Information Technology Ethics ReaderS.Y 2008-2009 3
TermBy: Francisco T. Guison Page 2
TABLE OF CONTENTS
Cyber Ethics…………………………………………………………………………pp: 7- 93
1. Ethics and the Information Revolution2. Ethics On-Line3. Reason, Relativity, and Responsibility in Computer Ethics4. Disclosive Computer Ethics5. Gender and Computer Ethics6. Is the Global Information Infrastructure a Democratic Technology7. Applying Ethical and Moral Concepts and Theories to IT Contexts8. Just Consequentialism and Computing9. The Internet as Public Space10. The Laws of Cyberspace11. Of Black Holes and Decentralized Law-Making in Cyberspace
Fahrenheit 451.2: Is Cyberspace Burning?
13. Filtering the Internet in the USA: Free Speech Denied14. Censorship, the Internet, and the Child Pornography Law of 1996: A Critique15. PICS: Internet Access Controls without Censorship16. Internet Service Providers and Defamation: New Standards of Liability17. Digital Millennium Copyright Act18. Note on the DeCSS Trial19. A Politics of Intellectual Property: Environmentalism for the Net20. Intellectual Property, Information, and the Common Good21. Is Copyright Ethical an Examination of the Theories, Laws, and Practices Regarding the Private22. On the Web, Plagiarism Matters More Than Copyright Piracy23. An Ethical Evaluation of Web Site Linking24. The Cathedral and the Bazaar25. Towards A Theory of Piracy for the Information Age26. The Structure of Rights in Directive 95 46 EC27. Privacy Protection, Control of Information, and Privacy-Enhancing Technologies28. Toward an Approach to Privacy in Public: Challenges of Information Technology29. KDD, Privacy, Individuality, and Fairness30. Data Mining and Privacy31. Workplace Surveillance, Privacy, and Distributive Justice32. Privacy and Varieties of Informational Wrongdoing33. PICS: Internet Access Controls Without Censorship34. Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace35. Terrorism or Civil Disobedience: Toward a Hacktivist Ethic36. Web Security and Privacy: An American Perspective37. The Meaning of Anonymity in an Information Age38. Written on the Body: Biometrics and Identity39. Ethical Considerations for the Information Professions40. Software Engineering Code of Ethics: Approved41. No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All42. Subsumption Ethics43. Ethical Issues in Business Computing44. The Practitioner from Within: Revisiting the Virtues