Skip to main content

Cyberspace, Cyberethics, and Social Networking

  • Chapter
  • First Online:
Ethical and Social Issues in the Information Age

Part of the book series: Texts in Computer Science ((TCS))

  • 2056 Accesses

Abstract

Learning Objectives

After reading this chapter, the reader should be able to:

  1. 1.

    Understand cyberspace.

  2. 2.

    Learn how to safeguard cyberspace.

  3. 3.

    Understand the issues of cyberspace.

  4. 4.

    Learn the complexity of cyberspace issues.

  5. 5.

    Acquire knowledge and understand where in cyberspace ethics is essential.

  6. 6.

    Learn the ethical framework of cyberspace.

  7. 7.

    Learn how languages and culture are influenced by cyberspace.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.95
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rosenberg, Matt. “Copyrights Law Meets the World Wide Web.” Crossroads, 2(2), 1995. http://info.acm.org/crossroads/

  2. Leesing, Larry, David Post, and Eugene Vololch. “Copyright Law in Cyberspace, Cyberspace Law Institute for Non-Lawyers.” http://www.counsel.com/cyberspace/

  3. The Net [motion picture]. http://www.spe.sony.com/pictures/sonymovies/

  4. Lewis, Peter. “Limiting a Medium Without Boundaries.” New York Times, January 15, 1996, D1.

    Google Scholar 

  5. Ang, Deng, and Balinda Nadarajan. “Censorship and the Internet: A Singapore Perspective.” Communications of the ACM, 39(6), 1996, pp. 72-78.

    Article  Google Scholar 

  6. Brandt, Daniel. “Cyberspace Wars: Microproceesing vs. Big Brother.” NameBase NewsLine 2, July-August 1993. http://ursula.btythe.org/NameBase/NewsLine.02/

  7. Bhimani, Anish. “Securing the Commercial Internet.” Communications of the ACM, 39(6), 1996, pp. 29-35.

    Article  Google Scholar 

  8. Kung, Hans. “Declaration Towards a Global Ethic.” http://rain.org/~origin/genetic.html

  9. “Internet as ‘Intellectual Colonialism’” The Council Chronicle, June 1996, p. 6.

    Google Scholar 

  10. National Telecommunications and Information Administration, Technical Report 2000 (NTIA 2000). “Falling Through the Net: Toward Digital Inclusion.” http://www.ntia.doc.gov.ntiahome/ftfn00/front00.htm

  11. Korpela, Jukka. “English: The Universal Language on the Internet?” http://www.hut.fi/jkorpela/lingua-franca.html

  12. Engst, Adam. “Need to Know: The Electronic Lingua Franca.” http://etext.archive.umich.edu/zines/

  13. Hauben, Micheal. “Culture and Communication: Interplay in the New Public Commons—Usenet and Community Networks.” http://www.columbia.edu/~hauben/project-book.html

  14. North, Tim. “The Internet and Usenet Global Networks: An Investigation of Their Culture and Its Effects on New Users [on-line].” http://foo.curtin.edu.au/Thesis/

  15. Kizza, Joseph M. Computer Network Security and CyberEthics. McFarland: Jefferson, NC 2002.

    Google Scholar 

  16. Joe Stance. “Net twins’ in Missouri, but home still unclear.” The Associated Press. http://www.inlandempireonline.com/de/adoption/adopt042001.shtml

  17. Ranum, Marcus. “Network Forensics: Network Traffic Monitoring.” http://www.nfr.net/publications/

  18. Jackson, Steve. “ESM NetRecon: Ultrascan Technology.” http://www.si.com.au/Appendix/NetRecon%20Ultranscan%20.Technology.html

  19. Carnegie Mellon University, Software Engineering Institute “Survivable Network Systems: An Emerging Discipline.” http://www.sei.cmu.edu/publications/documents/97.reports/97tr013/97tr013abstract.html

  20. Rosenblum, Robert. “Sorting Through the Confusion: Interpreting Recording Agreement Provisions of the Digital Era.” The Entertainment Law Reporter. November 1999.

    Google Scholar 

  21. Chikuro Hiroike. Towards Supreme Morality. The Institute of Moralogy. Japan. 2002.

    Google Scholar 

  22. Barbara Simons. “The ACM Declaration in Felten v. RIAA,” Communication of the ACM, 44(10), pp. 23-26.

    Google Scholar 

  23. Michael Arrington. “New Facebook Redesign More Than Aesthetic” TechCrunch, September 5, 2006.

    Google Scholar 

  24. Brian Colgan. “Facebook News Feed feature inspires student ire”. The Wesleyan Argus, Sept. 12, 2006, Vol. CXLI, No. 2.

    Google Scholar 

Further Readings

  • Borestein, Nathaniel. “Perils and Pitfalls of Practical Cybercommerce.” Communications of the ACM, 39(6), 1996, pp. 36-44.

    Article  Google Scholar 

  • CNN Headline News, January 15, 1996. http://www.cnn.com/

  • Denning, D., and Dannis K. Branstad. “A Taxonomy for Key Escrow Encryption Systems.” Communications of the ACM, 39(3), 1996, pp. 34-39.

    Article  Google Scholar 

  • Dornin, Rusty. “The Internet: Will It Last or Fade into the Past?” CNN Interactive. http://www.cnn.com/

  • Kung, Hans. “The Principle of a Global Ethic.” http://rain.org/~origin/genetic.html

  • Levy, Steven, “Prophet of Privacy.” Wired, November 1994, p. 126.

    Google Scholar 

  • Maher, David. “Crypto Backup and Kew Escrow.” Communications of the ACM, 39(3), 1996, pp. 48-53.

    Article  Google Scholar 

  • Pyle, Raymond. “Electronic Commerce and the Internet.” Communications of the ACM, 39(6), 1996, p. 23.

    Google Scholar 

  • Samuelson, Pamela. “Intellectual Property Rights and the Global Information Economy.” Communications of the ACM, 39(1), 1996, pp. 23-28.

    Article  Google Scholar 

  • Sterling, Bruce. “History of the Internet.” http://gopher.iso.org:70/internet/history/

  • Walker, Stephen, Steven Lipner, Carl Ellison, and David Balenson. “Commercial Key Recovery.” Communications of the ACM, 39(3), 1996, pp. 41-47.

    Article  Google Scholar 

  • Weiser, Mark. “Whatever Happened to the Next-Generation Internet?” Communication of the ACM, 44(9), pp. 61-68.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag London Limited

About this chapter

Cite this chapter

Kizza, J.M. (2010). Cyberspace, Cyberethics, and Social Networking. In: Ethical and Social Issues in the Information Age. Texts in Computer Science. Springer, London. https://doi.org/10.1007/978-1-84996-038-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-84996-038-0_11

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84996-037-3

  • Online ISBN: 978-1-84996-038-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics