Ethical and Social Issues in the Information Age pp 221-246 | Cite as
Cyberspace, Cyberethics, and Social Networking
Chapter
First Online:
Abstract
Learning Objectives
After reading this chapter, the reader should be able to:
- 1.
Understand cyberspace.
- 2.
Learn how to safeguard cyberspace.
- 3.
Understand the issues of cyberspace.
- 4.
Learn the complexity of cyberspace issues.
- 5.
Acquire knowledge and understand where in cyberspace ethics is essential.
- 6.
Learn the ethical framework of cyberspace.
- 7.
Learn how languages and culture are influenced by cyberspace.
Keywords
Intellectual Property Intrusion Detection Network Traffic Intrusion Detection System Online Social Network
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
- 1.Rosenberg, Matt. “Copyrights Law Meets the World Wide Web.” Crossroads, 2(2), 1995. http://info.acm.org/crossroads/
- 2.Leesing, Larry, David Post, and Eugene Vololch. “Copyright Law in Cyberspace, Cyberspace Law Institute for Non-Lawyers.” http://www.counsel.com/cyberspace/
- 3.The Net [motion picture]. http://www.spe.sony.com/pictures/sonymovies/
- 4.Lewis, Peter. “Limiting a Medium Without Boundaries.” New York Times, January 15, 1996, D1.Google Scholar
- 5.Ang, Deng, and Balinda Nadarajan. “Censorship and the Internet: A Singapore Perspective.” Communications of the ACM, 39(6), 1996, pp. 72-78.CrossRefGoogle Scholar
- 6.Brandt, Daniel. “Cyberspace Wars: Microproceesing vs. Big Brother.” NameBase NewsLine 2, July-August 1993. http://ursula.btythe.org/NameBase/NewsLine.02/
- 7.Bhimani, Anish. “Securing the Commercial Internet.” Communications of the ACM, 39(6), 1996, pp. 29-35.CrossRefGoogle Scholar
- 8.Kung, Hans. “Declaration Towards a Global Ethic.” http://rain.org/~origin/genetic.html
- 9.“Internet as ‘Intellectual Colonialism’” The Council Chronicle, June 1996, p. 6.Google Scholar
- 10.National Telecommunications and Information Administration, Technical Report 2000 (NTIA 2000). “Falling Through the Net: Toward Digital Inclusion.” http://www.ntia.doc.gov.ntiahome/ftfn00/front00.htm
- 11.Korpela, Jukka. “English: The Universal Language on the Internet?” http://www.hut.fi/jkorpela/lingua-franca.html
- 12.Engst, Adam. “Need to Know: The Electronic Lingua Franca.” http://etext.archive.umich.edu/zines/
- 13.Hauben, Micheal. “Culture and Communication: Interplay in the New Public Commons—Usenet and Community Networks.” http://www.columbia.edu/~hauben/project-book.html
- 14.North, Tim. “The Internet and Usenet Global Networks: An Investigation of Their Culture and Its Effects on New Users [on-line].” http://foo.curtin.edu.au/Thesis/
- 15.Kizza, Joseph M. Computer Network Security and CyberEthics. McFarland: Jefferson, NC 2002.Google Scholar
- 16.Joe Stance. “Net twins’ in Missouri, but home still unclear.” The Associated Press. http://www.inlandempireonline.com/de/adoption/adopt042001.shtml
- 17.Ranum, Marcus. “Network Forensics: Network Traffic Monitoring.” http://www.nfr.net/publications/
- 18.Jackson, Steve. “ESM NetRecon: Ultrascan Technology.” http://www.si.com.au/Appendix/NetRecon%20Ultranscan%20.Technology.html
- 19.Carnegie Mellon University, Software Engineering Institute “Survivable Network Systems: An Emerging Discipline.” http://www.sei.cmu.edu/publications/documents/97.reports/97tr013/97tr013abstract.html
- 20.Rosenblum, Robert. “Sorting Through the Confusion: Interpreting Recording Agreement Provisions of the Digital Era.” The Entertainment Law Reporter. November 1999.Google Scholar
- 21.Chikuro Hiroike. Towards Supreme Morality. The Institute of Moralogy. Japan. 2002.Google Scholar
- 22.Barbara Simons. “The ACM Declaration in Felten v. RIAA,” Communication of the ACM, 44(10), pp. 23-26.Google Scholar
- 23.Michael Arrington. “New Facebook Redesign More Than Aesthetic” TechCrunch, September 5, 2006.Google Scholar
- 24.Brian Colgan. “Facebook News Feed feature inspires student ire”. The Wesleyan Argus, Sept. 12, 2006, Vol. CXLI, No. 2.Google Scholar
Further Readings
- Borestein, Nathaniel. “Perils and Pitfalls of Practical Cybercommerce.” Communications of the ACM, 39(6), 1996, pp. 36-44.CrossRefGoogle Scholar
- CNN Headline News, January 15, 1996. http://www.cnn.com/
- Denning, D., and Dannis K. Branstad. “A Taxonomy for Key Escrow Encryption Systems.” Communications of the ACM, 39(3), 1996, pp. 34-39.CrossRefGoogle Scholar
- Dornin, Rusty. “The Internet: Will It Last or Fade into the Past?” CNN Interactive. http://www.cnn.com/
- Kung, Hans. “The Principle of a Global Ethic.” http://rain.org/~origin/genetic.html
- Levy, Steven, “Prophet of Privacy.” Wired, November 1994, p. 126.Google Scholar
- Maher, David. “Crypto Backup and Kew Escrow.” Communications of the ACM, 39(3), 1996, pp. 48-53.CrossRefGoogle Scholar
- Pyle, Raymond. “Electronic Commerce and the Internet.” Communications of the ACM, 39(6), 1996, p. 23.Google Scholar
- Samuelson, Pamela. “Intellectual Property Rights and the Global Information Economy.” Communications of the ACM, 39(1), 1996, pp. 23-28.CrossRefGoogle Scholar
- Sterling, Bruce. “History of the Internet.” http://gopher.iso.org:70/internet/history/
- Walker, Stephen, Steven Lipner, Carl Ellison, and David Balenson. “Commercial Key Recovery.” Communications of the ACM, 39(3), 1996, pp. 41-47.CrossRefGoogle Scholar
- Weiser, Mark. “Whatever Happened to the Next-Generation Internet?” Communication of the ACM, 44(9), pp. 61-68.Google Scholar
Copyright information
© Springer-Verlag London Limited 2010