CyberEthics : (Record no. 150)
000 -LEADER | |
---|---|
fixed length control field | 05274cam a2200289 a 4500 |
001 - CONTROL NUMBER | |
control field | 12786865 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20120703113135.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 020523s2003 maua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2002072214 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0763700649 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Transcribing agency | DLC |
Modifying agency | DLC |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.875.I57 |
Item number | S68 2003 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 303.48/34 |
Edition number | 21 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Spinello, Richard A. |
245 10 - TITLE STATEMENT | |
Title | CyberEthics : |
Remainder of title | morality and law in cyberspace / |
Statement of responsibility, etc | Richard A. Spinello. |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Boston : |
Name of publisher, distributor, etc | Jones and Bartlett Publishers ; |
Date of publication, distribution, etc | c2003. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvi, 238 p. : |
Other physical details | ill. ; |
Dimensions | 23 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references (p. 227-232) and index. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Machine generated contents note: CHAPTER ONE The Internet and Ethical Values 1 -- Introduction 1 -- Cyberethics and "The Law of the Horse" 2 -- An Iron Cage or a Gateway to Utopia? 8 -- Ethical Frameworks and the Digital Frontier 10 -- Utilitarianism 11 -- Contract Rights (Contractarianism) 13 -- Natural Rights 15 -- Moral Duty (Pluralism) 16 -- Postscript on Moral Theory 21 -- Normative Principles 23 -- The Principle of Autonomy 23 -- The Principle of Nonmaleficence 23 -- The Principle of Beneficence 24 -- The Principle of Justice 24 -- Discussion Questions 25 -- References 25 --CHAPTER TWO Regulating and Governing the Internet 29 -- Introduction 29 -- A Short History of the Internet 31 -- The Internet's Current Architecture 33 -- The World Wide Web 35 -- Electronic Commerce 37 -- Social Problems and Social Costs 40 -- The Invisible Hand 41 -- Regulating the Net: The Visible Hand 42 -- A "Bottoms-Up" Approach: The Sovereignty ot Code 45 -- Internet Governance 47 -- Net Regulation and Ethics 48 -- Discussion Questions 51 -- References 51 --CHAPTER THREE Free Speech and Content Control in Cyberspace 53 -- Introduction 53 -- Speech and Internet Architecture 55 -- Pornography in Cyberspace 56 -- The Communications Decency Act (CDA) 56 -- Child Online Protection Act (COPA) 59 -- Children's Interet Protection Act (CHIPA) 60 -- Automating Content Controls 62 -- Hate Speech and Online Threats 70 -- Anonymous Speech 73 -- Student Web Sites 75 -- Spam as Commercial Free Speech 77 -- Postscript 81 -- Discussion Questions 82 -- Cases: The Librarian's Dilemma 83 -- Spam or Free Speech at Intel? 84 -- L'Affair Yahoo 86 -- References 89 --CHAPTER FOUR Intelletdl Propery in Cyberspace 91 -- Part I: Background on Intellectual Property 91 -- Introduction 91 -- What Is Intellectual Property and Why Does It Matter? 93 -- Legal Protections for Intellectual Property 95 -- Copyright Laws 95 -- Patents 96 -- Trademarks 97 -- Moral Justification for Intellectual Property 98 -- Labor-Desert Theory 99 -- Personality Theory 100 -- Utilitarianism 100 -- Recent Legislation 102 -- The Digital Millenium Copyright Act (DMCA) 102 -- The Sonny Bono Copyright Term Extension Ad (CTEA) 103 -- Part II: Issues for the Interet 105 -- Copyright and the Digital Dilemma 105 -- Digital Music 105 -- The DeCSS Lawsuit 110 -- Software Ownership and the Open Source Code Movement 112 -- Digital Rights Architectures 117 -- Business Method Patents in Cyberspace 118 -- Domain Names and Interconnectivity Issues 121 -- Ownership of Domain Names 121 -- Linking and Framing 124 -- Metatags 127 -- Creative Integrity 129 -- Postscript 131 -- Discussion Questions 132 -- Cases: The wwwnga Domain Name Dispute 132 -- Patent War on the Web: Amazon vs. Barnes & Noble 133 -- Morpheus: The Next Napster? 135 -- References 137 -- CHAPTER FIVE Regulating nternet Prviacy 141 -- Introduction 141 -- Definition and Theory of Privacy 142 -- Personal Information on the Internet 145 -- Consumer Privacy on the Internet 147 -- Privacy-Invasive Technologies 147 -- Policy Considerations 152 -- Moral Considerations 155 -- The United States and Europe: Divergent Paths to Privacy Protection 159 -- Privacy Legislation in the U.S. 159 -- Privacy Protection in Europe 162 -- Privacy and Internet Architectures 166 -- A Prescription for Privacy 168 -- Privacy in the Workplace 170 -- Privacy Rights at Risk 170 -- Comparing U.S. and European Policies 171 -- The Case for E-Mail Privacy Rights 173 -- Discussion Questions 177 -- Cases: DoubleClick: The Ethics of Online Advertising 177 -- Amazon's New Privacy Policy 181 -- Newport Electronics 183 -- References 185 --CHAPTER SIX Securing the Electronic Frontier 189 -- Vulnerabilities of the Net 189 -- Cybercrime 192 -- Antipiracy Architectures 194 -- Trespass and Unauthorized Access in Cyberspace 196 -- Questionable Forms of Trespass 200 -- Security Measures in Cyberspace 203 -- The Encryption Controversy: A Public Policy Perspective 207 -- The Clipper Chip 208 -- Clipper II 210 -- Key Management Infrastructure (KMI) or Clipper III 211 -- Policy Reversal 213 -- Encryption Code, Privacy, and Free Speech 213 -- Discussion Questions 215 -- Cases: The Case of the Pretty Good Privacy (PGP) Encryption Program 215 -- eBay v. Bidder's Edge: Trespass or Legitimate Access? 217 -- References 219. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Internet |
General subdivision | Moral and ethical aspects. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers and civilization. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Law and ethics. |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Table of contents |
Uniform Resource Identifier | http://www.loc.gov/catdir/toc/fy033/2002072214.html |
925 0# - | |
-- | acquire |
-- | 2 shelf copies |
-- | policy default |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
No items available.