Coverart for item
The Resource Cyberethics : morality and law in cyberspace, Richard A. Spinello

Cyberethics : morality and law in cyberspace, Richard A. Spinello

Label
Cyberethics : morality and law in cyberspace
Title
Cyberethics
Title remainder
morality and law in cyberspace
Statement of responsibility
Richard A. Spinello
Creator
Subject
Language
eng
Cataloging source
DLC
http://library.link/vocab/creatorName
Spinello, Richard A
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/subjectName
  • Internet
  • Cyberspace
  • Computers and civilization
  • Law and ethics
Label
Cyberethics : morality and law in cyberspace, Richard A. Spinello
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Contents
Machine generated contents note: ch. One The Internet and Ethical Values -- Cyberethics and the "Law of the Horse" -- Iron Cage or Gateway to Utopia? -- Ethical Values and the Digital Frontier -- Utilitarianism -- Contract Rights (Contractarianism) -- Moral Duty (Pluralism) -- New Natural Law -- Postscript on Moral Theory -- Floridi's Macroethics -- Normative Principles -- Autonomy -- Nonmaleficence -- Beneficence -- Justice -- Discussion Questions -- References -- Additional Resources -- ch. Two Regulating and Governing the Internet -- A Short History of the Internet -- The Internet's Current Architecture -- The World Wide Web -- Electronic Commerce -- Gatekeepers and Search Engines -- Social Networking -- Social Problems and Social Costs -- The Invisible Hand -- Regulating the Net: The Visible Hand -- A "Bottom-Up" Approach: The Power of Code -- Internet Governance -- Contested Sovereignty in Cyberspace -- Discussion Questions -- Case Studies: L'Affair Yahoo! -- American or Australian Libel Law? -- Google: The New Monopolist? -- References -- Additional Resources -- ch. Three Free Speech and Content Controls in Cyberspace -- Speech and Internet Architecture -- Pornography in Cyberspace -- Public Policy Overview -- Automating Content Controls -- New Censors and Controversies -- Hate Speech and Online Threats -- Anonymous Speech -- The Ethics of Blogging -- Spam as Commercial Free Speech -- Government Censorship and the Fate of Political Speech -- Postscript -- Discussion Questions -- Case Studies: The Librarian's Dilemma -- Are Video Games Free Speech? -- Digital Censorship in China -- References -- Additional Resources -- ch. Four Intellectual Property in Cyberspace -- Background on Intellectual Property -- What Is Intellectual Property? -- Legal Protection for Intellectual Property -- Moral Justifications for Intellectual Property -- Recent Legislation -- Issues for the Internet and Networking Technologies -- Copyright and the Digital Dilemma -- Software Ownership and the Open Source Code Movement -- Digital Rights Architectures -- Business Method Patents in Cyberspace -- Patents and Smartphones -- Domain Names and Interconnectivity Issues -- Postscript -- Discussion Questions -- Case Studies: Readers' Rights, Remixing, and Mashups -- Patent War on the Web: Amazon v. Barnes & Noble -- A Parody of PETA -- The Movie Industry Takes on Grokster -- References -- Additional Resources -- ch. Five Regulating Internet Privacy -- A Definition and Theory of Privacy -- Personal Information on the Internet -- Consumer Privacy on the Internet -- Privacy-Invasive Technologies -- Policy Considerations -- Moral Considerations -- The United States and the European Union: Divergent Paths to Privacy Protection -- Privacy Legislation in the United States -- Privacy Protection in the European Union -- A Prescription for Privacy? -- Privacy in the Workplace -- Privacy Rights at Risk -- Comparing U.S. and European Policies -- The Case For and Against Monitoring -- Discussion Questions -- Case Studies: DoubleClick: The Ethics of Online Advertising -- Facebook's "Unfriendly" Privacy Policies -- Newport Electronics -- References -- Additional Resources -- ch. Six Securing the electronic Frontier -- Vulnerabilities of the Net -- Cybercrime -- Antipiracy Architectures -- Trespass, Unauthorized Access, and Hacktivision -- Questionable Forms of Trespass -- Security Measures in Cyberspace -- The Encryption Controversy: A Public Policy Perspective -- The Clipper Chip -- Clipper II -- Key Management Infrastructure or Clipper in -- Policy Reversal -- Encryption Code, Privacy, and Free Speech -- Discussion Questions -- Case Studies: The Lulz Sec Hackers -- eBay v. Bidder's Edge: Trespass or Legitimate Access? -- References -- Additional Resources
Control code
ocn825196332
Dimensions
23 cm.
Edition
5th ed.
Extent
xii, 237 p.
Isbn
9781449688417
Lccn
2012043488
Other physical details
ill
Label
Cyberethics : morality and law in cyberspace, Richard A. Spinello
Publication
Bibliography note
Includes bibliographical references and index
Contents
Machine generated contents note: ch. One The Internet and Ethical Values -- Cyberethics and the "Law of the Horse" -- Iron Cage or Gateway to Utopia? -- Ethical Values and the Digital Frontier -- Utilitarianism -- Contract Rights (Contractarianism) -- Moral Duty (Pluralism) -- New Natural Law -- Postscript on Moral Theory -- Floridi's Macroethics -- Normative Principles -- Autonomy -- Nonmaleficence -- Beneficence -- Justice -- Discussion Questions -- References -- Additional Resources -- ch. Two Regulating and Governing the Internet -- A Short History of the Internet -- The Internet's Current Architecture -- The World Wide Web -- Electronic Commerce -- Gatekeepers and Search Engines -- Social Networking -- Social Problems and Social Costs -- The Invisible Hand -- Regulating the Net: The Visible Hand -- A "Bottom-Up" Approach: The Power of Code -- Internet Governance -- Contested Sovereignty in Cyberspace -- Discussion Questions -- Case Studies: L'Affair Yahoo! -- American or Australian Libel Law? -- Google: The New Monopolist? -- References -- Additional Resources -- ch. Three Free Speech and Content Controls in Cyberspace -- Speech and Internet Architecture -- Pornography in Cyberspace -- Public Policy Overview -- Automating Content Controls -- New Censors and Controversies -- Hate Speech and Online Threats -- Anonymous Speech -- The Ethics of Blogging -- Spam as Commercial Free Speech -- Government Censorship and the Fate of Political Speech -- Postscript -- Discussion Questions -- Case Studies: The Librarian's Dilemma -- Are Video Games Free Speech? -- Digital Censorship in China -- References -- Additional Resources -- ch. Four Intellectual Property in Cyberspace -- Background on Intellectual Property -- What Is Intellectual Property? -- Legal Protection for Intellectual Property -- Moral Justifications for Intellectual Property -- Recent Legislation -- Issues for the Internet and Networking Technologies -- Copyright and the Digital Dilemma -- Software Ownership and the Open Source Code Movement -- Digital Rights Architectures -- Business Method Patents in Cyberspace -- Patents and Smartphones -- Domain Names and Interconnectivity Issues -- Postscript -- Discussion Questions -- Case Studies: Readers' Rights, Remixing, and Mashups -- Patent War on the Web: Amazon v. Barnes & Noble -- A Parody of PETA -- The Movie Industry Takes on Grokster -- References -- Additional Resources -- ch. Five Regulating Internet Privacy -- A Definition and Theory of Privacy -- Personal Information on the Internet -- Consumer Privacy on the Internet -- Privacy-Invasive Technologies -- Policy Considerations -- Moral Considerations -- The United States and the European Union: Divergent Paths to Privacy Protection -- Privacy Legislation in the United States -- Privacy Protection in the European Union -- A Prescription for Privacy? -- Privacy in the Workplace -- Privacy Rights at Risk -- Comparing U.S. and European Policies -- The Case For and Against Monitoring -- Discussion Questions -- Case Studies: DoubleClick: The Ethics of Online Advertising -- Facebook's "Unfriendly" Privacy Policies -- Newport Electronics -- References -- Additional Resources -- ch. Six Securing the electronic Frontier -- Vulnerabilities of the Net -- Cybercrime -- Antipiracy Architectures -- Trespass, Unauthorized Access, and Hacktivision -- Questionable Forms of Trespass -- Security Measures in Cyberspace -- The Encryption Controversy: A Public Policy Perspective -- The Clipper Chip -- Clipper II -- Key Management Infrastructure or Clipper in -- Policy Reversal -- Encryption Code, Privacy, and Free Speech -- Discussion Questions -- Case Studies: The Lulz Sec Hackers -- eBay v. Bidder's Edge: Trespass or Legitimate Access? -- References -- Additional Resources
Control code
ocn825196332
Dimensions
23 cm.
Edition
5th ed.
Extent
xii, 237 p.
Isbn
9781449688417
Lccn
2012043488
Other physical details
ill

Library Locations

    • Sydney Jones LibraryBorrow it
      Chatham Street, Liverpool, L7 7BD, GB
      53.403069 -2.963723
Processing Feedback ...