StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethics in Cyberspace - Essay Example

Cite this document
Summary
This essay discusses ethics in a modern cyberspace and issue of cybercrime, that is among the ethical concerns that have created a dilemma in the contemporary world. Essay focuses mostly on ethics in cyberspace and understanding modern technologies used in the computer networking…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Ethics in Cyberspace
Read Text Preview

Extract of sample "Ethics in Cyberspace"

Ethics in Cyberspace Lecturer: Ethics in Cyberspace Ethics in Cyberspace is the ethical study pertaining to computer networking. It encompasses the behaviors of users and its effects of computer programming (Herman 2010, p.34). Technology is useful, but many people have gone as far as committing cybercrimes such as sending virus which are damaging to others, revealing confidential issues to the third party without one’s approval and many others. Cybercrime is one is one of the problems that many people using Internet face. The issue of cybercrime is among the ethical concerns that have created a dilemma in the contemporary world. From an ethical perspective, it is more acceptable to put an apparent useful program, which is a harmless virus for download on a Website than selling customer details to third party marketing companies without telling the customers. It is more acceptable to put an apparent useful program, which is a harmless virus for downloading than selling the details of customers to the third party. This is because the program may be useful to people, and this is a matter of trying to gain experience. Since, the program is useful and harmless, the Internet user may benefit from the program in case it succeeds. Hester and Ford (2001.p.65) reveal varied cybercrimes and most of them are unethical. For instance, sending a virus that may destroy someone’s information is a crime that many technology hackers commit. Although, this is more acceptable than selling a customer’s information to the third party because some many people protect their computers with anti-virus. Schneier (2000) argues that cyber crime is committed for various reasons. There are some cyber hawkers who may want to access a computer deface through developing some programs. Some hackers employ techniques that exploit a bug created by cybercrimes. Therefore, they develop an address of preventing the information access for being traced. This is because hackers may protect the victim from tracing the information. This is violation of laws because, and it may lead to lawsuit once, some may be discovered cyber hacking. Although, it could not be compare with the case of selling the customers’ information to the third party because it is violating of business code of conduct (Spinello 2011, p.116). Another reason is that the program of testing if the program is working or not. Developing computer skills require some testing in order to develop vital knowledge in computer studies. Therefore, it may be acceptable when someone tries to send useful programs with the intention of tricking people into downloading it. For instance, someone may create a test virus in order to see what happens when the anti-virus detects the virus. This is vital because the anti-virus may help in detecting a harmful virus that may destroy people’s properties. The anti-virus will secure people’s personal documents that may otherwise become corrupt because using unsafe websites. Sending a useful program which is not harmful is vital rather than selling customer’s information to the third party. This is ethically acceptable as long as one does not interfere with someone’s Internet privacy. Internet privacy is one of the essential issues, and it requires one to avoid interfering with someone’s information. George (2011, p. 133) points out that many computer experts are now designing programs for various reasons. They are some who may want to try in case their programs are working. For instance, the developers of useful programs such as anti-virus and other software that helps in protecting the computer systems from virus. This is ethically acceptable because it may help Internet users to protect their systems from malicious cyber criminals. This criminals’ purpose is to destroy the user’s personal information. When comparing it with selling a customers’ information to the third party, the sending of useful program is more acceptable. This is because one may utilize his or her knowledge because even computer experts do carry out testing of programs in order to ensure if they are working. Moreover, it is advisable to download a useful program, which is a harmless virus from a trusted source using a safe computer (Kizza 2007, p. 141). This is essential because it helps system users from keeping their information safe. Hence, it is advisable to install antivirus programs from antivirus companies that have a reputation for free virus download. This will help system users from keeping their information safe and free from virus (Kirkey 2001, p.41). For instance, one may download anti-virus from a trust worthy company and avoid malicious software. Quinn (2011) points out that the computer experts may want to want to reveal their talent through creating of useful programs in the Internet. This is vital because the programs may become helpful to the Internet users; hence it is ethically acceptable. Moreover, creating useful programs, which have harmless virus, are more ethical than selling the customers’ information. Tavani (2007, p. 222) points out that there is certified ethical hacking in the cyberspace. This certified ethical hacking tries to reveal the differences between ethical and unethical issues of using technology for hacking. Moreover, ethical hacking is helpful because it enables ethical hackers to create vital programs that are useful. Ethical hacking refers to taking advantage of the Internet trough setting of programs for the purpose of tricking users to download them (Evans 2009, p. 56). One of the best ways of eliminating the intruder is to have an independent computer security programs to protect the hackers form breaking into computer systems. According to Hamelink (2000, p.79), ethical hackers may employ similar tools and technologies s the intruders, but they may not destroy the target systems nor steal information. However, they may evaluate the target security for the systems and provide feedbacks to the owners about vulnerabilities they found. Therefore, they will provide instructions on the way to control them, which is a reason why they are considered helpful. For instance, a computer hacker may develop a certain program that target the system, but this program may become useful in case it helps in protecting someone’s information. Lastly, sending useful programs that are harmless is vital because they may not infect data files. However, data files that contain executable files may be affected. For instance, one of them is the Microsoft word file. Nowadays, many computer users protect their firewalls from computer viruses, and they carry out scanning of documents in order to avoid their information from being infected. Therefore, sending the program may not impact system user’s information because some programs allow virus scanning in order to avoid the risk of infecting their documents. Computer crimes are ever increasing, but compute experts have developed various ethics in the cyberspace that are helpful. Therefore, sending the useful program does not have any considerable impact the Internet personal privacy when comparing with selling of a customers’ information to the third party. Someone may become a victim of computer counterfeit if he or she does not follow the computer ethical rules (Donaldson 2001, p.210). In conclusion, it is more acceptable to put an apparent useful program, which is a harmless virus for download on a Website than selling customer details to third party marketing companies without telling the customers. This is because the computer expert may create useful program that may helpful Internet users. Moreover, the computer experts may want to test their capability in technology which is acceptable. Others experts may want to reveal their talent through creating of useful programs in the Internet. Sending useful programs that are harmless is vital because they may not infect data files. Ethical hacking is help because it enables ethical hackers to create vital programs that are useful. Bibliography Charles E. (2009). Digital Media Ethics and Society. Polity Press Evans, A. (2009). Ethics in cyberspace. Upper Saddle River, N.J., Prentice Hall. Drushel, B., & German, K. M. (2011). The ethics of emerging media: information, social norms, and new media technology. New York, Continuum. Donaldson, T. (2001). Ethics in Cyberspace: Have We Seen This Movie Before? Business and Society Review. 106, 273-291. George, W.R. (2011). Ethics in information Technology, 4th ed. South Western College Publishing Hamelink, C. J. (2000). The ethics of cyberspace. London, Sage Publications. Hester, D. M., & Ford, P. (2001). Computers and ethics in the cyberage. Upper Saddle River, N.J., Prentice Hall. Herman, T. (2010). Ethics and Technology: Controversies, Questions, and strategies ethical computing. Wiley. Kirkey, J. E. (2001). Legal ethics in cyberspace: keeping lawyers and their computers out of trouble. Thomas M. Cooley Law Review. 18, 37-51. Kizza, J. M. (2007). Ethical and social issues in the information age. London, Springer-Verlag. Patterson, P., & Wilkins, L. (2011). Media ethics: issues and cases. New York, McGraw- Hill. Spinello, R. A. (2011). Cyberethics: morality and law in cyberspace.4th ed. Boston, Jones and Bartlett. Schultz, R. A. (2006). Contemporary issues in ethics and information technology. Hershey, PA, IRM Press. Schneier, B. (2000). Secrets and lies: digital security in a networked world. New York, John Wiley. Tavani, H. T. (2007). Ethics and technology: ethical issues in an age of information and communication technology. Hoboken, NJ, Wiley. Quinn, M. J. (2011). Ethics for the information age. 4th ed. Addison Wesley, Pearson. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1448875-ethics-in-cyberspace
(Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1250 Words)
Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1448875-ethics-in-cyberspace.
“Ethics in Cyberspace Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1448875-ethics-in-cyberspace.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethics in Cyberspace

Gambling in Cyberspace the Ethical Dilemma

This paper ''Gambling in cyberspace the Ethical Dilemma'' tells that Online gambling has elicited raging debates in the United States especially as regards ethical concerns.... This paper will discuss the ethical dilemma of gambling in cyberspace....             Primarily, there are two main standpoints for the ethical dilemma of gambling in cyberspace: the arguments against online gambling and arguments made for online gambling....
6 Pages (1500 words) Essay

Hacking with Hacktivism

hellip; Hacktivism is the emergence of popular political action, of the self-activity of groups of people, in cyberspace.... Hacktivists operate within the fabric of cyberspace, struggling over what is technologically possible in virtual lives, and reach out of cyberspace utilizing virtual powers to mold offline life.... The popular theory of ethics is ethical relativism that suggests the need for universal moral rights and wrongs to allow hacking to be taken place....
15 Pages (3750 words) Essay

Media Ethics IssueFinal

There is an age old question about the relationship between ethics and the law.... It is difficult to determine whether it is ethics that determine the kind of laws that are passed or it is the law that determines what we hold as ethics.... The relationship is particularly ambiguous in the realm of journalistic ethics and journalistic law.... hellip; The law is the instrument by which governments govern, while ethics is what guides the journalist in the practice of printing and broadcasting. ethics is a value system based on sensibility and vision as determined by human experience and reinforced by the superego....
4 Pages (1000 words) Essay

Ethical Ramifications of Medicine and Psychiatry in Cyberspace

The matter is even more complicated when it comes to Ethics in Cyberspace where they may be different questions with regard to privacy and confidentiality.... This paper "Ethical Ramifications of Medicine and Psychiatry in cyberspace" discusses ethical ramifications in cyberspace.... It is important to understand what ethics are and then to see how various ethical issues in cyberspace can be tackled by psychiatrists as well as medical practitioners....
7 Pages (1750 words) Case Study

English composition 2

id=115&sid=20e57881-df4b-47b1-bb28-2e47c48c3376%40sessionmgr110&vid=1Jennings, Marianne M (2002, January 1) Ethics in Cyberspace,.... his meant that even the private sector acknowledges that there has to be a set of acceptable behavior in cyberspace to eliminate misconduct.... The rate of exchange and availability of information also became dizzying that the cyberspace virtually became a “parallel universe” of our physical Government Regulation of the Internet (S4 MLA P5) Along with the advent of information technology, also came the internet connecting people through the digital medium where geographical demarcations and political boundaries are virtually removed....
2 Pages (500 words) Research Paper

The Internet and Ethics: Possible Risks

Furthermore, the author of this writing "The Internet and ethics: Possible Risks" would outline the ethical issues concerning the Internet.... The current research paper covers the background of the Internet and its use overall.... Finally, the common possible online risks shall be discussed....
9 Pages (2250 words) Research Paper

Ethics and Regulations in IT

This paper "ethics and IT" discusses several models that can be used to create an ethical program that works.... Computer ethics comes from the practical concerns that occur in connection to the fact that essentially everyone's life is available on a computer.... The aim of computer ethics must be to reach decisions that are defensible as well as having a principle and have moral insight.... There is presently much research being done to determine what the true definition of ethics is and should be and how it is maintained in the setting of a computing profession....
8 Pages (2000 words) Essay

The Correct Information for the Good of All Global Internet and Cyberspace Users

The author of the following paper under the title 'The Correct Information for the Good of All Global Internet and cyberspace Users' presents one of the characteristics of the global frame which is the mythical correlations, also known as the global mythic frame.... hellip; Every cyberspace user has a right to access coupled with freedom of expression, and hence they are responsible for ensuring propped use of cyberspace without transmitting untrue information that threatens the rights and privacy of other users....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us