Premium Essay

Ethics in Cyberspace

In: Computers and Technology

Submitted By ctj007
Words 851
Pages 4
Title: Ethics in Cyberspace

Ethics in Cyberspace Chris Jones Strayer University

CIS 324 Professor Luis ACEVEDO March 15, 2012

Ethics in Cyberspace

What is Cyberspace? Cyberspace is a global community of people using computers in networks. For ensured functionality, virtual communities with Internet support depend on rules of conduct, likewise with any other society. Business people like librarians and information technologists must have matured knowledge about ethical issues for their companies’ welfare and to protect and mentor other users. What is ethics? Ethics is the art of determining what is good or right. It can also be defined as a way of life or general pattern, a set of rules of conduct or moral code. Ethical guidelines are based on values. The Association of Computing Machinery (ACM) is a national organization that has a developed statement of its values. ACM’s every member is expected to uphold the Code of Ethics and Professional Conduct which includes these morals:

1) contribute to society and human well-being
2) avoid harm to others
3) be honest and trustworthy
4) be fair and take action not to discriminate
5) honor property rights including copyrights and patents
6) give proper credit for intellectual property
7) respect the privacy of others
8) honor confidentiality. New moral issues occur due to the nature of electronic communication.
Individuals and organizations should be proactive in examining these concerns and developing policies which protect liabilities. Top issues which need to be discussed include: privacy of mail, personal identities, access and control of the network, pornographic or unwanted messages, copyright, and commercial uses of the network. AUP also known as Acceptable Use Policy is…...

Similar Documents

Free Essay

Cyberspace Today, technology has become very advanced, dealing with worldwide problems in a more efficient manner. However, many are abusing this breakthrough invention because internet users are not aware of the vital connection that the real world has with the virtual world. In the article “Character Education for Cyberspace: Developing Good Netizens” by Andrew J. Milson and Beong-Wan Chu, human’s actions opposing from the real world is explained. Furthermore, in the article “We Need to Learn to Become Digital Citizens,” by Nick Harkaway, the connection between the real world and the virtual world is clarified and the importance of becoming a smart internet user is expressed. This paper will illustrate the authors’ claims in emphasizing the dangers of the virtual world that humans are ignorant toward by asserting claims sub claims, and examples to express their purpose. The main argument of the article, “Character Education for Cyberspace: Developing Good Netizens” by Andrew J. Milson and Beong-Wan Chu, is that cyberspace allows people to communicate and say words that they would not say or do in real life. Milson and Chu state, “In the most complex sense, cyberspace may be conceived as a parallel world where people can conduct ordinary activities without engaging in the physical acts traditionally associated with such activities” (Milson and Chu 1). They are saying that the internet gives people the opportunity to talk to one another and speak their minds without having to......

Words: 1796 - Pages: 8

Premium Essay

Identity Theft Via Cyberspace

...Kim Moore ITT Technical Institute/NSA Black/NT1110 December 3, 2012 Identity theft is when someone uses another’s personal information without that person’s knowledge or permission to pretend to be that person. There are several types of identity theft; financial, criminal, cloning, business, medical, and synthetic, just to name a few. Identity theft has been around a long time, but it has become increasingly more prevalent in recent years due to the increased use of cyberspace. It also has become easier for thieves to operate without getting caught. Identity thieves are all around. They are like strangers we tell our kids to beware of. Anyone we come in contact with could be a potential identity thief. Every day identity thieves are planning their next theft. They use cyberspace to collect information through phishing, which is sending emails that pretend to be a legitimate business, but provide links to fake websites and ask for personal information. Also, through pharming, they send emails with viruses attached. Another way is through robot networks, these allow a hacker to take control of a computer from a remote location. Lastly, through typosquatting, when people make typing errors they land on websites that are similar to legitimate businesses, this allows thieves to infect computers (Ramaswamy, 2006). Thieves also use spyware and malware to gain information from unsuspecting people. Identity thieves steal from unsuspecting victims for......

Words: 725 - Pages: 3

Free Essay


... A Different Word: Subcultures in Cyberspace Student’s Name Institutional Affiliation A Different Word: Subcultures in Cyberspace The way people organize, govern and create meaning in their lives is associated with social patterns that link to other cultures. This describes the study of sociocultural anthropology. This brief essay will examine: Egao, cyberpunk, queer and ethnic cyber-subcultures and relate them to sociocultural anthropology. This field of study as several concerns from the environment to health issues, however, the main in terms of cyber-subcultures deals with social change. Social change can be described as any event that causes a dramatic change immediately or over time. The presence of the Internet and cyberspace has already caused several changes in society. Facebook (FB), Twitter and other social media sights have made it possible to connect with people from different states and countries in seconds. It also makes it possible to find lost friends and reconnect with distant family members. There are opportunities to play games, exchange video files and stream live footage. The possibilities are seemingly endless. Within this new frontier of freedom along with social media Egao can be found. Egao Egao can be defined as a cyber-subculture in satire with the mainstream (Zhang, 2010). It can be accessed from mobile phones and other electronic devices. There are several forms which include: text, audio, image, or video. This particular......

Words: 1018 - Pages: 5

Premium Essay

The Abuse of Cyberspace

...Ss."Cyril and Methodius" University in Skopje Faculty of Law "Iustinianus Primus"-Skopje Master’s Degree programme in Intellectual Property Law (LL.M.) INTERNET LAW The abuse of the cyberspace - jeopardizing the copyrights Prof. Goce Naumovski, PhD Temelkova Simona 42321 I.I The rise of technology and Internet as a platform for new problems So cyberspace is real. And so are the risks that come with it. - President Barack Obama1 Despite the many and obvious benefits of the modern electronic communications development,it has also brought with it the worrying threat of intentional attacks against information systems and network platforms/infrastructures. As cyberspace gets more and more complex and its components more and more sophisticated, especially due to the fast development and evolution of (broadband) Internet-based platforms, new and unforeseen vulnerabilities may emerge.” And further that “in the hands of persons acting in bad faith, malice, or grave negligence, information society technologies (ISTs) may become tools for activities that endanger or injure, the life, property, or dignity of individuals or even damage the public interest. Technology-enabled crimes are also known as high-tech crime, computer crimes or cyber crime. They include crimes committed directly against computers and computer systems, as well as the use of technology to commit or facilitate the commission of traditional crimes, bringing unique challenges to law enforcement.......

Words: 4702 - Pages: 19

Premium Essay

Taming Chinese Cyberspace

...Taming Chinese Cyberspace -- a vision from Weibo Yicheng Zhu Reg. No. 110136970 Course: JNL 6032 Media Censorship Course leader: Dr. John Steel Abstract In this essay the recent fashion of Weibo in Chinese media is discussed, especially on the Chinese authorities and government's attitude towards it, moreover and more importantly, the way of how Weibo is being censored is explained. According to previous theories, internet cannot be regarded as a safe and free place for ideas and liberated speeches, Weibo is a good and exaggerated example as it is born in China--a nation long been considered to be less democratic. But is it really true? Was the limit of speech and media censorship really necessary? How does China want to assert them? Introduction As the 'Arab Spring' had cause enormous shake in the Middle East and north Africa, we had witnessed other great overthrows of regimes, and internet undoubtedly participated as a important role in the movement. When another civic protest took place in numerous western countries, we can also sense the huge power emanated by the social networks. The Chinese government was well aware of this, and they had foreseen the danger and unrest that these social networks could bring, 2 years earlier Twitter was officially shut sown---possibly because of the riot in Xinjiang one month before the blocking--and Weibo appeared as a Chinese replica to replace it. As theories have......

Words: 3102 - Pages: 13

Premium Essay

Do You Agree with the Position That Anonymity Should Be Preserved in Cyberspace?

...Chuong Ly Do you agree with the position that anonymity should be preserved in cyberspace? Day by day, there are more and more internet communities appear on the Internet. Anonymity along with free speech have been one of the headache topics which have been arguing more a long time. There are many people who against it because they are afraid bad people are using it to scam people or doing bad things without being identified. And there are people who agree with anonymity because they can say what they are afraid to say if their identity is revealed. For me I agree and support anonymity should be preserved in cyberspace, however, there should be limitation for anonymity as well. I think anonymity is good when it’s used for people to post their honest thoughts without being hated or offended by other people because their identity will not be shown. If we use this in an organization, or government, people can report what they see, what they don’t like or what their boss do that considered as bad things. By this technique, the company can improve better because they can see the honest truth about them. For example, my school has a course evaluation technique that allows students to rate their classes, their professors and say their thoughts about the thought and it’s totally anonymous because they don’t have to write down their name down so their identity is totally safe. Another example which is the math forum that my professor created which allows students to post their......

Words: 685 - Pages: 3

Premium Essay

First Amendment in Cyberspace

...Amendment as it applies to cyberspace. In 1997, the Equal Employment Opportunity Commission filed a workplace harassment lawsuit, which is still pending. Employees were sending derogatory e-mails that were insulting to other creeds and cultures. This resulted in a discrimination lawsuit and changes in corporate e-mail policy. The New Jersey Office of Administrative Law recently found a single incident of a long joke list being forwarded by e-mail to the whole department to be” sexual harassment, ” creating an “ offensive work environment” (Volokh, 2000). Awareness has been raised in recent years in regard to cyberbullying. This First Amendment exemption and the recent rise of suicides in which digital technology, the Internet and social media have played a role is extremely troubling, especially insofar as the victims in these cases seem to belong predominantly to one often discriminated against group (Merril. 2000). These rights are there to protect the creativity of your Facebook page, allowing for artistic expression. The same page can be out of compliance with the law if it contains obscene speech or defamation. “The beauty of the First Amendment is that it protects all kinds of speech” (Merril, 2000). 1 Works Cited Reynolds, G. W. (2014). Ethics in Information Technology. In   G. W. Reynolds, Ethics in Information Technology (p.19). Boston:   Cengage Learning. Volokh, E. (2000, January 1). Article - Freedom of Speech, Cyberspace, Harassment Law, and The......

Words: 356 - Pages: 2

Premium Essay


...Ethics in Cyberspace: Have We Seen This Movie Before? DR. THOMAS DONALDSON Monday, February 5, 2001 Wilder Pavilion, Adamian Academic Center Bentley College Waltham, Massachusetts Presenters Njeru Salesio Kinyua: Nduati Paul Njaaga: Toroitich Patrick Kiplimo: Lemuel Mangla: Bryan Egessa: 046485 015118 049063 090716 090524 Introduction       Dr. Donaldson begins by stating that his topic, ethics in cyberspace, should be approached with considerable humility. Internet has dramatically affected our lives while frustrating our attempts to understand it and therefore we should be mindful that in the past, great intellects have been undone by the appearance of new phenomena. He gives an example of Adam Smith’s where he devoted only one paragraph to the topic of the emerging phenomenon of the business corporation. He did so because he believed corporations were never going to amount to much. Professor Smith was profoundly wrong. Dr. Donaldson says he may be profoundly wrong also as he ventures into cyberspace to untangle its ethical implications. “In my attempt I am most concerned to separate the old from the new, that is, to discern which value changes we're encountering are really old stuff, like a movie we've seen before but with a different cast, and what is fundamentally new. “ An answer to this question should help us, in turn, to discover how, if at all, the internet promises to change our values and what ethical......

Words: 3009 - Pages: 13

Free Essay

Cyber Ethics

...Cyber Ethics CSEC 620 As one of the most uncertain and muddled aspects of any organization or company, Cyber Ethics are undoubtedly one of the most important in today’s technological age. Every organization or company operates with a Code of Conduct for its employees. This Code of Conduct outlines the “dos and don’ts” for an organization in hopes for “ethical” and “moral” operation of business. A typical code of conduct will outline an Acceptable Use policy, Internet Use policy, Security policy, and acceptable conduct policy for its employees that is supposed to be required reading. Like with any law, in cyber security there are always law-breakers waiting for the chance to exploit a weak firewall, a patch in the system, or a careless employee who leaves login information open for the wrong eyes to see. For this reason government and private sector alike must constantly update security measures and do thorough investigations of employees upon hiring. The internet is so large and open that it is a serious security threat for individual corporations and especially government agencies. The US government defends against countless internet attacks every day and because of the vast connections between private companies and government it is both the responsibility of private and public sector to insure everyone’s safety. Developing a widespread Code of Ethics in regards to Cyber Security is an increasingly difficult task. New advances in technology make it difficult to...

Words: 2222 - Pages: 9

Free Essay

Sexual Predactors in Cyberspace

...Allia Scott Mr. Cohen 2nd Period/Adv. 103 November 1, 2011 Sexual Predactors in Cyberspace All Americans are different. They have different religions, beliefs and customs. Different people have different hobbies such as playing sports, hanging out with friends or even just surfing the web. Surfing the web is the most common hobby among young Americans. There are many things you can do on the web. Some of the more notable things that you can do on the web are watch videos, e-mail, research and social networking. Social networking sites are is more popular among children and teens. (C. Hansen, MSNBC). Social networking sites are mainly used for dating and chatting, with family and friends also with people you don’t know. One of the more common questions, asked by many parents are, “Is the social networking and chatting sites your using safe?” Many people believe that online chat rooms and social networking sites, such as Facebook, MySpace, Tagged and Downlink are hunting grounds for many sex offenders and predators. The fact that you can meet sexual predators and sex offenders anywhere at any time of the day slips through people minds. A lot of children and teens interact with predators on websites due to the way that they conduct themselves in chat rooms, the people they socialize with and the amount of personal information that they put on the sites. Promoting online safety has become proiorty with recent explosive popularity of social networking websites. A......

Words: 2317 - Pages: 10

Free Essay

Cyberspace and Identity Critique

...A critique of “cyberspace and Identity” by Sherry Turkle Identity is a very crucial word that has a major role in building one’s distinct personality. Your identity can be shaped by many different factors or experiences, and the things that could have the most impact are family, friends and the internet. Nowadays, with the introduction of cyberspace and the technological evolution, virtual world is taking over society. And as a consequence, this advancement of technology has contributed to the development of multiple identities that many of us users have probably experienced and noticed the difference. In the text, “cyberspace and identity” (1999), the author Sherry Turkle talks about how multiple identities are created and rapidly spreading. She claims that through the internet people have expressed many different sides of their personalities as a person takes the role of many personas. In the essay “cyberspace and Identity” (1999), Sherry Turkle claims that the creation of cyberspace communication has resulted in putting together multiple identities. She concentrated her argument on how she sees society today with the existence and influence of the virtual world. As well, the writer talks in her composition about our current reality and the physiological impact that are taking place when dealing with the virtual world. She presents her argument with four different statements. She begins her discussion by the textual description; she claims that people in this world can...

Words: 684 - Pages: 3

Free Essay

Cyberspace Consumer Protections

...Tesha Ponder Cyberspace Consumer Protections Legal, Political & Ethical Dimensions of Business - MGT520 April 12, 2015 Professor James Keenan The modern day convenience of the internet has simplified life. Almost anything can be done via the internet. Shopping, research, book reading, CD downloads, ordering takeout and groceries are just some of the conveniences the internet has afforded us. However, these conveniences are not without risk. These risks, according to The White House Summit on Cybersecurity and Consumer Protection, “threaten national security, private enterprises and individual rights”. (The White House, 2015) The exponential rise and subsequent crimes of the internet have made it necessary to establish measures that protect consumers from risks such as fraud and identity theft. While these measures do offer protections to the consumer, as is the intent, they sometimes come at a cost to businesses. For example, if a customer’s credit/debit card information was stolen and unauthorized purchases were made, the customer has the ability to file a claim with the issuer of the card. The credit issuer or bank takes the loss for said purchase after an investigation determines fraud has occurred. According to the 2013 Nilson report, card issuers bore a 63% share of fraudulent losses and merchants assumed the remaining 37% liability in 2012. (as cited in Kiernan, 2015) What are the legal implications of advances in internet......

Words: 468 - Pages: 2

Free Essay


...“Work Ethic: Do New Employees Mean New Work Values?” 2010 Journal of Managerial Issues, 22 (1), 10-34 Raymond K. Van Ness, Ph.D. State University of New York at Albany, Kimberly Melinsky, Ph.D. ABD, The College of Saint Rose, Cheryl Buff, Ph.D. Siena College, and Charles F. Seifert, Ph.D. Siena College ABSTRACT This study compares and contrasts the individual dimensions of work ethic of graduating college and university students to those of workforce professionals. The Multidimensional Work Ethic Profile (MWEP) is used to operationalize seven dimensions of work ethic. The findings indicate that while students and workforce professionals differ within the individual dimensions, quantitatively, they have the same overall work ethic. Variances within the dimensions of work ethic may have important implications for corporate managers. Keywords: Work Ethic, Work Values, Dimensions of Work Ethic “Work Ethic: Do New Employees Mean New Work Values?” INTRODUCTION The concept of work ethic has evolved from the writings of the early 20th century scholar, Max Weber (Weber, 1904-1905), who has been frequently credited with contributing to the success of capitalism in western society with what became known as the Protestant work ethic (PWE) (Hirschfeld and Field, 2000; Hill and Petty, 1995; Kalberg, 1996; Chusmir and Koberg, 1988). Weber highlighted the value of work commitment and raised questions as to why some people place a greater importance on work and appear more conscientious......

Words: 9036 - Pages: 37

Premium Essay


... Reference Material on Ethics Books and Book Chapters Baase, S. (1997) A Gift of Fire: Social, Legal and Ethical Issues in Computing, Prentice Hall. Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London. Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria  Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of......

Words: 1786 - Pages: 8

Premium Essay

Ethics Lens

...University of Phoenix Digital Footprint Adrienne Ferrara With freedom comes responsibility. When we first began sending messages through cyberspace, few anticipated that the digital footprint we were creating would follow us for a lifetime. Posts on Facebook that people make in junior high and high school impact hiring decisions when they are 30. Consider the following questions. Question 1: Which of the perspectives of the four members of the G-BioSport Ethics Committee did you find most persuasive as you consider how you will manage your own digital footprint? Which was lease persuasive? Why? - I found that Mark Tatum was the most persuasive. He values truthfulness and honesty and values the right of each individual to think about how they will follow their conscience and I think if everyone in the community valued the same, it would make the community a better place. In my opinion the least persuasive was Alex Smith. He states that he wants to make sure that the choices we make as a community should be good for everyone but I think as individuals, we all have our opinions on what we would all consider as “good.” Question 2: Did the perspective you found persuasive mirror your result from the Ethical Lens Inventory? Where did you see similarities and differences? - I believe the perspective I found most persuasive mirrors my result from the Ethical Lens Inventory. We both shared the same Rights/Responsibilities Lens. We both value truthfulness and honesty. From...

Words: 911 - Pages: 4