 -- The Principle of Justice 24 -- Discussion Questions 25 -- References 25 --CHAPTER TWO Regulating and Governing the Internet 29 -- Introduction 29 -- A Short History of the Internet 31 -- The Internet's Current Architecture 33 -- The World Wide Web 35 -- Electronic Commerce 37 -- Social Problems and Social Costs 40 -- The Invisible Hand 41 -- Regulating the Net: The Visible Hand 42 -- A "Bottoms-Up" Approach: The Sovereignty ot Code 45 -- Internet Governance 47 -- Net Regulation and Ethics 48 -- Discussion Questions 51 -- References 51 --CHAPTER THREE Free Speech and Content Control in Cyberspace 53 -- Introduction 53 -- Speech and Internet Architecture 55 -- Pornography in Cyberspace 56 -- The Communications Decency Act (CDA) 56 -- Child Online Protection Act (COPA) 59 -- Children's Interet Protection Act (CHIPA) 60 -- Automating Content Controls 62 -- Hate Speech and Online Threats 70 -- Anonymous Speech 73 -- Student Web Sites 75 -- Spam as Commercial Free Speech 77 -- Postscript 81 -- Discussion Questions 82 -- Cases: The Librarian's Dilemma 83 -- Spam or Free Speech at Intel? 84 -- L'Affair Yahoo 86 -- References 89 --CHAPTER FOUR Intelletdl Propery in Cyberspace 91 -- Part I: Background on Intellectual Property 91 -- Introduction 91 -- What Is Intellectual Property and Why Does It Matter? 93 -- Legal Protections for Intellectual Property 95 -- Copyright Laws 95 -- Patents 96 -- Trademarks 97 -- Moral Justification for Intellectual Property 98 -- Labor-Desert Theory 99 -- Personality Theory 100 -- Utilitarianism 100 -- Recent Legislation 102 -- The Digital Millenium Copyright Act (DMCA) 102 -- The Sonny Bono Copyright Term Extension Ad (CTEA) 103 -- Part II: Issues for the Interet 105 -- Copyright and the Digital Dilemma 105 -- Digital Music 105 -- The DeCSS Lawsuit 110 -- Software Ownership and the Open Source Code Movement 112 -- Digital Rights Architectures 117 -- Business Method Patents in Cyberspace 118 -- Domain Names and Interconnectivity Issues 121 -- Ownership of Domain Names 121 -- Linking and Framing 124 -- Metatags 127 -- Creative Integrity 129 -- Postscript 131 -- Discussion Questions 132 -- Cases: The wwwnga Domain Name Dispute 132 -- Patent War on the Web: Amazon vs. Barnes & Noble 133 -- Morpheus: The Next Napster? 135 -- References 137 -- CHAPTER FIVE Regulating nternet Prviacy 141 -- Introduction 141 -- Definition and Theory of Privacy 142 -- Personal Information on the Internet 145 -- Consumer Privacy on the Internet 147 -- Privacy-Invasive Technologies 147 -- Policy Considerations 152 -- Moral Considerations 155 -- The United States and Europe: Divergent Paths to Privacy Protection 159 -- Privacy Legislation in the U.S. 159 -- Privacy Protection in Europe 162 -- Privacy and Internet Architectures 166 -- A Prescription for Privacy 168 -- Privacy in the Workplace 170 -- Privacy Rights at Risk 170 -- Comparing U.S. and European Policies 171 -- The Case for E-Mail Privacy Rights 173 -- Discussion Questions 177 -- Cases: DoubleClick: The Ethics of Online Advertising 177 -- Amazon's New Privacy Policy 181 -- Newport Electronics 183 -- References 185 --CHAPTER SIX Securing the Electronic Frontier 189 -- Vulnerabilities of the Net 189 -- Cybercrime 192 -- Antipiracy Architectures 194 -- Trespass and Unauthorized Access in Cyberspace 196 -- Questionable Forms of Trespass 200 -- Security Measures in Cyberspace 203 -- The Encryption Controversy: A Public Policy Perspective 207 -- The Clipper Chip 20.

IACT918

Powered by Koha