Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Preface | p. ix |
The Internet and Ethical Values | p. 1 |
Cyberethics and the ôLaw of the Horseö | p. 2 |
Iron Cage or Gateway to Utopia? | p. 7 |
Ethical Values and the Digital Frontier | p. 10 |
Utilitarianism | p. 11 |
Contract Rights (Contractarianism) | p. 12 |
Moral Duty (Pluralism) | p. 14 |
New Natural Law | p. 18 |
Postscript on Moral Theory | p. 20 |
Normative Principles | p. 21 |
Autonomy | p. 22 |
Nonmaleficence | p. 22 |
Beneficence | p. 22 |
Justice | p. 23 |
Discussion Questions | p. 24 |
Regulating and Governing the Internet | p. 27 |
A Short History of the Internet | p. 29 |
The Internet's Current Architecture | p. 31 |
The World Wide Web | p. 33 |
Electronic Commerce | p. 35 |
Social Networking | p. 38 |
Social Problems and Social Costs | p. 40 |
The Invisible Hand | p. 41 |
Regulating the Net: The Visible Hand | p. 42 |
A ôBottom-Upö Approach: The Sovereignty of Code | p. 44 |
Internet Governance | p. 46 |
Internet Regulation and Ethics | p. 48 |
Discussion Questions | p. 50 |
Case Studies: L'Affair Yahoo | p. 50 |
A Case of Libel | p. 54 |
Free Speech and Content Controls in Cyberspace | p. 57 |
Speech and Internet Architecture | p. 58 |
Pornography in Cyberspace | p. 59 |
Public Policy Overview | p. 60 |
Automating Content Controls | p. 65 |
Hate Speech and Online Threats | p. 73 |
Anonymous Speech | p. 75 |
The Ethics of Bloggin'g | p. 77 |
Spam as Commercial Free Speech | p. 79 |
Postscript | p. 83 |
Discussion Questions | p. 84 |
Case Studies: The Librarian's Dilemma | p. 85 |
Spam or Free Speech at Intel? | p. 86 |
Digital Censorship in China | p. 88 |
Intellectual Property in Cyberspace | p. 99 |
Background on Intellectual Property | p. 99 |
What Is Intellectual Property? | p. 101 |
Legal Protection for Intellectual Property | p. 102 |
Moral Justifications for Intellectual Property | p. 106 |
Recent Legislation | p. 109 |
Issues for the Internet | p. 111 |
Copyright and the Digital Dilemma | p. 111 |
Software Ownership and the Open Source Code Movement | p. 119 |
Digital Rights Architectures | p. 122 |
Business Method Patents in Cyberspace | p. 124 |
Domain Names and Intel-connectivity Issues | p. 126 |
Postscript | p. 135 |
Discussion Questions | p. 136 |
Case Studies: The RIAA v. Verizon | p. 136 |
Patent War on the Web: Amazon v. Barnes & Noble | p. 139 |
A Parody of PETA | p. 141 |
The Movie Industry Takes on Grokster | p. 142 |
Regulating Internet Privacy | p. 149 |
A Definition and Theory of Privacy | p. 150 |
Personal Information on the Internet | p. 153 |
Consumer Privacy on the Internet | p. 155 |
Privacy-Invasive Technologies | p. 155 |
Policy Considerations | p. 159 |
Moral Considerations | p. 162 |
The U. S. and the European Union (EU): Divergent Paths to Privacy Protection | p. 165 |
Privacy Legislation in the U. S. | p. 165 |
Privacy Protection in the EU | p. 168 |
Privacy and Internet Architectures | p. 171 |
A Prescription for Privacy? | p. 173 |
Privacy in the Workplace | p. 175 |
Privacy Rights at Risk | p. 175 |
Comparing U. S. and European Policies | p. 176 |
The Case For and Against Monitoring | p. 177 |
Discussion Questions | p. 180 |
Case Studies: DoubleClick: The Ethics of Online Advertising | p. 180 |
Amazon's Privacy Policy | p. 184 |
Newport Electronics | p. 186 |
Securing the Electronic Frontier | p. 191 |
Vulnerabilities of the Net | p. 191 |
Cybercrime | p. 194 |
Anti-Piracy Architectures | p. 196 |
Trespass, Unauthorized Access, and Hacktivision | p. 198 |
Questionable Forms of Trespass | p. 202 |
Security Measures in Cyberspace | p. 204 |
The Encryption Controversy: A Public Policy Perspective | p. 208 |
The Clipper Chip | p. 209 |
Clipper II | p. 211 |
Key Management Infrastructure or Clipper III | p. 212 |
Policy Reversal | p. 213 |
Encryption Code, Privacy, and Free Speech | p. 214 |
Discussion Questions | p. 215 |
Case Studies: The Case of the Pretty Good Privacy Encryption Program | p. 216 |
eBay v. Bidder's Edge: Trespass or Legitimate Access? | p. 218 |
Glossary: The Language of the Internet | p. 223 |
Bibliography | p. 227 |
Legal Cases Cited | p. 233 |
Index | p. 235 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.