Premium Essay

Ethics in Cyberspace

In:

Submitted By ctj007
Words 851
Pages 4
Title: Ethics in Cyberspace

Ethics in Cyberspace Chris Jones Strayer University

CIS 324 Professor Luis ACEVEDO March 15, 2012

Ethics in Cyberspace

What is Cyberspace? Cyberspace is a global community of people using computers in networks. For ensured functionality, virtual communities with Internet support depend on rules of conduct, likewise with any other society. Business people like librarians and information technologists must have matured knowledge about ethical issues for their companies’ welfare and to protect and mentor other users. What is ethics? Ethics is the art of determining what is good or right. It can also be defined as a way of life or general pattern, a set of rules of conduct or moral code. Ethical guidelines are based on values. The Association of Computing Machinery (ACM) is a national organization that has a developed statement of its values. ACM’s every member is expected to uphold the Code of Ethics and Professional Conduct which includes these morals:

1) contribute to society and human well-being
2) avoid harm to others
3) be honest and trustworthy
4) be fair and take action not to discriminate
5) honor property rights including copyrights and patents
6) give proper credit for intellectual property
7) respect the privacy of others
8) honor confidentiality. New moral issues occur due to the nature of electronic communication.
Individuals and organizations should be proactive in examining these concerns and developing policies which protect liabilities. Top issues which need to be discussed include: privacy of mail, personal identities, access and control of the network, pornographic or unwanted messages, copyright, and commercial uses of the network. AUP also known as Acceptable Use Policy is

Similar Documents

Premium Essay

Essay On Cyber Law

...data and information about themselves by those predators looking for victims in the cyber world. Regulating behaviour is never easy despite the existence of laws and regulations and one of the most difficult challenges is that technology are often too fast developed for the law to catch up. VIOLATION OF THE CYBERLAWS AND COMPUTER ETHICS Talk about available laws, have a lot of violation that will impact to us in our daily life...

Words: 1117 - Pages: 5

Premium Essay

Ethics

...Reference Material on Ethics Books and Book Chapters Baase, S. (1997) A Gift of Fire: Social, Legal and Ethical Issues in Computing, Prentice Hall. Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London. Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria  Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’...

Words: 1786 - Pages: 8

Free Essay

Cyber Ethics

...Cyber Ethics CSEC 620 As one of the most uncertain and muddled aspects of any organization or company, Cyber Ethics are undoubtedly one of the most important in today’s technological age. Every organization or company operates with a Code of Conduct for its employees. This Code of Conduct outlines the “dos and don’ts” for an organization in hopes for “ethical” and “moral” operation of business. A typical code of conduct will outline an Acceptable Use policy, Internet Use policy, Security policy, and acceptable conduct policy for its employees that is supposed to be required reading. Like with any law, in cyber security there are always law-breakers waiting for the chance to exploit a weak firewall, a patch in the system, or a careless employee who leaves login information open for the wrong eyes to see. For this reason government and private sector alike must constantly update security measures and do thorough investigations of employees upon hiring. The internet is so large and open that it is a serious security threat for individual corporations and especially government agencies. The US government defends against countless internet attacks every day and because of the vast connections between private companies and government it is both the responsibility of private and public sector to insure everyone’s safety. Developing a widespread Code of Ethics in regards to Cyber Security is an increasingly difficult task. New advances in technology make it difficult to...

Words: 2222 - Pages: 9

Premium Essay

No File

...Initiative. Released in 2009, the Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure acknowledged the need for cybersecurity public awareness and an advanced cybersecurity workforce. To address these needs, the Comprehensive National Cybersecurity Initiative (CNCI) developed 11 initiatives to help secure the United States in cyberspace. The National Initiative for Cybersecurity Education (NICE) was established to lead the work on the goals outlined in Initiative 8, which addresses the Nation’s cybersecurity needs related to public awareness, education, professional development, and talent management. (McDuffie, 2009) In the past 20 years, the innovative use of cyberspace has transformed the day-to-day operations of the Nation. These advances have enhanced the lives of individuals, business, and government in profound ways. From eCommerce, to mobile communications and complex networked systems, the rapidly growing dependence on cyberspace is evident. In the years to come, the Nation’s dependence on cyberspace will only increase as technology advances and will further integrate into our daily lives. Great advances in technology comes with great risks. The Cyberspace Policy Review identified vulnerabilities in cybersecurity as systemic risks introduced into infrastructure, defense, and personal property due to the widespread adoption and dependence on technology. The more the Nation relies on cyberspace as a critical part of its infrastructure...

Words: 1570 - Pages: 7

Free Essay

Management

...[pic] MASTER OF MANAGEMENT CORPORATE GOVERNANCE, ETHICS AND VALUES GSGM7253 TERM PAPER Issues and challenges in cyber ethic PREPARED BY: |MEOR NORULAZMI BIN MAT SALLEH |MD1409MD0030 | Contents Introduction 2 Literature Review 3 Recommendations 6 Conclusion 8 References 10 Introduction This article will highlight the issue and challenges in cyber ethic. It will cover general outlined the concept of cyber ethic and tries to relate it with the globalization of internet which was a way of living nowadays. Have you noticed that the whole world is now watching the same movies, listening to the same music and reading the same books? Of course not 100%, but the majority of the people on the planet do it the same thing as mentioned above. Why these activities happen, whereas they live not at the same location or place? This is what we call it as internet culture. Since the 1990’s, the Internet has a revolutionary impact on our culture. People around the world, start to use communication by instant messaging, electronic mail, interactive video call. Also, watching a movie, discussion and shopping they're using a World Wide Web or website.   Today, internet become part of living. I define frequent use of the Internet as...

Words: 2841 - Pages: 12

Premium Essay

First Amendment in Cyberspace

...crime, “fighting words,” and sedition (Reynolds, 2014). There are many examples of the First Amendment as it applies to cyberspace. In 1997, the Equal Employment Opportunity Commission filed a workplace harassment lawsuit, which is still pending. Employees were sending derogatory e-mails that were insulting to other creeds and cultures. This resulted in a discrimination lawsuit and changes in corporate e-mail policy. The New Jersey Office of Administrative Law recently found a single incident of a long joke list being forwarded by e-mail to the whole department to be” sexual harassment, ” creating an “ offensive work environment” (Volokh, 2000). Awareness has been raised in recent years in regard to cyberbullying. This First Amendment exemption and the recent rise of suicides in which digital technology, the Internet and social media have played a role is extremely troubling, especially insofar as the victims in these cases seem to belong predominantly to one often discriminated against group (Merril. 2000). These rights are there to protect the creativity of your Facebook page, allowing for artistic expression. The same page can be out of compliance with the law if it contains obscene speech or defamation. “The beauty of the First Amendment is that it protects all kinds of speech” (Merril, 2000). 1 Works Cited Reynolds, G. W. (2014). Ethics in Information...

Words: 356 - Pages: 2

Premium Essay

Ethics

...Ethics in Cyberspace: Have We Seen This Movie Before? DR. THOMAS DONALDSON Monday, February 5, 2001 Wilder Pavilion, Adamian Academic Center Bentley College Waltham, Massachusetts Presenters Njeru Salesio Kinyua: Nduati Paul Njaaga: Toroitich Patrick Kiplimo: Lemuel Mangla: Bryan Egessa: 046485 015118 049063 090716 090524 Introduction       Dr. Donaldson begins by stating that his topic, ethics in cyberspace, should be approached with considerable humility. Internet has dramatically affected our lives while frustrating our attempts to understand it and therefore we should be mindful that in the past, great intellects have been undone by the appearance of new phenomena. He gives an example of Adam Smith’s where he devoted only one paragraph to the topic of the emerging phenomenon of the business corporation. He did so because he believed corporations were never going to amount to much. Professor Smith was profoundly wrong. Dr. Donaldson says he may be profoundly wrong also as he ventures into cyberspace to untangle its ethical implications. “In my attempt I am most concerned to separate the old from the new, that is, to discern which value changes we're encountering are really old stuff, like a movie we've seen before but with a different cast, and what is fundamentally new. “ An answer to this question should help us, in turn, to discover how, if at all, the internet promises to change our values and what ethical controversies...

Words: 3009 - Pages: 13

Premium Essay

Annotated Bibliography

...to use artificial intelligence agents to help identify persons of interest and allow local law enforcement, along with the companies, to monitor these agents. Annotated Bibliography Dulek, R., Motes, W., & Hilton, C. (1997), Executive Perceptions of Superior and Subordinate Information Control: Practice versus Ethics. Journal of Business Ethics Vol. 16, pgs.1175-1184 This entry examines the ethical practices of leaders in a business and their employees involving information control within a business. Specifically it examines whether these executives know if control is being performed and if they deem it ethical. The statement “…executives are generally drawn to those command activities they deem to be "proper and right." but shy away from those that are iniquitous.” R. Dulek has authored six books and publishes more than forty journal articles. He is currently a professor at John R. Miller School of Business at the University of Alabama. W. Motes is a Marketing professor at the same university and has had articles appear in twelve business journals. C. Hilton is...

Words: 1878 - Pages: 8

Free Essay

Cyberspace

...A Different Word: Subcultures in Cyberspace Student’s Name Institutional Affiliation A Different Word: Subcultures in Cyberspace The way people organize, govern and create meaning in their lives is associated with social patterns that link to other cultures. This describes the study of sociocultural anthropology. This brief essay will examine: Egao, cyberpunk, queer and ethnic cyber-subcultures and relate them to sociocultural anthropology. This field of study as several concerns from the environment to health issues, however, the main in terms of cyber-subcultures deals with social change. Social change can be described as any event that causes a dramatic change immediately or over time. The presence of the Internet and cyberspace has already caused several changes in society. Facebook (FB), Twitter and other social media sights have made it possible to connect with people from different states and countries in seconds. It also makes it possible to find lost friends and reconnect with distant family members. There are opportunities to play games, exchange video files and stream live footage. The possibilities are seemingly endless. Within this new frontier of freedom along with social media Egao can be found. Egao Egao can be defined as a cyber-subculture in satire with the mainstream (Zhang, 2010). It can be accessed from mobile phones and other electronic devices. There are several forms which include: text, audio, image, or video. This particular sub-culture...

Words: 1018 - Pages: 5

Premium Essay

Who Say Swhat

...The remainder of the paper presents a new architecture, combining law and technology, to deal with trespass in cyberspace. Section 8 establishes the goals to be realized by the proposal, and Section 9 defines the precise language of the conceptual terms to be used. Section 10 proposes a legal and technical architecture utilizing the concepts of entities, control, and containers to prevent and govern unauthorized access in cyberspace. In section 11, the merits of this regime are evaluated in terms of meeting the stated objectives as well as feasibility of implementation and acceptance. Finally, section 13 conjectures as to how the implementation of this architecture will influence the world in terms of technology, law, markets, and social norms. 2 Real Space Trespass The right to exclude others has been described as the most fundamental and important right of property owners.[2] Because the right of exclusion "determines what men shall acquire. . . [and] determine[s] the mode of life of many," it involves de facto political sovereignty.[3] Thus, as one commentator has argued, property law should be treated with the same "considerations of social ethics and enlightened public policy which ought to be brought to the discussion of any just form of government."[4] This section will explore traditional trespass law from the vantage points of common law, statutes, and case law, focusing particularly on the common law actions of trespass and trespass to chattel. 2.1 Common Law...

Words: 875 - Pages: 4

Free Essay

Itinfo Security Law and Ethics Course Syllabus

...cyber-squatting. In addition, students examine ethical issues, forensics, and evidence of cyber-crime. (No Prerequisite) |   | | Terminal Course Objectives | DeVry University course content is constructed from curriculum guides developed for each course that are in alignment with specific Terminal Course Objectives (TCOs). The TCOs define the learning objectives that the student will be required to comprehend and demonstrate by course completion. The TCOs that will be covered in detail each week can be found in the Objectives section for that particular week. Whenever possible, a reference will be made from a particular assignment or discussion back to the TCO that it emphasizes. A | Given the importance of Law, Investigation, and Ethics in Computer Security, develop an understanding of the operation of the American legal system, including how the interpretation of statutes, judicial precedents, and legal reasoning affect information security. | B | Given the global nature of the Internet, evaluate how doing business on the Internet may subject you and your company to the laws, regulatory agencies, and judicial systems of multiple states and/or foreign countries. | C | Given that the Internet is owned by no one, consider how information security is affected by governmental regulation, specifically, privacy laws, taxation, assignment of Internet addresses, and the regulation of pornography and gambling. | D | Given the value of information, explain...

Words: 891 - Pages: 4

Premium Essay

Do You Agree with the Position That Anonymity Should Be Preserved in Cyberspace?

...Chuong Ly Do you agree with the position that anonymity should be preserved in cyberspace? Day by day, there are more and more internet communities appear on the Internet. Anonymity along with free speech have been one of the headache topics which have been arguing more a long time. There are many people who against it because they are afraid bad people are using it to scam people or doing bad things without being identified. And there are people who agree with anonymity because they can say what they are afraid to say if their identity is revealed. For me I agree and support anonymity should be preserved in cyberspace, however, there should be limitation for anonymity as well. I think anonymity is good when it’s used for people to post their honest thoughts without being hated or offended by other people because their identity will not be shown. If we use this in an organization, or government, people can report what they see, what they don’t like or what their boss do that considered as bad things. By this technique, the company can improve better because they can see the honest truth about them. For example, my school has a course evaluation technique that allows students to rate their classes, their professors and say their thoughts about the thought and it’s totally anonymous because they don’t have to write down their name down so their identity is totally safe. Another example which is the math forum that my professor created which allows students to post their questions...

Words: 685 - Pages: 3

Premium Essay

Pepsi Privacy

...Ethics and Privacy of Communications in the E-Polis Gordana Dodig-Crnkovic and Virginia Horniak Department of Computer Science and Electronics Mälardalen University Västerås, Sweden I N T R O D U C T I O N The electronic networking of physical space promises wide-ranging advances in science, medicine, delivery of services, environmental monitoring and remediation, industrial production, and the monitoring of persons and machines. It can also lead to new forms of social interaction [..]. However, without appropriate architecture and regulatory controls it can also subvert democratic values. Information technology is not in fact neutral in its values; we must be intentional about design for democracy. (Pottie, 2004) Information and communication technology, ICT, has led to the emergence of global web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it will be discussed in the chapter under the heading Different Views of Privacy. Today’s computer network technologies are sociologically founded on huntergatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely...

Words: 3586 - Pages: 15

Premium Essay

Essay On Cybercrime

...Title: Cybercrime is on a rise in UAE Part1: Introduction Crime is a popular issue that we always heard in this globalization era. It refers to any violation of law or the commission of an act forbidden by law. It can contribute to negative impact in term of social and economic development. Nowadays, there are a lot of crimes which increase around the world; United Arab Emirates is one of the countries at risk of these issues. One of these types is the cybercrime as; people want to keep up with technology and modern life. This matter in increase day by day as every day we hear from the news, newspaper and social media, there's a huge number of people who are victims cybercrime. Brenner (2010) in Cybercrime: Criminal Threats from Cyberspace book state, this type of crimes found in 21-century after the development and globalization because people used technology, but they don't have enough information and not aware about this issue. In addition, Cybercrime is the type of criminal crime which is punishable by law and it means that Using technology resources. Such as, the internet for committing serious crimes such as, deception, fraud, theft, copyright violations and extortion through online stalking, harassment, defamation, and invasion of privacy. Moreover, The cybercrime divided into three divisions, the first division is crimes...

Words: 1569 - Pages: 7

Free Essay

Paper Review

...Technology “Fundamental tenets of ethics include responsibility, accountability, and liability,” Rainer and Cegielski (2011). This paper will discuss two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors.” The two acts that will be covered are the Children’s Online Privacy Protection Act (COPPA) and Children Internet Protection Act (CIPA). The Children's Online Privacy Protection Act (COPPA) is meant to protect collected personal information from children under the age of 13. The privacy act provides website operators with the requirements to maintain and protect children’s privacy. In this new century children are skilled navigators of the Internet, and are fascinated with the Internet and the pool of information they can access. Some websites are designed to gather and store information just from the child visiting different websites of interest this method of information is called a click stream (Coppa, 2013). Blogs and chat rooms are another source of obtaining information in an unethical manner, such as home address, phone numbers, and family member’s names. Websites also target children by tempting them with gifts or prizes to fill out surveys or to sign up for memberships. In short, the world of cyberspace is a highly manipulative environment...

Words: 483 - Pages: 2