SlideShare a Scribd company logo
1 of 26
Ethics of the Internet
1.Intellectual property protection:
2. Privacy:
It is difficult to ensure that the attack on
privacy in the Internet, and to convince the
public that they are not a secure network to
penetrate the user's privacy.
3. Protect the network from pollution: some
people misuse the freedom of publication on
the internet sites to serve bad sexual
pornography, or incitement to violence, and
implant the spirit of hatred among the
people, or encourage suicide, and therefore
an ethical action and legal deterrent should
be taken to protect the network from these
behaviors.
4. Strengthen confidence in the Internet: some
locations available in the network lack
confidence in the validity or accuracy of the
information, which prevents the users from
citation.
5. Widening the knowledge gap:
the problem emerged sharply in recent times
between rich countries in sources of
information and poor countries in this aspect.
6. Ethical transgressions:
You must protect the network from some
common ethical transgressions, including the
following:
 Theft: caused from penetrating the local
system or forcing up the process forged
through the network.
 Terrorism and espionage-mail: is one of the
ethical problems faced by the information
society in the current era.
 Data manipulation: this problem may occur
from some workers in the institution where
the information changed for several
considerations.
 Phenomenon of internet addiction: because
of the desire to make more friends , exchange
views with the new people, and escape from
reality.
Policy of digitization projects
Digitization process means converting data to
electronic format for processing by computer,
and the resulting need for a policy on the
following aspects:
Copyright :
Laws of copyrights should be updated to fit in
with the digital world , facing the issues and
problems, and should preserve the rights of
authors and publishers and literary material.
Economic rights reserve to the author the right
to physical exploitation of his work. And
moral rights reserve for the author the right
not to distort his work, or modify it.
The material and moral rights of authors have
become violated in light of the use of the
internet. Despite the achieved of the
advantages of electronic publishing, on the
other hand, it made several disadvantages
such as ease of copying digital materials,
academic theft, espionage , cyber terrorism,
fraud, and plagiarism. Laws should fit the
requirements of digital sources.
Another difficulty facing the protection of
copyright is the lack of legal deposit system,
forcing the creator of digital information to
deposit copies of their work at the body
responsible for legal deposit in the country,
which leads to the difficulty of keeping the
national heritage.
Against this problem resorted copyright holders
to find multiple methods to restrict access,
which deprived the user from certain rights
and exemptions enjoyed by under the laws of
copyright protection. The previous, such as
exceptions to use the fair use taken vanish
under the application of conventions, and the
use of digital rights.
Academic thefts in the electronic
             environment
Appeared in cyberspace a new term is the electronic
crimes, or CYBERCRIMES, including thefts,
academic, dissemination of vice, disable the
devices, the destruction of sites, data manipulation,
penetration of e-mail, use copies of original
programs, copyrighted, the distribution of viruses,
published, copy-protected programs, and access to
the files, as well as others.
Robbery means hefting ideas of others on the
internet of articles, research and scientific
studies without reference to the original
source. This differs from the transport and
the quote which is legitimate right for all.
Within the scope of theft, plagiarism, fraud
cheating, piracy, and the like methods of
attack on the ideas of others.
Internet helped the emergence of the problem
of computer crimes or thefts, particularly the
online piracy, which impact on the ethics of
the information society. Laws in this area not
clear as a result of the complexity of internet
crime.
Publishing on the internet is available to all,
contributing to the violation of the rights of
authors, which calls for laws to address this
contemporary phenomenon. There are
Masters and PhD theses were stolen. Also
there are foreign books and articles have
been translated in full text from the internet.
What increases the size of the problem is that
the law does not follow the technical
developments. Internet crimes are
characterized by ambiguity, where it is
difficult to prove and investigate, as is the
case in traditional crimes.
One can not identify the location of the
offender on the internet, and the mental
image of the criminal of the Internet is often
the image of the hero and so smart, it is not
an admirable picture of the criminal who
should be prosecuted.
There are many terms that are used as an
expression of the reciprocal of the forms of
cybercrime, including:
HIGH-TICK CRIME
E-CRIME
COMPUTER CRIME
INFORMATICS CRIME
DIGITAL CRIME
COMPUTER ABUSE
TURNITIN company has developed a program
capable of detecting cases of theft, fraud, and
plagiarism, where theft is discovered by
downloading the article, and compare it with
the billions of pages available on the internet.
Another program helps address the academic
thefts called WORDCHECK, and the site
COPYSCAPE on the internet assists in the
discovery of the stolen articles.
With respect to the laws addressing the theft of
electronic crimes, it is mainly THE DIGITAL
MILLENNIUM COPYRIGHT ACT (DMCA) of
1998 in the United States of America, is
special legislation covering material available
online. As some European countries enacted
laws on cyber crime, and the establishment of
a special section to combat these crimes.
The Arab initiatives in this regard are weak. The
Arab gate for libraries and information the
design of a site that helps to discover the
stolen research and studies in the area
of ​interest. It was discovered that some of the
articles published in CYBRARIANS JOURNAL
have been published in other sites.
The Kingdom of Saudi Arabia became a member
of the Organization of Intellectual Property
Rights (WIPO) in 1982. There are in the
Kingdom three sides responsible for the
protection of intellectual property rights. For
publishing, the Ministry of Information, for
the trademark rights the Ministry of
Commerce, and for tracking of human
inventions and innovations King Abdulaziz
City for Science and Technology.
In the Kingdom certain laws that govern use of
the Internet were issued, including the Anti-
Crime Act, which was issued in 1428 for trying
to criminalize abuse and infringement on the
rights of others, to help achieve information
security, and the protection of public morals.

More Related Content

What's hot

Digital law
Digital lawDigital law
Digital lawzrh48
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
digital law
digital lawdigital law
digital law11tsk
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social SideNatalie Alesi
 
Internet Applications
Internet ApplicationsInternet Applications
Internet ApplicationsMarlon Jamera
 
Application of the internet
Application of the internetApplication of the internet
Application of the internetLayani Malsha
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpointlydneat
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
eductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose Eboraeductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose EboraCarren Pangilinan
 
Internet ,merits demerits, features
Internet ,merits demerits, featuresInternet ,merits demerits, features
Internet ,merits demerits, featuresKiran Kurian Philip
 
Internet and computer
Internet and computerInternet and computer
Internet and computerRhea Dellosa
 
Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...Eman Bustamante
 
Cyberspace
CyberspaceCyberspace
CyberspaceG Prachi
 

What's hot (20)

Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Review questions
Review questionsReview questions
Review questions
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
digital law
digital lawdigital law
digital law
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Internet Applications
Internet ApplicationsInternet Applications
Internet Applications
 
Assignment
AssignmentAssignment
Assignment
 
Application of the internet
Application of the internetApplication of the internet
Application of the internet
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
eductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose Eboraeductech 2 Lesson 16 Mary Rose Ebora
eductech 2 Lesson 16 Mary Rose Ebora
 
Internet surfing
Internet surfingInternet surfing
Internet surfing
 
Internet ,merits demerits, features
Internet ,merits demerits, featuresInternet ,merits demerits, features
Internet ,merits demerits, features
 
Internet and computer
Internet and computerInternet and computer
Internet and computer
 
Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...Trends, Network and Critical Thinking Unit 6 information communication techno...
Trends, Network and Critical Thinking Unit 6 information communication techno...
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 

Similar to اخلاقيات الثالث

Similar to اخلاقيات الثالث (18)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Legal issues in applied technology power point
Legal issues in applied technology power pointLegal issues in applied technology power point
Legal issues in applied technology power point
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
IPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptxIPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptx
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 

اخلاقيات الثالث

  • 1. Ethics of the Internet 1.Intellectual property protection: 2. Privacy: It is difficult to ensure that the attack on privacy in the Internet, and to convince the public that they are not a secure network to penetrate the user's privacy.
  • 2. 3. Protect the network from pollution: some people misuse the freedom of publication on the internet sites to serve bad sexual pornography, or incitement to violence, and implant the spirit of hatred among the people, or encourage suicide, and therefore an ethical action and legal deterrent should be taken to protect the network from these behaviors.
  • 3. 4. Strengthen confidence in the Internet: some locations available in the network lack confidence in the validity or accuracy of the information, which prevents the users from citation.
  • 4. 5. Widening the knowledge gap: the problem emerged sharply in recent times between rich countries in sources of information and poor countries in this aspect.
  • 5. 6. Ethical transgressions: You must protect the network from some common ethical transgressions, including the following:  Theft: caused from penetrating the local system or forcing up the process forged through the network.
  • 6.  Terrorism and espionage-mail: is one of the ethical problems faced by the information society in the current era.  Data manipulation: this problem may occur from some workers in the institution where the information changed for several considerations.
  • 7.  Phenomenon of internet addiction: because of the desire to make more friends , exchange views with the new people, and escape from reality.
  • 8. Policy of digitization projects Digitization process means converting data to electronic format for processing by computer, and the resulting need for a policy on the following aspects:
  • 9. Copyright : Laws of copyrights should be updated to fit in with the digital world , facing the issues and problems, and should preserve the rights of authors and publishers and literary material.
  • 10. Economic rights reserve to the author the right to physical exploitation of his work. And moral rights reserve for the author the right not to distort his work, or modify it.
  • 11. The material and moral rights of authors have become violated in light of the use of the internet. Despite the achieved of the advantages of electronic publishing, on the other hand, it made several disadvantages such as ease of copying digital materials, academic theft, espionage , cyber terrorism, fraud, and plagiarism. Laws should fit the requirements of digital sources.
  • 12. Another difficulty facing the protection of copyright is the lack of legal deposit system, forcing the creator of digital information to deposit copies of their work at the body responsible for legal deposit in the country, which leads to the difficulty of keeping the national heritage.
  • 13. Against this problem resorted copyright holders to find multiple methods to restrict access, which deprived the user from certain rights and exemptions enjoyed by under the laws of copyright protection. The previous, such as exceptions to use the fair use taken vanish under the application of conventions, and the use of digital rights.
  • 14. Academic thefts in the electronic environment Appeared in cyberspace a new term is the electronic crimes, or CYBERCRIMES, including thefts, academic, dissemination of vice, disable the devices, the destruction of sites, data manipulation, penetration of e-mail, use copies of original programs, copyrighted, the distribution of viruses, published, copy-protected programs, and access to the files, as well as others.
  • 15. Robbery means hefting ideas of others on the internet of articles, research and scientific studies without reference to the original source. This differs from the transport and the quote which is legitimate right for all. Within the scope of theft, plagiarism, fraud cheating, piracy, and the like methods of attack on the ideas of others.
  • 16. Internet helped the emergence of the problem of computer crimes or thefts, particularly the online piracy, which impact on the ethics of the information society. Laws in this area not clear as a result of the complexity of internet crime.
  • 17. Publishing on the internet is available to all, contributing to the violation of the rights of authors, which calls for laws to address this contemporary phenomenon. There are Masters and PhD theses were stolen. Also there are foreign books and articles have been translated in full text from the internet.
  • 18. What increases the size of the problem is that the law does not follow the technical developments. Internet crimes are characterized by ambiguity, where it is difficult to prove and investigate, as is the case in traditional crimes.
  • 19. One can not identify the location of the offender on the internet, and the mental image of the criminal of the Internet is often the image of the hero and so smart, it is not an admirable picture of the criminal who should be prosecuted.
  • 20. There are many terms that are used as an expression of the reciprocal of the forms of cybercrime, including: HIGH-TICK CRIME E-CRIME COMPUTER CRIME INFORMATICS CRIME DIGITAL CRIME COMPUTER ABUSE
  • 21. TURNITIN company has developed a program capable of detecting cases of theft, fraud, and plagiarism, where theft is discovered by downloading the article, and compare it with the billions of pages available on the internet.
  • 22. Another program helps address the academic thefts called WORDCHECK, and the site COPYSCAPE on the internet assists in the discovery of the stolen articles.
  • 23. With respect to the laws addressing the theft of electronic crimes, it is mainly THE DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA) of 1998 in the United States of America, is special legislation covering material available online. As some European countries enacted laws on cyber crime, and the establishment of a special section to combat these crimes.
  • 24. The Arab initiatives in this regard are weak. The Arab gate for libraries and information the design of a site that helps to discover the stolen research and studies in the area of ​interest. It was discovered that some of the articles published in CYBRARIANS JOURNAL have been published in other sites.
  • 25. The Kingdom of Saudi Arabia became a member of the Organization of Intellectual Property Rights (WIPO) in 1982. There are in the Kingdom three sides responsible for the protection of intellectual property rights. For publishing, the Ministry of Information, for the trademark rights the Ministry of Commerce, and for tracking of human inventions and innovations King Abdulaziz City for Science and Technology.
  • 26. In the Kingdom certain laws that govern use of the Internet were issued, including the Anti- Crime Act, which was issued in 1428 for trying to criminalize abuse and infringement on the rights of others, to help achieve information security, and the protection of public morals.