StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethics in Cyberspace - Essay Example

Cite this document
Summary
This essay describes ethics in cyberspace and analyzes how it concentrates on the impacts of ethical activity of mediating communication through computers and clarification of how the situations of certain ways of interaction in cyberspace different from the situations of interacting face-to-face…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Ethics in Cyberspace
Read Text Preview

Extract of sample "Ethics in Cyberspace"

Cyber ethics Cyber ethics Over the few years, communication and information technology has come to play a progressively pivotal role in people’s dealings with one another. Computers, have made accessible a host of contemporary ways of people’s interaction with one another, which we have more and more made use of. In the awakening of this progress, various ethical queries have come up and have been debated. Ethics in Cyberspace concentrates on the impacts of ethical activity of mediating communication through computers, in quest of to clarification of how the situations of certain ways of interaction in cyberspace different from the situations of interacting face-to-face and how these diversities might come to affect the conduct of interacting agents when it comes to ethics (Spinello, 2006, p.10). This is known to be the study of code of ethics that are used pertaining computer networking and what behavior should be expected in such cases. It also deals with what computer is networks are used and how they are programmed (Richtel, 2004, p.22). This affects all computer users and the community at large. Some of ethics that will be dealt with, is how ethical it is to display people’s personal information, or their location like some networking programmes do. Others will be things like ownership of data, security, privacy and freedom among others (Spinello 2006, p.12). Thesis: putting harmless virus in the internet for the purposes of seeing how fast the virus will spread is more acceptable than selling a customer’s information to a competing company. The act of customer Data protection re quires one to process the information in a confidential manner and breaking the act will result one to facing criminal charges. It is, therefore, important for one to handle customer’s confidential information with high integrity and confidentiality. The need to process individual data lawfully and fairly is set out in the data protection act and is among the principles at the core of data protection. The main reason for these principles is to safeguard the interests of the persons whose confidential data is being handled by other people. These principles apply to nearly everything one does with individual data, in exception of where one is at liberty for an exemption (McGowan, 2007, p.56; Reynolds, 2010, p.1). For a customer who has many competitors, it is important to have his or her information guarded highly from the competitors. This is because failure to protect this confidential information would result to very negative consequences. For instance, the client can lose customers if his methods of maintaining clients are leaked to his competitors. Moreover, the competitors can use the confidential information to fight the company out of the market. This is not acceptable because it can affect the customer directly and can be very costly. Furthermore, selling out customer’s information to a competing marketing company would jeopardize the customer’s loyalty and trust to the people who work for him (Herman, 2010, p. 23-78; Bott, 2010, p.7-22). Releasing harmless viruses in the Internet for the purposes of discovered how fast the virus will spread, is more acceptable than selling out customer’s information to a competing marketing company. For the last six years, viruses have brought a bout baffling amount of destruction because of loss of resources and time. For many users, the expression, computer virus refers to a synonym of the most horrible nightmares that can occur on their system. Up till now, famous experts keep saying that it is probable to use the duplication device of the viral programs for some beneficial and useful purpose (Lee & Peace, 2004, p.28). It is normally regarded unethical to change other people’s information without their consent. In most countries, this is also illegitimate and, therefore, a virus that performs similar actions will be taken to be illegal or unethical in spite of any constructive result, it could bring to the machines which are infected. At times, this issue is apparent to the users as the virus producer claims to be more informed than them on what software the users ought to run on their machine. Usually, there has to be a person who should take the fall in case this information is not right and in case there is a wrong use of such information. The information should be accurate and should not cause harm to anyone. There are populace who distort good information for personal purposes and not caring as to who gets hurts in the belief of the false information being believed (Ess, 2009, 23). Furthermore, in most cases, changing a certain program could mean that ownership, copyright, or technical support liberties for this program are not valid (Quinn, n.d., 1). Therefore, spreading harmless virus on the internet is more acceptable because it does not necessarily affect victims directly. The virus could be harmless and therefore, it might not affect the users in any way. Secondly, the fact that one would be spreading the virus to see how fast it can spread could for the benefit of the internet users. For instance, this person would be experimenting on ways of dealing with virus spread over many users. So this practice might not essentially be seen as unethical (Herman, 2010). In addition, the action of spreading the virus could be for the purposes of devising a new anti-virus, which is supposed to safeguard computers from different virus forms. It is well known that certain computer viruses are modeled to work, not just in virgin environments of programs that can be infected, but also on systems that incorporate competitor viruses and anti-virus programs. Therefore, releasing the harmless virus could be more acceptable than releasing confidential information to a competing company because the action could be to the advantage of the computer users (Herman, 2010, p.30-47). Moreover, releasing virus on the network is more acceptable because experts can come up with applications which can be used to safeguard users from these illegal spreads. These are applications can be used to control or filter information passed on to users of computer networks. This is what makes some information not to be easily found or accessed without circumvention; that is elaborate or on a level, where business and personal information is obtained. This is done by use of content-control software which filters the information that seems to be out to cause harm to people or certain age groups who should not view it. This is where people argue whether it is better to have people access information on certain levels, or should the information be regulated in terms of where it is directed. There are groups which have been introduced to bring awareness on accessibility (Akdeniz, 2001, p.3; Scheider, 2010, pp.109-145). Again, filtering and censoring of information is happening all the way from small scale to large scale business industries. This is where benefits are considered in various places and the information released depending of the analysis made by regulating bodies. An example is where censorship of certain information, which is done by Golden Shield Project in China or bodies such as League Against Racism and Antisemitism also known as LICRA where they control access to certain information online or offline (Warren 1998; Network Working Group, 1989, 2). Therefore, the release of computer viruses can be prevented in order to stop Internet users from being harmed, unlike the selling of customer’s information to the competitors who can have permanent damage on the customer (Barlow, 1996, pp. 40-46; Harris, 2003, p.34-93). Conclusion Even, though, selling a client’s information without telling the customer and releasing harmless virus on the network are both unethical, it is clear that the latter is more acceptable due to the impact. This can be analyzed from the effect side of each action. Just as, we have discussed above, most of these ethics deal with freedom involved in communicating certain information as one of people’s rights. However, this should not be at the expense of safety of others in the community. This means that there ought to be a border line as to where the restriction on using cyber space reaches, and they should be well thought and applied. One can clearly see the releasing seemingly useful program, which is, in fact, a harmless virus for download on a Website is more acceptable than selling out customer’s confidential information third party marketing companies, without telling the customers because the latter can have permanent damage on the affected person. In addition, release of computer virus is more acceptable because the situation can be reversed unlike the release of confidential information. Bibliography Akdeniz, Y. 2001.Case Analysis of League Against Racism and Antisemitism (LICRA), French Union of Jewish Students, v Yahoo! Inc. (USA), Yahoo France, Tribunal de Grande Instance de Paris (The County Court of Paris), Interim Court Order, 20 November 2000 http://www.cyber-rights.org/. [April 19, 2012]. Barlow, J. P. 1996. A Declaration of the Independence of Cyberspace. https://projects.eff.org/~barlow/Declaration-Final.html. [April 19, 2012]. Bott, F. 2011. Professional issue in information technology. British Computer Society. Ess, C. 2009. Digital media ethics and society. Polity Press. Harris, S. 2003. CISSP Certification: Exam Guide. Second Edition. New York, NY: McGraw-Hill /Osbourne. Herman, T. 2010. Ethics and technology: Controversies, Questions, and strategies ethical computing. Wiley. Lee, F. and Peace, G. 2004. Information Ethics: Privacy and Intellectual Property. Hersey, Pennsylvania: Information Science Publishing. McGowan, R. 2007. Ethics of gambling. The Boston Globe. http://www.boston.com/news/globe/editorial_opinion/oped/articles/2007/09/21/ethics_of_gambling/. [April 19, 2012]. Network Working Group. 1989. Ethics and the Internet. Network Working Group. http://tools.ietf.org/html/rfc1087. [April 19, 2012]. Quinn, M. n.d.. Ethics for the information age. 4th ed. Addison Wesley: Pearson. Print. Reynolds, G. 2011. Ethics in information technology. 4th ed. South Western College. Richtel, M. 2004. U.S. Steps Up Push Against Online Casinos By Seizing Cash. The New York Times. http://www.nytimes.com/2004/05/31/business/us-steps-up-push-against-online-casinos-by-seizing-cash.html. [April 19, 2012]. Schneiner, B. 2000. Secret and lies. New York: Wiley. Spinello, R. 2006. Cyber ethics: Morality and Law in Cyberspace. Third Edition. Sudbury, Massachusetts: Jones and Bartlett Publishers. Warren, S. and Brandeis, L. 1998. Privacy, photography, and the press. Harvard Law Review 111: 4. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1448872-ethics-in-cyberspace
(Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1000 Words)
Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1448872-ethics-in-cyberspace.
“Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1448872-ethics-in-cyberspace.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethics in Cyberspace

Gambling in Cyberspace the Ethical Dilemma

This paper ''Gambling in cyberspace the Ethical Dilemma'' tells that Online gambling has elicited raging debates in the United States especially as regards ethical concerns.... This paper will discuss the ethical dilemma of gambling in cyberspace....             Primarily, there are two main standpoints for the ethical dilemma of gambling in cyberspace: the arguments against online gambling and arguments made for online gambling....
6 Pages (1500 words) Essay

Hacking with Hacktivism

hellip; Hacktivism is the emergence of popular political action, of the self-activity of groups of people, in cyberspace.... Hacktivists operate within the fabric of cyberspace, struggling over what is technologically possible in virtual lives, and reach out of cyberspace utilizing virtual powers to mold offline life.... The popular theory of ethics is ethical relativism that suggests the need for universal moral rights and wrongs to allow hacking to be taken place....
15 Pages (3750 words) Essay

Media Ethics IssueFinal

There is an age old question about the relationship between ethics and the law.... It is difficult to determine whether it is ethics that determine the kind of laws that are passed or it is the law that determines what we hold as ethics.... The relationship is particularly ambiguous in the realm of journalistic ethics and journalistic law.... hellip; The law is the instrument by which governments govern, while ethics is what guides the journalist in the practice of printing and broadcasting. ethics is a value system based on sensibility and vision as determined by human experience and reinforced by the superego....
4 Pages (1000 words) Essay

Ethical Ramifications of Medicine and Psychiatry in Cyberspace

The matter is even more complicated when it comes to Ethics in Cyberspace where they may be different questions with regard to privacy and confidentiality.... This paper "Ethical Ramifications of Medicine and Psychiatry in cyberspace" discusses ethical ramifications in cyberspace.... It is important to understand what ethics are and then to see how various ethical issues in cyberspace can be tackled by psychiatrists as well as medical practitioners....
7 Pages (1750 words) Case Study

English composition 2

id=115&sid=20e57881-df4b-47b1-bb28-2e47c48c3376%40sessionmgr110&vid=1Jennings, Marianne M (2002, January 1) Ethics in Cyberspace,.... his meant that even the private sector acknowledges that there has to be a set of acceptable behavior in cyberspace to eliminate misconduct.... The rate of exchange and availability of information also became dizzying that the cyberspace virtually became a “parallel universe” of our physical Government Regulation of the Internet (S4 MLA P5) Along with the advent of information technology, also came the internet connecting people through the digital medium where geographical demarcations and political boundaries are virtually removed....
2 Pages (500 words) Research Paper

The Internet and Ethics: Possible Risks

Furthermore, the author of this writing "The Internet and ethics: Possible Risks" would outline the ethical issues concerning the Internet.... The current research paper covers the background of the Internet and its use overall.... Finally, the common possible online risks shall be discussed....
9 Pages (2250 words) Research Paper

Ethics and Regulations in IT

This paper "ethics and IT" discusses several models that can be used to create an ethical program that works.... Computer ethics comes from the practical concerns that occur in connection to the fact that essentially everyone's life is available on a computer.... The aim of computer ethics must be to reach decisions that are defensible as well as having a principle and have moral insight.... There is presently much research being done to determine what the true definition of ethics is and should be and how it is maintained in the setting of a computing profession....
8 Pages (2000 words) Essay

The Correct Information for the Good of All Global Internet and Cyberspace Users

The author of the following paper under the title 'The Correct Information for the Good of All Global Internet and cyberspace Users' presents one of the characteristics of the global frame which is the mythical correlations, also known as the global mythic frame.... hellip; Every cyberspace user has a right to access coupled with freedom of expression, and hence they are responsible for ensuring propped use of cyberspace without transmitting untrue information that threatens the rights and privacy of other users....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us