Topics in Ethics & Technology
Topics
Listed here are a number of titles to guide you towards your term paper topic. You are not limited to these titles or topics. The items listed are books but you are encouraged to research any topic of interest in the databases, as well.
Topics
Sex, Laws and Cyberspace by
Call Number: 345.730268 W191sISBN: 0805047670Publication Date: 1996-02-01A groundbreaking study of the legal issues and ethical debates surrounding the international growth of the Internet and commercial online services. The authors examine the pressure on the government to regulate this new media, scrutinize the ongoing battles, and interview key players in both pro- and anti-regulation camps. Ultimately, they offer a framework for a workable regulatory compromise in the arena of free speech. "Required reading for anyone interested in free speech in modern society."The New York Times Book Review.Access Denied by
Call Number: eBookISBN: 9780262042451Publication Date: 2008-02-29Many countries around the world block or filter Internet content, denying access to information--often about politics, but also relating to sexuality, culture, or religion--that they deem too sensitive for ordinary citizens. Access Denied documents and analyzes Internet filtering practices in over three dozen countries, offering the first rigorously conducted study of this accelerating trend.Consent of the Networked by
Call Number: eBookISBN: 9780465029297Publication Date: 2012-01-31The Internet was going to liberate us, but in truth it has not. For every story about the web’s empowering role in events such as the Arab Spring, there are many more about the quiet corrosion of civil liberties by companies and governments using the same digital technologies we have come to depend upon. Sudden changes in Facebook’s features and privacy settings have exposed identities of protestors to police in Egypt and Iran. Apple removes politically controversial apps at the behest of governments as well as for its own commercial reasons. Dozens of Western companies sell surveillance technology to dictatorships around the world. Google struggles with censorship demands from governments in a range of countries—many of them democracies—as well as mounting public concern over the vast quantities of information it collects about its users. In Consent of the Networked, journalist and Internet policy specialist Rebecca MacKinnon argues that it is time to fight for our rights before they are sold, legislated, programmed, and engineered away. Every day, the corporate sovereigns of cyberspace make decisions that affect our physical freedom—but without our consent. Yet the traditional solution to unaccountable corporate behavior—government regulation—cannot stop the abuse of digital power on its own, and sometimes even contributes to it. A clarion call to action, Consent of the Networked shows that it is time to stop arguing over whether the Internet empowers people, and address the urgent question of how technology should be governed to support the rights and liberties of users around the world.The Net Delusion by
Call Number: eBookISBN: 9781610391634Publication Date: 2012-02-28Updated with a new Afterword “The revolution will be Twittered!” declared journalist Andrew Sullivan after protests erupted in Iran. But as journalist and social commentator Evgeny Morozov argues in The Net Delusion, the Internet is a tool that both revolutionaries and authoritarian governments can use. For all of the talk in the West about the power of the Internet to democratize societies, regimes in Iran and China are as stable and repressive as ever. Social media sites have been used there to entrench dictators and threaten dissidents, making it harder—not easier—to promote democracy. Marshalling a compelling set of case studies, The Net Delusion shows why the cyber-utopian stance that the Internet is inherently liberating is wrong, and how ambitious and seemingly noble initiatives like the promotion of “Internet freedom” are misguided and, on occasion, harmful.Community,Space and Online Censorship: Regulating Pornotopia by
Call Number: eBookISBN: 0754673081Publication Date: 2009-07-28Internet censorship is a controversial topic - while the media periodically sounds alarms at the dangers of online life, the uncontrollable nature of the internet makes any kind of pervasive regulatory control impossible. This book compares the Australian solution, a set of laws which have been criticized as being both draconian and ineffectual, to major regulatory systems in the UK and US and understanding what drives them. The 'impossibility' of internet regulation opens deeper issues - what do we mean by regulation and how do we judge the certainty and effectiveness of law? These questions lead to an exploration of the theories of legal geography which provide tools to understand and evaluate regulatory practices. The book will be a valuable guide for academics, students and policy makers working in media and censorship law, those from a civil liberties interest and people interested in internet theory generally.
Cyber Bullying by
Call Number: 302.34 K88cISBN: 1405159928Publication Date: 2008-01-01This book provides the most current and essential information on the nature and prevalence of this epidemic. Examining the latest research, the authors have utilized vital studies involving over 3,500 middle school students, online research projects and the use of social network sites, and data from focus groups of victims and perpetrators and their parents. It also provides educators, parents, psychologists, and policy-makers with critical prevention techniques and strategies for effectively addressing electronic bullying.Adolescent Online Victimization by
Call Number: eBookISBN: 159332345XPublication Date: 2009-08-01Marcum investigates Internet usage among college freshmen, their experiences with online victimization, and their relationships with online contacts. She finds that participating in online behaviors and activities that increased exposure to motivated offenders and target suitability also increased the likelihood of victimization, as well as formation of relationships with online contacts. Communicating with people met online and providing personal information over the Internet are significant predictors of the dependent variables for the entire sample, as well as for males and females when examined separately. Conversely, taking protective measures against victimization to improve guardianship did not decrease the likelihood of victimization.Dealing with Bullying by
Call Number: eBookISBN: 9781921507533Publication Date: 2011Bullying is the deliberate desire by one or more people to hurt, threaten or frighten someone with words, behaviour or actions. Bullying can be verbal, physical, social or psychological and is one of the major issues facing young people today. It occurs at school, in the workplace, and even online as cyberbullying – it is very common, and it can happen to anyone. Bullying can have devastating impacts on victims, and it can also have detrimental effects on all involved, including bullies. This book identifies the various forms of bullying, explains its causes and effects, and presents advice on how to develop strategies in schools, workplaces and online to deal with bullying behaviour. Banish bullying – don’t put up with it, deal with it. 3 chapters: Bullying at school; Cyberbullying; Bullying at work. Also includes: Worksheets and activities ; Fast facts ; Glossary ; Web links ; Index. Sources of information: Titles in the ‘Issues in Society’ series are individual resource books which provide an overview on a specific subject comprised of facts and opinions. The information in this resource book is not from any single author, publication or organisation. The unique value of the ‘Issues in Society’ series lies in its diversity of content and perspectives. The content comes from a wide variety of sources and includes: Newspaper reports and opinion pieces ; Website fact sheets ; Magazine and journal articles ; Statistics and surveys ; Government reports ; Literature from special interest groups. Critical evaluation: As the information reproduced in this book is from a number of different sources, readers should always be aware of the origin of the text and whether or not the source is likely to be expressing a particular bias or agenda.Girls on the Edge by
Call Number: eBookISBN: 9780465015610Publication Date: 2010-04-27Girls are cutting themselves with razors. Girls are convinced they’re fat, and starve themselves to prove it. Other girls are so anxious about grades they can’t sleep at nightat eleven years of age. What’s going on? In Girls on the Edge, Dr. Leonard Sax provides the answers. He shares stories of girls who look confident and strong on the outside, but are fragile within. He shows why a growing proportion of teen and tween girls are confused about their sexual identity, or are obsessed with grades or Facebook. Dr. Sax provides parents with tools to help girls become confident women, along with practical tips on helping your daughter choose a sport, nurturing her spirit through female centered activities, and more. Compelling and inspiring, Girls on the Edge points the way to a new future for today’s young women.Children, Adolescents, and the Media by
Call Number: 302.23083 S897cISBN: 0761921257Publication Date: 2002-03-19An overview of what is known about the impact of mass media on youth in the 21st century. The goal is to provide a comprehensive, research-oriented treatment of how children and adolescents interact with the media.
The Digital Rights Movement by
Call Number: eBookISBN: 9780262017954Publication Date: 2012-10-05The movement against restrictive digital copyright protection arose largely in response to the excesses of the Digital Millennium Copyright Act (DMCA) of 1998. In The Digital Rights Movement, Hector Postigo shows that what began as an assertion of consumer rights to digital content has become something broader: a movement concerned not just with consumers and gadgets but with cultural ownership. Increasingly stringent laws and technological measures are more than incoveniences; they lock up access to our "cultural commons." Postigo describes the legislative history of the DMCA and how policy "blind spots" produced a law at odds with existing and emerging consumer practices. Yet the DMCA established a political and legal rationale brought to bear on digital media, the Internet, and other new technologies. Drawing on social movement theory and science and technology studies, Postigo presents case studies of resistance to increased control over digital media, describing a host of tactics that range from hacking to lobbying. Postigo discusses the movement's new, user-centered conception of "fair use" that seeks to legitimize noncommercial personal and creative uses such as copying legitimately purchased content and remixing music and video tracks. He introduces the concept of technological resistance -- when hackers and users design and deploy technologies that allows access to digital content despite technological protection mechanisms -- as the flip side to the technological enforcement represented by digital copy protection and a crucial tactic for the movement.News Piracy and the Hot News Doctrine by
Call Number: eBookISBN: 1593320752Publication Date: 2005-04-01Ekstrand explores the legal protections for the newsman's scoop, the hot news doctrine. This U.S. Supreme Court doctrine, now more than 80 years old, protects facts for a short period after publication -- in direct opposition to U.S. copyright law, which dedicates facts to the public domain. It remains highly controversial, but extremely valuable - not only to news organizations who seek its protections but now to others who seek to protect facts within highly complex and profitable digital databases. Though imperfect and ill-defined, the hot news doctrine may offer the best measured approach to protections for uncopyrighted works delivered by new technologies.
The Digital Rights Movement by
Call Number: eBookISBN: 9780262017954Publication Date: 2012-10-05The movement against restrictive digital copyright protection arose largely in response to the excesses of the Digital Millennium Copyright Act (DMCA) of 1998. In The Digital Rights Movement, Hector Postigo shows that what began as an assertion of consumer rights to digital content has become something broader: a movement concerned not just with consumers and gadgets but with cultural ownership. Increasingly stringent laws and technological measures are more than incoveniences; they lock up access to our "cultural commons." Postigo describes the legislative history of the DMCA and how policy "blind spots" produced a law at odds with existing and emerging consumer practices. Yet the DMCA established a political and legal rationale brought to bear on digital media, the Internet, and other new technologies. Drawing on social movement theory and science and technology studies, Postigo presents case studies of resistance to increased control over digital media, describing a host of tactics that range from hacking to lobbying. Postigo discusses the movement's new, user-centered conception of "fair use" that seeks to legitimize noncommercial personal and creative uses such as copying legitimately purchased content and remixing music and video tracks. He introduces the concept of technological resistance -- when hackers and users design and deploy technologies that allows access to digital content despite technological protection mechanisms -- as the flip side to the technological enforcement represented by digital copy protection and a crucial tactic for the movement.Cybercrime and the Law by
Call Number: eBookISBN: 9781555537982Publication Date: 2012-11-13The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique to investigations in a digital environment, Brenner examines both national law enforcement agencies and transnational crime, and shows how cyberspace erodes the functional and empirical differences that have long distinguished crime from terrorism and both from warfare.@ Is for Activism by
Call Number: eBookISBN: 9781849645393Publication Date: 2010-01-01Examines the transformation of politics through digital media, including digital television, online social networking and mobile computing.Digital Activism Decoded by
Call Number: eBookISBN: 9781932716603Publication Date: 2010-04-01The media have recently been abuzz with cases of citizens around the world using digital technologies to push for social and political change-from the use of Twitter to amplify protests in Iran and Moldova to the thousands of American nonprofits creating Facebook accounts in the hopes of luring supporters. These stories have been published, discussed, extolled, and derided, but the underlying mechanics of this practice of digital activism are little understood. This new field, its dynamics, practices, misconceptions, and possible futures are presented together for the first time in Digital Activism Decoded.Privacy and Information Rights by
Call Number: eBookISBN: 9781921507786Publication Date: 2012We live in a public age in which the free flow of personal information is increasingly exposed to serious invasions of privacy. Privacy protection is a growing concern in relation to how people use rapidly advancing technology to store and share their personal information with family, friends, organisations and governments. Many Australians daily interactions are conveyed by social networking websites and mobile phones, and can involve sharing personal and financial data online, often under the watchful eye of CCTV surveillance but are our privacy laws and protections keeping pace with technological change? Although people are able to complain about the misuse of their personal information to a national information commissioner, Australian laws do not clearly allow a person to take action against a person or entity that seriously violates their privacy. In light of the British medias recent phone hacking scandal, should peoples right to privacy be at the expense of freedom of expression and the freedom of the media to seek out and disseminate information of public interest? Can a balance between these principles be struck? Is anything really private anymore?
Web of Deceit: Misinformation and Manipulation in the Age of Social Media by
Call Number: eBookISBN: 9780910965910Publication Date: 2012-02-01Skilled researchers, journalists, and subject experts have come together in this follow-up to Web of Deception to reveal important lessons for staying safe and retaining privacy online. In the wake of the social media popularity boomepitomized by MySpace, eBay, and Craigslist and accelerating with Facebook and Twitterthe success of internet con artists and thieves has been quick to follow. Manipulators have been provided with the tools and targets to perpetrate hoaxes and con games on an ever larger scale. An invaluable guide to safe internet usage, this resource explains the importance of guarding privacy and identity online, spotting misinformation, avoiding charity scams, and evaluating websites.The (Dis)information Age by
Call Number: eBookISBN: 1433115026Publication Date: 2012-01-20The (Dis)information Age challenges prevailing notions about the impact of new information and media technologies. The widespread acceptance of ideas about the socially transformative power of these technologies demands a close and critical interrogation. The technologies of the information revolution, often perceived as harbingers of social transformation, may more appropriately be viewed as tools, capable of positive and negative uses. This book encourages a more rational and even skeptical approach to the claims of the information revolution and demonstrates that, despite a wealth of information, ignorance persists and even thrives. As the volume of information available to us increases, our ability to process and evaluate that information diminishes, rendering us, at times, less informed. Despite the assumed globalization potential of new information technologies, users of global media such as the World Wide Web and Facebook tend to cluster locally around their own communities of interest and even around traditional communities of geography, nationalism, and heritage. Thus new media technologies may contribute to ignorance about various #65533;others#65533; and, in this and many other ways, contribute to the persistence of ignorance.Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses by
Call Number: eBookISBN: 9781614995289Publication Date: 2015-10-08ICT plays a crucial role in the pursuit of modernization in the countries of Slovenia, Croatia, Albania and Bulgaria, which form the South Eastern European (SEE) region., The quest for Euro-Atlantic integration and the undeniable necessity for direct foreign investment have encouraged the SEE countries to invest in the development of cyber technology, and it has become the dominant area for social, economic and political interaction within the region. This has had both positive and negative consequences.This book presents the proceedings of the NATO Advanced Training Course (ATC), held in Ohrid, former Yugoslav Republic of Macedonia, in December 2014. The ATC addressed serious concerns about terrorist use of cyber technology in South Eastern Europe, which not only has the potential to destabilize regional efforts to create a platform for increased development by creating a breeding ground for the training of extremists and the launching of cyber attacks, but also represents a direct and indirect threat to the security and stability of other NATO partner countries.The book will be of interest to all those involved in countering the threat posed by terrorist use of the Internet worldwide.