Bibliographic record and links to related information available from the Library of Congress catalog.
Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.
Contents Preface 1 Introduction The Introduction to the Introduction Case Study 1.1: The Canadian Cyborg User Friendly Cartoon 003880 Lessig's Four Modalities Analysis Figure: Four Modalities Graphic Prophet and Loss: Failing to Foresee the Future Information System Partition The Law is an Ass Case Study 1.2: Tati v Kitetoa Globalization The Digital Divide Discussion Topics: Can Laws be Immoral? Genetically Modified Food, Technologically Modified Humans The Haves and the Have-nots Related Reading 2 Emergence and Convergence of Technologies Introduction User Friendly Cartoon 005020 Emergence The Rise of Print Media The Rise of the Telegraph and Telephone The Rise of Broadcast Media Case Study 2.1: The Failure of On Digital Case Study 2.2: The Failure of On Digital The Rise of The Computing Industry The Rise of the Content Industry The Rise of the Internet Capitalism and Commercialization Convergence Content Producers and Distributors Case Study 2.3: The Biggest Media Merger in History Platform Producers and Content Producers/Publishers Corporate Production v Individual Creativity Market Sector Integration Case Study 2.4: 3rd Generation Phones, 1st Order Mistake? Commerce, Monopoly and Competition Digitization Case Study 2.5: Global Media, Local Regulation The Big Challenges Ahead Discussion Topics Fit for Purpose? E-Tax Competing with Free Beer Related Reading 3 Digital Entertainment Introduction User Friendly Cartoon 005843 A Short History of Entertainment Technology Linear Visual Entertainment Case Study 3.1: Satellite v Cable v Terrestrial Broadcast Linear Audio Entertainment Video Games Computer Games User Friendly Cartoon 005848 Case Study 3.2: EverQuest and Lineage The Effects of Digital Entertainment Technology Digital Entertainment - Friend or Foe? The Toy Town Divide Boys and Girls Come Out to Play: Stereotyping Health Related Issues Curse of the Couch Potato Children Physical Problems Digital Equipment ? Part of the Modern Family Does Television Cause Adverse Social Behaviour? Creating Monsters - Do Computer Games Make People Violent? Case Study 3.3: Grand Theft Auto: Murder Training? Do Computer Games Fuel Addiction and Gambling Power to the Player ? Benefits of Computer Games Harnessing the Power of the Brain Education & Learning The Silver Gamers Game Development Grows Up ? The Hidden Agenda Discussion Points Should Computer Games be Regulated? Rated? Censored? Couch Potato Syndrome Online Gambling: Menace or Natural Progression? Related Reading 4 Censorship and Freedom of Speech Introduction Reasons for Censorship User Friendly Cartoon 006112 Censorship By States Case Study 4.1: The Great Firewall of China Censorship of Speakers by Governments Case Study 4.2: Thefreeworld.net Censorship of Listeners by Governments Censorship by Private Actors Censorship of Speakers by Private Actors Censorship of Listeners by Private Actors Technology for Expression Technological Developments with Expressive Power Censoring Internet Content Case Study 4.3: www.thinkofthechildren.co.uk Case Study 4.4: Freenet Client-Server and Peer-to-Peer Discussion Topics France Yahoo! Nazi Memorabilia ISP Liability for Content BT and the IWF Related Reading 5 Sex and Technology Introduction The Nature of Sexual Material Dilbert Cartoon 030821 One Man's Art... The Medium and the Message Use of Technology to (Re)Produce Sexual Material Techno-Sex User Friendly Cartoon 009426 Anonymity: Reality and Illusion Case Study 5.1: Accessing Sexual Material at Work Anon Servers Online Sex and Real Relationships The Future of Online Sex: TeleDildonics? Regulating Sex in Cyberspace Case Study 5.2: Ethics v Professionalism Not in Front of the Children; Protecting Children from Sex Online Surfing to a Naked Beach 'Satisfy Her in Bed': Sex Spam to Minors Online Friendships Child Pornography Types of Material Operation Ore Prohibition, Harm, Possession and Distribution Jurisdictional Anomalies and Conflicts Discovery, Defence and Mitigation Discussion Topics Freedom of Speech v Censorship of Sexual Material The Toby Studabaker Case Related Reading 6 Governance of the Internet Introduction Userfriendly Cartoon 004129 The Internet Protocols (TCP/IP) The Origins of the Internet Case Study 6.1: Chinese State Control over the .cn ccTLD Early Arguments IANA, IETF and the DNS Root The Root of All Evil Commercialization ICANN ccTLDs Alternative Root Servers Commercialization, Ownership and Corporate Identity Trademarks Case Study 6.2: Apple Corp v Apple Inc. Trademarks in Domain Names Case Study 6.3: VeriSign's Site Finder: All Your Typos Are Belong To Us Case Study 6.4: Sex.com The Uniform Dispute Resolution Process The Nominet Dispute Resolution Process Criticisms of Dispute Resolution Do Trademarks Matter in Domain Names? In URLs? The Future of Internet Governance ICANN, DoC, EU and ccTLDs Wiring the World: Who Really Owns 'The Internet'? Discussion Topics Should trademarks be valid in domain names? What governance should ICANN have? UN-based, US-based, EU-based, anarchy? What and how many top-level domains should there be? Related Reading 7 Privacy and Surveillance Introduction New Yorker Cartoon Cryptography and Steganography Case Study 7.1: 'The Worst Boyfriend in the World' Definition of Privacy Communication Technology and Eavesdropping Identity of Eavesdropper and Legality of Eavesdropping The Whole is Greater than the Sum of its Parts Case Study 7.2: Unproved Allegations and Future Crime General Data Protection Detailed Data Protection Issues: EU Law Detailed Data Protection Issues: US Regulation Case Study 7.3: Victoria's Not-So-Secret Online Shopping Info International Movement of Data Data Protection Not Impediment to Life Big Brother is Watching You: CCTV Big Brother in the Making? Automated CCTV Processing Privacy Post-9/11 Technological Privacy and Surveillance User Friendly Cartoon 004377 Discussion Topics Leaving Little Trace: Anonymity in the Digital World? Availability of Cryptography and Steganography Data Retention by ISPs Related Reading 8 Information Age Warfare Introduction User Friendly Cartoon 006151 History of Warfare Case Study 8.1: Internet How To Guide to Terrorism The Technology of War Case Study 8.2: War News Cyber Wars Satellites - The View from Space Star Wars Technology Network-centric warfare Case Study 8.3: WiFi Landmines The Battlefield Robo ? Soldier Man or Machine The Unseen Enemy Mobile Phones as Weapons War Games Information dominance User Friendly Cartoon 006225 Intelligence Gathering and Surveillance Discussion Topics Working for Arms Manufacturers Cyberterrorism: Real Threat or Virtual Bogeyman? Overall Benefit or Drain on Resources? Related Reading 9 Technology and the Human Body Introduction Dilbert Cartoon 020206 Health Information Systems Treatment Electronic Patient Records (EPR) Ebooking Eprescribing Intranets, Internet, and Call Centres Factors for Success Power to the Patient Internet, CD and Games Television Programmes Digital Television Self-diagnosis Kits Online Pharmacies Online Body Trafficking Techno-Medicine Telemedicine Training and Supporting Nurses & Doctors Virtual Therapy Robots in Hospitals Smart Monitoring Case Study 9.1: High Tech Nursing Home Computer Modelling Case Study 9.2: Computer Modelling to Track Tuberculosis Assistive Technology and Rehabilitation New Medical Technologies Implants for Diagnosis and Healing Implants and Prosthetics for Replacement and Reconstruction Artificial Eyes Intelligent Limbs Face Transplants Brain Implants Digital Flesh & Cyborgs Case Study 9.3: Implantation of Direct Neural Interfaces Discussion Topics The Longevity and Social Justice Debate Owning the Code of Life What is a Human? Related Reading 10 Professionalism in IT What is Professionalism? Dilbert Cartoon 050428 Case Study 10.1: Discovery of Customer Malfeasance Conduct Case Study 10.2: Health and Safety Practice Sanction Whistleblowing Safety Critical Software Discussion Topics Self-Incrimination Responsibility for DDoS Attacks Whistleblowing Insecurity Related Reading 11 Online Crime and Real Punishment Introduction User Friendly Cartoon 005863 A Very Brief History of Crime and Computers Computer Fraud Phishing Malware A Taxonomy of Malware Problems Caused by Malware Malware Authors: Who, How and Why? Hoaxes and Life Imitating Art User Friendly Cartoon 005865 Virus Checking and Auto-Notifying Computer Security: Cops and Robbers, Poachers and Gamekeepers Historical Roots of Cracking Case Study 11.1: The 8.5 Second Crack Who are the Crackers? Case Study 11.2: Princeton Crack Yale Admissions System Vulnerability, Risk and Threat The Closed v Open Security Debate Walking the Tightrope: Social Pressures on Security Fields/Fences/Gates or Buildings/Walls/Doors or How Much Security Should be Necessary? Poachers and Gamekeepers Laws Against Computer Misuse UK Computer Misuse Act US Sequence of Laws Council of Europe Convention on Cybercrime Case Study 11.3: Gary McKinnon's Extradition The Growing Problem of Computer Crime Discussion Topics White Hat Cracking Should Be Legalized Web Scrapers and Robot Denial Files An Immune System for the Internet Related Reading 12 Patents and Copyright Introduction User Friendly Cartoon 004079 Intellectual Property? The Philosophical Basis of Patents and Copyright Patents A Brief History of Patents The Modern Patent Systems Business Method and Software Patents User Friendly Cartoon 005277 General Criticisms of Patents Patent Licensing Companies Copyright Origins and Development of Copyright The Main Provisions of Modern Copyright Statutes Case Study 12.1: Sklyarov The Main Case Law of Copyright in the US Case Study 12.2: Napster The State of Play Caser Study 12.3: The Music Industry and Higher Education User Friendly Cartoon 004083 Software Copyright Copyright and the Architecture of Cyberspace Related Issues Free Culture Discussions Topics Is copyright the correct way to reward artists? Does it actually promote artistic activity? Lack of Legitimate Downloads Caused the Rise of Napster et al A New Basis for Copyright Law is Required Control and the Copyright Bargain Related Reading 13 Unwanted Electronic Attentions Introduction User Friendly Cartoon 003693 Unsolicited Communication Type of Communication Medium of Communication The Economics of Unsolicited Contacts Why Companies Use Unsolicited Contact Case Study 13.1: UK MPs Read No Evil Case Study 13.2: Comment Spam, No-Google Meta-tag and Googlebombing User Friendly Cartoon 006839 Social, Legal and Technological Discouragement Malicious Unwanted Attentions Online and Telephone Fraud Electronic Stalking Case Study 13.3: Jake Baker Online Grooming Discussion Topics Tackling Spam at the Transport Layer Opt-In, Opt-Out, Shake It All About Freedom of Speech or Online Stalking Related Reading 14 Education and Online Learning Introduction User Friendly Cartoon 006502 From the Chalkboard to the Virtual Classroom Technologies for Styles Developing the Technological Classroom The Learner Perspective The Teacher Perspective The Administration Perspective Electronic Learning Resources Online Information Systems Case Study 14.1: The Open University and Friends Mobile Education (M-Learning) Assessment and Authentication Plagiarism Case Study 14.2: Honor System Breakdown: University of Virginia Case Study 14.3: Failure of the UKeU Case Study 14.4: JISC Online Plagiarism Service Accessibility of Education in a Wired World Discussion Topics One Person's Plagiarism is Another's Research Overseas Education vs Distance Education The Net of a Million Lies Related Reading 15 Living and Working in a Wired World Introduction User Friendly Cartoon 005627 The Digital Lifestyle The Work and Home Environment UK Employers Not Entitled to Secretly Monitor Email Smarter Travel Smarter Homes Shopping The Sporting Life Technology and the Individual Education Health Crime Religion Communication The Changing Face of Communication Case Study 15.1: Flash Mobs ? a New Technology-Driven Social Event The Global Village User Friendly Cartoon 005758 The Digital Divide Case Study 15.2: Hewlett Packard (HP) Closes the Digital Divide The Digital Divide in the Industrialized World The Digital Divide Between the Nations Discussion Topics The Language of the Digital Age Digital Relationships Digital Divides Related Reading
Library of Congress Subject Headings for this publication:
Technology -- Social aspects.
Technology -- Moral and ethical aspects.