did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780763737832

CyberEthics: Morality and Law in Cyberspace

by
  • ISBN13:

    9780763737832

  • ISBN10:

    0763737836

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2006-03-01
  • Publisher: Jones & Bartlett
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $92.95

Summary

CyberEthics: Morality and Law in Cyberspace, Third Edition takes an in-depth look at the social costs and moral problems that have arisen by the expanded use of the Internet, and offers up-to-date legal and philosophical perspectives. The text focuses heavily on content control and free speech, intellectual property, privacy and security, and has added new coverage on Blogging. Case studies featured throughout the text offer real-life scenarios and include coverage of numerous hot topics, including the latest decisions on digital music and movie downloads, the latest legal developments on the Children's Internet Protection Act, and other Internet governance and regulation updates. In the process of examining these issues, the text identifies some of the legal disputes that will likely become paradigm cases for more complex situations yet to come.

Table of Contents

Preface ix
The Internet and Ethical Values
1(26)
CyberEthics and ``The Law of the Horse''
2(5)
Iron Cage or Gateway to Utopia?
7(3)
Ethical Values and the Digital Frontier
10(10)
Postscript on Moral Theory
20(1)
Normative Principles
21(3)
Discussion Questions
24(3)
Regulating and Governing the Internet
27(28)
A Short History of the Internet
29(2)
The Internet's Current Architecture
31(2)
The World Wide Web
33(2)
Electronic Commerce
35(3)
Social Problems and Social Costs
38(4)
The Invisible Hand
39(1)
Regulating the Net: The Visible Hand
40(2)
A Bottom-Up Approach: The Sovereignty of Code
42(2)
Internet Governance
44(2)
Internet Regulation and Ethics
46(2)
Discussion Questions
48(1)
Case Studies: L'Affair Yahoo
48(7)
A Case of Libel
51(4)
Free Speech and Content Controls in Cyberspace
55(36)
Speech and Internet Architecture
56(1)
Pornography in Cyberspace
57(14)
Public Policy Overview
58(5)
Automating Content Controls
63(8)
Hate Speech and Online Threats
71(2)
Anonymous Speech
73(2)
The Ethics of Blogging
75(2)
Spam as Commercial Free Speech
77(4)
Postscript
81(1)
Discussion Questions
82(1)
Case Studies: The Librarian's Dilemma
82(9)
Spam or Free Speech at Intel
84(1)
Filtering the Internet in China
85(6)
Intellectual Property in Cyberspace
91(50)
Background on Intellectual Property
91(13)
What Is Intellectual Property?
93(1)
Legal Protection for Intellectual Property
94(4)
Moral Justifications for Intellectual Property
98(3)
Recent Legislation
101(3)
Issues for the Internet
104(23)
Copyright and the Digital Dilemma
104(8)
Software Ownership and the Open Source Code Movement
112(3)
Digital Rights Architectures
115(1)
Business Method Patents in Cyberspace
116(3)
Domain Names and Interconnectivity Issues
119(8)
Postscript
127(1)
Discussion Questions
128(1)
Case Studies: The RIAA vs. Verizon
128(13)
Patent War on the Web: Amazon vs. Barnes & Noble
131(2)
A Parody of PETA
133(1)
The Movie Industry Takes on Grokster
134(7)
Regulating Internet Privacy
141(42)
A Definition and Theory of Privacy
142(2)
Personal Information on the Internet
144(2)
Consumer Privacy on the Internet
146(10)
Privacy-Invasive Technologies
146(4)
Policy Considerations
150(3)
Moral Considerations
153(3)
The U.S. and the E.U.: Divergent Paths to Privacy Protection
156(7)
Privacy Legislation in the U.S.
157(3)
Privacy Protection in the E.U.
160(3)
Privacy and Internet Architectures
163(2)
A Prescription for Privacy?
165(2)
Privacy in the Workplace
167(5)
Privacy Rights at Risk
167(2)
Comparing U.S. and European Policies
169(1)
The Case For and Against Monitoring
170(2)
Discussion Questions
172(1)
Case Studies: DoubleClick: The Ethics of Online Advertising
173(10)
Amazon's New Privacy Policy
176(2)
Newport Electronics
178(5)
Securing the Electronic Frontier
183(32)
Vulnerabilities of the Net
183(3)
Cybercrime
186(2)
Anti-Piracy Architectures
188(2)
Trespass and Unauthorized Access in Cyberspace
190(6)
Questionable Forms of Trespass
194(2)
Security Measures in Cyberspace
196(4)
The Encryption Controversy: A Public Policy Perspective
200(6)
The Clipper Chip
201(2)
Clipper II
203(1)
Key Management Infrastructure or Clipper III
204(1)
Policy Reversal
205(1)
Encryption Code, Privacy, and Free Speech
206(1)
Discussion Questions
207(1)
Case Studies: The Case of the Pretty Good Privacy Encryption Program
208(7)
eBay v. Bidder's Edge: Trespass or Legitimate Access?
210(5)
Glossary: The Language of Cyberspace 215(4)
Bibliography 219(6)
Legal Cases Cited 225(2)
Index 227

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program