SlideShare une entreprise Scribd logo
1  sur  16
Cyber Ethics
Moral Values in Cyber
Space
The Good, the Bad, and the
Electronic
2
Advice to Freshmen
 Don’t LOOK at anything in a Physics lab.
 Don’t SMELL anything in a Biology lab.
 Don’t TASTE anything in a Chemistry lab.
 Don’t TOUCH anything in a medical lab.
 Don’t LISTEN to anything in a Philosophy
course.
 Don’t TRUST anything in a computer lab.
3
Two Points of View
 There is nothing new or special about ethical
issues involving computer technology.
 First Law of Philosophy
 There are new, unique ethical issues that
could not have existed without computer
technology.
 Second Law of Philosophy
4
Policy Vacuums
 Computers are logically malleable.
 Typical problems arise in Computer Ethics
because there is a policy vacuum about how
computer technology should be used.
5
What Do We Mean by Cyber Ethics?
 Analysis of the nature and social impact of
computer technology
 Corresponding formulation and justification of
policies for the ethical use of such
technology.
6
Information Gap
 Example: Sub Saharan Africa
 Any third world country
7
On Line Education
 Cyber Degrees
 Social Acceptance?
 Take the Money, send the diploma, but
provide weak or no educational experience
8
Electronic Voting
 Paper vs. machine vs. computer.
 Convenience and speed.
9
On Line Pharmacies
 Convenience and price.
 Prescription needed?
 Doctor’s role?
10
Athletic Recruiting
 Numbers of phone calls vs. emails
 Personal promotions both amateur and
professional
 Two_way investigations
11
RFID
 Radio Frequency Identification RFID
 May contain everything about a person
 Saves Lives
 Invades Privacy
12
Employee Monitoring
 Email
 Websites
 Monitoring software
13
Virtual Life
 Gaming
 Create your own
identity
 Purchase virtual
merchandise
 Hone your skills
14
Who Are You? Who Am I?
 Anonymity in the virtual world
 How many hours do people spend online?
 Confusion?
15
Natural World and Cyberspace
 Physical World: DNA, RNA: A, T, G, C
 Computer World: 0, 1
 Natural Ethics
 Cyber Ethics
 Creation?
– Natural World
– Virtual World
16
Controlling Cyberspace
 Relativism need not apply.
 Cyberspace is beyond geographic and
political boundaries.
 Do we want to enforce ethical standards on
cyberspace?
 Can we?
 We must depend on human integrity.

Contenu connexe

Similaire à CyberEthics.ppt

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Digital Detox: Destruction Myths
Digital Detox: Destruction MythsDigital Detox: Destruction Myths
Digital Detox: Destruction MythsDmitriy Soloveev
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentationICCNS
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your futuresuperb11b
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and techwtidwell
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 
Unit One Technology And You
Unit One Technology And YouUnit One Technology And You
Unit One Technology And Youtammyl66
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
The 7 Key Future Principles of Digital Transformation, Gerd Leonhard, CEO, Th...
The 7 Key Future Principles of Digital Transformation, Gerd Leonhard, CEO, Th...The 7 Key Future Principles of Digital Transformation, Gerd Leonhard, CEO, Th...
The 7 Key Future Principles of Digital Transformation, Gerd Leonhard, CEO, Th...Thoughtworks
 

Similaire à CyberEthics.ppt (20)

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Digital Detox: Destruction Myths
Digital Detox: Destruction MythsDigital Detox: Destruction Myths
Digital Detox: Destruction Myths
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
 
Digitalisation and ethics
Digitalisation and ethicsDigitalisation and ethics
Digitalisation and ethics
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Super billing computers are your future
Super billing computers are your futureSuper billing computers are your future
Super billing computers are your future
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
Unit One Technology And You
Unit One Technology And YouUnit One Technology And You
Unit One Technology And You
 
Ethics Half Day
Ethics Half DayEthics Half Day
Ethics Half Day
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Ethical
EthicalEthical
Ethical
 
The 7 Key Future Principles of Digital Transformation, Gerd Leonhard, CEO, Th...
The 7 Key Future Principles of Digital Transformation, Gerd Leonhard, CEO, Th...The 7 Key Future Principles of Digital Transformation, Gerd Leonhard, CEO, Th...
The 7 Key Future Principles of Digital Transformation, Gerd Leonhard, CEO, Th...
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

CyberEthics.ppt

  • 1. Cyber Ethics Moral Values in Cyber Space The Good, the Bad, and the Electronic
  • 2. 2 Advice to Freshmen  Don’t LOOK at anything in a Physics lab.  Don’t SMELL anything in a Biology lab.  Don’t TASTE anything in a Chemistry lab.  Don’t TOUCH anything in a medical lab.  Don’t LISTEN to anything in a Philosophy course.  Don’t TRUST anything in a computer lab.
  • 3. 3 Two Points of View  There is nothing new or special about ethical issues involving computer technology.  First Law of Philosophy  There are new, unique ethical issues that could not have existed without computer technology.  Second Law of Philosophy
  • 4. 4 Policy Vacuums  Computers are logically malleable.  Typical problems arise in Computer Ethics because there is a policy vacuum about how computer technology should be used.
  • 5. 5 What Do We Mean by Cyber Ethics?  Analysis of the nature and social impact of computer technology  Corresponding formulation and justification of policies for the ethical use of such technology.
  • 6. 6 Information Gap  Example: Sub Saharan Africa  Any third world country
  • 7. 7 On Line Education  Cyber Degrees  Social Acceptance?  Take the Money, send the diploma, but provide weak or no educational experience
  • 8. 8 Electronic Voting  Paper vs. machine vs. computer.  Convenience and speed.
  • 9. 9 On Line Pharmacies  Convenience and price.  Prescription needed?  Doctor’s role?
  • 10. 10 Athletic Recruiting  Numbers of phone calls vs. emails  Personal promotions both amateur and professional  Two_way investigations
  • 11. 11 RFID  Radio Frequency Identification RFID  May contain everything about a person  Saves Lives  Invades Privacy
  • 12. 12 Employee Monitoring  Email  Websites  Monitoring software
  • 13. 13 Virtual Life  Gaming  Create your own identity  Purchase virtual merchandise  Hone your skills
  • 14. 14 Who Are You? Who Am I?  Anonymity in the virtual world  How many hours do people spend online?  Confusion?
  • 15. 15 Natural World and Cyberspace  Physical World: DNA, RNA: A, T, G, C  Computer World: 0, 1  Natural Ethics  Cyber Ethics  Creation? – Natural World – Virtual World
  • 16. 16 Controlling Cyberspace  Relativism need not apply.  Cyberspace is beyond geographic and political boundaries.  Do we want to enforce ethical standards on cyberspace?  Can we?  We must depend on human integrity.