(0) items

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.




Pub. Date:
Jones & Bartlett Learning
List Price: $123.95

Rent Textbook


Buy New Textbook

In Stock Usually Ships in 24 Hours.

Used Textbook

We're Sorry
Sold Out


We're Sorry
Not Available

More New and Used
from Private Sellers
Starting at $0.34

Questions About This Book?

Why should I rent this book?

Renting is easy, fast, and cheap! Renting from can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.

How do rental returns work?

Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!

What version or edition is this?

This is the 4th edition with a publication date of 7/30/2010.

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.


Revised and updated to reflect new technologies in the field, the fourth edition of this popular text takes an in-depth look at the social costs and moral problems that have emerged by the ever expanding use of the Internet, and offers up-to-date legal and philosophical examinations of these issues. It focuses heavily on content control, free speech, intellectual property, and security while delving into new areas of blogging and social networking. Case studies throughout discuss real-world events and include coverage of numerous hot topics. In the process of exploring current issues, it identifies legal disputes that will likely set the standard for future cases.

Table of Contents

Prefacep. ix
The Internet and Ethical Valuesp. 1
Cyberethics and the ˘Law of the Horse÷p. 2
Iron Cage or Gateway to Utopia?p. 7
Ethical Values and the Digital Frontierp. 10
Utilitarianismp. 11
Contract Rights (Contractarianism)p. 12
Moral Duty (Pluralism)p. 14
New Natural Lawp. 18
Postscript on Moral Theoryp. 20
Normative Principlesp. 21
Autonomyp. 22
Nonmaleficencep. 22
Beneficencep. 22
Justicep. 23
Discussion Questionsp. 24
Regulating and Governing the Internetp. 27
A Short History of the Internetp. 29
The Internet's Current Architecturep. 31
The World Wide Webp. 33
Electronic Commercep. 35
Social Networkingp. 38
Social Problems and Social Costsp. 40
The Invisible Handp. 41
Regulating the Net: The Visible Handp. 42
A ˘Bottom-Up÷ Approach: The Sovereignty of Codep. 44
Internet Governancep. 46
Internet Regulation and Ethicsp. 48
Discussion Questionsp. 50
Case Studies: L'Affair Yahoop. 50
A Case of Libelp. 54
Free Speech and Content Controls in Cyberspacep. 57
Speech and Internet Architecturep. 58
Pornography in Cyberspacep. 59
Public Policy Overviewp. 60
Automating Content Controlsp. 65
Hate Speech and Online Threatsp. 73
Anonymous Speechp. 75
The Ethics of Bloggin'gp. 77
Spam as Commercial Free Speechp. 79
Postscriptp. 83
Discussion Questionsp. 84
Case Studies: The Librarian's Dilemmap. 85
Spam or Free Speech at Intel?p. 86
Digital Censorship in Chinap. 88
Intellectual Property in Cyberspacep. 99
Background on Intellectual Propertyp. 99
What Is Intellectual Property?p. 101
Legal Protection for Intellectual Propertyp. 102
Moral Justifications for Intellectual Propertyp. 106
Recent Legislationp. 109
Issues for the Internetp. 111
Copyright and the Digital Dilemmap. 111
Software Ownership and the Open Source Code Movementp. 119
Digital Rights Architecturesp. 122
Business Method Patents in Cyberspacep. 124
Domain Names and Intel-connectivity Issuesp. 126
Postscriptp. 135
Discussion Questionsp. 136
Case Studies: The RIAA v. Verizonp. 136
Patent War on the Web: Amazon v. Barnes & Noblep. 139
A Parody of PETAp. 141
The Movie Industry Takes on Groksterp. 142
Regulating Internet Privacyp. 149
A Definition and Theory of Privacyp. 150
Personal Information on the Internetp. 153
Consumer Privacy on the Internetp. 155
Privacy-Invasive Technologiesp. 155
Policy Considerationsp. 159
Moral Considerationsp. 162
The U. S. and the European Union (EU): Divergent Paths to Privacy Protectionp. 165
Privacy Legislation in the U. S.p. 165
Privacy Protection in the EUp. 168
Privacy and Internet Architecturesp. 171
A Prescription for Privacy?p. 173
Privacy in the Workplacep. 175
Privacy Rights at Riskp. 175
Comparing U. S. and European Policiesp. 176
The Case For and Against Monitoringp. 177
Discussion Questionsp. 180
Case Studies: DoubleClick: The Ethics of Online Advertisingp. 180
Amazon's Privacy Policyp. 184
Newport Electronicsp. 186
Securing the Electronic Frontierp. 191
Vulnerabilities of the Netp. 191
Cybercrimep. 194
Anti-Piracy Architecturesp. 196
Trespass, Unauthorized Access, and Hacktivisionp. 198
Questionable Forms of Trespassp. 202
Security Measures in Cyberspacep. 204
The Encryption Controversy: A Public Policy Perspectivep. 208
The Clipper Chipp. 209
Clipper IIp. 211
Key Management Infrastructure or Clipper IIIp. 212
Policy Reversalp. 213
Encryption Code, Privacy, and Free Speechp. 214
Discussion Questionsp. 215
Case Studies: The Case of the Pretty Good Privacy Encryption Programp. 216
eBay v. Bidder's Edge: Trespass or Legitimate Access?p. 218
Glossary: The Language of the Internetp. 223
Bibliographyp. 227
Legal Cases Citedp. 233
Indexp. 235
Table of Contents provided by Ingram. All Rights Reserved.

Please wait while the item is added to your cart...