Sie sind auf Seite 1von 46

Ethics in Cyber Space

What are Ethics anyway?

Understanding how your actions affect other people

Knowing right from wrong

Taking personal responsibility for your actions

So , Ethics is about putting principles into action. Consistency between what


we say and what our actions say is a matter of integrity.
Unethical vs. Illegal

What is unethical is not necessarily illegal.


For example, the issue of a company legally monitoring Employees E-mail is
very controversial issues.
Employees have limited protection against employers electronic surveillance.
The law appears to support employers rights to read electronic mail and
other electronic documents of their employees.
Here, The definitions of Right and Wrong are not clear. Also, the
distinction between what is illegal and what is unethical is not always obvious
What do we mean by CYBERETHICS ?

Cyberethics is the philosophic study of ethics pertaining to computer


networks, encompassing user behaviour.

what networked computers are programmed to do, and how this


affects individuals and society.

Cyber-Ethics is the Ethics applied to the online environment.


Why should we be Concerned about
Cyber Ethics ?
Anonymous posting to blogs, websites and social media can encourage bad
behaviour anytime.
Information in cyberspace can be accessed globally.
what is right and wrong for Internet users can do,
what are the social impacts of Information Technology (IT).
understand security, privacy issues, and major negative impacts of IT on
cyberspace
Computer Networks can be threatened by many internal and external hazards
internationally,
Why Cyber Ethics ?

Cyber Ethics underpin actions that must be


taken not only to harness the power of the IT
itself, but also to survive its revolution so it
should be the concern of everyone.
Three main types of Ethical issues
Privacy
IT enables exchange of information on a large scale enables increased
potential for disclosing information and violating the privacy
Access Right
The topic of computer security and access right has moved quickly from
being a low priority for corporations to high priority for government
agencies.
Harmful Actions
Harm to any of users, the general public, employees, and employers .
Harmful actions include intentional destruction or modification of files and
programs leading to serious loss of resources or unnecessary expenditure of
human resources.
Lets review and discuss some common
cyber-ethical
concerns
Acceptable Use Policy (AUP)
Violations

Disregard for technology or


network rules and policies. This
could be willful or unintended
disregard.
Piracy

Unauthorized duplication and distribution of


items such as games, software, DVDs, music, etc.

End User License Agreement Violation : When


you purchase a game or CD, you are purchasing a
license to USE them; you do not OWN them.
Plagiarism

Using another persons ideas,


words, images, or original works
as your own without
acknowledging the source.
Cyber-bullying

"Cyber-bullying" is when a child or


teen is tormented, threatened,
harassed, humiliated, embarrassed,
or otherwise targeted by another
child or teen using the Internet,
interactive and digital technologies,
or cell phones.
Cyber-libel

Deliberate misrepresentation of
people or events.

False statements that harm


anothers reputation.
Worms and Viruses

Malicious programs shared

with the intent of shutting down

a computer or computer system.


Violating Privacy

Willfully using another persons


password to access his or her
email or documents online,
distributing private information
of or about another.
Cyber-stalking

The use of the Internet, email,

or other electronic

communications devices

to stalk another

person.
Illegal Information on Internet
90

79.5
80
73.1

70

59.3 59
60
55.2

50 48.5

40

30

20

10.4
10

0
Fraudulent violation of False Rumors Obscence Libel Information Civil Rights Gambling
Information privacy Information Violation Information
Call into Questions
Is it ok to display personal information
about other on the Internet ?
Who owns digital data ( such as
music, movies, books, webpages etc.)
and what should users be allowed to do
with it ?
Who is allowed to access the data and
information?
How can we safeguards to ensure that
the information can be accessed only by
the right person or organizations?
Who should be Concerned about Cyber
Ethics ?
businesses and governments rely on technical measures to protect themselves
from false information, stealing, deny access, or even destroy valuable
information.
Self-protection is not sufficient to make cyberspace a safe place to conduct
business. The rule of law must also be enforced.
Cyber ethics must be taught and reinforced at every level of computer use
From the novice user just learning to navigate a computer and the
internet, to an information technology professional
Those who use the internet in any mode must be taught ethical practices in
every aspect of its use
The Rules of Ethical Cyber Activity

Basic Rule Do not do something in cyber space that you would consider
wrong or illegal in everyday life
Do not use rude or offensive language
Do not be a bully on the Internet. Do not call peoples name, lie about
them, send embarrassing pictures of them, or anything else to try to heart
them.
Dont encourage the cyberbullies. Do report cyberbullying.
Do use internet for research and information but dont use copyrighted
information as your own.
The Rules of Ethical Cyber Activity

Do not break into someone elses computer.


Do not attempt to infect or in any way try to make someone elses computer
unusable.
Dont share personal information too easily.
Do use the internet to expand your social and business network but dont
hamper other in doing so.
Internet Safety

Guard your privacy : What people know about you is up to you.


Protect your reputation: Self-reflect before you self-reveal. Whats funny or
edgy today could cost you tomorrow.
Nothing is private online: Anything you say or do can be copied, pasted and
sent to billions of people without your permission.
Assume everyone is watching: There is huge vast audience out there.
Someone you dont know also has access to your information.
Apply the golden rule: If you dont want it done to you, then dont do it with
someone else.
Watch the clock : A virtual hug never matches a real one. Balance your life.
Internet Safety

Choose wisely: Not all the content is appropriate. You know what we mean.
Dont hide: Using anonymity to cloak your actions doent turn you into a
trustworthy, responsible human being.
Think about what you see: Just because you find it over internet doesnt
make it true.
Be smart, be safe: Not everyone is who they say they are. Be smart while
sitting online and interacting with people.
ACM Commitments on Ethics

1. Contribute to society and human being.


2. Avoid harm to others.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate.
5. Honor property rights including copyrights and patents.
6. Give proper credit for intellectual property.
7. Respect the privacy of others.
8. Honor confidentiality.
9. Contribute to society and human being.
CONCLUSION

The new world of information society with global networks and cyberspace
will inevitably generate a wide variety of social, political, and ethical
problems.
Basic issues have been solved partially using technological approaches and
legal laws in cyberspace.
Guidelines and strategies should be implemented so that global information
can be exploited in a socially and ethically sensitive way for our future
benefit and applications.
CASE STUDY 1
Facebook confessions page
Facebook confessions page
What is it ?

It is page on Facebook on which any one can anonymously post a


personal information.
Juicy-campus launched in 2007 with the goal of enabling online
anonymous free speech on college campuses.
College ACB.com in 2007 which peaked with over 900,000 views
in a single day
College ACB closed down in October 2011 but anonymous online
confession sites didnt go away
Facebook confessions page
What is it ?

US college students began using a combination of Facebook pages


and anonymous forms such as Google Forms or SurveyMonkey to
create school based Facebook Confession Pages.
In India it started in IIT-B and just after one day It also started in
LNMIIT and various other collages.
These services were controversial as many of the posted
confessions hurt the schools image.
Facebook confessions page
Why do Students use them ?

ANONYMITY is the answer to this.


Anonymity is an important and useful tool in many
situations.
Most adults have at some time read newspaper advice
columns where readers anonymously submit problems and
an Agony Aunt responds with advice so that others with
similar problems benefit.
Voting is usually done anonymously to allow freedom of
expression and governments protect anonymous
whistleblowers with legislation.
Facebook confessions page
Why do Students use them ?

And police Tips phone services assure anonymity as a way


of getting people to share others misdeeds.
Kids Help Phone encourages teens and children to phone in
and share their problems anonymously because this helps
teens and children to address problems they cant in other
ways
What no one can deny is that the need to share
anonymously is deep-seated.
Facebook confessions page
How do they work ?

Facebook Confession Pages are simply pages that allow


students to anonymously submit their deepest secrets.
The moderator of the page posts the confessions on the
Facebook page.
Students who like the page can see each confession and
can like each confession and comment.
The moderators of the page are often unknown to the
students, as are the contributors.
Facebook confessions page
How do they work ?

The Facebook Confession Page model has caught on and


spreading fast.
The pages are free, easy to set up and tap into this deep-
seated need teens and young adults have to share what
theyre really thinking and feeling without fear of adult
sanctions.
Facebook confessions page
What are the problems ?

While the original intent of Facebook Confession Pages was


to offer a forum for students to share problems, concerns
and secrets that isnt all students are sharing. The online
dis-inhibition effect, a loosening of social restrictions and
inhibitions that would normally be present in social
interactions, means that many students want to also use
the confessions pages to share stories of alcohol and drug
use or sexual behaviour. In some cases the pages lead to
cyberbullying or even slander.
Facebook confessions page
What is Unethical here ?

Invasion of Privacy

Character Assassination
Facebook confessions page
What can educators and parents to do?

Experience in other jurisdictions suggests that taking pages


down wont solve the problem. Pages are easy to set
up, and often when one is taken down another pops up
right away moderated by a different student.

Teens expressing depression, issues with body image or


alcohol and drug use should concern us all and rather than
preventing them from posting about it we should be looking
at the behavior and trying to address it.
Facebook confessions page
What can educators and parents to do?

Students clearly have a need to post anonymously about


their problems, concerns and fears.
Schools should embrace the opportunity and set up their
own Confessions Pages, moderated by students but with
guidelines
Confession Pages and their associated problems also
highlight the need for greater education about digital
citizenship for students
Facebook confessions page
What can educators and parents to do?

need to better understand the risks of posting and the


permanent and public nature of digital spaces.
This starts at an early age with parents talking to children
about social media and modeling good online behavior
themselves.
CASE STUDY 2

Napster vs RIAA
The Napster Controversy: RIAA vs. Napster

In the summer of 1999, a website, www.napster.com, was


launched in the US. The website made it possible for its
users to freely share their music files through the Internet
with other users all over the world.

The service became extremely popular within a short span


of time. The website attracted 1.6 million simultaneous
users during the height of its popularity in February 2000.

Napster's offering of this 'peer-to-peer' technology was


strongly condemned by the Recording Industry Association of
America (RIAA), a trade group representing the world's
biggest record labels, Universal Music, Sony Music, Warner
Music, EMI Group and Bertelsmann AG.
Allegation on Napster

RIAA alleged that Napster was engaging in or assisting others


in copying copyrighted music without payment or the
express permission of the rights owners.

RIAA also claimed that Napster would significantly harm the


sales of the recording industry.

In December 1999, the body sued Napster in the Federal


District Court for copyright infringements and petitioned the
court to shut down the website.
What Happened NEXT.
The legal battle was covered extensively in the global media.

In the beginning of July 2001, Napster had to stop offering its services
due to certain technical problems. While the company was working
towards setting the problems right and resuming operations, in mid
July 2001, a District Court Judge order barred Napster from offering
the file-sharing service.

Even as Napster users strongly protested against the order, the


company appealed the ruling before the US Court of Appeals in San
Francisco. The Appeals Court granted Napster temporary reprieve
against injunction until a further review of the injunction request.

Napster was eventually acquired by Roxio. In its second incarnation


Napster became an online music store until it was acquired by
Rhapsody from Best Buy on 1 December 2011.
Questions Raised
The controversy raised several questions regarding the
impact of the emergence of newer technologies like Napster
on the traditional modes of conducting business.

Was the recording industry using its financial power to


suppress technological innovations in the music business?

Was Napster wrong in allowing people across the globe to


access music without paying for it and without the artistes'
permission?

The case eventually came to be seen as a struggle by the


powerful entertainment industry against a new technology
threatening it.
Ethical Point of View
What went wrong ?

Shared Music For Free But Not


FREE MUSIC.
Ethical Point of View
Why was it Unethical ?

Firstly, Because it caused Heavy Loses to the Recording


industry; Artists & Recording houses who spent millions in
productions.
Secondly, It directly encouraged Piracy of Music and giving
birth to Many other similar websites
Thank You

Das könnte Ihnen auch gefallen