Table of contents for Cyberethics : morality and law in cyberspace / Richard Spinello.

Bibliographic record and links to related information available from the Library of Congress catalog.

Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.


Counter
Preface
Chapter One : The Internet and Ethical Values
·	CyberEthics and ¿The Law of the Horse¿
·	Iron Cage or Gateway to Utopia?
·	Ethical Values and the Digital Frontier
·	Postscript on Moral Theory
·	Normative Principles
·	Discussion Questions
Chapter Two: Regulating and Governing the Internet
·	A Short History of the Internet
·	The Internet's Current Architecture
·	The World Wide Web
·	Electronic Commerce
·	Social Problems and Social Costs
·	A Bottoms Up Approach: Code and Norms
·	Internet Governance
·	Internet Regulation and Ethics
·	Discussion Questions
·	Case Study: L'Affair Yahoo! 
·	Case Study: A Case of Libel
Chapter Three Free Speech and Content Controls in Cyberspace
·	The Problem of Pornography in Cyberspace
	-Public Policy Overview
	-Automated Content Controls
·	Hate Speech and Online Threats
·	Anonymous Speech
·	The Ethics of Blogging
·	Spam as Commercial Free Speech
·	Postscript
·	Discussion Questions
·	Case Study: The Librarian's Dilemma
·	Case Study: Spam or Free Speech at Intel?
·	Case Study: Filtering the Internet in China
Chapter Four: Intellectual Property in Cyberspace
	Part I: Background on Intellectual Property
·	What is Intellectual Property?
·	Legal Protection for Intellectual Property
·	Moral Justification for Intellectual Property
·	Recent Legislation
·	Part II: Issues for the Internet
·	Copyright and the Digital Dilemma
·	Business Method Patents in Cyberspace
·	Domain Names and Interconnectivity Issues
·	Discussion Questions
·	Case Study: The RIAA vs. Verizon
·	Case Study: Patent War on the Web: Amazon vs. Barnes & Noble
·	Case Study: A Parody of PETA
·	Case Study: The Movie Industry Takes on Grokster
Chapter Five: Regulating Internet Privacy
·	Definition and Theory of Privacy
·	Personal Information on the Internet
·	Consumer Privacy on the Internet
·	The United States and Europe: Divergent Paths to Privacy Protection
·	Privacy and Internet Architectures
·	Searching for Solutions
·	A Prescription for Privacy
·	Privacy in the Workplace
·	Discussion Questions
·	Case Study: DoubleClick: The Ethics of Online Advertising
·	Case Study: Amazon's New Privacy Policy
·	Case Study: Newport Electronics
Chapter Six: Securing the Electronic Frontier
·	Vulnerabilities of the Net
·	Cybercrime
·	Anti-Piracy Architectures
·	Trespass and Unauthorized Access in Cyberspace
·	Questionable Forms of Trespass
·	Security Measures in Cyberspace
·	Encryption and the Internet
·	The Encryption Controversy: A Public Policy Perspective
·	Encryption Code, Privacy, and Free Speech
·	Discussion Questions
·	Case Study: The Case of the "Pretty Good Privacy" Encryption Program
·	Case Study: eBay v. Bidder's Edge: Trespass or Legitimate Access?
Glossary of Terms
Recommended Readings (condensed bibliography)

Library of Congress Subject Headings for this publication:

Internet -- Moral and ethical aspects.
Computers and civilization.
Law and ethics.
Cyberspace.