ISBN-10:
1284081397
ISBN-13:
9781284081398
Pub. Date:
01/08/2016
Publisher:
Jones & Bartlett Learning
Cyberethics [With Access Code] / Edition 6

Cyberethics [With Access Code] / Edition 6

by Richard Spinello

Paperback

View All Available Formats & Editions
Current price is , Original price is $81.95. You
Select a Purchase Option (New Edition)
  • purchase options
    $67.22 $81.95 Save 18% Current price is $67.22, Original price is $81.95. You Save 18%.
  • purchase options

Product Details

ISBN-13: 9781284081398
Publisher: Jones & Bartlett Learning
Publication date: 01/08/2016
Edition description: New Edition
Pages: 244
Sales rank: 543,406
Product dimensions: 6.00(w) x 8.90(h) x 0.60(d)

About the Author


Boston College, Chestnut Hill, Massachusetts

Table of Contents

Preface ix

Chapter 1 The Internet and Ethical Values 1

Cyberethics and the "Law of the Horse" 2

Iron Cage or Gateway to Utopia? 8

Ethical Values and the Digital Frontier 10

Utilitarianism 12

Contract Rights (Contractarianism) 14

Moral Duty (Pluralism) 15

New Natural Law 20

Postscript on Moral Theory 22

Floridi's Macroethics 23

Normative Principles 25

Autonomy 26

Nonmaleficence 26

Beneficence 27

Justice 27

Discussion Questions 28

References 28

Additional Resources 30

Chapter 2 Regulating and Governing the Internet 31

A Short History of the Internet 32

The Internet's Current Architecture 35

Net Neutrality 37

The World Wide Web 39

Gatekeepers and Search Engines 41

Social Networking 43

Regulating the Infosphere 46

A "Bottom-Up'! Approach: Empowerment by Code 49

Internet Governance 50

Contested Sovereignty in Cyberspace 52

Discussion Questions 54

Case Studies: L'Affair Yahoo! 55

American or Australian Libel Law? 58

Google: The New Monopolist? 60

References 62

Additional Resources 64

Chapter 3 Free Speech and Content Controls in Cyberspace 67

Speech and Internet Architecture 69

Pornography in Cyberspace 70

Public Policy Overview 71

Automating Content Controls 75

New Censors and Controversies 82

Hate Speech and Online Threats 83

Anonymous Speech 86

The Ethics of Blogging 88

Spam as Commercial Free Speech 89

Government Censorship and the Fate of Political Speech 91

Postscript 94

Discussion Questions 95

Case Studies: When Is a Facebook Post a Real Threat? 97

Are Video Games Free Speech? 99

Twitter, Free Speech, and Terrorism 101

References 104

Additional Resources 106

Chapter 4 Intellectual Property in Cyberspace 107

Background on Intellectual Property 107

What Is Intellectual Property? 109

Legal Protection for intellectual Property 110

Moral Justifications for Intellectual Property 113

Recent Legislation 117

Issues for the Internet and Networking Technologies 120

Copyright and the Digital Dilemma 120

Software Patents and Open Source Code 129

Digital Rights Management (DRM) 133

Business Method Patents in Cyberspace 134

Patents and Smartphones 137

Domain Names 139

Digital Books and E-Books 144

Postscript 146

Discussion Questions 147

Case Studies: Readers' Rights, Remixing, and Mashups 148

Patent War on the Web: Amazon v. Barnes ft Noble 150

A Parody of PETA 152

The Movie Industry Takes on Grokster 153

References 155

Additional Resources 159

Chapter 5 Regulating Internet Privacy 161

A Definition and Theory of Privacy 162

Personal Information on the Internet 166

Consumer Privacy on the Internet 168

Privacy-Invasive Technologies 168

Policy Considerations 171

Moral Considerations 173

The United States and the European Union: Divergent Paths to Privacy Protection 175

Privacy Legislation in the United States 176

Privacy Protection in the European Union 179

A Prescription for Privacy? 182

Privacy in the Workplace 185

Privacy Rights at Risk 185

Comparing U.S. and European Policies 186

The Case For and Against Monitoring 187

Discussion Questions 191

Case Studies: Privacy and the Right to Be Forgotten 192

Facebook's "Unfriendly" Privacy Policies 194

The Monitoring of Social Media by Employers 196

References 198

Additional Resources 200

Chapter 6 Securing the Electronic Frontier 203

Vulnerabilities of the Net 203

Cybercrime 206

Antipiracy Architectures 208

Trespass, Hackers, and Hacktivism 210

Security Measures in Cyberspace 213

The Encryption Controversy: A Public Policy Perspective 218

The Clipper Chip 219

Key Management Infrastructure 221

Policy Reversal and New Controversies 222

Encryption Code, Privacy, and Free Speech 224

Discussion Questions 225

Case Studies: The Lulz Sec Hackers 226

The New Crypto Wars: The Dispute over Apple's iPhone 228

References 230

Additional Resources 231

Glossary: The Language of the Internet 233

Legal Cases Cited 237

Index 239

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews