Cyber Ethics
Cyber Ethics
Cyber Ethics
INTRODUCTION TO
CYBERETHICS
Study of ethics that pertains to computers and
covers the user behavior and what the
programmed computers are supposed to do,
and the resultant effects on individuals and
society.
WHAT IS CYBERETHICS ?
Ethics in the Web Space or Virtual World. Its a code of safe and responsible behavior
desired from the Internet community. Practicing good cyber-ethics
requires understanding the risks of harmful and illegal online behavior and learn
ways to protect Internet users including ourselves, from such risks.
With the increase of young children using the internet it is now very essential than
ever to tell children about how to properly operate the internet and its dangers.
WHY IS IT REQUIRED ?
Increasing Cybercrime:
Cyber-crimes, hacking of bank accounts and stealing
identities, defrauding people and scamming in a
variety of ways is becoming common.
To protect personal & commercial information such
as login & password info, credit card and account
information and government and commercial
databases. It also controls unwanted internet mail and
ads(Spam).
To control plagiarism, student identity fraud and the
use of copyrighted material.
To promote moral and social values in society.
INCREASING UNETHICAL
BEHAVIOR
Increasing unethical behavior: many
kinds of ethical or moral irresponsible
behavior, in the open space of the
internet arising from actions involving
financial status of people, by hate-
speech or writing that points to gender,
race, culture etc.
Spying: Actions such as governments or corporations spying on individuals,
individuals spying on governments, and so on, raise the need of cyber ethical code.
A cyber ethical code would enlighten citizens about what is good or bad for them
and will hold government responsible for unethical actions.
THREAT TO PRIVACY
Threat to privacy: Privacy from an ethical and moral point of view should be
central to dignity and individuality and personhood. Privacy is also indispensable to
a sense of autonomy to ‘a feeling that there is an area of an individual’s life that
is totally under his or her control, an area that is free from outside intrusion.’ The
deprivation of privacy can even endanger a person’s health. Individuals surrender
private information when conducting transactions and registering for services.
FRAUDS
DIGITAL RIGHTS
MANAGEMENT (DRM)
Everand Blind making of audio books of PDFs, allowing people
g Oneself from Hacking
to in the
burn Form of they
music Phishing, Malware,
have Ransomware, bought
legitimately and Social Engineering
to CD or to
n Kiser
ut of 5 stars transfer it to a new computer etc. are seen as violation
(40)
s in Real Life
of the rights of the intellectual property holders,
opening the door to uncompensated use of copyrighted
media. Another ethical issue concerning DRMs involves
the way these systems could undermine the fair use
provisions of the copyright laws. The reason is that
these allow content providers to choose who can view
or listen to their materials making the discrimination
nt1 page against certain groups possible.
s in Real Life
Chauhan
ngs yet
2 E Tech
ACCESSIBILITY, CENSORSHIP
AND FILTERING
s
FREEDOM OF INFORMATION
Freedom of information, that is the
freedom of speech as well as the freedom
to seek, obtain and impart information
brings up the question of who or what, has
the jurisdiction in cyberspace. The right of
freedom of information is commonly
subject to limitations dependent upon the
country, society and culture concerned.
s
CONCLUSION
Thus in modern times with concerns of privacy, spying, hacking etc. where no
government has control on cyberspace, an international body is must based on
consensus. This body should work on a cyber-ethical “code” or set of guidelines that
would potentially be capable of regulating people’s behavior on the internet.
THANK YOU
BY : SANDHYA PANICKER