SlideShare une entreprise Scribd logo
1  sur  46
Ethics in Cyber Space
What are Ethics anyway?
 Understanding how your actions affect other people
 Knowing right from wrong
 Taking personal responsibility for your actions
 So , “Ethics is about putting principles into action. Consistency between what
we say and … what our actions say… is a matter of integrity.”
Unethical vs. Illegal
 What is unethical is not necessarily illegal.
 For example, the issue of a company legally monitoring Employee‟s E-mail is
very controversial issues.
 Employees have limited protection against employer‟s electronic surveillance.
 The law appears to support employer‟s rights to read electronic mail and
other electronic documents of their employees.
 Here, The definitions of “Right” and “Wrong” are not clear. Also, the
distinction between what is illegal and what is unethical is not always obvious
What do we mean by CYBERETHICS ?
 Cyberethics is the philosophic study of ethics pertaining to computer
networks, encompassing user behaviour.
 what networked computers are programmed to do, and how this
affects individuals and society.
 Cyber-Ethics is the Ethics applied to the online environment.
Why should we be Concerned about
Cyber Ethics ?
 Anonymous posting to blogs, websites and social media can encourage bad
behaviour anytime.
 Information in cyberspace can be accessed globally.
 what is right and wrong for Internet users can do,
 what are the social impacts of Information Technology (IT).
 understand security, privacy issues, and major negative impacts of IT on
cyberspace
 Computer Networks can be threatened by many internal and external hazards
internationally,
Why Cyber Ethics ?
Cyber Ethics underpin actions that must be
taken not only to harness the power of the IT
itself, but also to survive its revolution so it
should be the concern of everyone.
Three main types of Ethical issues
 Privacy
IT enables exchange of information on a large scale enables increased
potential for disclosing information and violating the privacy
 Access Right
The topic of computer security and access right has moved quickly from
being a low priority for corporations to high priority for government
agencies.
 Harmful Actions
Harm to any of users, the general public, employees, and employers .
Harmful actions include intentional destruction or modification of files and
programs leading to serious loss of resources or unnecessary expenditure of
human resources.
Let’s review and discuss some common
cyber-ethical
concerns…
Acceptable Use Policy (AUP)
Violations
 Disregard for technology or
network rules and policies. This
could be willful or unintended
disregard.
Piracy
 Unauthorized duplication and distribution of
items such as games, software, DVDs, music, etc.
 End User License Agreement Violation : When
you purchase a game or CD, you are purchasing a
license to USE them; you do not OWN them.
Plagiarism
 Using another person’s ideas,
words, images, or original works
as your own without
acknowledging the source.
Cyber-bullying
"Cyber-bullying" is when a child or
teen is tormented, threatened,
harassed, humiliated, embarrassed,
or otherwise targeted by another
child or teen using the Internet,
interactive and digital technologies,
or cell phones.
Cyber-libel
 Deliberate misrepresentation of
people or events.
 False statements that harm
another’s reputation.
Worms and Viruses
 Malicious programs shared
with the intent of shutting down
a computer or computer system.
Violating Privacy
 Willfully using another person’s
password to access his or her
email or documents online,
distributing private information
of or about another.
Cyber-stalking
 The use of the Internet, email,
or other electronic
communications devices
to stalk another
person.
79.5
73.1
59.3 59
55.2
48.5
10.4
0
10
20
30
40
50
60
70
80
90
Fraudulent
Information
violation of
privacy
False Rumors Obscence
Information
Libel Information Civil Rights
Violation
Gambling
Information
Illegal Information on Internet
Call into Questions…
 Is it ok to display personal information
about other on the Internet ?
 Who owns digital data ( such as
music, movies, books, webpages etc.)
and what should users be allowed to do
with it ?
 Who is allowed to access the data and
information?
 How can we safeguards to ensure that
the information can be accessed only by
the right person or organizations?
Who should be Concerned about Cyber
Ethics ?
 businesses and governments rely on technical measures to protect themselves
from false information, stealing, deny access, or even destroy valuable
information.
 Self-protection is not sufficient to make cyberspace a safe place to conduct
business. The rule of law must also be enforced.
 Cyber ethics must be taught and reinforced at every level of computer use
 From the novice user just learning to navigate a computer and the
internet, to an information technology professional
 Those who use the internet in any mode must be taught ethical practices in
every aspect of its use
The Rules of Ethical Cyber Activity
 Basic Rule – Do not do something in cyber space that you would consider
wrong or illegal in everyday life
 Do not use rude or offensive language
 Do not be a bully on the Internet. Do not call peoples name, lie about
them, send embarrassing pictures of them, or anything else to try to heart
them.
 Don‟t encourage the cyberbullies. Do report cyberbullying.
 Do use internet for research and information but don‟t use copyrighted
information as your own.
The Rules of Ethical Cyber Activity
 Do not break into someone else‟s computer.
 Do not attempt to infect or in any way try to make someone else‟s computer
unusable.
 Don‟t share personal information too easily.
 Do use the internet to expand your social and business network but don‟t
hamper other in doing so.
Internet Safety
 Guard your privacy : What people know about you is up to you.
 Protect your reputation: Self-reflect before you self-reveal. What‟s funny or
edgy today could cost you tomorrow.
 Nothing is private online: Anything you say or do can be copied, pasted and
sent to billions of people without your permission.
 Assume everyone is watching: There is huge vast audience out there.
Someone you don‟t know also has access to your information.
 Apply the golden rule: If you don‟t want it done to you, then don‟t do it with
someone else.
 Watch the clock : A virtual hug never matches a real one. Balance your life.
Internet Safety
 Choose wisely: Not all the content is appropriate. You know what we mean.
 Don‟t hide: Using anonymity to cloak your actions doen‟t turn you into a
trustworthy, responsible human being.
 Think about what you see: Just because you find it over internet doesn‟t
make it true.
 Be smart, be safe: Not everyone is who they say they are. Be smart while
sitting online and interacting with people.
ACM Commitments on Ethics
1. Contribute to society and human being.
2. Avoid harm to others.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate.
5. Honor property rights including copyrights and patents.
6. Give proper credit for intellectual property.
7. Respect the privacy of others.
8. Honor confidentiality.
9. Contribute to society and human being.
CONCLUSION
 The new world of information society with global networks and cyberspace
will inevitably generate a wide variety of social, political, and ethical
problems.
 Basic issues have been solved partially using technological approaches and
legal laws in cyberspace.
 Guidelines and strategies should be implemented so that global information
can be exploited in a socially and ethically sensitive way for our future
benefit and applications.
CASE STUDY 1
Facebook confessions page
Facebook confessions page
 It is page on Facebook on which any one can anonymously post a
personal information.
 Juicy-campus launched in 2007 with the goal of enabling “online
anonymous free speech on college campuses”.
 College ACB.com in 2007 which peaked with over 900,000 views
in a single day
 College ACB closed down in October 2011 but anonymous online
confession sites didn‟t go away
What is it ?
Facebook confessions page
 US college students began using a combination of Facebook pages
and anonymous forms such as Google Forms or SurveyMonkey to
create school based Facebook Confession Pages.
 In India it started in IIT-B and just after one day It also started in
LNMIIT and various other collages.
 These services were controversial as many of the posted
confessions hurt the school‟s image.
What is it ?
Facebook confessions page
ANONYMITY is the answer to this.
 Anonymity is an important and useful tool in many
situations.
 Most adults have at some time read newspaper advice
columns where readers anonymously submit problems and
an “Agony Aunt” responds with advice so that others with
similar problems benefit.
 Voting is usually done anonymously to allow freedom of
expression and governments protect anonymous
whistleblowers with legislation.
Why do Students use them ?
Facebook confessions page
 And police “Tips” phone services assure anonymity as a way
of getting people to share others‟ misdeeds.
 Kids Help Phone encourages teens and children to phone in
and share their problems anonymously because this helps
teens and children to address problems they can‟t in other
ways
 What no one can deny is that the need to share
anonymously is deep-seated.
Why do Students use them ?
Facebook confessions page
 Facebook Confession Pages are simply pages that allow
students to anonymously submit their deepest secrets.
 The moderator of the page posts the confessions on the
Facebook page.
 Students who „like‟ the page can see each confession and
can „like‟ each confession and comment.
 The moderators of the page are often unknown to the
students, as are the contributors.
How do they work ?
Facebook confessions page
 The Facebook Confession Page model has caught on and
spreading fast.
 The pages are free, easy to set up and tap into this deep-
seated need teens and young adults have to share what
they‟re really thinking and feeling without fear of adult
sanctions.
How do they work ?
Facebook confessions page
 While the original intent of Facebook Confession Pages was
to offer a forum for students to share problems, concerns
and secrets that isn‟t all students are sharing. The online
dis-inhibition effect, a loosening of social restrictions and
inhibitions that would normally be present in social
interactions, means that many students want to also use
the confessions pages to share stories of alcohol and drug
use or sexual behaviour. In some cases the pages lead to
cyberbullying or even slander.
What are the problems ?
Facebook confessions page
 Invasion of Privacy
 Character Assassination
What is Unethical here ?
Facebook confessions page
 Experience in other jurisdictions suggests that taking pages
down won‟t solve the problem. Pages are easy to set
up, and often when one is taken down another pops up
right away moderated by a different student.
 Teens expressing depression, issues with body image or
alcohol and drug use should concern us all and rather than
preventing them from posting about it we should be looking
at the behavior and trying to address it.
What can educators and parents to do?
Facebook confessions page
 Students clearly have a need to post anonymously about
their problems, concerns and fears.
 Schools should embrace the opportunity and set up their
own “Confessions Pages”, moderated by students but with
guidelines
 Confession Pages and their associated problems also
highlight the need for greater education about digital
citizenship for students
What can educators and parents to do?
Facebook confessions page
 need to better understand the risks of posting and the
permanent and public nature of digital spaces.
 This starts at an early age with parents talking to children
about social media and modeling good online behavior
themselves.
What can educators and parents to do?
CASE STUDY 2
Napster vs RIAA
The Napster Controversy: RIAA vs. Napster
 In the summer of 1999, a website, www.napster.com, was
launched in the US. The website made it possible for its
users to freely share their music files through the Internet
with other users all over the world.
 The service became extremely popular within a short span
of time. The website attracted 1.6 million simultaneous
users during the height of its popularity in February 2000.
 Napster's offering of this 'peer-to-peer' technology was
strongly condemned by the Recording Industry Association of
America (RIAA), a trade group representing the world's
biggest record labels, Universal Music, Sony Music, Warner
Music, EMI Group and Bertelsmann AG.
Allegation on Napster
 RIAA alleged that Napster was engaging in or assisting others
in copying copyrighted music without payment or the
express permission of the rights owners.
 RIAA also claimed that Napster would significantly harm the
sales of the recording industry.
 In December 1999, the body sued Napster in the Federal
District Court for copyright infringements and petitioned the
court to shut down the website.
What Happened NEXT.
 The legal battle was covered extensively in the global media.
 In the beginning of July 2001, Napster had to stop offering its services
due to certain technical problems. While the company was working
towards setting the problems right and resuming operations, in mid
July 2001, a District Court Judge order barred Napster from offering
the file-sharing service.
 Even as Napster users strongly protested against the order, the
company appealed the ruling before the US Court of Appeals in San
Francisco. The Appeals Court granted Napster temporary reprieve
against injunction until a further review of the injunction request.
 Napster was eventually acquired by Roxio. In its second incarnation
Napster became an online music store until it was acquired by
Rhapsody from Best Buy on 1 December 2011.
Questions Raised
 The controversy raised several questions regarding the
impact of the emergence of newer technologies like Napster
on the traditional modes of conducting business.
 Was the recording industry using its financial power to
suppress technological innovations in the music business?
 Was Napster wrong in allowing people across the globe to
access music without paying for it and without the artistes'
permission?
 The case eventually came to be seen as a struggle by the
powerful entertainment industry against a new technology
threatening it.
Ethical Point of View
 Shared Music For Free But Not
FREE MUSIC.
What went wrong ?
Ethical Point of View
 Firstly, Because it caused Heavy Loses to the Recording
industry; Artists & Recording houses who spent millions in
productions.
 Secondly, It directly encouraged Piracy of Music and giving
birth to Many other similar websites
Why was it Unethical ?
Thank You…

Contenu connexe

Tendances

Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies Bhagya Bgk
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceraviteja reddy
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 

Tendances (20)

Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Data security
Data securityData security
Data security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 

En vedette

QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATIONQUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATIONMary Blaise Mantiza
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Quality assurance in education through voluntary accreditation
Quality assurance in education through voluntary accreditationQuality assurance in education through voluntary accreditation
Quality assurance in education through voluntary accreditationgratinale
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
Curricular landscape for the 21 st century
Curricular landscape for the 21 st centuryCurricular landscape for the 21 st century
Curricular landscape for the 21 st centuryNina Graye Sean Lanante
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Mother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
Mother Tongue Based - Multilingual Education (MTB-MLE) in PhilippinesMother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
Mother Tongue Based - Multilingual Education (MTB-MLE) in PhilippinesDåLé Rǝnomǝron
 

En vedette (20)

Bridging Between Languages
Bridging Between LanguagesBridging Between Languages
Bridging Between Languages
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATIONQUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
 
Cyber law
Cyber lawCyber law
Cyber law
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Quality assurance in education through voluntary accreditation
Quality assurance in education through voluntary accreditationQuality assurance in education through voluntary accreditation
Quality assurance in education through voluntary accreditation
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Spiral progression in Science
Spiral progression in ScienceSpiral progression in Science
Spiral progression in Science
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Curricular landscape for the 21 st century
Curricular landscape for the 21 st centuryCurricular landscape for the 21 st century
Curricular landscape for the 21 st century
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Mother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
Mother Tongue Based - Multilingual Education (MTB-MLE) in PhilippinesMother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
Mother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
 

Similaire à Ethics in cyber space

Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)Maria Obaidi
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
The Nine Elements of Technology
The Nine Elements of TechnologyThe Nine Elements of Technology
The Nine Elements of TechnologyYousef93
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.vitor94
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 

Similaire à Ethics in cyber space (20)

Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
The Nine Elements of Technology
The Nine Elements of TechnologyThe Nine Elements of Technology
The Nine Elements of Technology
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 

Plus de nitss007

Practical ethics
Practical ethicsPractical ethics
Practical ethicsnitss007
 
Political violence
Political violencePolitical violence
Political violencenitss007
 
Incentives
IncentivesIncentives
Incentivesnitss007
 
Freakonomics
FreakonomicsFreakonomics
Freakonomicsnitss007
 
Personality Development
Personality DevelopmentPersonality Development
Personality Developmentnitss007
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 

Plus de nitss007 (6)

Practical ethics
Practical ethicsPractical ethics
Practical ethics
 
Political violence
Political violencePolitical violence
Political violence
 
Incentives
IncentivesIncentives
Incentives
 
Freakonomics
FreakonomicsFreakonomics
Freakonomics
 
Personality Development
Personality DevelopmentPersonality Development
Personality Development
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 

Dernier

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Dernier (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Ethics in cyber space

  • 2. What are Ethics anyway?  Understanding how your actions affect other people  Knowing right from wrong  Taking personal responsibility for your actions  So , “Ethics is about putting principles into action. Consistency between what we say and … what our actions say… is a matter of integrity.”
  • 3. Unethical vs. Illegal  What is unethical is not necessarily illegal.  For example, the issue of a company legally monitoring Employee‟s E-mail is very controversial issues.  Employees have limited protection against employer‟s electronic surveillance.  The law appears to support employer‟s rights to read electronic mail and other electronic documents of their employees.  Here, The definitions of “Right” and “Wrong” are not clear. Also, the distinction between what is illegal and what is unethical is not always obvious
  • 4. What do we mean by CYBERETHICS ?  Cyberethics is the philosophic study of ethics pertaining to computer networks, encompassing user behaviour.  what networked computers are programmed to do, and how this affects individuals and society.  Cyber-Ethics is the Ethics applied to the online environment.
  • 5. Why should we be Concerned about Cyber Ethics ?  Anonymous posting to blogs, websites and social media can encourage bad behaviour anytime.  Information in cyberspace can be accessed globally.  what is right and wrong for Internet users can do,  what are the social impacts of Information Technology (IT).  understand security, privacy issues, and major negative impacts of IT on cyberspace  Computer Networks can be threatened by many internal and external hazards internationally,
  • 6. Why Cyber Ethics ? Cyber Ethics underpin actions that must be taken not only to harness the power of the IT itself, but also to survive its revolution so it should be the concern of everyone.
  • 7. Three main types of Ethical issues  Privacy IT enables exchange of information on a large scale enables increased potential for disclosing information and violating the privacy  Access Right The topic of computer security and access right has moved quickly from being a low priority for corporations to high priority for government agencies.  Harmful Actions Harm to any of users, the general public, employees, and employers . Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources.
  • 8. Let’s review and discuss some common cyber-ethical concerns…
  • 9. Acceptable Use Policy (AUP) Violations  Disregard for technology or network rules and policies. This could be willful or unintended disregard.
  • 10. Piracy  Unauthorized duplication and distribution of items such as games, software, DVDs, music, etc.  End User License Agreement Violation : When you purchase a game or CD, you are purchasing a license to USE them; you do not OWN them.
  • 11. Plagiarism  Using another person’s ideas, words, images, or original works as your own without acknowledging the source.
  • 12. Cyber-bullying "Cyber-bullying" is when a child or teen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child or teen using the Internet, interactive and digital technologies, or cell phones.
  • 13. Cyber-libel  Deliberate misrepresentation of people or events.  False statements that harm another’s reputation.
  • 14. Worms and Viruses  Malicious programs shared with the intent of shutting down a computer or computer system.
  • 15. Violating Privacy  Willfully using another person’s password to access his or her email or documents online, distributing private information of or about another.
  • 16. Cyber-stalking  The use of the Internet, email, or other electronic communications devices to stalk another person.
  • 17. 79.5 73.1 59.3 59 55.2 48.5 10.4 0 10 20 30 40 50 60 70 80 90 Fraudulent Information violation of privacy False Rumors Obscence Information Libel Information Civil Rights Violation Gambling Information Illegal Information on Internet
  • 18. Call into Questions…  Is it ok to display personal information about other on the Internet ?  Who owns digital data ( such as music, movies, books, webpages etc.) and what should users be allowed to do with it ?  Who is allowed to access the data and information?  How can we safeguards to ensure that the information can be accessed only by the right person or organizations?
  • 19. Who should be Concerned about Cyber Ethics ?  businesses and governments rely on technical measures to protect themselves from false information, stealing, deny access, or even destroy valuable information.  Self-protection is not sufficient to make cyberspace a safe place to conduct business. The rule of law must also be enforced.  Cyber ethics must be taught and reinforced at every level of computer use  From the novice user just learning to navigate a computer and the internet, to an information technology professional  Those who use the internet in any mode must be taught ethical practices in every aspect of its use
  • 20. The Rules of Ethical Cyber Activity  Basic Rule – Do not do something in cyber space that you would consider wrong or illegal in everyday life  Do not use rude or offensive language  Do not be a bully on the Internet. Do not call peoples name, lie about them, send embarrassing pictures of them, or anything else to try to heart them.  Don‟t encourage the cyberbullies. Do report cyberbullying.  Do use internet for research and information but don‟t use copyrighted information as your own.
  • 21. The Rules of Ethical Cyber Activity  Do not break into someone else‟s computer.  Do not attempt to infect or in any way try to make someone else‟s computer unusable.  Don‟t share personal information too easily.  Do use the internet to expand your social and business network but don‟t hamper other in doing so.
  • 22. Internet Safety  Guard your privacy : What people know about you is up to you.  Protect your reputation: Self-reflect before you self-reveal. What‟s funny or edgy today could cost you tomorrow.  Nothing is private online: Anything you say or do can be copied, pasted and sent to billions of people without your permission.  Assume everyone is watching: There is huge vast audience out there. Someone you don‟t know also has access to your information.  Apply the golden rule: If you don‟t want it done to you, then don‟t do it with someone else.  Watch the clock : A virtual hug never matches a real one. Balance your life.
  • 23. Internet Safety  Choose wisely: Not all the content is appropriate. You know what we mean.  Don‟t hide: Using anonymity to cloak your actions doen‟t turn you into a trustworthy, responsible human being.  Think about what you see: Just because you find it over internet doesn‟t make it true.  Be smart, be safe: Not everyone is who they say they are. Be smart while sitting online and interacting with people.
  • 24. ACM Commitments on Ethics 1. Contribute to society and human being. 2. Avoid harm to others. 3. Be honest and trustworthy. 4. Be fair and take action not to discriminate. 5. Honor property rights including copyrights and patents. 6. Give proper credit for intellectual property. 7. Respect the privacy of others. 8. Honor confidentiality. 9. Contribute to society and human being.
  • 25. CONCLUSION  The new world of information society with global networks and cyberspace will inevitably generate a wide variety of social, political, and ethical problems.  Basic issues have been solved partially using technological approaches and legal laws in cyberspace.  Guidelines and strategies should be implemented so that global information can be exploited in a socially and ethically sensitive way for our future benefit and applications.
  • 26. CASE STUDY 1 Facebook confessions page
  • 27. Facebook confessions page  It is page on Facebook on which any one can anonymously post a personal information.  Juicy-campus launched in 2007 with the goal of enabling “online anonymous free speech on college campuses”.  College ACB.com in 2007 which peaked with over 900,000 views in a single day  College ACB closed down in October 2011 but anonymous online confession sites didn‟t go away What is it ?
  • 28. Facebook confessions page  US college students began using a combination of Facebook pages and anonymous forms such as Google Forms or SurveyMonkey to create school based Facebook Confession Pages.  In India it started in IIT-B and just after one day It also started in LNMIIT and various other collages.  These services were controversial as many of the posted confessions hurt the school‟s image. What is it ?
  • 29. Facebook confessions page ANONYMITY is the answer to this.  Anonymity is an important and useful tool in many situations.  Most adults have at some time read newspaper advice columns where readers anonymously submit problems and an “Agony Aunt” responds with advice so that others with similar problems benefit.  Voting is usually done anonymously to allow freedom of expression and governments protect anonymous whistleblowers with legislation. Why do Students use them ?
  • 30. Facebook confessions page  And police “Tips” phone services assure anonymity as a way of getting people to share others‟ misdeeds.  Kids Help Phone encourages teens and children to phone in and share their problems anonymously because this helps teens and children to address problems they can‟t in other ways  What no one can deny is that the need to share anonymously is deep-seated. Why do Students use them ?
  • 31. Facebook confessions page  Facebook Confession Pages are simply pages that allow students to anonymously submit their deepest secrets.  The moderator of the page posts the confessions on the Facebook page.  Students who „like‟ the page can see each confession and can „like‟ each confession and comment.  The moderators of the page are often unknown to the students, as are the contributors. How do they work ?
  • 32. Facebook confessions page  The Facebook Confession Page model has caught on and spreading fast.  The pages are free, easy to set up and tap into this deep- seated need teens and young adults have to share what they‟re really thinking and feeling without fear of adult sanctions. How do they work ?
  • 33. Facebook confessions page  While the original intent of Facebook Confession Pages was to offer a forum for students to share problems, concerns and secrets that isn‟t all students are sharing. The online dis-inhibition effect, a loosening of social restrictions and inhibitions that would normally be present in social interactions, means that many students want to also use the confessions pages to share stories of alcohol and drug use or sexual behaviour. In some cases the pages lead to cyberbullying or even slander. What are the problems ?
  • 34. Facebook confessions page  Invasion of Privacy  Character Assassination What is Unethical here ?
  • 35. Facebook confessions page  Experience in other jurisdictions suggests that taking pages down won‟t solve the problem. Pages are easy to set up, and often when one is taken down another pops up right away moderated by a different student.  Teens expressing depression, issues with body image or alcohol and drug use should concern us all and rather than preventing them from posting about it we should be looking at the behavior and trying to address it. What can educators and parents to do?
  • 36. Facebook confessions page  Students clearly have a need to post anonymously about their problems, concerns and fears.  Schools should embrace the opportunity and set up their own “Confessions Pages”, moderated by students but with guidelines  Confession Pages and their associated problems also highlight the need for greater education about digital citizenship for students What can educators and parents to do?
  • 37. Facebook confessions page  need to better understand the risks of posting and the permanent and public nature of digital spaces.  This starts at an early age with parents talking to children about social media and modeling good online behavior themselves. What can educators and parents to do?
  • 39. The Napster Controversy: RIAA vs. Napster  In the summer of 1999, a website, www.napster.com, was launched in the US. The website made it possible for its users to freely share their music files through the Internet with other users all over the world.  The service became extremely popular within a short span of time. The website attracted 1.6 million simultaneous users during the height of its popularity in February 2000.  Napster's offering of this 'peer-to-peer' technology was strongly condemned by the Recording Industry Association of America (RIAA), a trade group representing the world's biggest record labels, Universal Music, Sony Music, Warner Music, EMI Group and Bertelsmann AG.
  • 40. Allegation on Napster  RIAA alleged that Napster was engaging in or assisting others in copying copyrighted music without payment or the express permission of the rights owners.  RIAA also claimed that Napster would significantly harm the sales of the recording industry.  In December 1999, the body sued Napster in the Federal District Court for copyright infringements and petitioned the court to shut down the website.
  • 41. What Happened NEXT.  The legal battle was covered extensively in the global media.  In the beginning of July 2001, Napster had to stop offering its services due to certain technical problems. While the company was working towards setting the problems right and resuming operations, in mid July 2001, a District Court Judge order barred Napster from offering the file-sharing service.  Even as Napster users strongly protested against the order, the company appealed the ruling before the US Court of Appeals in San Francisco. The Appeals Court granted Napster temporary reprieve against injunction until a further review of the injunction request.  Napster was eventually acquired by Roxio. In its second incarnation Napster became an online music store until it was acquired by Rhapsody from Best Buy on 1 December 2011.
  • 42. Questions Raised  The controversy raised several questions regarding the impact of the emergence of newer technologies like Napster on the traditional modes of conducting business.  Was the recording industry using its financial power to suppress technological innovations in the music business?  Was Napster wrong in allowing people across the globe to access music without paying for it and without the artistes' permission?  The case eventually came to be seen as a struggle by the powerful entertainment industry against a new technology threatening it.
  • 43. Ethical Point of View  Shared Music For Free But Not FREE MUSIC. What went wrong ?
  • 44. Ethical Point of View  Firstly, Because it caused Heavy Loses to the Recording industry; Artists & Recording houses who spent millions in productions.  Secondly, It directly encouraged Piracy of Music and giving birth to Many other similar websites Why was it Unethical ?
  • 45.