Ethical and Social Issues in Cyberspace

  • Joseph Migga Kizza
Part of the Undergraduate Texts in Computer Science book series (UTCS)


When William Gibson first coined the word cyberspace in his novel Neuromancer, he was describing the vision of a three-dimensional space of pure information consisting of networks of computers linking people, machines, and other objects as information sources and sinks. This space offered a high degree of movement, enabling users to navigate cyberspace, or to surf, as it is now commonly referred to. A cyberspace user is represented in the space as a packet of pure information moving from a source node to a destination node as needed.


Intellectual Property Electronic Commerce Trade Secret Global Culture Electronic Payment System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Rosenberg, Matt. “Copyrights Law Meets the World Wide Web.” Crossroads,2(2), 1995. Available:
  2. 2.
    Leesing, Larry, David Post, and Eugene Vololch. “Copyright Law in Cyberspace, Cyberspace Law Institute for Non-Lawyers.” Available:
  3. 3.
    The Net [motion picture]. Available:
  4. 4.
    Lewis, Peter. “Limiting a Medium without Boundaries.” New York Times, January 15, 1996, Dl.Google Scholar
  5. 5.
    Ang, Deng, and Balinda Nadarajan. “Censorship and the Internet: A Singapore Perspective.” Communications of the ACM, 39 (6), 1996, pp. 72–78.CrossRefGoogle Scholar
  6. 6.
    Miller, Micheal. “A Bad Dream Comes True in Cyberspace.” Newsweek, January 1, 1996, pp. 26–31.Google Scholar
  7. 7.
    New Survey Finds Internet Use Surging.“ CNN Interactive, January 1996. Available:
  8. 8.
    Brandt, Daniel. “Cyberspace Wars: Microproceesing vs Big Brother.” NameBase NewsLine 2, July-August 1993. Available:
  9. 9.
    Bhimani, Anish. “Securing the Commercial Internet.” Communications of the ACM, 39 (6), 1996, pp. 29–35.CrossRefGoogle Scholar
  10. 10.
    Ganesan, Revi. “How to Use the Key Escrow.” Communications of the ACM, 39 (3), 1996, p. 33.MathSciNetGoogle Scholar
  11. 11.
    Murray, Williams. “Who Holds the Keys.” Communications of the ACM, 35 (7), 1992, pp. 1315.CrossRefGoogle Scholar
  12. 12.
    Panurach, Patiwat. “Money in Electronic Commerce:Digital Cash, Electronic Fund Transfer, and Ecash.” Communications of the ACM, 39 (6), 1996, pp. 45–50.CrossRefGoogle Scholar
  13. 13.
    Security: VISA and MasterCard Join Forces for Security.“ Available:
  14. 14.
    Kung, Hans. “Declaration Towards a Global Ethic.” Available:
  15. 15.
    Internet as `Intellectual Colonialism?“ The Council Chronicle, June 1996, p. 6.Google Scholar
  16. 16.
    The 1997 American Internet User Survey“ FIND/SVP—Emerging Technologies Research Group. AvailableGoogle Scholar
  17. 17.
    Korpela, Jukka. “English—the Universal Language on the Internet?” AvailableGoogle Scholar
  18. 18.
    Leonard, Andrew. “Slouching Towards Babel?” Available:
  19. 19.
    Engst, Adam. “Need to Know: The Electronic Lingua Franca.” Available:
  20. 20.
    Hauben, Micheal. “Culture and Communication: Interplay in the New Public Commons—Usenet and Community Networks.” Available:
  21. 21.
    North, Tim. “The Internet and Usenet Global Networks: An Investigation of Their Culture and Its Effects on New Users [on-line].”Google Scholar

Further Reading

  1. Borestein, Nathaniel. “Perils and Pitfalls of Practical Cybercommerce.” Communications of the ACM,39(6), 1996, pp. 36–44.CNN Headline News, January 15, 1996. Available:
  2. Denning, D., and Dannis K. Branstad. “A Taxonomy for Key Escrow Encryption Systems.” Communications of the ACM, 39 (3), 1996, pp. 34–39.CrossRefGoogle Scholar
  3. Domin, Rusty. “The Internet: Will It Last or Fade into the Past?” CNN Interactive. Available:
  4. Kung, Hans. “The Principle of a Global Ethic.” Available:
  5. Levy, Steven, “Prophet of Privacy.” Wired, November 1994, p. 126.Google Scholar
  6. Maher, David. “Crypto Backup and Kew Escrow.” Communications of the ACM, 39 (3), 1996, pp. 48–53.CrossRefGoogle Scholar
  7. Pyle, Raymond. “Electronic Commerce and the Internet.” Communications of the ACM, 39 (6), 1996, p. 23.CrossRefGoogle Scholar
  8. Samuelson, Pamela. “Intellectual Property Rights and the Global Information Economy.” Communications of the ACM, 39 (1), 1996, pp. 23–28.CrossRefGoogle Scholar
  9. Sterling, Bruce. “History of the Internet.” Available: http://www.gopher.iso.70/internet/history/
  10. Walker, Stephen, Steven Lipner, Carl Ellison, and David Balenson. “Commercial Key Recovery.” Communications of the ACM, 39 (3), 1996, pp. 41–47.Google Scholar

Copyright information

© Springer Science+Business Media New York 1998

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer Science and Electrical EngineeringUniversity of Tennessee at ChattanoogaChattanoogaUSA

Personalised recommendations