• ISBN13:


  • ISBN10:


  • Edition: 4th
  • Format: Paperback
  • Copyright: 2010-07-30
  • Publisher: Jones & Bartlett Learning
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $123.95


Revised and updated to reflect new technologies in the field, the fourth edition of this popular text takes an in-depth look at the social costs and moral problems that have emerged by the ever expanding use of the Internet, and offers up-to-date legal and philosophical examinations of these issues. It focuses heavily on content control, free speech, intellectual property, and security while delving into new areas of blogging and social networking. Case studies throughout discuss real-world events and include coverage of numerous hot topics. In the process of exploring current issues, it identifies legal disputes that will likely set the standard for future cases.

Table of Contents

Prefacep. ix
The Internet and Ethical Valuesp. 1
Cyberethics and the ˘Law of the Horse÷p. 2
Iron Cage or Gateway to Utopia?p. 7
Ethical Values and the Digital Frontierp. 10
Utilitarianismp. 11
Contract Rights (Contractarianism)p. 12
Moral Duty (Pluralism)p. 14
New Natural Lawp. 18
Postscript on Moral Theoryp. 20
Normative Principlesp. 21
Autonomyp. 22
Nonmaleficencep. 22
Beneficencep. 22
Justicep. 23
Discussion Questionsp. 24
Regulating and Governing the Internetp. 27
A Short History of the Internetp. 29
The Internet's Current Architecturep. 31
The World Wide Webp. 33
Electronic Commercep. 35
Social Networkingp. 38
Social Problems and Social Costsp. 40
The Invisible Handp. 41
Regulating the Net: The Visible Handp. 42
A ˘Bottom-Up÷ Approach: The Sovereignty of Codep. 44
Internet Governancep. 46
Internet Regulation and Ethicsp. 48
Discussion Questionsp. 50
Case Studies: L'Affair Yahoop. 50
A Case of Libelp. 54
Free Speech and Content Controls in Cyberspacep. 57
Speech and Internet Architecturep. 58
Pornography in Cyberspacep. 59
Public Policy Overviewp. 60
Automating Content Controlsp. 65
Hate Speech and Online Threatsp. 73
Anonymous Speechp. 75
The Ethics of Bloggin'gp. 77
Spam as Commercial Free Speechp. 79
Postscriptp. 83
Discussion Questionsp. 84
Case Studies: The Librarian's Dilemmap. 85
Spam or Free Speech at Intel?p. 86
Digital Censorship in Chinap. 88
Intellectual Property in Cyberspacep. 99
Background on Intellectual Propertyp. 99
What Is Intellectual Property?p. 101
Legal Protection for Intellectual Propertyp. 102
Moral Justifications for Intellectual Propertyp. 106
Recent Legislationp. 109
Issues for the Internetp. 111
Copyright and the Digital Dilemmap. 111
Software Ownership and the Open Source Code Movementp. 119
Digital Rights Architecturesp. 122
Business Method Patents in Cyberspacep. 124
Domain Names and Intel-connectivity Issuesp. 126
Postscriptp. 135
Discussion Questionsp. 136
Case Studies: The RIAA v. Verizonp. 136
Patent War on the Web: Amazon v. Barnes & Noblep. 139
A Parody of PETAp. 141
The Movie Industry Takes on Groksterp. 142
Regulating Internet Privacyp. 149
A Definition and Theory of Privacyp. 150
Personal Information on the Internetp. 153
Consumer Privacy on the Internetp. 155
Privacy-Invasive Technologiesp. 155
Policy Considerationsp. 159
Moral Considerationsp. 162
The U. S. and the European Union (EU): Divergent Paths to Privacy Protectionp. 165
Privacy Legislation in the U. S.p. 165
Privacy Protection in the EUp. 168
Privacy and Internet Architecturesp. 171
A Prescription for Privacy?p. 173
Privacy in the Workplacep. 175
Privacy Rights at Riskp. 175
Comparing U. S. and European Policiesp. 176
The Case For and Against Monitoringp. 177
Discussion Questionsp. 180
Case Studies: DoubleClick: The Ethics of Online Advertisingp. 180
Amazon's Privacy Policyp. 184
Newport Electronicsp. 186
Securing the Electronic Frontierp. 191
Vulnerabilities of the Netp. 191
Cybercrimep. 194
Anti-Piracy Architecturesp. 196
Trespass, Unauthorized Access, and Hacktivisionp. 198
Questionable Forms of Trespassp. 202
Security Measures in Cyberspacep. 204
The Encryption Controversy: A Public Policy Perspectivep. 208
The Clipper Chipp. 209
Clipper IIp. 211
Key Management Infrastructure or Clipper IIIp. 212
Policy Reversalp. 213
Encryption Code, Privacy, and Free Speechp. 214
Discussion Questionsp. 215
Case Studies: The Case of the Pretty Good Privacy Encryption Programp. 216
eBay v. Bidder's Edge: Trespass or Legitimate Access?p. 218
Glossary: The Language of the Internetp. 223
Bibliographyp. 227
Legal Cases Citedp. 233
Indexp. 235
Table of Contents provided by Ingram. All Rights Reserved.

Rewards Program

Write a Review