Sie sind auf Seite 1von 3

Cyber-ethics Article and FAQs

Taken from LifeSmarts U, www.lifesmarts.org LifeSmarts is a program of the National Consumers League Access the e-version of this lesson to use the pre-test and post-test, vocabulary mash-up game, and see all resources, glossary, and Fast Facts associated with this lesson. Go to: http://school.lifesmarts.org/ and register or use guest/guest to enter.

Cyber-ethics
In less than a month, Ben landed and lost the job of his dreams. Emailing friends, buying hot concert tickets on his employer's time and network, making telephone calls to his girlfriend, and checking on his online auction items cost him a great job. Ben did not keep his personal online life separate from his work. He did not understand Cyber-ethics or his cyber-responsibilities in the workplace. Employers report that employees using workplace technology for personal activities is an ongoing problem, which costs millions of dollars in lost productivity. The explosion of technology and the mind-boggling array of gadgets, multimedia, and communication devices place new demands on us as cyber-citizens. Recognizing and understanding how our actions affect other people is at the core of cyber-ethics. New standards have been developed to help us interact respectfully with each other in this rapidly changing world of technology. AUP and the World of Work To help us be good cyber-citizens, many schools and businesses have implemented Acceptable Use Policies ( AUP). These policies describe how the company expects you to interact with technology owned by the school or used on the job. Most policies state that company-owned property or services should only be used for work or school activitiesno surfing on the Web to find the best price for a CD or to read online news stories. Using the Internet or computer at work in ways that your employer would not agree with is called cyber-slacking. Multi-shirking is when you do several of these activities at the same timefor example, chatting on the phone while instant messaging or blogging. Not knowing and following the AUP of your school or employer can lead to dismissal, as it did for Ben.
LifeSmarts is a program of the National Consumers League, www.lifesmarts.org Page 1

Is your online profile revealing? Remember to screen personal information that you post on the Internet. Data on networking Web sites is another ethical issue that could be potentially embarrassing. According to the Privacy Rights Clearing House, it is common practice for employers to access networking sites, mining for information about a prospective employee. Unfortunately, casual information you posted for fun may give a false or poor impression and result in the loss of a job opportunity. Make sure to check the privacy settings for the networking site you are using; some sites allow you to block access to parts of your profile. On the Job Did you know that while you are at work your company owns your email? Your employer has the right to access your work and personal email accounts when you send or receive email over the workplace network. This includes your private email accounts if you access them at work. Most businesses can track an employee's movement on the Internet and the amount of time the computer is active. Some employers even check to make sure workers are not wasting work time surfing the Net. Employers may also listen to your phone calls. Conversations with other employees, workrelated or personal phone calls, and any voice mail you receive can be intercepted or screened without telling you. Bringing your own cell phone to work and making your personal calls during breaks is one way to respect your employer and guard your Privacy. Cyber-ethics hold us to a higher standard than simply following the law. Advances in technology bring up new legal and ethical issues for you to consider. Knowing your school's or employer's expectations is just the beginning.

FAQs
1. How can ethics apply to the Internet when it reflects the values of many cultures? The Internet is global, comprising many Networks offering numerous services to many people. Tough issues such as child exploitation and trafficking in illegal goods need practical and urgent solutions. Applying common values and asking Internet service providers to assume some responsibility for the information posted online is a start. 2. How can I tell if my electronic communications at work are being monitored? According to Privacyrights.org, you can't. Computer monitoring can take place without your knowledge. Some employers do notify employees, but they are not required to. When an email system is used at work, it is the employers property. Employers may also monitor phone calls with clients or customers. For example, as a customer on the phone with a business representative, you have probably heard this common pre-recorded statement: This call may be recorded to improve customer service.
LifeSmarts is a program of the National Consumers League, www.lifesmarts.org Page 2

3. What are the Ten Commandments of Cyber-Ethics? The Computer Ethics Institute offers the Ten Commandments of Computer Ethics to help reinforce acceptable online behavior: 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other peoples computer work. 3. Thou shalt not snoop around in other peoples Files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which thou hast not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other peoples intellectual output. 9. Thou shalt think about the social consequences of the programs you write. 10. Thou shalt use a computer in ways that show consideration and respect. Source: http://www.fau.edu/irm/about/netiquette.php

LifeSmarts is a program of the National Consumers League, www.lifesmarts.org

Page 3

Das könnte Ihnen auch gefallen