Chapter 1
1. Explain the difference between deontological theories of ethics and
utilitarian theories of ethics.
2. Explain the difference between negative rights and positive rights.
Chapter 2
1. Explain why the United States has historically placed less value than
the European Union on the right to privacy.
2. Describe three of the Fair Information Principles.
Chapter 3
1. a. Summarize the Child Online Protection Act (COPA) and the
Children's Internet Protection Act (CIPA).
b. Discuss at least three differences between COPA and CIPA?
c. What impact would COPA have had on freedom of speech on the
Internet? Why was COPA overturned by the courts?
2. The oral arguments before the Supreme Court concerning the
Communications Decency Act (CDA) focused extensively on
determining the most appropriate analogy for cyberspace. Arguments
, were presented that compared the Internet to a library, to television, and
to a public place such as a street corner or park.
a. Why are these comparisons important? Briefly explain the
differences between libraries, television, and public places with
respect to First Amendment protection.
b. For each of these three analogies (library, television, and public
place), describe one significant way in which the Internet is similar
and one significant way in which it is different. Explain the
relevance of each of these similarities and differences to the issue of
regulation of the Internet.
3. In 2002, the U.S. Supreme Court struck down the ban on virtual child
pornography. Explain two arguments in support of striking the ban.
Explain two arguments against striking the ban.
4. Explain how Google's experience in China relates to the issue of global
censorship.
Chapter 4
1. a. How are the Napster and Grokster copyright cases similar, and how
are they different?
b. Briefly describe the court's ruling in both the Napster and Grokster
cases.
2. a. Explain the two main provisions of the DMCA (Digital Millennium
Copyright Act).
b. Explain how "take-down" notices work and who they protect from
lawsuits.
c. How do "take-down" notices sometimes infringe on "fair use"?
, Chapter 5
1. a. Briefly define identity theft.
b. Describe two techniques criminals can use to gather the information
they need to steal an identity.
c. Describe two ways a person can protect their identity.
d. Describe two ways a business can protect its customers from identity
thieves.
2. In the context of Internet content that some countries prohibit, discuss
how the "responsibility to prevent access" differs from the "authority to
prevent entry". Include examples.
Chapter 6
1. a. Give two examples of job categories for which the increased
productivity of computer systems strongly reduced the number of
people working in those areas.
b. Give an example of an area in which computer technology reduces
jobs for skilled workers. Give an example of how computer technology
enables people with less skill and/or training to do jobs that used to
require more. Explain how computer technology changed the skill
level required for these jobs.
c. Give two examples of jobs that did not exist before the Internet.
2. Explain the ethical and social implications of "offshoring". Consider the
issue from the perspective of both U.S. employees and foreign employees.
Consider the issue from the perspective of companies hiring foreign
workers.