Skip to main content

2010 | OriginalPaper | Buchkapitel

11. Cyberspace, Cyberethics, and Social Networking

verfasst von : Prof. Joseph Migga Kizza

Erschienen in: Ethical and Social Issues in the Information Age

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Learning Objectives
After reading this chapter, the reader should be able to:
1.
Understand cyberspace.
 
2.
Learn how to safeguard cyberspace.
 
3.
Understand the issues of cyberspace.
 
4.
Learn the complexity of cyberspace issues.
 
5.
Acquire knowledge and understand where in cyberspace ethics is essential.
 
6.
Learn the ethical framework of cyberspace.
 
7.
Learn how languages and culture are influenced by cyberspace.
 

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Lewis, Peter. “Limiting a Medium Without Boundaries.” New York Times, January 15, 1996, D1. Lewis, Peter. “Limiting a Medium Without Boundaries.” New York Times, January 15, 1996, D1.
5.
Zurück zum Zitat Ang, Deng, and Balinda Nadarajan. “Censorship and the Internet: A Singapore Perspective.” Communications of the ACM, 39(6), 1996, pp. 72-78.CrossRef Ang, Deng, and Balinda Nadarajan. “Censorship and the Internet: A Singapore Perspective.” Communications of the ACM, 39(6), 1996, pp. 72-78.CrossRef
7.
Zurück zum Zitat Bhimani, Anish. “Securing the Commercial Internet.” Communications of the ACM, 39(6), 1996, pp. 29-35.CrossRef Bhimani, Anish. “Securing the Commercial Internet.” Communications of the ACM, 39(6), 1996, pp. 29-35.CrossRef
9.
Zurück zum Zitat “Internet as ‘Intellectual Colonialism’” The Council Chronicle, June 1996, p. 6. “Internet as ‘Intellectual Colonialism’” The Council Chronicle, June 1996, p. 6.
15.
Zurück zum Zitat Kizza, Joseph M. Computer Network Security and CyberEthics. McFarland: Jefferson, NC 2002. Kizza, Joseph M. Computer Network Security and CyberEthics. McFarland: Jefferson, NC 2002.
20.
Zurück zum Zitat Rosenblum, Robert. “Sorting Through the Confusion: Interpreting Recording Agreement Provisions of the Digital Era.” The Entertainment Law Reporter. November 1999. Rosenblum, Robert. “Sorting Through the Confusion: Interpreting Recording Agreement Provisions of the Digital Era.” The Entertainment Law Reporter. November 1999.
21.
Zurück zum Zitat Chikuro Hiroike. Towards Supreme Morality. The Institute of Moralogy. Japan. 2002. Chikuro Hiroike. Towards Supreme Morality. The Institute of Moralogy. Japan. 2002.
22.
Zurück zum Zitat Barbara Simons. “The ACM Declaration in Felten v. RIAA,” Communication of the ACM, 44(10), pp. 23-26. Barbara Simons. “The ACM Declaration in Felten v. RIAA,” Communication of the ACM, 44(10), pp. 23-26.
23.
Zurück zum Zitat Michael Arrington. “New Facebook Redesign More Than Aesthetic” TechCrunch, September 5, 2006. Michael Arrington. “New Facebook Redesign More Than Aesthetic” TechCrunch, September 5, 2006.
24.
Zurück zum Zitat Brian Colgan. “Facebook News Feed feature inspires student ire”. The Wesleyan Argus, Sept. 12, 2006, Vol. CXLI, No. 2. Brian Colgan. “Facebook News Feed feature inspires student ire”. The Wesleyan Argus, Sept. 12, 2006, Vol. CXLI, No. 2.
Zurück zum Zitat Borestein, Nathaniel. “Perils and Pitfalls of Practical Cybercommerce.” Communications of the ACM, 39(6), 1996, pp. 36-44.CrossRef Borestein, Nathaniel. “Perils and Pitfalls of Practical Cybercommerce.” Communications of the ACM, 39(6), 1996, pp. 36-44.CrossRef
Zurück zum Zitat Denning, D., and Dannis K. Branstad. “A Taxonomy for Key Escrow Encryption Systems.” Communications of the ACM, 39(3), 1996, pp. 34-39.CrossRef Denning, D., and Dannis K. Branstad. “A Taxonomy for Key Escrow Encryption Systems.” Communications of the ACM, 39(3), 1996, pp. 34-39.CrossRef
Zurück zum Zitat Levy, Steven, “Prophet of Privacy.” Wired, November 1994, p. 126. Levy, Steven, “Prophet of Privacy.” Wired, November 1994, p. 126.
Zurück zum Zitat Maher, David. “Crypto Backup and Kew Escrow.” Communications of the ACM, 39(3), 1996, pp. 48-53.CrossRef Maher, David. “Crypto Backup and Kew Escrow.” Communications of the ACM, 39(3), 1996, pp. 48-53.CrossRef
Zurück zum Zitat Pyle, Raymond. “Electronic Commerce and the Internet.” Communications of the ACM, 39(6), 1996, p. 23. Pyle, Raymond. “Electronic Commerce and the Internet.” Communications of the ACM, 39(6), 1996, p. 23.
Zurück zum Zitat Samuelson, Pamela. “Intellectual Property Rights and the Global Information Economy.” Communications of the ACM, 39(1), 1996, pp. 23-28.CrossRef Samuelson, Pamela. “Intellectual Property Rights and the Global Information Economy.” Communications of the ACM, 39(1), 1996, pp. 23-28.CrossRef
Zurück zum Zitat Walker, Stephen, Steven Lipner, Carl Ellison, and David Balenson. “Commercial Key Recovery.” Communications of the ACM, 39(3), 1996, pp. 41-47.CrossRef Walker, Stephen, Steven Lipner, Carl Ellison, and David Balenson. “Commercial Key Recovery.” Communications of the ACM, 39(3), 1996, pp. 41-47.CrossRef
Zurück zum Zitat Weiser, Mark. “Whatever Happened to the Next-Generation Internet?” Communication of the ACM, 44(9), pp. 61-68. Weiser, Mark. “Whatever Happened to the Next-Generation Internet?” Communication of the ACM, 44(9), pp. 61-68.
Metadaten
Titel
Cyberspace, Cyberethics, and Social Networking
verfasst von
Prof. Joseph Migga Kizza
Copyright-Jahr
2010
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-84996-038-0_11