Cargando…
Tabla de Contenidos:
  • ""Rights and Responsibilities of Participants in Networked Communities""; ""Copyright""; ""Preface""; ""Contents""; ""Executive Summary""; ""1 The Nature of Electronic Networks""; ""A NEW MEDIUM FOR COMMUNICATION""; ""THE NETWORK SCENE""; ""NETWORK METAPHORS""; ""Cyberspace""; ""The Information Superhighway""; ""The Electronic Marketplace""; ""2 Networks and Society""; ""NETWORKS AND CULTURE""; ""CONFLICTING VALUES IN NETWORKED COMMUNITIES""; ""ENFORCEMENT OF BEHAVIORAL NORMS IN NETWORKED COMMUNITIES""; ""HOW CULTURAL NORMS EVOLVE: AN HISTORICAL PERSPECTIVE""
  • ""ETHICS, LAW, AND THE PROMOTION OF SOCIALLY ACCEPTABLE BEHAVIOR""""3 Legal Considerations for Electronic Networks""; ""LEGAL DOMAINS""; ""LEGAL MODELS EXISTING IN THE ELECTRONIC ENVIRONMENT""; ""WHAT IS DIFFERENT ABOUT ELECTRONIC NETWORKS?""; ""LEGAL CONSIDERATIONS THAT AFFECT THE USE OF INFORMATION""; ""COURT CASES LAWYERS RELY ON FOR ARGUMENT""; ""SPECIAL PROBLEMS AND POLICY CONCERNS""; ""SUMMARY""; ""4 Free Speech""; ""SCENARIO 1: EXPLICIT PHOTOS ON A UNIVERSITY NETWORK""; ""Issue: The Law as the Ultimate Authority""; ""Issue: The Need to Establish Rules and Educate Users""
  • ""SCENARIO 2: NEGATIVE COMMENTS HARM A THIRD PARTY""""Issue: Provider Responsibility and Liability""; ""Issue: User Responsibility and Liability""; ""DISCUSSION AND COMMON THEMES""; ""5 Electronic Vandalism""; ""SCENARIO 1: VIRUS DAMAGES BULLETIN BOARD""; ""Issue: Criminal Liability""; ""Issue: Deficiencies in the Laws""; ""Issue: Civil Obligations and Liabilities""; ""SCENARIO 2: MULTISYSTEM INTRUDER DAMAGES FILES""; ""Issue: Trespassing and Theft""; ""Issue: Determining Damage""; ""Issue: Ethics and Education""; ""Issue: Operator Responsibilities and Liabilities""; ""COMMON THEMES""
  • ""6 Intellectual Property Interests""""BACKGROUND: COPYRIGHT PROTECTION""; ""SCENARIO 1: DATABASE AGREEMENT IS VIOLATED""; ""Issue: Licenses, Copyrights, and Enforcement Responsibilities""; ""Issue: Fair Use""; ""Issue: Effects of Property Protection Concerns on Authors and Contributors""; ""SCENARIO 2: FOREIGN USER COPIES ENCRYPTION SOFTWARE""; ""Issue: Obligations to Monitor""; ""Issue: Obligations to Turn Over Records""; ""COMMON THEMES""; ""7 Privacy""; ""SCENARIO 1: OPERATOR LEARNS OF POSSIBLE DEATH THREAT""; ""Issue: Obligation to Notify Authorities of Death Threats""
  • ""Issue: General Provider Practices and Responsibilities""""Issue: Liability for Violating Privacy""; ""Issue: Ethical and Social Issues""; ""SCENARIO 2: PROVIDER SELLS USER PROFILES TO MERCHANDISERS""; ""Issue: Legal Privacy Protection For Subscriber Information""; ""Issue: Informed Consent""; ""Issue: Blocking Unwanted Sales Pitches""; ""COMMON THEMES""; ""8 Common Themes""; ""VALUES AND NORMS IN NETWORKED ENVIRONMENTS""; ""RECURRING CONCERNS""; ""Appendixes""; ""APPENDIX A Network Technology""; ""NETWORK BUILDING BLOCKS""; ""STORE-AND-FORWARD COMMUNICATION""; ""Real-Time Connections""