Premium Essay

Internet Ethics

In:

Submitted By jconger702
Words 344
Pages 2
The internet most certainly can be used as a tool to do unethical things, but it can also be a very positive and powerful tool for anyone to get information. It used to take hours to get information out of a library by painstakingly searching and reading but now with the ease of the internet and search engines it’s much easier. The internet is a time-efficient tool for everyone that enlarges the possibilities for curriculum growth. Learning depends on the ability to find relevant and reliable information quickly and easily, and to select, understand and assess that information. Searching for information on the internet can help to develop these skills. Classroom exercises and take-home assessment tasks, where students are required to compare website content, are ideal for alerting students to the requirements of writing for different audiences, the purpose of particular content, identifying and judging accuracy and reliability. Since many sites adopt particular views about issues, the internet is a useful tool for developing the skills of distinguishing fact from opinion and exploring subjectivity and objectivity.
Internet ethics means acceptable behavior for using internet. We should be honest, respect the rights and property of others on the internet. Some of the rules that individuals should follow while using a computer are listed below:
•Do not use computers to harm other users.
•Do not use computers to steal others information.
•Do not access files without the permission of the owner.
•Do not copy copyrighted software without the author’s permission.
•Always respect copyright laws and policies.
•Respect the privacy of others, just as you expect the same from others.
•Do not use other user's computer resources without their permission.
•Use Internet ethically.
•Complain about illegal communication and activities, if found, to Internet service Providers

Similar Documents

Premium Essay

Internet Code of Ethics

...Internet Code of Ethics Paper By Monica Boales COM/339 Instructor Moran Cloward December 14, 2015 The internet is very powerful and when there is great power, it comes with many great responsibilities. So what kind of responsibilities do the Internet marketers, online businesses, digital strategists and the other inhabitants of the online space have? Media, it can come in many forms; newspapers, magazines, radio or the TV news channels, have always maintained a clear distinction between information and advertisements. And the same stands true for the digital media too. With the Web the on its rise, digital mediums are one of the most developing events in the world’s history. Internet today is all pervasive—from keeping people updated on the latest international and national events to giving a person the inside scoop on all kinds of major political matters, it has steadily moved on to becoming the one-stop destination for all sorts of information. And then there are the digital learning sessions, e-commerce, online review sites, e-campuses, consumer forums, and virtual shopping zones, there is nothing that the Web does not have an answer for. Advertising is the best way for companies can reach consumers with their target market for different kinds of companies. Having the internet and able to advertise is the most modern way for companies to be able to reach and influence larger groups of consumers. With advertising, companies need to follow certain kinds of code of ethics...

Words: 1507 - Pages: 7

Premium Essay

Internet Research

...Project 3 – Internet Research Name Institution Search Engines | Directories | Meta-search Engines | Databases | Bing URL:www.bing.com | Snap.com | KAYAK | Altis | Duck duck go URL: www.duckduck go.com | MSN.com | BLINGO | eevl | AskURL:www.ask.com | Lycos | HOTBOT | Gesource | YippyURL:www.yippy.com | Yahoo! | INFO.COM | Humbul | WebopediaURL:www.webopedia.com | AOL Search | EXCITE | SOSIG | The following reports are related to cyber ethics: Sudi, V. (2011, March 25). Safer internet: Cyber Ethics. Retrieved Nov 11, 2013, from http://cyberethics.info/cyethics1/ Marshall University. (2011, Feb 11). Information Security: Cyber Ethics. Retrieved from Nov 11, 2013, from http://www.marshall.edu/infosec/resources/cyber-security-tips-newsletter/cyber-ethics/ Marshall University. (2011, Feb 11). Information Security: Cyber Ethics. Retrieved from Nov 11, 2013, from http://www.marshall.edu/infosec/resources/cyber-security-tips-newsletter/cyber-ethics/ The Web page above displays information about what entails cyber ethics. The information relayed in the site is relevant to the reader in the sense that it cautions them to use the internet safely and responsibly while conducting themselves online. It intended to inform the general public or the internet users to learn the need of navigating safely on the internet. In the broader sense the user is being informed on the basics that they should be aware of in the event they access the internet. The reader is...

Words: 803 - Pages: 4

Free Essay

Management

...MANAGEMENT CORPORATE GOVERNANCE, ETHICS AND VALUES GSGM7253 TERM PAPER Issues and challenges in cyber ethic PREPARED BY: |MEOR NORULAZMI BIN MAT SALLEH |MD1409MD0030 | Contents Introduction 2 Literature Review 3 Recommendations 6 Conclusion 8 References 10 Introduction This article will highlight the issue and challenges in cyber ethic. It will cover general outlined the concept of cyber ethic and tries to relate it with the globalization of internet which was a way of living nowadays. Have you noticed that the whole world is now watching the same movies, listening to the same music and reading the same books? Of course not 100%, but the majority of the people on the planet do it the same thing as mentioned above. Why these activities happen, whereas they live not at the same location or place? This is what we call it as internet culture. Since the 1990’s, the Internet has a revolutionary impact on our culture. People around the world, start to use communication by instant messaging, electronic mail, interactive video call. Also, watching a movie, discussion and shopping they're using a World Wide Web or website.   Today, internet become part of living. I define frequent use of the Internet as simply daily use (Bruce Bimber...

Words: 2841 - Pages: 12

Premium Essay

Law/421 Article Review

... The capability to do business on the Internet has opened the gates for companies to grow at faster rates by making available to consumers, products, and services on demand. Although the Internet has allowed quick expansion too many business sectors, the growth of such capabilities has also presented a different set of issues. Protecting intellectual property for these types of business transactions has proven to be more challenging than the startup of e-commerce trade. Legislatures have begun to educate themselves with priority, on the differences in commerce and e-commerce; but the effects from lack of proper ethics and security has caused many lawmakers to scramble for answers. The following article review will reveal what is becoming more apparent as consumers persistently demand e-commerce products and services. Video Streams into the Mainstream The widespread adoption of streaming video on the Internet has become the major frontier for online multimedia. Graphics, animation, and audio technologies have proliferated on the Internet for years. Streaming video—in which viewers can begin watching content almost as soon as it starts downloading—is developed as a mainstream technology (Lawton, 2013). The portion of US companies using streaming media has doubled, from nine to 17%, since last year. According to IEE Computer Society, the factors that drove this trend was the increased adoption of broadband services that speed Internet access for users and the content providers...

Words: 731 - Pages: 3

Free Essay

The Rights and Ethics of Employees with Respect to Privacy at Work

...El-Achmar The Rights and Ethics of Employees with Respect to Privacy at Work Widespread use of electronic communications media such as e-mail and information resources such as the Internet has prompted many employers to engage in electronic surveillance of their employees. Employers are monitoring—and even recording—employees’ personal phone calls, e-mails, and workplace conversations. Video cameras are trained on employee parking lots, break areas, and other parts of the workplace. Today’s employers have the legal right to conduct search and seizure of employees’ personal property; monitor the employee’s telephone calls, workplace computer, Internet, fax use, and e-mail; perform employee drug testing; and conduct investigation and surveillance of employees. Electronic Surveillance The ethics of employee surveillance are problematic, because both the company and the employee have rights, and these rights can conflict. The employee owes the company a solid day’s work and protection of proprietary property and knowledge, but the employee can claim rights such as privacy, compensation for injury, freedom from harassment, and a living wage. Employees are often not aware of the fact that their e-mails are being read by their employers. Moreover, most employees are unaware of the extent to which their employers can and actually do monitor what they do. Studies indicated that worldwide, approximately 27 million employees workforce, are under continuous Internet or e-mail use surveillance...

Words: 780 - Pages: 4

Premium Essay

Technology Ethics in the Classroom

...Maketha Spears December 21, 2012 EDU-225 Professor Horton Technology Ethics in the Classroom Technology has become a driving force in classrooms from preschool all the way up to college levels of learning. The institutions traditionally procure, provide and control the technology for learning but now students are acquiring their own personal technologies for learning and institutions are challenged to keep pace. (ALT-J: Research in Learning Technology, v18 n2 p149-160 Jul 2010. 12 pp.). Computers and other technical devices that are being used to enhance student learning has made teaching more creative and effective but it has also caused a lot of confusion and chaos in regards to ethics. Once teachers only had to be concerned about the basic rules of classroom etiquette and they could govern their classroom visually. Now teachers have to implement rules and guidelines to ensure that technology in the classroom is being used for its intended purpose to protect students from lurking dangers that are unseen by the human eyes. Before one can understand the importance of employing internet security in the classroom, they must first know the issues that arise from the use of technology in the classroom. Some think of cell phones as just a convenient means of communication, whereas others see it as a way to lure innocent victims so that they can satisfy their own personal pleasures. Regarding the use of technology, social, legal, and moral issues have emerged as three major...

Words: 1232 - Pages: 5

Premium Essay

Mba-Fp6004 Assessment 5-1

...MBA-FP6004 Strategy Recommendation Paper Capella University 2015 Introduction Today the power of the Internet and social media as it pertains to companies is immense. A great strategy to harness the power of both can be the difference between one company’s failure and another’s success. The following essay will first begin by giving a brief introduction and history on Barnes & Noble, Incorporated. Second, existing technologies that exist that management should consider with regard to the Internet and social media will be discussed. Third, an in depth look into how Barnes & Noble is currently utilizing the Internet and social media will be shown, as well as, how their competitors in the same industry are using these tools. Fourth, a SWOT analysis for Barnes & Noble using the Internet and social media will be discussed. Also, the implications discovered in the analysis and how they will affect the future of the business will be explained. Fifth, the ethical impacts that come with the use of these tools will be examined and how they may impact the future of the company. Sixth, an assessment of the use of the Internet and social media will be given as they pertain to the global environment and demographics. Finally, a thoughtful business strategy will be given along with recommendations that Barnes & Noble should consider in moving forward with their Internet and social media use. Barnes & Noble Background While attending New York University in the 1960s...

Words: 2692 - Pages: 11

Premium Essay

Essay On Cyber Law

...computers, IT and the Internet technology. Cyber world is known for its unlimited space and boundaries. Talk about cyber world, it is must have a violation that we will face it. Consequently in our country, cyber world become an ocean of information that enables people to share, communicate, and make business, making friends including creating opportunities to commit crimes and taking advantage of people openness in sharing data and information about themselves by those predators looking for victims in the cyber world. Regulating behaviour is never easy despite the existence of laws and regulations and one of the most difficult challenges is that technology are often too fast developed for the law to catch up. VIOLATION OF THE CYBERLAWS AND COMPUTER ETHICS Talk about available laws, have a lot of violation that will impact to us in our daily life...

Words: 1117 - Pages: 5

Premium Essay

Internet Privacy: Is the Internet as Safe as Everyone Says?

...era has depended on some form of tool to help him to his tasks whatever they may be, a tool to make things easier. This tool is technology; technology does not have to be the modern thoughts of computers. Technology is "the science of technical processes in a wide, though related field of knowledge." That is the definition given by The New Lexicon Webster's Dictionary of the English Language. So technology can be anything as long as it helps us advance. It can be anything like a plough to help a farmer, a television to help the media and the telephone to help us communicate. The latest technology of the 20th Century is the Internet and it has placed a great mark on our society. It is the new "place to be" where business can advance, people can interact worldwide at the click of a mouse and this has revolutionarily changed the world. In the world of the Internet there are millions of members worldwide and that means it is a very profitable arena. In an area where there is money there are criminals and that is where the modern criminals of the world are behind computer screens. They may be credible individuals in society and they could also be credible corporations and organizations that are finding a quick way to make money and by doing this they are breaking ethical rules of society (even...

Words: 1707 - Pages: 7

Free Essay

Come Clean Business Case

...offer programs to empower and drive positive changes designed to stop the cycle of violence in the local community of Lithonia, Georgia. This makes Come Clean a unique, niche company because it has a small segment of a market suitable for focused attention and it provides services not offered addressed by its immediate competitors. This paper will assess how Come Clean Inc. uses social media as a strategy for marketing and communications and will analyze the implications of the Internet and social media for the future as internet use is growing. According to the Pew Research Center, at the close of 2010, 77 percent of Americans use the Internet on a regular basis (Three Technology Revolutions, 2015). In addition to assessing Come Clean’s Internet and social media use, this is paper will highlight and evaluate the organizations strengths, weaknesses, opportunities, and threats. The analysis will also include the possible impacts of diversity, ethics and technology. Current Internet/Social Media Strategy “Businesses that want to boost the results of traditional advertising need to dovetail...

Words: 1297 - Pages: 6

Free Essay

Est 1 Task 2

... 1.Company X has a high code of ethics. These standards are what we expect our employees to follow: a.Dress Code: All employees must wear uniforms that consist of black dress slacks, Polo Shirt (Choice of 3 Colors), black shoes (No logos, or additional colors visible). Company to provide slacks and polo shirts. Visible body piercings are not allowed, except for earrings. Hair must be clean and well kept. Hair Coloring must de natural hues. Visible tattoos must be covered by clothing or by other means. b.Attendance: All employees are to work their scheduled shifts. If you are going be absent or late for work, you must notify your supervisor at least two hours before the start of your scheduled shift. c.Mobile Devices: Personal electronics such as cell phones, tablets, laptops may not be used while at work, unless required for work purposes. Mobile devices may be used during breaks and before and after shifts just not in public areas. d.Internet: All company computers that have internet access are to be used for official company business only. Employees may not use the internet for personal use, i.e. social media. 2.Company X has an extensive training program to make sure that its employees understand what is required of them during their employment. These trainings happen on frequent bases. Three specific Components for an ethics training program. a.Frequency of Trainings: The Training of ethics will occur when any employee is hired...

Words: 597 - Pages: 3

Premium Essay

Technology in Business: E-Etiquette

...Abstract If it was not for certain technological advances with reference to computers much of the global business community would not able conduct business and produce products. In all aspects of business, ethics and morals have to be the foundation but where the rubber hits the road, business etiquette will aid in maintaining high job satisfaction and keep customers coming back. With the vast majority of business operations having a foothold in technology there is a severe need for e-etiquette. What is Driving Technology in Business? In today’s era of business there would be a severe lack of production if the power goes out. With the advancement’s and availability of computer technology in business, there has been a significant shift in the way day-to-day business operations are conducted. The introduction of the computer and data processing capability to the business world transformed the workplace. Unlike the traditional typewriter, the computer brought with it the ability to easily store and correct documents without having unsightly spots of “white-out”. The usage and utilization of computers, computer systems and information technology (IT) applications in every aspect of business is now routine. Wide-ranging means of connecting to and access technologies with computing interfaces expedite communication between employees and with business partners, suppliers, customers, or other stakeholders. With the plethora of software, production...

Words: 2949 - Pages: 12

Premium Essay

Article Law

...into the Mainstream The widespread adoption of streaming video on the Internet has become the major frontier for online multimedia. Graphics, animation, and audio technologies have proliferated on the Internet for years. Streaming video—in which viewers can begin watching content almost as soon as it starts downloading—is developed as a mainstream technology (Lawton, 2013). The portion of US companies using streaming media has doubled, from nine to 17%, since last year. According to IEE Computer Society, the factors that drove this trend was the increased adoption of broadband services that speed Internet access for users and the content providers simply able to speed the delivery process (pp. 12-17). The main three players are Apple’s QuickTime 4, Microsoft’s Windows Media 7, and RealNetworks’ RealVideo 8. Streaming video faces several key technical and business challenges. The key technical issues include Internet congestion, interoperability, and compression. Internet congestion slows the service for those with lower bandwidth connections. Interoperability becomes an issue because streaming-video technology has no standardization to become widespread for any user capability. Compression is an issue because data-compression algorithms are critical to providing quality video at lower transmission speeds (Lawton, 2013). The ramification from these issues starts with intellectual property, privacy, ethics, and security. Content providers will raise issue about privacy and distribution...

Words: 583 - Pages: 3

Premium Essay

Law and Degree

...into the Mainstream The widespread adoption of streaming video on the Internet has become the major frontier for online multimedia. Graphics, animation, and audio technologies have proliferated on the Internet for years. Streaming video—in which viewers can begin watching content almost as soon as it starts downloading—is developed as a mainstream technology (Lawton, 2013). The portion of US companies using streaming media has doubled, from nine to 17%, since last year. According to IEE Computer Society, the factors that drove this trend was the increased adoption of broadband services that speed Internet access for users and the content providers simply able to speed the delivery process (pp. 12-17). The main three players are Apple’s QuickTime 4, Microsoft’s Windows Media 7, and RealNetworks’ RealVideo 8. Streaming video faces several key technical and business challenges. The key technical issues include Internet congestion, interoperability, and compression. Internet congestion slows the service for those with lower bandwidth connections. Interoperability becomes an issue because streaming-video technology has no standardization to become widespread for any user capability. Compression is an issue because data-compression algorithms are critical to providing quality video at lower transmission speeds (Lawton, 2013). The ramification from these issues starts with intellectual property, privacy, ethics, and security. Content providers will raise issue about privacy and distribution...

Words: 583 - Pages: 3

Premium Essay

E-Mail and Internet Policy

...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition, state...

Words: 941 - Pages: 4