Computing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society – it is embedded in, and affects, all aspects of life, from education to healthcare to war. Dealing with the implications of this is a major challenge, and one that can impact upon us, both personally and professionally. As a consequence, it is vital that all in the computing industry make wise decisions regarding their conduct.
Using case studies and discussion topics drawn from entertaining real world examples, Pandora’s Box examines the background of a wide range of vital contemporary issues, encouraging readers to examine the social, legal and ethical challenges they will face in their own careers.
Written in an engaging style and packed with international examples, this book addresses topics which have come to the forefront of public consciousness in recent years, such as online crime, piracy and peer to peer file sharing. Comprehensive coverage is provided of digital entertainment, censorship and privacy issues, presenting a rich source of context in which to consider ethical matters.
Suitable for students on computer science degree programmes, as well as those taking IT related modules on other courses which consider the impact of technology on 21st century living, Pandora’s Box is an essential read and a unique and timely textbook.
Lessig's Four Modalities Analysis.
Prophet and Loss: Failing to Foresee the Future.
Information System Partition.
The Law is an Ass.
The Digital Divide.
Servant or Master: Computers Making Decisions
Can Laws be Immoral?
Genetically Modified Food, Technologically Modified Humans.
The Haves and the Have-nots.
2. Emergence and Convergence of Technologies.
The Rise of Print Media.
The Rise of the Telegraph and Telephone.
The Rise of Broadcast Media.
The Rise of The Computing Industry.
The Rise of the Content Industry.
The Rise of the Internet.
Content Producers and Distributors.
Platform Producers and Content Producers or Publishers.
Corporate Production vs Individual Creativity.
Market Sector Integration
The Big Challenges Ahead.
Fit for Purpose?
Competing with Free Beer.
3. Digital Entertainment.
The Effects of Digital Entertainment Technology.
Digital Entertainment - Friend or Foe?
The Toy Town Divide.
Boys and Girls Come Out to Play: Stereotyping.
Health Related Issues.
Curse of the Couch Potato Children.
Digital Equipment - Part of the Modern Family.
Does Television Cause Adverse Social Behaviour?
Creating Monsters - Do Computer Games Make People Violent?
Do Computer Games Fuel Addiction and Gambling.
Power to the Player - Benefits of Computer Games.
Harnessing the Power of the Brain.
Education and Learning.
The Silver Gamers.
Game Development Grows Up - The Hidden Agenda.
Should Computer Games be Regulated? Rated? Censored?
Couch Potato Syndrome.
Online Gambling: Menace or Natural Progression?
4. Censorship and Freedom of Speech.
Reasons for Censorship.
Censorship By States.
Censorship of Speakers by Governments.
Censorship of Listeners by Governments.
Censorship by Private Actors.
Censorship of Speakers by Private Actors.
Censorship of Listeners by Private Actors.
Technology for Expression.
Technological Developments with Expressive Power.
Censoring Internet Content.
Client-Server and Peer-to-Peer.
Yahoo! France Nazi Memorabilia.
ISP Liability for Content.
BT and the IWF.
5. Sex and Technology.
The Nature of Sexual Material.
One Man's Art....
The Medium and the Message.
Use of Technology to (Re)Produce Sexual Material.
Anonymity: Reality and Illusion.
Online Sex and Real Relationships.
The Future of Online Sex: TeleDildonics?
Regulating Sex in Cyberspace.
Not in Front of the Children; Protecting Children from Sex Online.
Surfing to a Naked Beach.
'Satisfy Her in Bed': Sex Spam to Minors.
Types of Material.
Prohibition, Harm, Possession and Distribution.
Jurisdictional Anomalies and Conflicts.
Discovery, Defence and Mitigation.
Freedom of Speech v Censorship of Sexual Material.
The Toby Studabaker Case.
6. Governance of the Internet.
The Internet Protocols.
The Origins of the Internet.
The Root of All Evil.
Alternative Root Servers.
Commercialization, Ownership and Corporate Identity.
Trademarks in Domain Names.
The Uniform Dispute Resolution Process.
The Nominet Dispute Resolution Process.
Criticisms of Dispute Resolution.
Do Trademarks Matter in Domain Names? In URLs?
The Future of Internet Governance.
ICANN, DoC, EU and ccTLDs.
Wiring the World: Who Really Owns 'The Internet'?
Should trademarks be valid in domain names?
What governance should ICANN have? UN-based, US-based, EU-based, anarchy?
What and how many top-level domains should there be? .
7. Privacy and Surveillance.
Cryptography and Steganography.
Definition of Privacy.
Communication Technology and Eavesdropping.
Identity of Eavesdropper and Legality of Eavesdropping.
Data Protection Issues in EU Law.
Data Protection Issues in US Regulation.
International Movement of Data.
Data Protection Not Impediment to Life.
Big Brother is Watching You: CCTV.
Big Brother in the Making? Automated CCTV Processing.
Technological Privacy and Surveillance.
Leaving Little Trace: Anonymity in the Digital World?
Availability of Cryptography and Steganography.
Data Retention by ISPs.
8. Information Age Warfare.
History of Warfare.
The Technology of War.
Satellites - The View from Space.
Star Wars Technology.
Robo - Soldier.
Man or Machine.
The Unseen Enemy.
Mobile Phones as Weapons.
Intelligence Gathering and Surveillance.
Working for Arms Manufacturers.
Cyberterrorism: Real Threat or Virtual Bogeyman?
Overall Benefit or Drain on Resources?
9. Technology and the Human Body.
Health Information Systems.
Electronic Patient Records.
Intranets, Internet, and Call Centres.
Factors for Success.
Power to the Patient.
Internet, CD and Games.
Online Body Trafficking.