CyberEthics : morality and law in cyberspace /
This timely text takes an unbiased look at four perennial issues on the Internet: free speech, intellectual property, privacy, and security
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Boston :
Jones and Bartlett Publishers ;
c2003
Boston : Jones and Bartlett Publishers, c2003 Boston : ©2003 Sudbury, Mass. : c2003 |
Edition: | 2nd ed |
Subjects: |
Table of Contents:
- The Internet and ethical values
- Regulating and governing the Internet
- Free speech and content control in cyberspace
- Intellectual property in cyberspace
- Regulating Internet privacy
- Securing the electronic frontier
- Machine generated contents note: CHAPTER ONE The Internet and Ethical Values 1
- Introduction 1
- Cyberethics and "The Law of the Horse" 2
- An Iron Cage or a Gateway to Utopia? 8
- Ethical Frameworks and the Digital Frontier 10
- Utilitarianism 11
- Contract Rights (Contractarianism) 13
- Natural Rights 15
- Moral Duty (Pluralism) 16
- Postscript on Moral Theory 21
- Normative Principles 23
- The Principle of Autonomy 23
- The Principle of Nonmaleficence 23
- The Principle of Beneficence 24
- The Principle of Justice 24
- Discussion Questions 25
- References 25
- CHAPTER TWO Regulating and Governing the Internet 29
- Introduction 29
- A Short History of the Internet 31
- The Internet's Current Architecture 33
- The World Wide Web 35
- Electronic Commerce 37
- Social Problems and Social Costs 40
- The Invisible Hand 41
- Regulating the Net: The Visible Hand 42
- A "Bottoms-Up" Approach: The Sovereignty ot Code 45
- Internet Governance 47
- Net Regulation and Ethics 48
- Discussion Questions 51
- References 51
- CHAPTER THREE Free Speech and Content Control in Cyberspace 53
- Introduction 53
- Speech and Internet Architecture 55
- Pornography in Cyberspace 56
- The Communications Decency Act (CDA) 56
- Child Online Protection Act (COPA) 59
- Children's Interet Protection Act (CHIPA) 60
- Automating Content Controls 62
- Hate Speech and Online Threats 70
- Anonymous Speech 73
- Student Web Sites 75
- Spam as Commercial Free Speech 77
- Postscript 81
- Discussion Questions 82
- Cases: The Librarian's Dilemma 83
- Spam or Free Speech at Intel? 84
- L'Affair Yahoo 86
- References 89
- CHAPTER FOUR Intelletdl Propery in Cyberspace 91
- Part I: Background on Intellectual Property 91
- Introduction 91
- What Is Intellectual Property and Why Does It Matter? 93
- Legal Protections for Intellectual Property 95
- Copyright Laws 95
- Patents 96
- Trademarks 97
- Moral Justification for Intellectual Property 98
- Labor-Desert Theory 99
- Personality Theory 100
- Utilitarianism 100
- Recent Legislation 102
- The Digital Millenium Copyright Act (DMCA) 102
- The Sonny Bono Copyright Term Extension Ad (CTEA) 103
- Part II: Issues for the Interet 105
- Copyright and the Digital Dilemma 105
- Digital Music 105
- The DeCSS Lawsuit 110
- Software Ownership and the Open Source Code Movement 112
- Digital Rights Architectures 117
- Business Method Patents in Cyberspace 118
- Domain Names and Interconnectivity Issues 121
- Ownership of Domain Names 121
- Linking and Framing 124
- Metatags 127
- Creative Integrity 129
- Postscript 131
- Discussion Questions 132
- Cases: The wwwnga Domain Name Dispute 132
- Patent War on the Web: Amazon vs. Barnes & Noble 133
- Morpheus: The Next Napster? 135
- References 137
- CHAPTER FIVE Regulating nternet Prviacy 141
- Introduction 141
- Definition and Theory of Privacy 142
- Personal Information on the Internet 145
- Consumer Privacy on the Internet 147
- Privacy-Invasive Technologies 147
- Policy Considerations 152
- Moral Considerations 155
- The United States and Europe: Divergent Paths to Privacy Protection 159
- Privacy Legislation in the U.S. 159
- Privacy Protection in Europe 162
- Privacy and Internet Architectures 166
- A Prescription for Privacy 168
- Privacy in the Workplace 170
- Privacy Rights at Risk 170
- Comparing U.S. and European Policies 171
- The Case for E-Mail Privacy Rights 173
- Discussion Questions 177
- Cases: DoubleClick: The Ethics of Online Advertising 177
- Amazon's New Privacy Policy 181
- Newport Electronics 183
- References 185
- CHAPTER SIX Securing the Electronic Frontier 189
- Vulnerabilities of the Net 189
- Cybercrime 192
- Antipiracy Architectures 194
- Trespass and Unauthorized Access in Cyberspace 196
- Questionable Forms of Trespass 200
- Security Measures in Cyberspace 203
- The Encryption Controversy: A Public Policy Perspective 207
- The Clipper Chip 208
- Clipper II 210
- Key Management Infrastructure (KMI) or Clipper III 211
- Policy Reversal 213
- Encryption Code, Privacy, and Free Speech 213
- Discussion Questions 215
- Cases: The Case of the Pretty Good Privacy (PGP) Encryption Program 215
- eBay v. Bidder's Edge: Trespass or Legitimate Access? 217
- References 219