| |
| |
| |
Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics | |
| |
| |
"Ethics and the Information Revolution" | |
| |
| |
| |
"Ethics On-Line" | |
| |
| |
| |
"Reason, Relativity, and Responsibility in Computer Ethics" | |
| |
| |
| |
"Disclosive Computer Ethics" | |
| |
| |
| |
"Gender and Computer Ethics" | |
| |
| |
| |
"The Foundationalist Debate in Computer Ethics" | |
| |
| |
| |
"Common Morality and Computing" | |
| |
| |
| |
"Just Consequentialism and Computing" | |
| |
| |
| |
| |
Regulating the Net: Free Expression and Content Controls | |
| |
| |
"Is the Global Information Infrastructure a Democratic Technology?" | |
| |
| |
| |
"The Laws of Cyberspace" | |
| |
| |
| |
"Of Black Holes and Decentralized Law-Making in Cyberspace" | |
| |
| |
| |
"Fahrenheit 451.2: Is Cyberspace Burning?" | |
| |
| |
| |
"Filtering the Internet in the United States: Free Speech Denied?" | |
| |
| |
| |
Excerpts from United States v. American Library Association, Inc. | |
| |
| |
"Censorship, the Internet, and the Child Pornography Law of 1996: A Critique" | |
| |
| |
| |
"Agents of Harm or Agents of Grace: The Legal and Ethical Aspects of Identifying Harm and Assigning Responsibility in a Networked World" | |
| |
| |
| |
| |
Intellectual Property in Cyberspace | |
| |
| |
Excerpts from the Digital Millennium Copyright Act (DMCA) of 1998 | |
| |
| |
Note on the DeCSS Case | |
| |
| |
"Digital Music and Peer-to-Peer File Sharing" | |
| |
| |
| |
"A Politics of Intellectual Property: Environmentalism for the Net?" | |
| |
| |
| |
"Intellectual Property, Information, and the Common Good" | |
| |
| |
| |
"Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in the United States" | |
| |
| |
| |
"On the Web, Plagiarism Matters More than Copyright Piracy" | |
| |
| |
| |
"An Ethical Evaluation of Web Site Linking" | |
| |
| |
| |
"Ethical Issues in Open Source Software" | |
| |
| |
| |
"The Cathedral and the Bazaar" | |
| |
| |
| |
| |
Privacy in Cyberspace | |
| |
| |
"Toward a Theory of Privacy for the Information Age" | |
| |
| |
| |
"The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data" | |
| |
| |
| |
"Privacy Protection, Control of Information, and Privacy-Enhancing Technologies" | |
| |
| |
| |
"Toward an Approach to Privacy in Public: Challenges of Information Technology" | |
| |
| |
| |
"KDD, Privacy, Individuality, and Fairness" | |
| |
| |
| |
"Data Mining and Privacy" | |
| |
| |
| |
"Workplace Surveillance, Privacy, and Distributive Justice" | |
| |
| |
| |
"Privacy and the Varieties of Informational Wrongdoing" | |
| |
| |
| |
| |
Security and Crime in Cyberspace | |
| |
| |
"Defining the Boundaries of Computer Crime: Piracy, Trespass, and Vandalism in Cyberspace" | |
| |
| |
| |
"Terrorism or Civil Disobedience: Toward a Hacktivist Ethic" | |
| |
| |
| |
"Cyberterrorism" | |
| |
| |
| |
"Web Security and Privacy: An American Perspective" | |
| |
| |
| |
"The Meaning of Anonymity in an Information Age" | |
| |
| |
| |
"Ethical Reflections on Cyberstalking" | |
| |
| |
| |
"Written on the Body: Biometrics and Identity" | |
| |
| |
| |
"Ethical Aspects of Facial Recognition Systems in Public Places" | |
| |
| |
| |
| |
Professional Ethics, Codes of Conduct, and Computer/Information Professionals | |
| |
| |
"Ethical Considerations for the Information Professions" | |
| |
| |
| |
ACM Code of Ethics and Professional Conduct | |
| |
| |
IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practice | |
| |
| |
"The Life Cycle of Cyber and Computing Ethics" | |
| |
| |
| |
"Unintentional Power in the Design of Computing Systems" | |
| |
| |
| |
"The Wheel" | |
| |
| |
| |
"Reducing Software Failures: Address Ethical Risks with Software Development Impact Statements (SoDIS)" | |
| |
| |
| |
"Lilliputian Computer Ethics" | |
| |