Cyberethics Morality and Law in Cyberspace
(cyberethics)
/ ISBN: 978-1-61691-996-2
This course includes
Lessons
TestPrep
Cyberethics Morality and Law in Cyberspace
The Cyberethics Morality and Law in Cyberspace course covers the social costs and moral problems caused by the underlying technologies that support the vast information network. The cyberethics course stimulates a reader's reflection on the broad issues of Internet governance and its control by the state.
Lessons
-
6+ Lessons
-
60+ Quizzes
-
48+ Flashcards
-
48+ Glossary of terms
TestPrep
-
25+ Pre Assessment Questions
-
25+ Post Assessment Questions
- Cyberethics and the Law of the Horse
- Iron Cage or Gateway to Utopia?
- Ethical Values and the Digital Frontier
- Postscript on Moral Theory
- Floridi's Macroethics
- Normative Principles
- Discussion Questions
- Additional Resources
- A Short History of the Internet
- The Internet's Current Architecture
- The World Wide Web
- Electronic Commerce
- Gatekeepers and Search Engines
- Social Networking
- Social Problems and Social Costs
- A Bottom-Up Approach: The Power of Code
- Internet Governance
- Contested Sovereignty in Cyberspace
- Discussion Questions
- Case Studies
- Additional Resources
- Speech and Internet Architecture
- Pornography in Cyberspace
- Hate Speech and Online Threats
- Anonymous Speech
- The Ethics of Blogging
- Spam as Commercial Free Speech
- Government Censorship and the Fate of Political Speech
- Postscript
- Discussion Questions
- Case Studies
- Additional Resources
- Background on Intellectual Property
- Issues for the Internet and Networking Technologies
- Postscript
- Discussion Questions
- Case Studies
- Additional Resources
- A Definition and Theory of Privacy
- Personal Information on the Internet
- Consumer Privacy on the Internet
- The United States and the European Union: Divergent Paths to Privacy Protection
- A Prescription for Privacy?
- Privacy in the Workplace
- Discussion Questions
- Case Studies
- Additional Resources
- Vulnerabilities of the Net
- Cybercrime
- Antipiracy Architectures
- Trespass, Unauthorized Access, and Hacktivision
- Security Measures in Cyberspace
- The Encryption Controversy: A Public Policy Perspective
- Encryption Code, Privacy, and Free Speech
- Discussion Questions
- Case Studies
- Additional Resources
Alsu Mishuna
Show more
×