Cyberspace, Cyberethics, and Social Networking

Chapter
Part of the Texts in Computer Science book series (TCS)

Abstract

Learning Objectives

After reading this chapter, the reader should be able to:
  1. 1.

    Understand cyberspace.

     
  2. 2.

    Learn how to safeguard cyberspace.

     
  3. 3.

    Understand the issues of cyberspace.

     
  4. 4.

    Learn the complexity of cyberspace issues.

     
  5. 5.

    Acquire knowledge and understand where in cyberspace ethics is essential.

     
  6. 6.

    Learn the ethical framework of cyberspace.

     
  7. 7.

    Learn how languages and culture are influenced by cyberspace.

     

Keywords

Intellectual Property Intrusion Detection Network Traffic Intrusion Detection System Online Social Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Rosenberg, Matt. “Copyrights Law Meets the World Wide Web.” Crossroads, 2(2), 1995. http://info.acm.org/crossroads/
  2. 2.
    Leesing, Larry, David Post, and Eugene Vololch. “Copyright Law in Cyberspace, Cyberspace Law Institute for Non-Lawyers.” http://www.counsel.com/cyberspace/
  3. 3.
  4. 4.
    Lewis, Peter. “Limiting a Medium Without Boundaries.” New York Times, January 15, 1996, D1.Google Scholar
  5. 5.
    Ang, Deng, and Balinda Nadarajan. “Censorship and the Internet: A Singapore Perspective.” Communications of the ACM, 39(6), 1996, pp. 72-78.CrossRefGoogle Scholar
  6. 6.
    Brandt, Daniel. “Cyberspace Wars: Microproceesing vs. Big Brother.” NameBase NewsLine 2, July-August 1993. http://ursula.btythe.org/NameBase/NewsLine.02/
  7. 7.
    Bhimani, Anish. “Securing the Commercial Internet.” Communications of the ACM, 39(6), 1996, pp. 29-35.CrossRefGoogle Scholar
  8. 8.
    Kung, Hans. “Declaration Towards a Global Ethic.” http://rain.org/~origin/genetic.html
  9. 9.
    “Internet as ‘Intellectual Colonialism’” The Council Chronicle, June 1996, p. 6.Google Scholar
  10. 10.
    National Telecommunications and Information Administration, Technical Report 2000 (NTIA 2000). “Falling Through the Net: Toward Digital Inclusion.” http://www.ntia.doc.gov.ntiahome/ftfn00/front00.htm
  11. 11.
    Korpela, Jukka. “English: The Universal Language on the Internet?” http://www.hut.fi/jkorpela/lingua-franca.html
  12. 12.
    Engst, Adam. “Need to Know: The Electronic Lingua Franca.” http://etext.archive.umich.edu/zines/
  13. 13.
    Hauben, Micheal. “Culture and Communication: Interplay in the New Public Commons—Usenet and Community Networks.” http://www.columbia.edu/~hauben/project-book.html
  14. 14.
    North, Tim. “The Internet and Usenet Global Networks: An Investigation of Their Culture and Its Effects on New Users [on-line].” http://foo.curtin.edu.au/Thesis/
  15. 15.
    Kizza, Joseph M. Computer Network Security and CyberEthics. McFarland: Jefferson, NC 2002.Google Scholar
  16. 16.
    Joe Stance. “Net twins’ in Missouri, but home still unclear.” The Associated Press. http://www.inlandempireonline.com/de/adoption/adopt042001.shtml
  17. 17.
    Ranum, Marcus. “Network Forensics: Network Traffic Monitoring.” http://www.nfr.net/publications/
  18. 18.
    Jackson, Steve. “ESM NetRecon: Ultrascan Technology.” http://www.si.com.au/Appendix/NetRecon%20Ultranscan%20.Technology.html
  19. 19.
    Carnegie Mellon University, Software Engineering Institute “Survivable Network Systems: An Emerging Discipline.” http://www.sei.cmu.edu/publications/documents/97.reports/97tr013/97tr013abstract.html
  20. 20.
    Rosenblum, Robert. “Sorting Through the Confusion: Interpreting Recording Agreement Provisions of the Digital Era.” The Entertainment Law Reporter. November 1999.Google Scholar
  21. 21.
    Chikuro Hiroike. Towards Supreme Morality. The Institute of Moralogy. Japan. 2002.Google Scholar
  22. 22.
    Barbara Simons. “The ACM Declaration in Felten v. RIAA,” Communication of the ACM, 44(10), pp. 23-26.Google Scholar
  23. 23.
    Michael Arrington. “New Facebook Redesign More Than Aesthetic” TechCrunch, September 5, 2006.Google Scholar
  24. 24.
    Brian Colgan. “Facebook News Feed feature inspires student ire”. The Wesleyan Argus, Sept. 12, 2006, Vol. CXLI, No. 2.Google Scholar

Further Readings

  1. Borestein, Nathaniel. “Perils and Pitfalls of Practical Cybercommerce.” Communications of the ACM, 39(6), 1996, pp. 36-44.CrossRefGoogle Scholar
  2. CNN Headline News, January 15, 1996. http://www.cnn.com/
  3. Denning, D., and Dannis K. Branstad. “A Taxonomy for Key Escrow Encryption Systems.” Communications of the ACM, 39(3), 1996, pp. 34-39.CrossRefGoogle Scholar
  4. Dornin, Rusty. “The Internet: Will It Last or Fade into the Past?” CNN Interactive. http://www.cnn.com/
  5. Kung, Hans. “The Principle of a Global Ethic.” http://rain.org/~origin/genetic.html
  6. Levy, Steven, “Prophet of Privacy.” Wired, November 1994, p. 126.Google Scholar
  7. Maher, David. “Crypto Backup and Kew Escrow.” Communications of the ACM, 39(3), 1996, pp. 48-53.CrossRefGoogle Scholar
  8. Pyle, Raymond. “Electronic Commerce and the Internet.” Communications of the ACM, 39(6), 1996, p. 23.Google Scholar
  9. Samuelson, Pamela. “Intellectual Property Rights and the Global Information Economy.” Communications of the ACM, 39(1), 1996, pp. 23-28.CrossRefGoogle Scholar
  10. Sterling, Bruce. “History of the Internet.” http://gopher.iso.org:70/internet/history/
  11. Walker, Stephen, Steven Lipner, Carl Ellison, and David Balenson. “Commercial Key Recovery.” Communications of the ACM, 39(3), 1996, pp. 41-47.CrossRefGoogle Scholar
  12. Weiser, Mark. “Whatever Happened to the Next-Generation Internet?” Communication of the ACM, 44(9), pp. 61-68.Google Scholar

Copyright information

© Springer-Verlag London Limited 2010

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity of TennesseeChattanoogaUSA

Personalised recommendations