Page Tools:

Readings in CyberEthics, Second Edition

Author(s): Richard Spinello, Boston College, Chestnut Hill, Massachusetts
Herman Tavani, Rivier College
  • ISBN-13: 9780763724108
  • ISBN-10:0763724106
  • Paperback    697 pages      © 2004
Price: International Sales $130.95 US List
Add to Cart Request a Review Copy

This book of readings is a flexible learning tool for undergraduate and graduate courses in the evolving fields of computer and Internet ethics. Each selection has been carefully chosen for its timeliness and analytical depth and is written by a well-known expert in the field. The readings are organized to take the reader from a discussion on ethical frameworks and regulatory issues to a substantial treatment of the four fundamental, interrelated issues of cyberethics: speech, property, privacy, and security. A chapter on professionalism rounds out the selection. This book makes an excellent companion to Cyber Ethics: Morality and Law in Cyberspace, Second Edition by providing articles that present both sides of key issues in cyberethics.

Applicable Courses

Readings in CyberEthics, Second Edition is designed for use in the following courses:

  • Computer and Internet Ethics
  • Business Ethics (concentration on Computer and Internet Ethics)
  • Applied Ethics (concentration on Computer and Internet Ethics)

Chapter 1: Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics
Terrell Ward Bynum, “Ethics and the Information Revolution”
Deborah G. Johnson, “Ethics On-line”
James H. Moor, “Reason, Relativity, and Responsibility in Computer Ethics”
Philip Brey, “Disclosive Computer Ethics”
Alison Adam, “Gender and Computer Ethics”
NEW! Luciano Floridi and J.W. Sanders, "The Foundationalist Debate in Computer Ethics"
NEW! Bernard Gert, "Common Morality and Computing"
James H. Moor, “Just Consequentialism and Computing”

Chapter 2: Regulating the Net:  Free Expression and Content Controls
Deborah G. Johnson, "Is the Global Information Infrastructure a Democratic Technology?"
Larry Lessig, "The Laws of Cyberspace"
David Post, "Of Black Holes and Decentralized Law-Making in Cyberspace"
ACLU, “Fahrenheit 451.2: Is Cyberspace Burning?”
Richard Rosenberg, "Filtering the Internet in the United States:  Free Speech Denied"
NEW! Excerpts from United States v. American Library Association
Jacques N. Catudal, “Censorship, the Internet, and the Child Pornography Law of 1996: A Critique”
NEW! Tomas A. Lipinski, Elizabeth Buchanan, and Johannes Britz, "Agents of Harm or Agents of Grace: The Legal and Ethical Aspects of Identifying Harm and Assigning Responsibility in a Networked World,"

Chapter 3: Intellectual Property in Cyberspace
Excerpts from the Digital Millennium Copyright Act (DMCA) of 1998
Note on the DeCSS Trial
Richard A. Spinello, "Peer-to-Peer File Sharing"
James Boyle, "A Politics of Intellectual Property:  Environmentalism for the Net?"
Michael McFarland, "Intellectual Property, Information, and the Common Good" 
Shelly Warwick, “Is Copyright Ethical?”
John W. Snapper, “On the Web, Plagiarism Matters More Than Copyright Violations”
Richard A. Spinello, "An Ethical Evaluation of Web Site Linking "
NEW! Frances S. Grodzinsky, Keith Miller, and Marty Wolf,  "Ethical Issues in Open Source Software"
Eric Raymond, "The Cathedral and the Bazaar"

Chapter 4: Privacy in Cyberspace
James H. Moor, “Towards a Theory of Privacy in the Information Age”
Dag Elgesem, “The Structure of Rights in Directive 95/46/EC on the Protection of Individuals With Regard to the Processing of Personal Data and the Free Movement of Such Data”
Herman T. Tavani and James H. Moor, “Privacy Protection, Control of Information, and Privacy-Enhancing Technologies”
Helen Nissenbaum, “Toward an Approach to Privacy in Public: Challenges to Information Technology”
Anton Vedder, “KDD, Privacy, Individuality, and Fairness”
Joseph S. Fulda, "Data Mining and Privacy"
Lucas D. Introna, “Workplace Surveillance, Privacy, and Distributive Justice”
Jeroen van den Hoven, “Privacy and the Varieties of Moral Wrong-doing”

Chapter 5: Security and Crime in Cyberspace
Herman T. Tavani, “Defining the Boundaries of Computer Crime: Piracy, Break-Ins and Sabotage in Cyberspace”
Mark Manion and Abby Goodrum, “Terrorism or Civil Disobedience: Toward a Hacktivist Ethic”
Dorothy E. Denning, "Cyberterrorism"
L. Jean Camp, "Web Security and Privacy: An American Perspective"
Helen Nissenbaum, “The Meaning of Anonymity in an Information Age”
NEW! Frances S. Grodzinsky and Herman T. Tavani, "Some Ethical Reflections on Cyberstalking"
Irma van der Ploeg, “Written on the Body: Biometrics and Identity”
NEW! Philip Brey, "Ethical Aspects of Facial Recognition Systems in Public Places"

Chapter 6: Professional Ethics, Codes of Conduct, and Computer/Information Professionals
Elizabeth Buchanan, “Ethical Considerations for the Information Professions”
ACM Code of Ethics and Professional Conduct
NEW! IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practices
NEW! Don Gotterbarn, "The Life Cycle of Computer and Cyber Ethics"
NEW! Chuck Huff, "Unintentional Power in the Design of Computing Systems"
NEW! Richard G. Epstein, “The Wheel”
NEW! Don Gotterbarn, "Reduce Software Failures:  Address Ethical Risks in Software Development Impact Statements (SoDIS™)"
NEW! John Weckert, "Lilliputian Computer Ethics"

Richard Spinello-Boston College, Chestnut Hill, Massachusetts

Richard Spinello, Carroll School of Management, Boston College
Richard Spinello is an Associate Research Professor in the Operations and Strategic Management department of Boston College.  He received both his PhD and his M.A. from Fordham University.  His most recent publication is Readings in CyberEthics, which he co-authored with Herman Tavani.

Additional Titles by this Author

Herman Tavani-Rivier College

Herman Tavani is an Associate Professor and the Chair of the Philosophy department at Rivier College. Professor Tavani earned his Ph.D. at Temple University.