More New and Used
from Private Sellers
Only one copy
in stock at this price.
In Stock Usually Ships in 24 Hours.
In Stock Usually Ships in 24 Hours.
Questions About This Book?
Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 4th edition with a publication date of 7/30/2010.
What is included with this book?
- The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
- The Used copy of this book is not guaranteed to inclue any supplemental materials. Typically, only the book itself is included.
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
Revised and updated to reflect new technologies in the field, the fourth edition of this popular text takes an in-depth look at the social costs and moral problems that have emerged by the ever expanding use of the Internet, and offers up-to-date legal and philosophical examinations of these issues. It focuses heavily on content control, free speech, intellectual property, and security while delving into new areas of blogging and social networking. Case studies throughout discuss real-world events and include coverage of numerous hot topics. In the process of exploring current issues, it identifies legal disputes that will likely set the standard for future cases.
Table of Contents
|The Internet and Ethical Values||p. 1|
|Cyberethics and the ˘Law of the Horse÷||p. 2|
|Iron Cage or Gateway to Utopia?||p. 7|
|Ethical Values and the Digital Frontier||p. 10|
|Contract Rights (Contractarianism)||p. 12|
|Moral Duty (Pluralism)||p. 14|
|New Natural Law||p. 18|
|Postscript on Moral Theory||p. 20|
|Normative Principles||p. 21|
|Discussion Questions||p. 24|
|Regulating and Governing the Internet||p. 27|
|A Short History of the Internet||p. 29|
|The Internet's Current Architecture||p. 31|
|The World Wide Web||p. 33|
|Electronic Commerce||p. 35|
|Social Networking||p. 38|
|Social Problems and Social Costs||p. 40|
|The Invisible Hand||p. 41|
|Regulating the Net: The Visible Hand||p. 42|
|A ˘Bottom-Up÷ Approach: The Sovereignty of Code||p. 44|
|Internet Governance||p. 46|
|Internet Regulation and Ethics||p. 48|
|Discussion Questions||p. 50|
|Case Studies: L'Affair Yahoo||p. 50|
|A Case of Libel||p. 54|
|Free Speech and Content Controls in Cyberspace||p. 57|
|Speech and Internet Architecture||p. 58|
|Pornography in Cyberspace||p. 59|
|Public Policy Overview||p. 60|
|Automating Content Controls||p. 65|
|Hate Speech and Online Threats||p. 73|
|Anonymous Speech||p. 75|
|The Ethics of Bloggin'g||p. 77|
|Spam as Commercial Free Speech||p. 79|
|Discussion Questions||p. 84|
|Case Studies: The Librarian's Dilemma||p. 85|
|Spam or Free Speech at Intel?||p. 86|
|Digital Censorship in China||p. 88|
|Intellectual Property in Cyberspace||p. 99|
|Background on Intellectual Property||p. 99|
|What Is Intellectual Property?||p. 101|
|Legal Protection for Intellectual Property||p. 102|
|Moral Justifications for Intellectual Property||p. 106|
|Recent Legislation||p. 109|
|Issues for the Internet||p. 111|
|Copyright and the Digital Dilemma||p. 111|
|Software Ownership and the Open Source Code Movement||p. 119|
|Digital Rights Architectures||p. 122|
|Business Method Patents in Cyberspace||p. 124|
|Domain Names and Intel-connectivity Issues||p. 126|
|Discussion Questions||p. 136|
|Case Studies: The RIAA v. Verizon||p. 136|
|Patent War on the Web: Amazon v. Barnes & Noble||p. 139|
|A Parody of PETA||p. 141|
|The Movie Industry Takes on Grokster||p. 142|
|Regulating Internet Privacy||p. 149|
|A Definition and Theory of Privacy||p. 150|
|Personal Information on the Internet||p. 153|
|Consumer Privacy on the Internet||p. 155|
|Privacy-Invasive Technologies||p. 155|
|Policy Considerations||p. 159|
|Moral Considerations||p. 162|
|The U. S. and the European Union (EU): Divergent Paths to Privacy Protection||p. 165|
|Privacy Legislation in the U. S.||p. 165|
|Privacy Protection in the EU||p. 168|
|Privacy and Internet Architectures||p. 171|
|A Prescription for Privacy?||p. 173|
|Privacy in the Workplace||p. 175|
|Privacy Rights at Risk||p. 175|
|Comparing U. S. and European Policies||p. 176|
|The Case For and Against Monitoring||p. 177|
|Discussion Questions||p. 180|
|Case Studies: DoubleClick: The Ethics of Online Advertising||p. 180|
|Newport Electronics||p. 186|
|Securing the Electronic Frontier||p. 191|
|Vulnerabilities of the Net||p. 191|
|Anti-Piracy Architectures||p. 196|
|Trespass, Unauthorized Access, and Hacktivision||p. 198|
|Questionable Forms of Trespass||p. 202|
|Security Measures in Cyberspace||p. 204|
|The Encryption Controversy: A Public Policy Perspective||p. 208|
|The Clipper Chip||p. 209|
|Clipper II||p. 211|
|Key Management Infrastructure or Clipper III||p. 212|
|Policy Reversal||p. 213|
|Encryption Code, Privacy, and Free Speech||p. 214|
|Discussion Questions||p. 215|
|Case Studies: The Case of the Pretty Good Privacy Encryption Program||p. 216|
|eBay v. Bidder's Edge: Trespass or Legitimate Access?||p. 218|
|Glossary: The Language of the Internet||p. 223|
|Legal Cases Cited||p. 233|
|Table of Contents provided by Ingram. All Rights Reserved.|