CyberEthics : morality and law in cyberspace /

This timely text takes an unbiased look at four perennial issues on the Internet: free speech, intellectual property, privacy, and security

Bibliographic Details
Main Author: Spinello, Richard A
Format: Book
Language:English
Published: Boston : Jones and Bartlett Publishers ; c2003
Boston : Jones and Bartlett Publishers, c2003
Boston : ©2003
Sudbury, Mass. : c2003
Edition:2nd ed
Subjects:
Table of Contents:
  • The Internet and ethical values
  • Regulating and governing the Internet
  • Free speech and content control in cyberspace
  • Intellectual property in cyberspace
  • Regulating Internet privacy
  • Securing the electronic frontier
  • Machine generated contents note: CHAPTER ONE The Internet and Ethical Values 1
  • Introduction 1
  • Cyberethics and "The Law of the Horse" 2
  • An Iron Cage or a Gateway to Utopia? 8
  • Ethical Frameworks and the Digital Frontier 10
  • Utilitarianism 11
  • Contract Rights (Contractarianism) 13
  • Natural Rights 15
  • Moral Duty (Pluralism) 16
  • Postscript on Moral Theory 21
  • Normative Principles 23
  • The Principle of Autonomy 23
  • The Principle of Nonmaleficence 23
  • The Principle of Beneficence 24
  • The Principle of Justice 24
  • Discussion Questions 25
  • References 25
  • CHAPTER TWO Regulating and Governing the Internet 29
  • Introduction 29
  • A Short History of the Internet 31
  • The Internet's Current Architecture 33
  • The World Wide Web 35
  • Electronic Commerce 37
  • Social Problems and Social Costs 40
  • The Invisible Hand 41
  • Regulating the Net: The Visible Hand 42
  • A "Bottoms-Up" Approach: The Sovereignty ot Code 45
  • Internet Governance 47
  • Net Regulation and Ethics 48
  • Discussion Questions 51
  • References 51
  • CHAPTER THREE Free Speech and Content Control in Cyberspace 53
  • Introduction 53
  • Speech and Internet Architecture 55
  • Pornography in Cyberspace 56
  • The Communications Decency Act (CDA) 56
  • Child Online Protection Act (COPA) 59
  • Children's Interet Protection Act (CHIPA) 60
  • Automating Content Controls 62
  • Hate Speech and Online Threats 70
  • Anonymous Speech 73
  • Student Web Sites 75
  • Spam as Commercial Free Speech 77
  • Postscript 81
  • Discussion Questions 82
  • Cases: The Librarian's Dilemma 83
  • Spam or Free Speech at Intel? 84
  • L'Affair Yahoo 86
  • References 89
  • CHAPTER FOUR Intelletdl Propery in Cyberspace 91
  • Part I: Background on Intellectual Property 91
  • Introduction 91
  • What Is Intellectual Property and Why Does It Matter? 93
  • Legal Protections for Intellectual Property 95
  • Copyright Laws 95
  • Patents 96
  • Trademarks 97
  • Moral Justification for Intellectual Property 98
  • Labor-Desert Theory 99
  • Personality Theory 100
  • Utilitarianism 100
  • Recent Legislation 102
  • The Digital Millenium Copyright Act (DMCA) 102
  • The Sonny Bono Copyright Term Extension Ad (CTEA) 103
  • Part II: Issues for the Interet 105
  • Copyright and the Digital Dilemma 105
  • Digital Music 105
  • The DeCSS Lawsuit 110
  • Software Ownership and the Open Source Code Movement 112
  • Digital Rights Architectures 117
  • Business Method Patents in Cyberspace 118
  • Domain Names and Interconnectivity Issues 121
  • Ownership of Domain Names 121
  • Linking and Framing 124
  • Metatags 127
  • Creative Integrity 129
  • Postscript 131
  • Discussion Questions 132
  • Cases: The wwwnga Domain Name Dispute 132
  • Patent War on the Web: Amazon vs. Barnes & Noble 133
  • Morpheus: The Next Napster? 135
  • References 137
  • CHAPTER FIVE Regulating nternet Prviacy 141
  • Introduction 141
  • Definition and Theory of Privacy 142
  • Personal Information on the Internet 145
  • Consumer Privacy on the Internet 147
  • Privacy-Invasive Technologies 147
  • Policy Considerations 152
  • Moral Considerations 155
  • The United States and Europe: Divergent Paths to Privacy Protection 159
  • Privacy Legislation in the U.S. 159
  • Privacy Protection in Europe 162
  • Privacy and Internet Architectures 166
  • A Prescription for Privacy 168
  • Privacy in the Workplace 170
  • Privacy Rights at Risk 170
  • Comparing U.S. and European Policies 171
  • The Case for E-Mail Privacy Rights 173
  • Discussion Questions 177
  • Cases: DoubleClick: The Ethics of Online Advertising 177
  • Amazon's New Privacy Policy 181
  • Newport Electronics 183
  • References 185
  • CHAPTER SIX Securing the Electronic Frontier 189
  • Vulnerabilities of the Net 189
  • Cybercrime 192
  • Antipiracy Architectures 194
  • Trespass and Unauthorized Access in Cyberspace 196
  • Questionable Forms of Trespass 200
  • Security Measures in Cyberspace 203
  • The Encryption Controversy: A Public Policy Perspective 207
  • The Clipper Chip 208
  • Clipper II 210
  • Key Management Infrastructure (KMI) or Clipper III 211
  • Policy Reversal 213
  • Encryption Code, Privacy, and Free Speech 213
  • Discussion Questions 215
  • Cases: The Case of the Pretty Good Privacy (PGP) Encryption Program 215
  • eBay v. Bidder's Edge: Trespass or Legitimate Access? 217
  • References 219