"CyberEthics" - Information and Links:

CyberEthics - Info and Reading Options

morality and law in cyberspace

Book's cover
The cover of “CyberEthics” - Open Library.

"CyberEthics" was published by Jones and Bartlett Publishers in 2003 - Boston, it has 238 pages and the language of the book is English.


“CyberEthics” Metadata:

  • Title: CyberEthics
  • Author:
  • Language: English
  • Number of Pages: 238
  • Publisher: Jones and Bartlett Publishers
  • Publish Date:
  • Publish Location: Boston

“CyberEthics” Subjects and Themes:

Edition Specifications:

  • Pagination: xvi, 238 p. :

Edition Identifiers:

AI-generated Review of “CyberEthics”:


"CyberEthics" Table Of Contents:

  • 1- Machine generated contents note: CHAPTER ONE The Internet and Ethical Values 1
  • 2- Introduction 1
  • 3- Cyberethics and "The Law of the Horse" 2
  • 4- An Iron Cage or a Gateway to Utopia? 8
  • 5- Ethical Frameworks and the Digital Frontier 10
  • 6- Utilitarianism 11
  • 7- Contract Rights (Contractarianism) 13
  • 8- Natural Rights 15
  • 9- Moral Duty (Pluralism) 16
  • 10- Postscript on Moral Theory 21
  • 11- Normative Principles 23
  • 12- The Principle of Autonomy 23
  • 13- The Principle of Nonmaleficence 23
  • 14- The Principle of Beneficence 24
  • 15- The Principle of Justice 24
  • 16- Discussion Questions 25
  • 17- References 25
  • 18- CHAPTER TWO Regulating and Governing the Internet 29
  • 19- Introduction 29
  • 20- A Short History of the Internet 31
  • 21- The Internet's Current Architecture 33
  • 22- The World Wide Web 35
  • 23- Electronic Commerce 37
  • 24- Social Problems and Social Costs 40
  • 25- The Invisible Hand 41
  • 26- Regulating the Net: The Visible Hand 42
  • 27- A "Bottoms-Up" Approach: The Sovereignty ot Code 45
  • 28- Internet Governance 47
  • 29- Net Regulation and Ethics 48
  • 30- Discussion Questions 51
  • 31- References 51
  • 32- CHAPTER THREE Free Speech and Content Control in Cyberspace 53
  • 33- Introduction 53
  • 34- Speech and Internet Architecture 55
  • 35- Pornography in Cyberspace 56
  • 36- The Communications Decency Act (CDA) 56
  • 37- Child Online Protection Act (COPA) 59
  • 38- Children's Interet Protection Act (CHIPA) 60
  • 39- Automating Content Controls 62
  • 40- Hate Speech and Online Threats 70
  • 41- Anonymous Speech 73
  • 42- Student Web Sites 75
  • 43- Spam as Commercial Free Speech 77
  • 44- Postscript 81
  • 45- Discussion Questions 82
  • 46- Cases: The Librarian's Dilemma 83
  • 47- Spam or Free Speech at Intel? 84
  • 48- L'Affair Yahoo 86
  • 49- References 89
  • 50- CHAPTER FOUR Intelletdl Propery in Cyberspace 91
  • 51- Part I: Background on Intellectual Property 91
  • 52- Introduction 91
  • 53- What Is Intellectual Property and Why Does It Matter? 93
  • 54- Legal Protections for Intellectual Property 95
  • 55- Copyright Laws 95
  • 56- Patents 96
  • 57- Trademarks 97
  • 58- Moral Justification for Intellectual Property 98
  • 59- Labor-Desert Theory 99
  • 60- Personality Theory 100
  • 61- Utilitarianism 100
  • 62- Recent Legislation 102
  • 63- The Digital Millenium Copyright Act (DMCA) 102
  • 64- The Sonny Bono Copyright Term Extension Ad (CTEA) 103
  • 65- Part II: Issues for the Interet 105
  • 66- Copyright and the Digital Dilemma 105
  • 67- Digital Music 105
  • 68- The DeCSS Lawsuit 110
  • 69- Software Ownership and the Open Source Code Movement 112
  • 70- Digital Rights Architectures 117
  • 71- Business Method Patents in Cyberspace 118
  • 72- Domain Names and Interconnectivity Issues 121
  • 73- Ownership of Domain Names 121
  • 74- Linking and Framing 124
  • 75- Metatags 127
  • 76- Creative Integrity 129
  • 77- Postscript 131
  • 78- Discussion Questions 132
  • 79- Cases: The wwwnga Domain Name Dispute 132
  • 80- Patent War on the Web: Amazon vs. Barnes & Noble 133
  • 81- Morpheus: The Next Napster? 135
  • 82- References 137
  • 83- CHAPTER FIVE Regulating nternet Prviacy 141
  • 84- Introduction 141
  • 85- Definition and Theory of Privacy 142
  • 86- Personal Information on the Internet 145
  • 87- Consumer Privacy on the Internet 147
  • 88- Privacy-Invasive Technologies 147
  • 89- Policy Considerations 152
  • 90- Moral Considerations 155
  • 91- The United States and Europe: Divergent Paths to Privacy Protection 159
  • 92- Privacy Legislation in the U.S. 159
  • 93- Privacy Protection in Europe 162
  • 94- Privacy and Internet Architectures 166
  • 95- A Prescription for Privacy 168
  • 96- Privacy in the Workplace 170
  • 97- Privacy Rights at Risk 170
  • 98- Comparing U.S. and European Policies 171
  • 99- The Case for E-Mail Privacy Rights 173
  • 100- Discussion Questions 177
  • 101- Cases: DoubleClick: The Ethics of Online Advertising 177
  • 102- Amazon's New Privacy Policy 181
  • 103- Newport Electronics 183
  • 104- References 185
  • 105- CHAPTER SIX Securing the Electronic Frontier 189
  • 106- Vulnerabilities of the Net 189
  • 107- Cybercrime 192
  • 108- Antipiracy Architectures 194
  • 109- Trespass and Unauthorized Access in Cyberspace 196
  • 110- Questionable Forms of Trespass 200
  • 111- Security Measures in Cyberspace 203
  • 112- The Encryption Controversy: A Public Policy Perspective 207
  • 113- The Clipper Chip 208
  • 114- Clipper II 210
  • 115- Key Management Infrastructure (KMI) or Clipper III 211
  • 116- Policy Reversal 213
  • 117- Encryption Code, Privacy, and Free Speech 213
  • 118- Discussion Questions 215
  • 119- Cases: The Case of the Pretty Good Privacy (PGP) Encryption Program 215
  • 120- eBay v. Bidder's Edge: Trespass or Legitimate Access? 217
  • 121- References 219.

Read “CyberEthics”:

Read “CyberEthics” by choosing from the options below.

Search for “CyberEthics” downloads:

Visit our Downloads Search page to see if downloads are available.

Find “CyberEthics” in Libraries Near You:

Read or borrow “CyberEthics” from your local library.

Buy “CyberEthics” online:

Shop for “CyberEthics” on popular online marketplaces.