| |
| |
Preface | |
| |
| |
| |
Unwrapping the Gift | |
| |
| |
| |
The Ubiquity of Computers and the Rapid Pace of Change | |
| |
| |
| |
New Developments and Dramatic Impacts | |
| |
| |
| |
Amateur Creative Works: Blogs and Video Sharing | |
| |
| |
| |
Connections | |
| |
| |
| |
Collaborative Efforts Among Strangers | |
| |
| |
| |
E-commerce and Free Stuff | |
| |
| |
| |
Artificial Intelligence, Robotics, and Motion | |
| |
| |
| |
Tools for Disabled People | |
| |
| |
| |
What Next? | |
| |
| |
| |
An Introduction to Some Issues and Themes | |
| |
| |
| |
Issues | |
| |
| |
| |
Themes | |
| |
| |
| |
Ethics | |
| |
| |
| |
What Is Ethics, Anyway? | |
| |
| |
| |
A Variety of Ethical Views | |
| |
| |
| |
Some Important Distinctions | |
| |
| |
| |
Privacy | |
| |
| |
| |
Privacy and Computer Technology | |
| |
| |
| |
Introduction | |
| |
| |
| |
New Technology, New Risks | |
| |
| |
| |
Terminology and Principles for Data Collection and Use | |
| |
| |
| |
Big Brother Is Watching You | |
| |
| |
| |
Databases | |
| |
| |
| |
The Fourth Amendment, Expectation of Privacy, and Surveillance Technologies | |
| |
| |
| |
Video Surveillance | |
| |
| |
| |
Diverse Privacy Topics | |
| |
| |
| |
Marketing, Personalization and Consumer Dossiers | |
| |
| |
| |
Location Tracking | |
| |
| |
| |
Stolen and Lost Data | |
| |
| |
| |
What We Do Ourselves | |
| |
| |
| |
Public Records: Access vs Privacy | |
| |
| |
| |
National ID Systems | |
| |
| |
| |
Children | |
| |
| |
| |
Protecting Privacy: Technology, Markets, Rights, and Laws | |
| |
| |
| |
Technology and Markets | |
| |
| |
| |
Rights and Law | |
| |
| |
| |
Privacy Regulations in the European Union | |
| |
| |
| |
Communications | |
| |
| |
| |
Wiretapping and E-mail Protection | |
| |
| |
| |
Designing Communications Systems for Interception | |
| |
| |
| |
Secret Intelligence Gathering | |
| |
| |
| |
Encryption Policy | |
| |
| |
| |
Freedom of Speech | |
| |
| |
| |
Changing Communications Paradigms | |
| |
| |
| |
Regulating Communications Media | |
| |
| |
| |
Free-Speech Principles | |
| |
| |
| |
Controlling Offensive Speech | |
| |
| |
| |
Offensive Speech: What Is It? What Is Illegal? | |
| |
| |
| |
Internet Censorship Laws and Alternatives | |
| |
| |
| |
Spam | |
| |
| |
| |
Challenging Old Regulatory Paradigms and Special Interests | |
| |
| |
| |
Posting and Selling Sensitive Material: Ethics and Social Concerns | |
| |
| |
| |
Censorship on the Global Net | |
| |
| |
| |
The Global Impact of Censorship | |
| |
| |
| |
Yahoo and French Censorship | |
| |
| |
| |
Censorship in Other Nations | |
| |
| |
| |
Aiding Foreign Censors | |
| |
| |
| |
Political Campaign Regulations in Cyberspace | |
| |
| |
| |
Anonymity | |
| |
| |
| |
Common Sense and the Internet | |
| |
| |
| |
Is Anonymity Protected? | |
| |
| |
| |
Against Anonymity | |
| |
| |
| |
Protecting Access and Innovation: Net Neutrality or Deregulation? | |
| |
| |
| |
Intellectual Property | |
| |
| |
| |
Intellectual Property and Changing Technology | |
| |
| |
| |
What Is Intellectual Property? | |
| |
| |
| |
Challenges of New Technologies | |
| |
| |
| |
Copyright Law and Significant Cases | |
| |
| |
| |
A Bit of History | |
| |
| |
| |
The Fair-Use Doctrine | |
| |
| |
| |
Significant Cases | |
| |
| |
| |
Copying and Sharing | |
| |
| |
| |
Defensive and Aggressive Responses from the Content Industries | |
| |
| |
| |
The DMCA vs Fair Use, Freedom of Speech, and Innovation | |
| |
| |
| |
Video Sharing | |
| |
| |
| |
New Business Models and Constructive Solutions | |
| |
| |
| |
Ethical Arguments About Copying | |
| |
| |
| |
International Piracy | |
| |
| |
| |
Search Engines and Online Libraries | |
| |
| |
| |
Free Speech Issues | |
| |
| |
| |
Free Software | |
| |
| |
| |
What Is Free Software? | |
| |
| |
| |
Should All Software Be Free? | |
| |
| |
| |
Issues for Software Developers | |
| |
| |
| |
Patents for Software? | |
| |
| |
| |
Patents for Web Technologies | |
| |
| |
| |
Copyright and Similar Software Products | |
| |
| |
| |
Crime | |
| |
| |
| |
Introduction | |
| |
| |
| |
Hacking | |
| |
| |
| |
What is Hacking? | |
| |
| |
| |
Ha | |