Cyberethics Morality and Law in Cyberspace
(cyberethics) / ISBN : 978-1-61691-996-2
About This Course
The Cyberethics Morality and Law in Cyberspace course covers the social costs and moral problems caused by the underlying technologies that support the vast information network. The cyberethics course stimulates a reader's reflection on the broad issues of Internet governance and its control by the state.
Skills You’ll Get
Interactive Lessons
6+ Interactive Lessons | 60+ Quizzes | 48+ Flashcards | 48+ Glossary of terms
Gamified TestPrep
25+ Pre Assessment Questions | 25+ Post Assessment Questions |
The Internet and Ethical Values
- Cyberethics and the Law of the Horse
- Iron Cage or Gateway to Utopia?
- Ethical Values and the Digital Frontier
- Postscript on Moral Theory
- Floridi's Macroethics
- Normative Principles
- Discussion Questions
- Additional Resources
Regulating and Governing the Internet
- A Short History of the Internet
- The Internet's Current Architecture
- The World Wide Web
- Electronic Commerce
- Gatekeepers and Search Engines
- Social Networking
- Social Problems and Social Costs
- A Bottom-Up Approach: The Power of Code
- Internet Governance
- Contested Sovereignty in Cyberspace
- Discussion Questions
- Case Studies
- Additional Resources
Free Speech and Content Controls in Cyberspace
- Speech and Internet Architecture
- Pornography in Cyberspace
- Hate Speech and Online Threats
- Anonymous Speech
- The Ethics of Blogging
- Spam as Commercial Free Speech
- Government Censorship and the Fate of Political Speech
- Postscript
- Discussion Questions
- Case Studies
- Additional Resources
Intellectual Property in Cyberspace
- Background on Intellectual Property
- Issues for the Internet and Networking Technologies
- Postscript
- Discussion Questions
- Case Studies
- Additional Resources
Regulating Internet Privacy
- A Definition and Theory of Privacy
- Personal Information on the Internet
- Consumer Privacy on the Internet
- The United States and the European Union: Divergent Paths to Privacy Protection
- A Prescription for Privacy?
- Privacy in the Workplace
- Discussion Questions
- Case Studies
- Additional Resources
Securing the Electronic Frontier
- Vulnerabilities of the Net
- Cybercrime
- Antipiracy Architectures
- Trespass, Unauthorized Access, and Hacktivision
- Security Measures in Cyberspace
- The Encryption Controversy: A Public Policy Perspective
- Encryption Code, Privacy, and Free Speech
- Discussion Questions
- Case Studies
- Additional Resources