Cyberethics : Morality And Law in Cyberspace
Uitverkocht (er is een nieuwe druk bekend)
Preface ix The Internet and Ethical Values 1(26) CyberEthics and ``The Law of the Horse'' 2(5) Iron Cage or Gateway to Utopia? 7(3) Ethical Values and the Digital Frontier 10(10) Postscript on Moral Theory 20(1) Normative Principles 21(3) Discussion Questions 24(3) Regulating and Governing the Internet 27(28) A Short History of the Internet 29(2) The Internet's Current Architecture 31(2) The World Wide Web 33(2) Electronic Commerce 35(3) Social Problems and Social Costs 38(4) The Invisible Hand 39(1) Regulating the Net: The Visible Hand 40(2) A Bottom-Up Approach: The Sovereignty of Code 42(2) Internet Governance 44(2) Internet Regulation and Ethics 46(2) Discussion Questions 48(1) Case Studies: L'Affair Yahoo 48(7) A Case of Libel 51(4) Free Speech and Content Controls in Cyberspace 55(36) Speech and Internet Architecture 56(1) Pornography in Cyberspace 57(14) Public Policy Overview 58(5) Automating Content Controls 63(8) Hate Speech and Online Threats 71(2) Anonymous Speech 73(2) The Ethics of Blogging 75(2) Spam as Commercial Free Speech 77(4) Postscript 81(1) Discussion Questions 82(1) Case Studies: The Librarian's Dilemma 82(9) Spam or Free Speech at Intel 84(1) Filtering the Internet in China 85(6) Intellectual Property in Cyberspace 91(50) Background on Intellectual Property 91(13) What Is Intellectual Property? 93(1) Legal Protection for Intellectual Property 94(4) Moral Justifications for Intellectual Property 98(3) Recent Legislation 101(3) Issues for the Internet 104(23) Copyright and the Digital Dilemma 104(8) Software Ownership and the Open Source Code Movement 112(3) Digital Rights Architectures 115(1) Business Method Patents in Cyberspace 116(3) Domain Names and Interconnectivity Issues 119(8) Postscript 127(1) Discussion Questions 128(1) Case Studies: The RIAA vs. Verizon 128(13) Patent War on the Web: Amazon vs. Barnes & Noble 131(2) A Parody of PETA 133(1) The Movie Industry Takes on Grokster 134(7) Regulating Internet Privacy 141(42) A Definition and Theory of Privacy 142(2) Personal Information on the Internet 144(2) Consumer Privacy on the Internet 146(10) Privacy-Invasive Technologies 146(4) Policy Considerations 150(3) Moral Considerations 153(3) The U.S. and the E.U.: Divergent Paths to Privacy Protection 156(7) Privacy Legislation in the U.S. 157(3) Privacy Protection in the E.U. 160(3) Privacy and Internet Architectures 163(2) A Prescription for Privacy? 165(2) Privacy in the Workplace 167(5) Privacy Rights at Risk 167(2) Comparing U.S. and European Policies 169(1) The Case For and Against Monitoring 170(2) Discussion Questions 172(1) Case Studies: DoubleClick: The Ethics of Online Advertising 173(10) Amazon's New Privacy Policy 176(2) Newport Electronics 178(5) Securing the Electronic Frontier 183(32) Vulnerabilities of the Net 183(3) Cybercrime 186(2) Anti-Piracy Architectures 188(2) Trespass and Unauthorized Access in Cyberspace 190(6) Questionable Forms of Trespass 194(2) Security Measures in Cyberspace 196(4) The Encryption Controversy: A Public Policy Perspective 200(6) The Clipper Chip 201(2) Clipper II 203(1) Key Management Infrastructure or Clipper III 204(1) Policy Reversal 205(1) Encryption Code, Privacy, and Free Speech 206(1) Discussion Questions 207(1) Case Studies: The Case of the Pretty Good Privacy Encryption Program 208(7) eBay v. Bidder's Edge: Trespass or Legitimate Access? 210(5) Glossary: The Language of Cyberspace 215(4) Bibliography 219(6) Legal Cases Cited 225(2) Index 227
Ingenaaid | 272 pagina's
1e druk | Verschenen in 2006
Rubriek: