Abstract
Learning Objectives
After reading this chapter, the reader should be able to:
-
1.
Understand cyberspace.
-
2.
Learn how to safeguard cyberspace.
-
3.
Understand the issues of cyberspace.
-
4.
Learn the complexity of cyberspace issues.
-
5.
Acquire knowledge and understand where in cyberspace ethics is essential.
-
6.
Learn the ethical framework of cyberspace.
-
7.
Learn how languages and culture are influenced by cyberspace.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rosenberg, Matt. “Copyrights Law Meets the World Wide Web.” Crossroads, 2(2), 1995. http://info.acm.org/crossroads/
Leesing, Larry, David Post, and Eugene Vololch. “Copyright Law in Cyberspace, Cyberspace Law Institute for Non-Lawyers.” http://www.counsel.com/cyberspace/
The Net [motion picture]. http://www.spe.sony.com/pictures/sonymovies/
Lewis, Peter. “Limiting a Medium Without Boundaries.” New York Times, January 15, 1996, D1.
Ang, Deng, and Balinda Nadarajan. “Censorship and the Internet: A Singapore Perspective.” Communications of the ACM, 39(6), 1996, pp. 72-78.
Brandt, Daniel. “Cyberspace Wars: Microproceesing vs. Big Brother.” NameBase NewsLine 2, July-August 1993. http://ursula.btythe.org/NameBase/NewsLine.02/
Bhimani, Anish. “Securing the Commercial Internet.” Communications of the ACM, 39(6), 1996, pp. 29-35.
Kung, Hans. “Declaration Towards a Global Ethic.” http://rain.org/~origin/genetic.html
“Internet as ‘Intellectual Colonialism’” The Council Chronicle, June 1996, p. 6.
National Telecommunications and Information Administration, Technical Report 2000 (NTIA 2000). “Falling Through the Net: Toward Digital Inclusion.” http://www.ntia.doc.gov.ntiahome/ftfn00/front00.htm
Korpela, Jukka. “English: The Universal Language on the Internet?” http://www.hut.fi/jkorpela/lingua-franca.html
Engst, Adam. “Need to Know: The Electronic Lingua Franca.” http://etext.archive.umich.edu/zines/
Hauben, Micheal. “Culture and Communication: Interplay in the New Public Commons—Usenet and Community Networks.” http://www.columbia.edu/~hauben/project-book.html
North, Tim. “The Internet and Usenet Global Networks: An Investigation of Their Culture and Its Effects on New Users [on-line].” http://foo.curtin.edu.au/Thesis/
Kizza, Joseph M. Computer Network Security and CyberEthics. McFarland: Jefferson, NC 2002.
Joe Stance. “Net twins’ in Missouri, but home still unclear.” The Associated Press. http://www.inlandempireonline.com/de/adoption/adopt042001.shtml
Ranum, Marcus. “Network Forensics: Network Traffic Monitoring.” http://www.nfr.net/publications/
Jackson, Steve. “ESM NetRecon: Ultrascan Technology.” http://www.si.com.au/Appendix/NetRecon%20Ultranscan%20.Technology.html
Carnegie Mellon University, Software Engineering Institute “Survivable Network Systems: An Emerging Discipline.” http://www.sei.cmu.edu/publications/documents/97.reports/97tr013/97tr013abstract.html
Rosenblum, Robert. “Sorting Through the Confusion: Interpreting Recording Agreement Provisions of the Digital Era.” The Entertainment Law Reporter. November 1999.
Chikuro Hiroike. Towards Supreme Morality. The Institute of Moralogy. Japan. 2002.
Barbara Simons. “The ACM Declaration in Felten v. RIAA,” Communication of the ACM, 44(10), pp. 23-26.
Michael Arrington. “New Facebook Redesign More Than Aesthetic” TechCrunch, September 5, 2006.
Brian Colgan. “Facebook News Feed feature inspires student ire”. The Wesleyan Argus, Sept. 12, 2006, Vol. CXLI, No. 2.
Further Readings
Borestein, Nathaniel. “Perils and Pitfalls of Practical Cybercommerce.” Communications of the ACM, 39(6), 1996, pp. 36-44.
CNN Headline News, January 15, 1996. http://www.cnn.com/
Denning, D., and Dannis K. Branstad. “A Taxonomy for Key Escrow Encryption Systems.” Communications of the ACM, 39(3), 1996, pp. 34-39.
Dornin, Rusty. “The Internet: Will It Last or Fade into the Past?” CNN Interactive. http://www.cnn.com/
Kung, Hans. “The Principle of a Global Ethic.” http://rain.org/~origin/genetic.html
Levy, Steven, “Prophet of Privacy.” Wired, November 1994, p. 126.
Maher, David. “Crypto Backup and Kew Escrow.” Communications of the ACM, 39(3), 1996, pp. 48-53.
Pyle, Raymond. “Electronic Commerce and the Internet.” Communications of the ACM, 39(6), 1996, p. 23.
Samuelson, Pamela. “Intellectual Property Rights and the Global Information Economy.” Communications of the ACM, 39(1), 1996, pp. 23-28.
Sterling, Bruce. “History of the Internet.” http://gopher.iso.org:70/internet/history/
Walker, Stephen, Steven Lipner, Carl Ellison, and David Balenson. “Commercial Key Recovery.” Communications of the ACM, 39(3), 1996, pp. 41-47.
Weiser, Mark. “Whatever Happened to the Next-Generation Internet?” Communication of the ACM, 44(9), pp. 61-68.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag London Limited
About this chapter
Cite this chapter
Kizza, J.M. (2010). Cyberspace, Cyberethics, and Social Networking. In: Ethical and Social Issues in the Information Age. Texts in Computer Science. Springer, London. https://doi.org/10.1007/978-1-84996-038-0_11
Download citation
DOI: https://doi.org/10.1007/978-1-84996-038-0_11
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84996-037-3
Online ISBN: 978-1-84996-038-0
eBook Packages: Computer ScienceComputer Science (R0)