CyberEthics

CyberEthics

Cyberethics is a branch of ethics that studies ethical dilemma brought on by the emergence of digital technologies. The emergence of personal computers and the internet have led to conflicts over privacy, intellectual property rights, software ownership, censorship, and sexuality.

Cyberethics is distinct from cyberlaw. Laws are formal written directives that apply to everyone, interpreted by the judicial system, and enforced by the police. Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life". See Ethics.

Privacy

In the late 1800 century, the inventions of cameras spurred similar ethical debates as the Internet does today. During a Harvard Law Review seminal in 1890, Warren and Brandeis defines privacy from an ethical and moral point of view to be "central to dignity and individuality and personhood. Privacy is also indispensable to a sense of autonomy - to 'a feeling that there is an area of an individual's life that is totally under his or her control, an area that is free from outside intrusion.' The deprivation of privacy can even endanger a person's health." (Warren & Brandeis, 1890).cite paper
last = Warren
first = Samuel
authorlin = Samuel Warren
coauthors = Brandeis, Louis
title = Privacy, photography, and the press.
publisher = Harvard Law Review 111:4
date = 1998
url = http://web.ebscohost.com.ezproxy.umuc.edu/ehost/pdf?vid=5&hid=2&sid=2044c42f-be18-4a49-8757-e1b4177d895b%40sessionmgr9
accessdate = 2008-04-29
] Over 100 years later, the Internet and proliferation of private data through ecommerce is a phenomenon which requires a new round of ethical debate involving a person's privacy.


Privacy can be decomposed to the limitation of others' access to an individual with "three elements of secrecy, anonymity, and solitude" (Gavison, 1984).cite paper
author = Gavison, R.
title = Privacy and the Limits of the Law
publisher = The Yale Law Journal 8:421
date = 1984
] Anonymity refers to the individual's right to protection from undesired attention. Solitude refers to the lack of physical proximity of an individual to others. Secrecy refers to the protection of personalized information from being freely distributed.


Individuals surrender private information when conducting transactions and registering for services. Ethical business practice protects the privacy of their customers by securing information which may attribute to the loss of secrecy, anonymity, and solitude. Credit card information, social security numbers, phone numbers, mothers' maiden names, addresses and phone numbers freely collected and shared over the internet may lead to a loss of Privacy.
Fraud and impersonation are some of the malicious activities that occurr due to the direct or indirect abuse of private information. Identity theft is rising rapidly due to the availability of private information in the internet. For instance, seven million Americans have fallen victim to Identity Theft in 2003, making identity theft as the fastest growing crime in the United States (Latak, 2005).cite web
author = Latak, A
publisher = Legal Affairs
year = 2005, February
title = Identity Crisis: To make its players safe the NFL is tackling schemers and scammers
url = http://www.legalaffairs.org/issues/January-February-2005/scene_latack_janfeb05.msp
accessdate = 2008-05-01
] Public records search engines and databases are the main culprits contributing to the rise of cybercrime. Listed below are a few recommendations to restrict online databases from proliferating sensitive personnel information.

  1. Exclude sensitive unique identifiers from database records such as social security numbers, birth dates, hometown and mothers' maiden names.
  2. Exclude phone numbers that are normally unlisted.
  3. Clear provision of a method which allows people to have their names removed from a database.
  4. Banning the reverse social security number lookup services (Spinello, 2006).cite book
    last = Spinello
    first = Richard
    authorlink = Richard Spinello
    publisher = Jones and Bartlett Publishers
    location = Sudbury, Massachusetts|Sudbury, MA
    title = Cyberethics: Morality and Law in Cyberspace, Third Edition
    year = 2006
    isbn = 0-7637-3783-6
    ]

Private Data Collection

Data warehouses are used today to collect and store huge amounts of personal data and consumer transactions. These facilities can preserve large volumes of consumer information for an indefinite amount of time. Some of the key architectures contributing to the erosion of privacy include databases, cookies and spyware.

Some may argue that data warehouses are supposed to stand alone and be protected. However, the fact is enough personal information can be gathered from corporate websites and social networking sites to initiate a reverse lookup. Therefore, is it not important to address some of the ethical issues regarding how protected data ends up in the public domain?

As a result, identity theft protection businesses are on the rise. Companies such as LifeLock and JPMorgan Chase have begun to capitalize on selling identity theft protection insurance.

Intellectual Property Rights

The ever-increasing speed of the internet and the mp3 compression technology opened the doors to file sharing, a technology that allowed users to anonymously transfer files to each other. Much of this, however, was copyrighted music, illegal to transfer to other users. Whether it is "ethical" to transfer copyrighted media is another question.

Proponents of unrestricted file sharing point out how file sharing has given people broader and faster access to media, has increased exposure to new artists, and has reduced the costs of transferring media (including less environmental damage). Supporters of restrictions on file sharing argue that we must protect the income of our artists and other people who work to create our media. This argument is partially answered by pointing to the small proportion of money artists receive from the legitimate sale of media.

With the introduction of Digital Rights Management software, new issues are raised over whether the subverting of DRM is ethical. Some champion the hackers of DRM as defenders of users' rights, allowing the blind to make audio books of PDFs they receive, allowing people to burn music they have legitimately bought to CD or to transfer it to a new computer. Others see this as nothing but simply a violation of the rights of the intellectual property holders, opening the door to uncompensated use of copyrighted media.

oftware Ownership

Software ownership is an issue related to intellectual property rights. The two opposing views are for closed source software distributed under restrictive licenses or for free and open source software (Freeman & Peace, 2004).cite web
author = Computer Ethics Institute
publisher = Computer Ethics Institute
year = 1992
title = The Ten Commandments of Computer Ethics
url = http://www.computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf
accessdate = 2008-05-01
]

RFC 1087

In January 1989, the Internet Architecture Board (IAB) in RFC 1087 defines an activity as unethical and unacceptable if they:

  1. Seeks to gain unauthorized access to the resources of the Internet.
  2. Disrupts the intended use of the Internet.
  3. Wastes resources (people, capacity, computer) through such actions.
  4. Destroys the integrity of computer-based information, or
  5. Compromises the privacy of users (RFC 1087, 1989). cite web
    author = Network Working Group.
    publisher = Network Working Group
    year = 1989
    title = Ethics and the Internet
    url = http://tools.ietf.org/html/rfc1087
    accessdate = 2008-05-01
    ]


= [https://www.isc2.org/cgi-bin/content.cgi?category=12 (ISC)2 Code of Ethics] =

(ISC)2 an organization committed to certification of computer security professional has further defined its own Code of Ethics generally as:

  1. Act honestly, justly, responsibly, and legally, and protecting the commonwealth.
  2. Work diligently and provide competent services and advance the security profession.
  3. Encourage the growth of research – teach, mentor, and value the certification.
  4. Discourage unsafe practices, and preserve and strengthen the integrity of public infrastructures.
  5. Observe and abide by all contracts, expressed or implied, and give prudent advice.
  6. Avoid any conflict of interest, respect the trust that others put in you, and take on only those jobs you are qualified to perform.
  7. Stay current on skills, and do not become involved with activities that could injure the reputation of other security professionals (Harris, 2003).cite book

    last = Harris
    first = Shon
    authorlink = Shon Harris
    publisher = McGraw-Hill/Osbourne
    location = New York, NY
    title = CISSP Certification: Exam Guide Second Edition
    year = 2003
    isbn = 0-07-222966-7
    ]

[http://epic.org/privacy/consumer/code_fair_info.html The Code of Fair Information Practices]

The Code of Fair Information Practices is based on five principles outlining the requirements for records keeping systems. This requirement was implemented in 1973 by the U.S. Department of Health, Education and Welfare.

  1. There must be no personal data record-keeping systems whose very existence is secret.
  2. There must be a way for a person to find out what information about the person is in a record and how it is used.
  3. There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent.

  4. There must be a way for a person to correct or amend a record of identifiable information about the person.
  5. Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data (Harris, 2003).

ee also

* Computer Ethics
* Computer Crime
* Cyber Law
* Information Privacy Laws

References

External links

* [http://www.ieee.org/portal/site IEEE Website]
* [http://www.acm.org/ ACM Website]
* [https://www.isc2.org/cgi-bin/index.cgi ISC2 Website]
* [http://www.iab.org Internet Architecture Board]


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Cyberethics — is the study of ethics pertaining to computer networks, encompassing user behavior and what networked computers are programmed to do, and how this affects individuals and society. Examples of cyberethical questions include Is it OK to display… …   Wikipedia

  • cyberethics — noun Ethics in cyberspace …   Wiktionary

  • Cyprus Neuroscience and Technology Institute — Formation 1991 Type Research Institute Location Nicosia …   Wikipedia

  • Cyprus Safer Internet Hotline — SafenetCY, the Cyprus Internet Hotline Formation 2007 Purpose/focus The identification and removal of illegal content on the internet. Location Nicosia, Cyprus …   Wikipedia

  • Cyprus Safer Internet Helpline — The Cyprus Internet Helpline Formation 2009 Purpose/focus To provide confidential support and advice regarding personal problems associated with the use of the Internet Location Nicosia, Cyprus …   Wikipedia

  • Ethics of technology — is a subfield of ethics addressing the ethical questions specific to the Technology Age. Some prominent works of philosopher Hans Jonas are devoted to ethics of technology. Technology itself is incapable of possessing moral or ethical qualities,… …   Wikipedia

  • Computer ethics — is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia… …   Wikipedia

  • Information ethics — is the field that investigates the ethical issues arising from the development and application of information technologies. It provides a critical framework for considering moral issues concerning informational privacy, moral agency (e.g. whether …   Wikipedia

  • Ten Commandments of Computer Ethics — The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute. The commandments were introduced in the paper In Pursuit of a Ten Commandments for Computer Ethics by Ramon C. Barquin as a means to create a set of… …   Wikipedia

  • Planetary Collegium — The Planetary Collegium is an international network for research in art, technology and consciousness, based in the University of Plymouth, with linked centers ( nodes ) in Zurich and Milan. The Collegium consists of artists, theoreticians and… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”