Paperback: 312 pages
Publisher: Harvard University Press; Reprint edition (May 7, 2012)
Language: English
ISBN-10: 0674064313
ISBN-13: 978-0674064317
Product Dimensions: 5.8 x 0.8 x 9 inches
Shipping Weight: 15.2 ounces (View shipping rates and policies)
Average Customer Review: 4.0 out of 5 stars See all reviews (6 customer reviews)
Best Sellers Rank: #1,374,620 in Books (See Top 100 in Books) #159 in Books > Computers & Technology > History & Culture > Computer & Internet Law #228 in Books > Law > Legal Theory & Systems > Science & Technology #4130 in Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
This collection of essays discusses abuses of the Internet and offers a variety of possible responses to those abuses. The collection of essays appears to be based on presentations made at a conference entitled "Speech, Privacy, and the Internet: The University and Beyond," which was held at the University of Chicago Law School in November 2008.Collectively, the essays: (1) discuss the nature and extent of Internet abuses; (2) consider how they pose threats to privacy and reputation; (3) propose different solutions to those abuses; and (4) weigh the pros and cons of the freedom of speech and other implications of proposed solutions to Internet abuses. Eleven of the essays provide a legal analysis of Internet abuses, and propose legal solutions to the identified abuses. Two of the essays take a more philosophical approach to discussing Internet abuses. Because the book discusses Internet abuses primarily from a legal perspective, anyone interested in a social, ethical, technological, or business perspective of Internet abuses should look for other books.The book is aimed at readers with training, experience, or background knowledge in law, and is not suitable for casual reading. The emphasis on legal perspectives may be discouraging to some readers, but the nature and significance of the Internet abuses discussed in the book shows that the subject is of importance to more than just the legal community.Readers interested in this book may wish to look at other, non-legalistic books that discuss positive and negative aspects of the Internet and social networking, such as the following: Sherry Turkle,
The Internet resembles the Wild West when it comes to technology. Like many emerging industries the Internet does not need to follow traditional laws. Today anything really goes on the internet and the Communications Decency Act (CDA) allows web providers to use unregulated discussion without any liability. One of the several authors of this book compares this to the defamatory writing on the bathroom walls. This allows people to post things on the internet that would most likely get them into legal trouble in any other communication outlets. These hurtful comments can cause great emotional harm to its intended target. In the book these posters are referred to as juvenile posters, who offer no intellectual or valuable contribution to any internet forum. In layman's terms they are what we refer to us as trolls. As pointed out in the book the bathroom stalls comments are only seen by a few, but on the internet a certain defamatory comments can be seen by thousands. Sometimes legal action can be taken, but the Communication Decency Act lets the web providers off the hook many times. Hurtful or defamatory posts are not only nasty, but can also affect future employment prospects. It is no secret employers use the internet for referencing future employees.Pornography and the objectifying of women is also a growing concern. Never in history has pornography been so assessable. The books state that this gives emotionally unstable individuals the ability to control and look at women as merely objects. This further degrades their already disturbed psychological nature. There are controls available that can stop this content from reaching children, but sometimes it is not effective.These site and blogs are referred to as Cyber-Cesspools by one of the authors.
The Offensive Internet: Speech, Privacy, and Reputation Tor Browser: The 2016 Guide (Ensure Internet Privacy, Access The Deep Web, Hide ... anonymity, Tow Browser, Privacy, Internet, Silk Road, Online Privacy) Speech Therapy for Kids : Techniques and Parents Guide for Speech Therapy (speech therapy, speech therapy materials) The Future of Reputation: Gossip, Rumor, and Privacy on the Internet ESP8266: Programming NodeMCU Using Arduino IDE - Get Started With ESP8266: (Internet Of Things, IOT, Projects In Internet Of Things, Internet Of Things for Beginners, NodeMCU Programming, ESP8266) Speech and Audio Signal Processing: Processing and Perception of Speech and Music Statistical Methods for Speech Recognition (Language, Speech, and Communication) Speech After Stroke: A Manual for the Speech Pathologist and the Family Member No Trace Left: Internet Privacy Tips and Strategies to Protect Your Personal and Financial Information Father of the Bride Speech (The 7-STEP GUIDE to Writing a Sensational Wedding Speech & Toast Book 1) Tor Browser Handbook: Quick Start Guide On How To Access The Deep Web, Hide Your IP Address and Ensure Internet Privacy (Includes a Tor Installation Guide for Linux & Windows + Over 50 Helpful Links) Decisiones: A look inside the legal battle between Salsa music legends Willie Colon and Ruben Blades, and an Iraq War Veteran caught in the middle, fighting for his honor and reputation. Game Faces: Sport Celebrity and the Laws of Reputation (Sport and Society) Google Alerts Essentials: Master the Web, Manage Your Reputation and Become a Magnet for Relevant Conversations Engines of Anxiety: Academic Rankings, Reputation, and Accountability The Reputation Society: How Online Opinions Are Reshaping the Offline World (The Information Society Series) Slut! Growing Up Female with a Bad Reputation "Lucky War" Third Army in Desert Storm - Complete History of Persian Gulf War, Planning a Ground Offensive, General Norman Schwarzkopf, Air Power, Command and Control, Iraq and Kuwait, Yeosock Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Offensive and Defensive Lawfare: Fighting Civilization Jihad in America's Courts (Civilization Jihad Reader Series Book 7)