skip to main content
article
Free Access

Excerpt from cyberethics: morality and law in cyberspace

Published:01 March 2000Publication History
First page image

References

  1. 1 David Johnson and David Post, "How Shall the Net be Governed," available at http:/ /www.cli.org/X0025_LBFIN.html.Google ScholarGoogle Scholar
  2. 2 Howard Rheingold, The Virtual Community: Homesteading on the Electronic Frontier, (Reading, MA: Addison-Wesley, 1993), p. 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 America Banana Co. v. United Fruit Co. 213 U. S. 347, 357 (1909).Google ScholarGoogle Scholar
  4. 4 Tony Walker, "China's Wave of Internet Surfers," The Financial Times, June 24, 1995.Google ScholarGoogle Scholar
  5. 5 David Johnson and David Post, "The Rise of Law on the Global Network," in Brian Kahin and Charles Nesson (eds.) Borders in Cyberspace (Cambridge: MIT Press, 1997), p. 6.Google ScholarGoogle Scholar
  6. 6 David G. Post, "Of Horses, Black Holes, and Decentralized Law-Making in Cyberspace," Paper delivered at Private Censorship/Perfect Choice Conference at Yale Law School, April 9-11, 1999.Google ScholarGoogle Scholar
  7. 7 Seth Finkelstein, "Internet Blocking Programs and Privatized Censorship," The Ethical Spectacle, August, 1998 {http://www.spectacle.org/896/finkel.html}.Google ScholarGoogle Scholar
  8. 8 Lessig, "Tyranny in the Infrastructnre," Wired, 5.07, p. 96.Google ScholarGoogle Scholar
  9. 9 Michel Foucault, Power and Knowledge: Selected Interviews and Other Writings trans. C. Gordon (New York: Random House, 1980), p. 112.Google ScholarGoogle Scholar
  10. 10 Michel Foucault, The History of Sexuality, Volume I, trans. R. Hurley (New York: Vintage Books, 1978), p. 95.Google ScholarGoogle Scholar
  11. 11 Lessig, "The Laws of Cyberspace," available at http://cyber.harvard.edu/lessig.html.Google ScholarGoogle Scholar
  12. 12 David Shapiro, The Control Revolution, (New York: Century Foundation Books, 1999), p. 73.Google ScholarGoogle Scholar

Index Terms

  1. Excerpt from cyberethics: morality and law in cyberspace
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCAS Computers and Society
        ACM SIGCAS Computers and Society  Volume 30, Issue 1
        March 2000
        34 pages
        ISSN:0095-2737
        DOI:10.1145/572217
        Issue’s Table of Contents

        Copyright © 2000 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 March 2000

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader