Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cyber Ethics

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

CYBER ETHICS SANDHYA PANICKER

INTRODUCTION TO
CYBERETHICS
Study of ethics that pertains to computers and
covers the user behavior and what the
programmed computers are supposed to do,
and the resultant effects on individuals and
society.
WHAT IS CYBERETHICS ?
Ethics in the Web Space or Virtual World. Its a code of safe and responsible behavior
desired from the Internet community. Practicing good cyber-ethics
requires understanding the risks of harmful and illegal online behavior and learn
ways to protect Internet users including ourselves, from such risks.
With the increase of young children using the internet it is now very essential than
ever to tell children about how to properly operate the internet and its dangers.
WHY IS IT REQUIRED ?

Increasing Cybercrime:
Cyber-crimes, hacking of bank accounts and stealing
identities, defrauding people and scamming in a
variety of ways is becoming common.
To protect personal & commercial information such
as login & password info, credit card and account
information and government and commercial
databases. It also controls unwanted internet mail and
ads(Spam).
To control plagiarism, student identity fraud and the
use of copyrighted material.
To promote moral and social values in society.
INCREASING UNETHICAL
BEHAVIOR
Increasing unethical behavior: many
kinds of ethical or moral irresponsible
behavior, in the open space of the
internet arising from actions involving
financial status of people, by hate-
speech or writing that points to gender,
race, culture etc.
Spying: Actions such as governments or corporations spying on individuals,
individuals spying on governments, and so on, raise the need of cyber ethical code.
A cyber ethical code would enlighten citizens about what is good or bad for them
and will hold government responsible for unethical actions.
THREAT TO PRIVACY
Threat to privacy: Privacy from an ethical and moral point of view should be
central to dignity and individuality and personhood. Privacy is also indispensable to
a sense of autonomy to ‘a feeling that there is an area of an individual’s life that
is totally under his or her control, an area that is free from outside intrusion.’ The
deprivation of privacy can even endanger a person’s health. Individuals surrender
private information when conducting transactions and registering for services.
FRAUDS

Fraud and impersonation are some of the malicious


activities that occur due to the direct or indirect
abuse of private information. Identity theft is rising
rapidly. Public records, search engines and
databases are the main culprits contributing to the
rise of cybercrime. Ethical business
practice protects the privacy of their customers by
securing information which may contribute to
the loss of secrecy, anonymity, and solitude.
OWNERSHIP

Ethical debate has long included the concept


of property. This concept has created many
clashes in the world of cyberethics. One
philosophy of the internet is centered around
the freedom of information. The controversy
over ownership occurs when the property of
information is infringed upon or uncertain.
INTELLECTUAL PROPERTY
RIGHTS
The ever-increasing speed of the internet and the
emergence of compression technology, opened the
doors to Peer-to-peer file sharing, a technology that
allowed users to anonymously transfer files to each
other, previously seen on programs. Much of this,
however, was copyrighted music and illegal to transfer
to other users. Whether it is ethical to transfer
copyrighted media is another question. Restrictions are
required because companies would not invest weeks
and months in development if there were no incentive
for revenue generated from sales and licensing fees.
let No. 7 (Cyberethics)
oy Amolato
ngs yet
g Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering

DIGITAL RIGHTS
MANAGEMENT (DRM)
Everand Blind making of audio books of PDFs, allowing people
g Oneself from Hacking
to in the
burn Form of they
music Phishing, Malware,
have Ransomware, bought
legitimately and Social Engineering
to CD or to
n Kiser
ut of 5 stars transfer it to a new computer etc. are seen as violation
(40)
s in Real Life
of the rights of the intellectual property holders,
opening the door to uncompensated use of copyrighted
media. Another ethical issue concerning DRMs involves
the way these systems could undermine the fair use
provisions of the copyright laws. The reason is that
these allow content providers to choose who can view
or listen to their materials making the discrimination
nt1 page against certain groups possible.
s in Real Life
Chauhan
ngs yet
2 E Tech
ACCESSIBILITY, CENSORSHIP
AND FILTERING

Accessibility, censorship and filtering bring up many


ethical issues that have several branches in cyber
ethics. Internet censorship and filtering are used to
control or suppress the publishing or accessing of
information. The legal issues are similar to offline
censorship and filtering. Whether people are better
off with free access to information or should be
protected from what is considered by a governing
body as harmful, indecent or illicit is a new debate.
DIGITAL DIVIDE
An issue specific to the ethical issues of the
freedom of information is what is known as
the digital divide. This refers to the unequal
socio-economic divide between those who
have had access to digital and information
technology, such as cyberspace, and those
who have had limited or no access at all. This
gap of access between countries or regions of
the world is called the global digital divide.

s
FREEDOM OF INFORMATION
Freedom of information, that is the
freedom of speech as well as the freedom
to seek, obtain and impart information
brings up the question of who or what, has
the jurisdiction in cyberspace. The right of
freedom of information is commonly
subject to limitations dependent upon the
country, society and culture concerned.

s
CONCLUSION

Thus in modern times with concerns of privacy, spying, hacking etc. where no
government has control on cyberspace, an international body is must based on
consensus. This body should work on a cyber-ethical “code” or set of guidelines that
would potentially be capable of regulating people’s behavior on the internet.
THANK YOU
BY : SANDHYA PANICKER

You might also like