O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cyberethics, 6th Edition

Book Description

The Sixth Edition of CyberEthics: Morality and Law in Cyberspace provides a comprehensive examination of the social costs and moral issues emerging from the ever-expanding use of the internet and new information technologies. Focusing heavily on content control, free speech, intellectual property, and security, the sixth edition offers a legal and philosophical discussion of these critical issues.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. Contents
  6. Preface
  7. Chapter 1 The Internet and Ethical Values
    1. Cyberethics and the “Law of the Horse”
    2. Iron Cage or Gateway to Utopia?
    3. Ethical Values and the Digital Frontier
      1. Utilitarianism
      2. Contract Rights (Contractarianism)
      3. Moral Duty (Pluralism)
      4. New Natural Law
    4. Postscript on Moral Theory
    5. Floridi’s Macroethics
    6. Normative Principles
      1. Autonomy
      2. Nonmaleficence
      3. Beneficence
      4. Justice
    7. Discussion Questions
    8. References
    9. Additional Resources
  8. Chapter 2 Regulating and Governing the Internet
    1. A Short History of the Internet
    2. The Internet’s Current Architecture
    3. Net Neutrality
    4. The World Wide Web
    5. Gatekeepers and Search Engines
    6. Social Networking
      1. Regulating the Infosphere
    7. A “Bottom-Up” Approach: Empowerment by Code
    8. Internet Governance
    9. Contested Sovereignty in Cyberspace
    10. Discussion Questions
    11. Case Studies: L’Affair Yahoo!
      1. American or Australian Libel Law?
      2. Google: The New Monopolist?
    12. References
    13. Additional Resources
  9. Chapter 3 Free Speech and Content Controls in Cyberspace
    1. Speech and Internet Architecture
    2. Pornography in Cyberspace
      1. Public Policy Overview
      2. Automating Content Controls
      3. New Censors and Controversies
    3. Hate Speech and Online Threats
    4. Anonymous Speech
    5. The Ethics of Blogging
    6. Spam as Commercial Free Speech
    7. Government Censorship and the Fate of Political Speech
    8. Postscript
    9. Discussion Questions
    10. Case Studies: When Is a Facebook Post a Real Threat?
      1. Are Video Games Free Speech?
      2. Twitter, Free Speech, and Terrorism
    11. References
    12. Additional Resources
  10. Chapter 4 Intellectual Property in Cyberspace
    1. Background on Intellectual Property
      1. What Is Intellectual Property?
      2. Legal Protection for Intellectual Property
      3. Moral Justifications for Intellectual Property
      4. Recent Legislation
    2. Issues for the Internet and Networking Technologies
      1. Copyright and the Digital Dilemma
      2. Software Patents and Open Source Code
      3. Digital Rights Management (DRM)
      4. Business Method Patents in Cyberspace
      5. Patents and Smartphones
      6. Domain Names
    3. Digital Books and E-Books
    4. Postscript
    5. Discussion Questions
    6. Case Studies: Readers’ Rights, Remixing, and Mashups
      1. Patent War on the Web: Amazon v. Barnes & Noble
      2. A Parody of PETA
      3. The Movie Industry Takes on Grokster
    7. References
    8. Additional Resources
  11. Chapter 5 Regulating Internet Privacy
    1. A Definition and Theory of Privacy
    2. Personal Information on the Internet
    3. Consumer Privacy on the Internet
      1. Privacy-Invasive Technologies
      2. Policy Considerations
      3. Moral Considerations
    4. The United States and the European Union: Divergent Paths to Privacy Protection
      1. Privacy Legislation in the United States
      2. Privacy Protection in the European Union
    5. A Prescription for Privacy?
    6. Privacy in the Workplace
      1. Privacy Rights at Risk
      2. Comparing U.S. and European Policies
      3. The Case For and Against Monitoring
    7. Discussion Questions
    8. Case Studies: Privacy and the Right to Be Forgotten
      1. Facebook’s “Unfriendly” Privacy Policies
      2. The Monitoring of Social Media by Employers
    9. References
    10. Additional Resources
  12. Chapter 6 Securing the Electronic Frontier
    1. Vulnerabilities of the Net
    2. Cybercrime
    3. Antipiracy Architectures
    4. Trespass, Hackers, and Hacktivism
    5. Security Measures in Cyberspace
    6. The Encryption Controversy: A Public Policy Perspective
      1. The Clipper Chip
      2. Key Management Infrastructure
      3. Policy Reversal and New Controversies
    7. Encryption Code, Privacy, and Free Speech
    8. Discussion Questions
    9. Case Studies: The Lulz Sec Hackers
      1. The New Crypto Wars: The Dispute over Apple’s iPhone
    10. References
    11. Additional Resources
  13. Glossary: The Language of the Internet
  14. Legal Cases Cited
  15. Index