Abstract
This essay is a critique of LarryLessig's book, Code and other Laws ofCyberspace (Basic Books, 1999). Itsummarizes Lessig's theory of the fourmodalities of regulation in cyberspace: code,law, markets, and norms. It applies thistheory to the topics of privacy and speech,illustrating how code can undermine basicrights or liberties. The review raisesquestions about the role of ethics in thismodel, and it argues that ethical principlesmust be given a privileged position in anytheory that purports to deal with the shapingof behavior in cyberspace. Finally, itproposes a philosophy of ethicalself-regulation instead of an over-reliance ongovernment policy to deal with certainimproprieties and negative externalities thattend to disrupt the Net.
Similar content being viewed by others
References
J. Boyle. Foucault in Cyberspace: Surveillance, Sovereignty and Hardwired Censors. University of Cincinnati law Review, 66: 177, 1997.
P. Foot. Moral Relativism. In T. Carson andP. Moser, editors, Moral Relativism: A Reader. Oxford University Press, New York, 2001.
L. Fuller. The Morality of Law. Yale University Press, New Haven, 1969.
K. Goodpaster. The Concept of Corporate Responsibility. In T. Regan, editor, New Introductory Essays in Business Ethics. Random House, New York, 1984.
I. Kant. Foundations of the Metaphysics of Morals, L. Beck, trans. Liberal Arts Press, New York, 1959.
E. Katsh. Software Worlds and the First Amendment: Virtual Doorkeepers in Cyberspace. University of Chicago Legal Forum, 35: 338, 1996.
D. Hamilton. Web's Design Hinders Goals of User Privacy. The Wall Street Journal, April 3, 2000.
L. Lessig. Tyranny in the Infrastructure. Wired, 5(7), July, 1997.
L. Lessig. The Laws of Cyberspace. In R. Spinello andH. Tavani, editors, Readings in Cyberethics. Jones & Bartlett, Sudbury, MA, 2001.
L. Lessig. The Spam Wars. The Industry Standard, December 31, 1998.
L. Lessig. Code and other Laws of Cyberspace. Basic Books, New York, 1999.
W. Mitchell. City of Bits: Space, Place and the Infobahn. MIT Press, Cambridge, MA, 1995.
J. Moor. Reason, Relativity, and Responsibility in Computer Ethics. In R. Spinello andH. Tavani, editors, Readings in Cyberethics. Jones & Bartlett, Sudbury, MA, 2001.
J. Post. Of Black Holes and Decentralized Law-Making in Cyberspace In R. Spinello andH. Tavani, editors, Readings in Cyberethics. Jones & Bartlett, Sudbury, MA, 2001.
J. Reidenberg. Lex Informatica: The Formulation of Information Policy Rules Through Technology. Texas Law Review, 76: 553, 1998.
J. Rosen. The Unwanted Gaze: The Destruction of Privacy in America. Random House, New York, 2000.
A. Shapiro. The Control Revolution. Century Foundation Books, New York, 1999.
C. Stone. Where the Law Ends: The Social Control of Corporate Behavior. Harper & Row, New York, 1975.
C. Taylor. Ethics and Authenticity. Harvard University Press, Cambridge, MA, 1992.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Spinello, R.A. Code and moral values in cyberspace. Ethics and Information Technology 3, 137–150 (2001). https://doi.org/10.1023/A:1011854211207
Issue Date:
DOI: https://doi.org/10.1023/A:1011854211207