Readings in CyberethicsRichard A. Spinello, Herman T. Tavani This book of readings is a flexible resource for undergraduate and graduate courses in the evolving fields of computer and Internet ethics. Each selection has been carefully chosen for its timeliness and analytical depth and is written by a well-known expert in the field. The readings are organized to take students from a discussion on ethical frameworks and regulatory issues to a substantial treatment of the four fundamental, interrelated issues of cyberethics: speech, property, privacy, and security. A chapter on professionalism rounds out the selection. This book makes an excellent companion to CyberEthics: Morality and Law in Cyberspace, Third Edition by providing articles that present both sides of key issues in cyberethics. |
From inside the book
Results 1-5 of 80
Page v
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page vii
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page viii
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page xii
... Information , and the Common Good " 294 Shelly Warwick , " Is Copyright ... Technology " 450 Anton H. Vedder , " KDD , Privacy , Individuality , and ... Information Age " 555 ( Chapter 5 continued ) Frances S. Grodzinsky and Herman. XII 杀 ...
... Information , and the Common Good " 294 Shelly Warwick , " Is Copyright ... Technology " 450 Anton H. Vedder , " KDD , Privacy , Individuality , and ... Information Age " 555 ( Chapter 5 continued ) Frances S. Grodzinsky and Herman. XII 杀 ...
Page xv
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
Contents | 1 |
Terrell Ward Bynum Ethics and the Information Revolution | 13 |
Deborah G Johnson Ethics OnLine | 30 |
James H Moor Reason Relativity and Responsibility in Computer Ethics | 40 |
Philip Brey Disclosive Computer Ethics | 55 |
Alison Adam Gender and Computer Ethics | 67 |
Luciano Floridi and J W Sanders The Foundationalist Debate | 81 |
Bernard Gert Common Morality and Computing | 96 |
Privacy in Cyberspace | 397 |
James H Moor Toward a Theory of Privacy for the Information Age | 407 |
Dag Elgesem The Structure of Rights in Directive 9546EC on the Protection | 418 |
Herman T Tavani and James H Moor Privacy Protection Control of Information | 436 |
Challenges | 450 |
Anton H Vedder KDD Privacy Individuality and Fairness | 462 |
Joseph S Fulda Data Mining and Privacy | 471 |
Jeroen van den Hoven Privacy and the Varieties of Informational | 488 |
James H Moor Just Consequentialism and Computing | 107 |
Regulating the Net Free Expression and Content Controls | 114 |
Deborah G Johnson Is the Global Information Infrastructure a Democratic | 121 |
Larry Lessig The Laws of Cyberspace | 134 |
David G Post Of Black Holes and Decentralized LawMaking in Cyberspace | 145 |
Is Cyberspace Burning? | 159 |
Free Speech | 173 |
Excerpts from United States v American Library Association Inc | 180 |
Jacques N Catudal Censorship the Internet and the Child Pornography Law | 196 |
Tomas A Lipinski Elizabeth A Buchanan and Johannes J Britz Agents of Harm | 214 |
Intellectual Property in Cyberspace | 247 |
Excerpts from the Digital Millennium Copyright Act DMCA of 1998 | 253 |
Note on the DeCSS Case | 264 |
the Net? | 273 |
McFarland S J Intellectual Property Information and the Common | 294 |
Shelly Warwick Is Copyright Ethical? An Examination of the Theories Laws | 305 |
Source Software | 351 |
Eric Raymond The Cathedral and the Bazaar | 367 |
Security and Crime in Cyberspace | 501 |
Piracy | 513 |
Toward | 525 |
Dorothy E Denning Cyberterrorism | 536 |
An American Perspective | 542 |
Helen Nissenbaum The Meaning of Anonymity in an Information Age | 555 |
Cyberstalking | 561 |
Professional Ethics Codes of Conduct and ComputerInformation | 601 |
Elizabeth A Buchanan Ethical Considerations for the Information | 613 |
ACM Code of Ethics and Professional Conduct | 625 |
IEEECSACM Software Engineering Code of Ethics and Professional Practice | 633 |
Don Gotterbarn The Life Cycle of Cyber and Computing Ethics | 641 |
Chuck Huff Unintentional Power in the Design of Computing Systems | 651 |
Richard G Epstein The Wheel | 659 |
Address Ethical Risks with | 674 |
John Weckert Lilliputian Computer Ethics | 690 |
Other editions - View all
Common terms and phrases
activities analysis anonymity applied argued biometric child pornography claim computer crime computer ethics computer professionals computer systems computer technology concept concern consider copy Court criminal culture CyberEthics cyberspace cyberstalking cyberterrorism data mining data subject databases decision DeCSS deep linking defamation discussion electronic ethical issues Ethics and Information example fetchmail filtering freedom function creep gender Gotterbarn hackers hacktivism harm human identify identity important individual Information Ethics Information Technology intellectual property interest Internet involving ISPs libraries Linux material mation means ment moral Nissenbaum norms one's open source personal data personal information political problems property rights protection purpose puter question reason require responsibility service provider Smart CCTV social society software development software engineers speech stakeholders surveillance Tavani theory tion traditional University users values violation