| |
| |
Preface | |
| |
| |
| |
The Internet and Ethical Values | |
| |
| |
Cyberethics and the �Law of the Horse� | |
| |
| |
Iron Cage or Gateway to Utopia? | |
| |
| |
Ethical Values and the Digital Frontier | |
| |
| |
Utilitarianism | |
| |
| |
Contract Rights (Contractarianism) | |
| |
| |
Moral Duty (Pluralism) | |
| |
| |
New Natural Law | |
| |
| |
Postscript on Moral Theory | |
| |
| |
Normative Principles | |
| |
| |
Autonomy | |
| |
| |
Nonmaleficence | |
| |
| |
Beneficence | |
| |
| |
Justice | |
| |
| |
Discussion Questions | |
| |
| |
| |
Regulating and Governing the Internet | |
| |
| |
A Short History of the Internet | |
| |
| |
The Internet's Current Architecture | |
| |
| |
The World Wide Web | |
| |
| |
Electronic Commerce | |
| |
| |
Social Networking | |
| |
| |
Social Problems and Social Costs | |
| |
| |
The Invisible Hand | |
| |
| |
Regulating the Net: The Visible Hand | |
| |
| |
A �Bottom-Up� Approach: The Sovereignty of Code | |
| |
| |
Internet Governance | |
| |
| |
Internet Regulation and Ethics | |
| |
| |
Discussion Questions | |
| |
| |
Case Studies: L'Affair Yahoo | |
| |
| |
A Case of Libel | |
| |
| |
| |
Free Speech and Content Controls in Cyberspace | |
| |
| |
Speech and Internet Architecture | |
| |
| |
Pornography in Cyberspace | |
| |
| |
Public Policy Overview | |
| |
| |
Automating Content Controls | |
| |
| |
Hate Speech and Online Threats | |
| |
| |
Anonymous Speech | |
| |
| |
The Ethics of Bloggin'g | |
| |
| |
Spam as Commercial Free Speech | |
| |
| |
Postscript | |
| |
| |
Discussion Questions | |
| |
| |
Case Studies: The Librarian's Dilemma | |
| |
| |
Spam or Free Speech at Intel? | |
| |
| |
Digital Censorship in China | |
| |
| |
| |
Intellectual Property in Cyberspace | |
| |
| |
Background on Intellectual Property | |
| |
| |
What Is Intellectual Property? | |
| |
| |
Legal Protection for Intellectual Property | |
| |
| |
Moral Justifications for Intellectual Property | |
| |
| |
Recent Legislation | |
| |
| |
Issues for the Internet | |
| |
| |
Copyright and the Digital Dilemma | |
| |
| |
Software Ownership and the Open Source Code Movement | |
| |
| |
Digital Rights Architectures | |
| |
| |
Business Method Patents in Cyberspace | |
| |
| |
Domain Names and Intel-connectivity Issues | |
| |
| |
Postscript | |
| |
| |
Discussion Questions | |
| |
| |
Case Studies: The RIAA v. Verizon | |
| |
| |
Patent War on the Web: Amazon v. Barnes & Noble | |
| |
| |
A Parody of PETA | |
| |
| |
The Movie Industry Takes on Grokster | |
| |
| |
| |
Regulating Internet Privacy | |
| |
| |
A Definition and Theory of Privacy | |
| |
| |
Personal Information on the Internet | |
| |
| |
Consumer Privacy on the Internet | |
| |
| |
Privacy-Invasive Technologies | |
| |
| |
Policy Considerations | |
| |
| |
Moral Considerations | |
| |
| |
The U. S. and the European Union (EU): Divergent Paths to Privacy Protection | |
| |
| |
Privacy Legislation in the U. S. | |
| |
| |
Privacy Protection in the EU | |
| |
| |
Privacy and Internet Architectures | |
| |
| |
A Prescription for Privacy? | |
| |
| |
Privacy in the Workplace | |
| |
| |
Privacy Rights at Risk | |
| |
| |
Comparing U. S. and European Policies | |
| |
| |
The Case For and Against Monitoring | |
| |
| |
Discussion Questions | |
| |
| |
Case Studies: DoubleClick: The Ethics of Online Advertising | |
| |
| |
Amazon's Privacy Policy | |
| |
| |
Newport Electronics | |
| |
| |
| |
Securing the Electronic Frontier | |
| |
| |
Vulnerabilities of the Net | |
| |
| |
Cybercrime | |
| |
| |
Anti-Piracy Architectures | |
| |
| |
Trespass, Unauthorized Access, and Hacktivision | |
| |
| |
Questionable Forms of Trespass | |
| |
| |
Security Measures in Cyberspace | |
| |
| |
The Encryption Controversy: A Public Policy Perspective | |
| |
| |
The Clipper Chip | |
| |
| |
Clipper II | |
| |
| |
Key Management Infrastructure or Clipper III | |
| |
| |
Policy Reversal | |
| |
| |
Encryption Code, Privacy, and Free Speech | |
| |
| |
Discussion Questions | |
| |
| |
Case Studies: The Case of the Pretty Good Privacy Encryption Program | |
| |
| |
eBay v. Bidder's Edge: Trespass or Legitimate Access? | |
| |
| |
Glossary: The Language of the Internet | |
| |
| |
Bibliography | |
| |
| |
Legal Cases Cited | |
| |
| |
Index | |