Table of Contents
Preface ix
Chapter 1 The Internet and Ethical Values 1
Cyberethics and the "Law of the Horse" 2
Iron Cage or Gateway to Utopia? 8
Ethical Values and the Digital Frontier 10
Utilitarianism 12
Contract Rights (Contractarianism) 14
Moral Duty (Pluralism) 15
New Natural Law 20
Postscript on Moral Theory 22
Floridi's Macroethics 23
Normative Principles 25
Autonomy 26
Nonmaleficence 26
Beneficence 27
Justice 27
Discussion Questions 28
References 28
Additional Resources 30
Chapter 2 Regulating and Governing the Internet 31
A Short History of the Internet 32
The Internet's Current Architecture 35
Net Neutrality 37
The World Wide Web 39
Gatekeepers and Search Engines 41
Social Networking 43
Regulating the Infosphere 46
A "Bottom-Up'! Approach: Empowerment by Code 49
Internet Governance 50
Contested Sovereignty in Cyberspace 52
Discussion Questions 54
Case Studies: L'Affair Yahoo! 55
American or Australian Libel Law? 58
Google: The New Monopolist? 60
References 62
Additional Resources 64
Chapter 3 Free Speech and Content Controls in Cyberspace 67
Speech and Internet Architecture 69
Pornography in Cyberspace 70
Public Policy Overview 71
Automating Content Controls 75
New Censors and Controversies 82
Hate Speech and Online Threats 83
Anonymous Speech 86
The Ethics of Blogging 88
Spam as Commercial Free Speech 89
Government Censorship and the Fate of Political Speech 91
Postscript 94
Discussion Questions 95
Case Studies: When Is a Facebook Post a Real Threat? 97
Are Video Games Free Speech? 99
Twitter, Free Speech, and Terrorism 101
References 104
Additional Resources 106
Chapter 4 Intellectual Property in Cyberspace 107
Background on Intellectual Property 107
What Is Intellectual Property? 109
Legal Protection for intellectual Property 110
Moral Justifications for Intellectual Property 113
Recent Legislation 117
Issues for the Internet and Networking Technologies 120
Copyright and the Digital Dilemma 120
Software Patents and Open Source Code 129
Digital Rights Management (DRM) 133
Business Method Patents in Cyberspace 134
Patents and Smartphones 137
Domain Names 139
Digital Books and E-Books 144
Postscript 146
Discussion Questions 147
Case Studies: Readers' Rights, Remixing, and Mashups 148
Patent War on the Web: Amazon v. Barnes ft Noble 150
A Parody of PETA 152
The Movie Industry Takes on Grokster 153
References 155
Additional Resources 159
Chapter 5 Regulating Internet Privacy 161
A Definition and Theory of Privacy 162
Personal Information on the Internet 166
Consumer Privacy on the Internet 168
Privacy-Invasive Technologies 168
Policy Considerations 171
Moral Considerations 173
The United States and the European Union: Divergent Paths to Privacy Protection 175
Privacy Legislation in the United States 176
Privacy Protection in the European Union 179
A Prescription for Privacy? 182
Privacy in the Workplace 185
Privacy Rights at Risk 185
Comparing U.S. and European Policies 186
The Case For and Against Monitoring 187
Discussion Questions 191
Case Studies: Privacy and the Right to Be Forgotten 192
Facebook's "Unfriendly" Privacy Policies 194
The Monitoring of Social Media by Employers 196
References 198
Additional Resources 200
Chapter 6 Securing the Electronic Frontier 203
Vulnerabilities of the Net 203
Cybercrime 206
Antipiracy Architectures 208
Trespass, Hackers, and Hacktivism 210
Security Measures in Cyberspace 213
The Encryption Controversy: A Public Policy Perspective 218
The Clipper Chip 219
Key Management Infrastructure 221
Policy Reversal and New Controversies 222
Encryption Code, Privacy, and Free Speech 224
Discussion Questions 225
Case Studies: The Lulz Sec Hackers 226
The New Crypto Wars: The Dispute over Apple's iPhone 228
References 230
Additional Resources 231
Glossary: The Language of the Internet 233
Legal Cases Cited 237
Index 239