Abstract
When William Gibson first coined the word cyberspace in his novel Neuromancer, he was describing the vision of a three-dimensional space of pure information consisting of networks of computers linking people, machines, and other objects as information sources and sinks. This space offered a high degree of movement, enabling users to navigate cyberspace, or to surf, as it is now commonly referred to. A cyberspace user is represented in the space as a packet of pure information moving from a source node to a destination node as needed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Rosenberg, Matt. “Copyrights Law Meets the World Wide Web.” Crossroads,2(2), 1995. Available: http://info.acm.org/crossroads/
Leesing, Larry, David Post, and Eugene Vololch. “Copyright Law in Cyberspace, Cyberspace Law Institute for Non-Lawyers.” Available: http://www.counsel.com/cyberspace/
The Net [motion picture]. Available: http://www.spe.sony.com/pictures/sonymovies/
Lewis, Peter. “Limiting a Medium without Boundaries.” New York Times, January 15, 1996, Dl.
Ang, Deng, and Balinda Nadarajan. “Censorship and the Internet: A Singapore Perspective.” Communications of the ACM, 39 (6), 1996, pp. 72–78.
Miller, Micheal. “A Bad Dream Comes True in Cyberspace.” Newsweek, January 1, 1996, pp. 26–31.
New Survey Finds Internet Use Surging.“ CNN Interactive, January 1996. Available: http://www.spe.sony.com
Brandt, Daniel. “Cyberspace Wars: Microproceesing vs Big Brother.” NameBase NewsLine 2, July-August 1993. Available: http://ursula.btythe.org/NameBase/NewsLine.02/
Bhimani, Anish. “Securing the Commercial Internet.” Communications of the ACM, 39 (6), 1996, pp. 29–35.
Ganesan, Revi. “How to Use the Key Escrow.” Communications of the ACM, 39 (3), 1996, p. 33.
Murray, Williams. “Who Holds the Keys.” Communications of the ACM, 35 (7), 1992, pp. 1315.
Panurach, Patiwat. “Money in Electronic Commerce:Digital Cash, Electronic Fund Transfer, and Ecash.” Communications of the ACM, 39 (6), 1996, pp. 45–50.
Security: VISA and MasterCard Join Forces for Security.“ Available: http://www.luckman.com/lux/vmcard.html
Kung, Hans. “Declaration Towards a Global Ethic.” Available: http://rain.org/-origin/genetic.html
Internet as `Intellectual Colonialism?“ The Council Chronicle, June 1996, p. 6.
The 1997 American Internet User Survey“ FIND/SVP—Emerging Technologies Research Group. Available
Korpela, Jukka. “English—the Universal Language on the Internet?” Available
Leonard, Andrew. “Slouching Towards Babel?” Available: http://www.hotwired.com/i-agent/
Engst, Adam. “Need to Know: The Electronic Lingua Franca.” Available: http://etext.archive.umich.edu/zines/
Hauben, Micheal. “Culture and Communication: Interplay in the New Public Commons—Usenet and Community Networks.” Available: http://www.columbia.edu/-hauben/project-book.html
North, Tim. “The Internet and Usenet Global Networks: An Investigation of Their Culture and Its Effects on New Users [on-line].”
Available: http://foo.curtin.edu.au/Thesis/
Further Reading
Borestein, Nathaniel. “Perils and Pitfalls of Practical Cybercommerce.” Communications of the ACM,39(6), 1996, pp. 36–44.CNN Headline News, January 15, 1996. Available: http://www.cnn.com/
Denning, D., and Dannis K. Branstad. “A Taxonomy for Key Escrow Encryption Systems.” Communications of the ACM, 39 (3), 1996, pp. 34–39.
Domin, Rusty. “The Internet: Will It Last or Fade into the Past?” CNN Interactive. Available: http://www.cnn.com/
Kung, Hans. “The Principle of a Global Ethic.” Available: http://rain.org/~origin/genetic.html
Levy, Steven, “Prophet of Privacy.” Wired, November 1994, p. 126.
Maher, David. “Crypto Backup and Kew Escrow.” Communications of the ACM, 39 (3), 1996, pp. 48–53.
Pyle, Raymond. “Electronic Commerce and the Internet.” Communications of the ACM, 39 (6), 1996, p. 23.
Samuelson, Pamela. “Intellectual Property Rights and the Global Information Economy.” Communications of the ACM, 39 (1), 1996, pp. 23–28.
Sterling, Bruce. “History of the Internet.” Available: http://www.gopher.iso.70/internet/history/
Walker, Stephen, Steven Lipner, Carl Ellison, and David Balenson. “Commercial Key Recovery.” Communications of the ACM, 39 (3), 1996, pp. 41–47.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer Science+Business Media New York
About this chapter
Cite this chapter
Kizza, J.M. (1998). Ethical and Social Issues in Cyberspace. In: Ethical and Social Issues in the Information Age. Undergraduate Texts in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-2950-4_9
Download citation
DOI: https://doi.org/10.1007/978-1-4757-2950-4_9
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4757-2952-8
Online ISBN: 978-1-4757-2950-4
eBook Packages: Springer Book Archive