Chapter 1: Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics
Terrell Ward Bynum, “Ethics and the Information Revolution”
Deborah G. Johnson, “Ethics On-line”
James H. Moor, “Reason, Relativity, and Responsibility in Computer Ethics”
Philip Brey, “Disclosive Computer Ethics”
Alison Adam, “Gender and Computer Ethics”
NEW! Luciano Floridi and J.W. Sanders, "The Foundationalist Debate in Computer Ethics"
NEW! Bernard Gert, "Common Morality and Computing"
James H. Moor, “Just Consequentialism and Computing”
Chapter 2: Regulating the Net: Free Expression and Content Controls
Deborah G. Johnson, "Is the Global Information Infrastructure a Democratic Technology?"
Larry Lessig, "The Laws of Cyberspace"
David Post, "Of Black Holes and Decentralized Law-Making in Cyberspace"
ACLU, “Fahrenheit 451.2: Is Cyberspace Burning?”
Richard Rosenberg, "Filtering the Internet in the United States: Free Speech Denied"
NEW! Excerpts from United States v. American Library Association
Jacques N. Catudal, “Censorship, the Internet, and the Child Pornography Law of 1996: A Critique”
NEW! Tomas A. Lipinski, Elizabeth Buchanan, and Johannes Britz, "Agents of Harm or Agents of Grace: The Legal and Ethical Aspects of Identifying Harm and Assigning Responsibility in a Networked World,"
Chapter 3: Intellectual Property in Cyberspace
Excerpts from the Digital Millennium Copyright Act (DMCA) of 1998
Note on the DeCSS Trial
Richard A. Spinello, "Peer-to-Peer File Sharing"
James Boyle, "A Politics of Intellectual Property: Environmentalism for the Net?"
Michael McFarland, "Intellectual Property, Information, and the Common Good"
Shelly Warwick, “Is Copyright Ethical?”
John W. Snapper, “On the Web, Plagiarism Matters More Than Copyright Violations”
Richard A. Spinello, "An Ethical Evaluation of Web Site Linking "
NEW! Frances S. Grodzinsky, Keith Miller, and Marty Wolf, "Ethical Issues in Open Source Software"
Eric Raymond, "The Cathedral and the Bazaar"
Chapter 4: Privacy in Cyberspace
James H. Moor, “Towards a Theory of Privacy in the Information Age”
Dag Elgesem, “The Structure of Rights in Directive 95/46/EC on the Protection of Individuals With Regard to the Processing of Personal Data and the Free Movement of Such Data”
Herman T. Tavani and James H. Moor, “Privacy Protection, Control of Information, and Privacy-Enhancing Technologies”
Helen Nissenbaum, “Toward an Approach to Privacy in Public: Challenges to Information Technology”
Anton Vedder, “KDD, Privacy, Individuality, and Fairness”
Joseph S. Fulda, "Data Mining and Privacy"
Lucas D. Introna, “Workplace Surveillance, Privacy, and Distributive Justice”
Jeroen van den Hoven, “Privacy and the Varieties of Moral Wrong-doing”
Chapter 5: Security and Crime in Cyberspace
Herman T. Tavani, “Defining the Boundaries of Computer Crime: Piracy, Break-Ins and Sabotage in Cyberspace”
Mark Manion and Abby Goodrum, “Terrorism or Civil Disobedience: Toward a Hacktivist Ethic”
Dorothy E. Denning, "Cyberterrorism"
L. Jean Camp, "Web Security and Privacy: An American Perspective"
Helen Nissenbaum, “The Meaning of Anonymity in an Information Age”
NEW! Frances S. Grodzinsky and Herman T. Tavani, "Some Ethical Reflections on Cyberstalking"
Irma van der Ploeg, “Written on the Body: Biometrics and Identity”
NEW! Philip Brey, "Ethical Aspects of Facial Recognition Systems in Public Places"
Chapter 6: Professional Ethics, Codes of Conduct, and Computer/Information Professionals
Elizabeth Buchanan, “Ethical Considerations for the Information Professions”
ACM Code of Ethics and Professional Conduct
NEW! IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practices
NEW! Don Gotterbarn, "The Life Cycle of Computer and Cyber Ethics"
NEW! Chuck Huff, "Unintentional Power in the Design of Computing Systems"
NEW! Richard G. Epstein, “The Wheel”
NEW! Don Gotterbarn, "Reduce Software Failures: Address Ethical Risks in Software Development Impact Statements (SoDIS™)"
NEW! John Weckert, "Lilliputian Computer Ethics"