Shopping Cart | Login | Register | Language: English

Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices

Release Date: September, 2011. Copyright © 2012. 343 pages.
Select a Format:
Hardcover
$156.00
List Price: $195.00
Current Promotions:
20% Online Bookstore Discount*
In Stock. Have it as soon as Apr. 23 with express shipping*.
DOI: 10.4018/978-1-61350-132-0, ISBN13: 9781613501320, ISBN10: 1613501323, EISBN13: 9781613501337
Cite Book

MLA

Dudley, Alfreda, James Braman and Giovanni Vincenti. "Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices." IGI Global, 2012. 1-343. Web. 18 Apr. 2014. doi:10.4018/978-1-61350-132-0

APA

Dudley, A., Braman, J., & Vincenti, G. (2012). Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices (pp. 1-343). Hershey, PA: IGI Global. doi:10.4018/978-1-61350-132-0

Chicago

Dudley, Alfreda, James Braman and Giovanni Vincenti. "Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices." 1-343 (2012), accessed April 18, 2014. doi:10.4018/978-1-61350-132-0

Export Reference

Mendeley
Favorite
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices
Access on Platform
Browse by Subject
Top

Description

Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored.

Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.

Top

Table of Contents and List of Contributors

Search this Book: Reset
Table of Contents
Foreword
Scott Hilberg
Preface
Alfreda Dudley, James Braman, Giovanni Vincenti
Chapter 1
Ugo Pagallo
This chapter focuses on some of the most relevant issues in today’s data protection: responsibility and jurisdiction are examined in the light of... Sample PDF
Responsibility, Jurisdiction, and the Future of “Privacy by Design”
$37.50
Chapter 2
Gráinne Kirwan, Andrew Power
Hacking is an activity which has long been tied with ethical and legal complications. The term has evolved to have both ethical and unethical... Sample PDF
Hacking: Legal and Ethical Aspects of an Ambiguous Activity
$37.50
Chapter 3
Sean M. Zadig, Gurvirender Tejay
The issue of cybercrime has received much attention of late, as individual and organizational losses from online crimes frequently reach into the... Sample PDF
Emerging Cybercrime Trends: Legal, Ethical, and Practical Issues
$37.50
Chapter 4
Anteneh Ayanso, Tejaswini Herath
Historical incidents have taught organizations several key lessons on computer crimes. The complexity of the current technology environment dictates... Sample PDF
Law and Technology at Crossroads in Cyberspace: Where Do We Go From Here?
$37.50
Chapter 5
Lee Gillam, Anna Vartapetiance
Cyberspace offers up numerous possibilities for entertainment and leisure, and can be a rich source for information. Unfortunately, it can also be a... Sample PDF
Cyber Law, Cyber Ethics and Online Gambling
$37.50
Chapter 6
Miguel A. Garcia-Ruiz, Miguel Vargas Martin, Patrik Olsson
It appears that child pornography distribution and child abuses on the Internet have permeated to massively multiplayer online role-playing video... Sample PDF
An Overview of Child Abuses in 3D Social Networks and Online Video Games
$37.50
Chapter 7
Andrew Power, Gráinne Kirwan
The development of a legal environment for virtual worlds presents issues of both law and ethics. The cross-border nature of online law and... Sample PDF
Ethics and Legal Aspects of Virtual Worlds
$37.50
Chapter 8
Ananda Mitra
enumeration of these attributes of the narbs produce a narb weight and a narb matrix which can be examined numerically to provide a preliminary... Sample PDF
Narbs as a Measure and Indicator of Identity Narratives
$37.50
Chapter 9
Jean-Philippe Moiny
As the author of this chapter is a European jurist, European law constitutes the point of departure of the reflections, and can be sometimes (titles... Sample PDF
Cloud Based Social Network Sites: Under Whose Control?
$37.50
Chapter 10
Anne Gerdes
This chapter investigates al-Qaeda’s use of Web 2.0 as a tool for radicalization and recruitment. The media network of al-Qaeda is described in... Sample PDF
Al-Qaeda on Web 2.0: Radicalization and Recruitment Strategies
$37.50
Chapter 11
Richard A. Spinello
This chapter, focusing primarily on the search engine company Google, treats the normative issue of how U.S. or European companies should respond... Sample PDF
Google in China: Corporate Responsibility on a Censored Internet
$37.50
Chapter 12
Jonathan Bishop
Constitutional and Administrative Law is a core component of legal studies throughout the world, but to date little has been written about how this... Sample PDF
All’s WELL that Ends WELL: A Comparative Analysis of the Constitutional and Administrative Frameworks of Cyberspace and the United Kingdom
$37.50
Chapter 13
Sam De Silva
The development of the Internet raises challenges in the application of defamation, given that the click of a mouse can communicate a defamatory... Sample PDF
A UK Law Perspective: Defamation Law as it Applies on the Internet
$37.50
Chapter 14
Eugenia Alexandropoulou-Egyptiadou
The huge financial rewards that may be gained from software sales have resulted in computer piracy, an increasing worldwide phenomenon. This... Sample PDF
The Hellenic Framework for Computer Program Copyright Protection Following the Implementation of the Relative European Union Directives
$37.50
Chapter 15
Radomír Jakab
As can be derived from its name, Internet advertising means any form of promoting products or services through the Internet. This form of... Sample PDF
Internet Advertising: Legal Aspects in the European Union
$37.50
Top

Reviews and Testimonials

It is our desire that this particular book will serve as a both a research and educational tool to encompass knowledge in these domain. It is also our desire that this book can also serve to help others see that cyberlaw and cyberethics are important domains whose understanding is instrumental to understand our future as a society as our lives become ever further meshed and integrated with the ever growing connected digital world.

– Dr. Alfreda Dudley, Towson University, USA; Dr. James Braman, Towson University, USA; and Dr. Giovanni Vincenti, Towson University, USA
Top

Topics Covered

  • Computer Crime
  • Constitutional Issues Involving Information Technology
  • Ethics and Legal Aspects of Virtual Worlds
  • Intellectual property
  • Jurisdictional Issues and Copyright
  • Networking
  • Online Business Applications
  • Online Privacy and Security
  • Virtual Law
  • Web Accessibility
Top

Preface

Computer technologies have continually and rapidly changed and advanced in the last two decades. The impacts of these rapid changes are affecting the use and applications of computer technologies in society.  These impacts bring about new focus and new scrutiny. One of the fundamental changes in the last decade has been the realization that the context in which computer technologies are used must take into account the ethical implications associated with its use. Examples of computing ethical issues include, but are not limited to: cyberterrorism; security and privacy responsibilities; intellectual property rights; online piracy; blogger litigation; data recovery; data protection; wireless computing; computer crime; et cetera.  Another fundamental change is the increased importance of the legal impacts that new computer technologies introduce.   However, these changes do not necessarily correspond to the changes in the computer technology itself.  

Ethics, when applied to technology-related issues, is also recognized as cyberethics (Tavani, 2010). There is a plethora of viewpoints regarding the subject of cyberethics.  For instance, one major question that many professionals within and without the computer community consider:  Is cyberethics different from “regular” ethics?   Regular ethics is defined as ethics that apply across all contexts (i.e., medical, legal, business, and religious).  In some instances, this question can be answered with a definite yes.  However, many theorists would state that there are differences between regular ethics and cyberethics.  They base their arguments on the fact that cyberethics is based on the impact of computing technologies on individuals and society.  However, this does not indicate that computing technologies have introduced new ethical issues.  Therefore, some would argue that there are no differences between regular ethics and cyberethics.  Their arguments are based on the fact that computing technologies only bring a new dimension to existing ethical issues. A major problem is the practice and application of ethics in computing environments by computing professionals and users.  
In the computing culture, professionals and organizations put emphasis on proper or improper design procedures and practices.  While this is definitely important, increasing awareness of the ethical behavioral practices of the computing professional and organization is becoming crucial.  Computing technology is pervasive in all areas of society; therefore, when considering ethical practices, this component should not be omitted.  Computing professionals and organizations are not different species. However, the ethical practices and applications of computing professionals and organizations are becoming suspect in the light of computer crimes, i.e., fraud, identity theft, embezzlement, etc. (Dudley-Sponaugle & Lazar, 2005).
Ethics is a central component in the legal prospectus.  However, many legal professionals and academics believe current legal statutes leave much to be desired in regards to computing technologies.   In addition, there are further debates regarding the pedagogical structure of the legal curriculum and the inclusion of ethics. “There has been some concern about the growing disjunction between legal education and the legal profession. While the law schools seem to be moving toward pure theory, the firms are moving toward pure commerce, and both have abandoned the middle ground -ethical practice” (Edwards, 1992). It is the consensus of legal scholars and practitioners that students should be acclimated to the application of ethical principles in law.  In doing so, law students will be more adapt in the interpretation and modification of legal doctrine and precedents in the law. It is believed that a good, practical scholar gives due weight to cases, statutes, and other authoritative texts, but also employs theory to criticize doctrine and to propose changes in the law.

Regardless of their views or positions, most ethicists and legal practitioners would agree that ethics and legal knowledge is important in the applications of computer technologies.   The issue for many is how to connect ethics and legal knowledge and practice regarding computing technologies implementation.  For the past several years, the editors became interested in the ethical behaviors of users in the application of computer technologies.  This lead to several published journal articles and book chapters.  While pursuing their ongoing research, the editors were made aware of the lack of publications on how law is being translated and applied to existing computer technologies.  This book project became in existence because of the lack or need of different perspectives in these areas.   The approach to this book was to discover various viewpoints and issues dealing with the topics of cyberlaw and cyberethics.  Moreover, the editors believe the information from this book will provide important insights for future development and research in these areas.

The book “Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices” arises from observing the rate of growth registered within the field of technology and the speed at which ethics discussions and legal coverage try to keep up. The difference in advancement offers fertile ground to illegal trades, unethical behaviors, and unmonitored activities in general. Such observation is true for any new endeavor, but it is exacerbated by the high levels of diffusion among the peoples of the world, blurring national boundaries or cultural habits. As the world heads towards a technological global harmonization, the legal systems especially, but also the frames of reference that the field of ethics offers seem to diverge rather than converge. This work’s aim represents the summary of the work of many researchers and practitioners who are striving to unite their efforts towards a significant progress. This book is divided into three sections: Section 1, Legal and Jurisdictional Issues Regarding Cyberspace, gives an overview of the problem; Section 2, Legal and Ethical Implications involving Social Networks and Virtual Worlds, analyzes the above-mentioned gap by focusing on the forefront of technological advancements with the most societal impacts; Section 3, Legal and Ethical Implications in Cyberspace – An International Perspective, steps back from the details of technology and approaches the main topic of this work from multiple national angles.

The first set of contributions gathered in Section 1, titled Legal and Jurisdictional Issues Regarding Cyberspace, offers a wide perspective on legal and ethical issues related to innovations in technology. In Chapter 1, Responsibility, Jurisdiction, and the Future of Privacy by Design, Ugo Pagallo analyzes the effects that privacy policies of popular technology-based services have on data protection and personal control. In Chapter 2, titled Hacking: Legal and Ethical Aspects of an Ambiguous Activity, Kirwan and Power offer thought-provoking arguments that describe the always controversial practice (of vocation?) of hacking. In Chapter 3 the contribution from Zadig and Tejay, titled Emerging Cybercrime Trends: Legal, Ethical, and Practical Issues, quantify and qualify through examples some of the new and arising concerns in the expansion of crime into new technological niches. Chapter 4, titled Law and Technology at Crossroads in Cyberspace: Where Do We Go From Here? by Ayanso and Herath, analyzes practical aspects of enforcing laws in modern technology-based terrains. Chapter 5, titled Cyber Law, Cyber Ethics and Online Gambling, by Gillam and Vartapetiance, concludes the first section by exploring legal and ethical aspects of gambling and addiction, a significant concern that quickly spread from the physical halls of casinos to the online world.

In Section 2, titled Legal and Ethical Implications involving Social Networks and Virtual Worlds, we focus the reader’s attention on the quickly-rising front of technology that aims at recreating sociality, cultures and societies in cyberspace. Chapter 6 opens this section with the chapter titled An Overview of Child Abuses in 3D Social Networks and Online Video Games, by Garcia-Ruiz, Vargas Martin, and Olsson, which analyzes the problem of child abuse in virtual worlds and how it is translated into this new frontier from the physical world. Then Chapter 7, titled Ethics and Legal Aspects of Virtual Worlds by Power and Kirwan, focus on legal aspects of virtual worlds in general, offering a broader perspective on the state of ethical and legal progress applied to this virtual representation of life. In Chapter 8, Ananda Mitra discusses Narbs as a Measure and Indicator of Identity Narratives, offering a new look to narrative bits and how they may affect our personal (and very real) lives. Jean-Philippe Moiny authored Chapter 9, titled Cloud Based Social Network Sites: Under Whose Control? a work that analyzes the implications that cloud-based computing may have over the control, or its lack, of our information, which is still available to us locally, but stored globally.

Finally, we conclude this book by offering the points of view of different social and legal systems in Section 3, titled Legal and Ethical Implications in Cyberspace – An International Perspective. Anne Gerdes describes the different approach that terror-centered organizations, such as Al-Qaeda, have developed in order to fully realize their potential in conjunction with innovation-based platforms in Chapter 10, titled Al-Qaeda on Web 2.0 – Radicalization and Recruitment Strategies. In Chapter 11, titled Google in China: Corporate Responsibility on a Filtered Internet, Richard Spinello reviews a case that has made headlines for months, by analyzing the difficult interaction between a population that craves information and the restrictions of a controlling government when it comes to access of a technology that makes of free speech its funding pillar. Jonathan Bishop authored Chapter 12, titled All’s WELL that Ends WELL: A Comparative Analysis of the Constitutions of Cyberspace and the United Kingdom, a clear depiction of the lag reported in the process of adapting a national legal system to its Internet-based counterpart. In Chapter 13, Sam De Silva demonstrates through the crime of defamation the gaps that exist in the legal systems that cover the physical and the virtual worlds in his work titled A UK Law Perspective: Defamation Law as it Applies on the Internet. Chapter 14 explores the globally sensitive topic of copyright protection, an issue that continues to make headlines any time the legal system identifies a significant discrepancy between what the system should do and how it actually works. This work by Eugenia Alexandropoulou–Egyptiadou is titled Copyright Protection of Computer Programs Focusing on the Hellenic Regulatory Framework after the Implementation of the Relative E.U. Directives. The book is concluded by Radomír Jakab in Chapter 15, titled Internet Advertising: Legal Aspects in the European Union, which focuses on the poor regulation of advertising in the digital world as opposed to the laws established within the European Union.

This book brings together a wide range of topics regarding the areas of cyberlaw and cyberethics.  In it, readers will find discussions, positions, and information regarding the impacts of these topics across a wide network of disciplines and global perspectives. As new technologies continue to evolve, so too must our understanding of its ethical and legal implications. When a new tool or technology is invented and introduced, what emerges is not always what was originally intended. These new emerging ideas and other advances can have long lasting influences that cannot always be readily foreseeable. It is our desire that this particular book will serve as a both a research and educational tool to encompass knowledge in these domain. It is also our desire that this book can also serve to help others see that cyberlaw and cyberethics are important domains whose understanding is instrumental to understand our future as a society as our lives become ever further meshed and integrated with the ever growing connected digital world.

Alfreda Dudley
Towson University, USA

James Braman
Towson University, USA

Giovanni Vincenti
Towson University, USA

REFERENCES

Dudley-Sponaugle, A., & Lazar, J. (2005). Webmasters’ perception of ethics within an IT setting. Information Resources Management Association International Conference, May 15-18, 2005, San Diego, CA.  

Edwards, H. (1992). The growing disjunction between legal education and the legal profession. Michigan Law Review, 91(1), 34-79.

Tavani, H. T. (2010). Ethics and technology: Controversies, questions, and strategies for ethical computing (3rd ed.).  Danvers, MA: John Wiley & Sons, Inc.
Top

Author(s)/Editor(s) Biography

Alfreda Dudley is currently a Clinical Assistant Professor in the Department of Computer and Information Sciences at Towson University. She currently teaches the computer ethics, cyberlaw, database and Information Technology courses in the department. Dr. Dudley's research areas include: Information Technology, computer ethics, computer security, virtual technologies, and computer education with an emphasis on the application of ethics in augmented reality and virtual worlds. Dr. Dudley has published numerous journal articles, book chapters, and conference proceedings related to the application ethics in computing environments. Her other interests and pursuits include research involving underrepresented populations in the STEM area (specifically in the computing areas).
James Braman is a Lecturer in the Department of Computer and Information Sciences at Towson University. He earned a M.S. in Computer Science in 2006 and is pursuing a D.Sc. in Information Technology. James serves as joint editor-in-chief for the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST) Transactions on E-Education and E-Learning along with Dr. Vincenti. He has published several edited books, the most recent, Multi-User Virtual Environments for the Classroom: Practical Approaches to Teaching in Virtual Worlds. He has been involved in virtual world research for several years, along with providing consulting and research services for businesses and organizations utilizing virtual worlds and augmented reality. He has also published numerous research articles related to affective computing, intelligent agents, computer ethics, and education in virtual and immersive environments.
Giovanni Vincenti is a Lecturer for the Department of Computer and Information Sciences at Towson University, in Towson, MD. He received his Doctorate of Science in Applied Information Technology from Towson University in 2007. He has been teaching undergraduate and graduate courses for several years, letting him develop his interest in instructional technologies that range from simple learning objects as a supplement to in-person instruction, all the way to the utilization of virtual worlds in the classroom. He has been collaborating for years with James Braman, co-authoring several published works including the edited volume titled Multi-User Virtual Environments for the Classroom: Practical Approaches to Teaching in Virtual Worlds. Vincenti and Braman are also leading e-learning projects for the Institute of Computer Sciences, Social Informatics, and Telecommunications Engineering (ICST). In addition, Dr. Vincenti also serves as a consultant to companies and universities that focus on online learning.
Top

Editorial Board

  • Doris Lidtke, Towson University, USA    
  • Gabriele Meiselwitz, Towson University, USA                            
  • Donna Tupper, Community College of Baltimore County Maryland, USA            
  • Yuanqiong Wang, Towson University, USA
  • Cecelia Wright Brown, University of Baltimore, USA