Cyberethics Morality and Law in Cyberspace
(cyberethics)/ISBN:978-1-61691-996-2
The Cyberethics Morality and Law in Cyberspace course covers the social costs and moral problems caused by the underlying technologies that support the vast information network. The cyberethics course stimulates a reader's reflection on the broad issues of Internet governance and its control by the state.
Lessons
6+ Lessons | 60+ Quizzes | 48+ Flashcards | 48+ Glossary of terms
TestPrep
25+ Pre Assessment Questions | 25+ Post Assessment Questions |
Need guidance and support? Click here to check our Instructor Led Course.
Here's what you will learn
Download Course OutlineLessons 1: The Internet and Ethical Values
- Cyberethics and the Law of the Horse
- Iron Cage or Gateway to Utopia?
- Ethical Values and the Digital Frontier
- Postscript on Moral Theory
- Floridi's Macroethics
- Normative Principles
- Discussion Questions
- Additional Resources
Lessons 2: Regulating and Governing the Internet
- A Short History of the Internet
- The Internet's Current Architecture
- The World Wide Web
- Electronic Commerce
- Gatekeepers and Search Engines
- Social Networking
- Social Problems and Social Costs
- A Bottom-Up Approach: The Power of Code
- Internet Governance
- Contested Sovereignty in Cyberspace
- Discussion Questions
- Case Studies
- Additional Resources
Lessons 3: Free Speech and Content Controls in Cyberspace
- Speech and Internet Architecture
- Pornography in Cyberspace
- Hate Speech and Online Threats
- Anonymous Speech
- The Ethics of Blogging
- Spam as Commercial Free Speech
- Government Censorship and the Fate of Political Speech
- Postscript
- Discussion Questions
- Case Studies
- Additional Resources
Lessons 4: Intellectual Property in Cyberspace
- Background on Intellectual Property
- Issues for the Internet and Networking Technologies
- Postscript
- Discussion Questions
- Case Studies
- Additional Resources
Lessons 5: Regulating Internet Privacy
- A Definition and Theory of Privacy
- Personal Information on the Internet
- Consumer Privacy on the Internet
- The United States and the European Union: Divergent Paths to Privacy Protection
- A Prescription for Privacy?
- Privacy in the Workplace
- Discussion Questions
- Case Studies
- Additional Resources
Lessons 6: Securing the Electronic Frontier
- Vulnerabilities of the Net
- Cybercrime
- Antipiracy Architectures
- Trespass, Unauthorized Access, and Hacktivision
- Security Measures in Cyberspace
- The Encryption Controversy: A Public Policy Perspective
- Encryption Code, Privacy, and Free Speech
- Discussion Questions
- Case Studies
- Additional Resources