scispace - formally typeset
Open AccessBook

Cybersins and Digital Good Deeds: A Book About Technology and Ethics

Reads0
Chats0
TLDR
This book discusses cyberbullying, identity theft, hacktivism, and the impact of technology on free speech in schools.
Abstract
* Introduction * Absent Presence * Advertising at School * AMBER Alert * Americans with Disabilities Act (ADA) and Its Impact upon Technology in Schools * Blogging--A Tool for Education and Free Speech * Bride Scams * Camcorders, Surveillance, and Video Voyeurism * Cell Phone Rage * Cell Phones and Driving * Cell Yell * Censorship and Filtering * Cheating at School Using Cell Phone Cameras * Child Online Protection Act and Children's Online Privacy Protection Act * Child Pornography Prevention Act * Children's Internet Protection Act * Computer Addiction * Computer Security * Crackers, Lamers, and Phreaks * Creating an Identity in a Chat Room * Cyberbullying * Cyberchondriacs * Disinformation * Disinhibition * Distance Learning Content Sharing * Distributed Computing * Doctor-Patient Relationships * Domain Hijacking * DRM * eBay and Online Auction Fraud * Elder Care and Technology * E-Mail Addresses and Privacy * Encryption * E-Waste * File Swapping * Firewall * Flame Wars * Flash Mobs * Google Bombing * Google Book Search * Google Stalking * GPS and Privacy * Hackers, Crackers, and Hacking * Hacktivism * Hoaxes * Identity Theft and the Internet * Internet Pornography * Internet User Agreement and the Library * Keystroke Logging * Logging On As an Administrator * Logo Abuse * Marketing to Children * Media and Cognitive Development * Modern Luddites * Monitoring Employees' Internet Use * Movie Duplication * Media Manipulation * Napster * Network Ubiquity * $100 MIT Laptop * Online Gambling * Online Protests * Online Pyramid Schemes * Patriot Act * Phishing * Phreaking * Plagiarism * Podcasting * Privacy and the Internet * Project Guttenberg * RFID * Scare Chains * Script Kiddies * Slander, Libel, and Technology * Social Engineering * Spam * Splogs * Spoofing * Spyware or Adware * Steganography * Surfer's Voice * Sympathy Hoaxes * Technology and Knowledge Management * Technolust * Trojan Horses * Turnitincom * Typosquatting * Virtual Offices * Viruses and Virus Protection * Warchalking * Watching Over Children with High-Tech Tools * Wiki * Wireless Computers and Security * Worm * Index

read more