- CyberEthics
Cyberethics is a branch of
ethics that studies ethical dilemma brought on by the emergence of digital technologies. The emergence of personal computers and the internet have led to conflicts over privacy, intellectual property rights, software ownership, censorship, and sexuality.Cyberethics is distinct from
cyberlaw .Laws are formal written directives that apply to everyone, interpreted by thejudicial system , and enforced by the police.Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life". SeeEthics .Privacy
In the late 1800 century, the inventions of cameras spurred similar ethical debates as the
Internet does today. During aHarvard Law Review seminal in 1890, Warren and Brandeis defines privacy from an ethical and moral point of view to be "central to dignity and individuality and personhood. Privacy is also indispensable to a sense of autonomy - to 'a feeling that there is an area of an individual's life that is totally under his or her control, an area that is free from outside intrusion.' The deprivation of privacy can even endanger a person's health." (Warren & Brandeis, 1890).cite paper
last = Warren
first = Samuel
authorlin = Samuel Warren
coauthors = Brandeis, Louis
title = Privacy, photography, and the press.
publisher =Harvard Law Review 111:4
date = 1998
url = http://web.ebscohost.com.ezproxy.umuc.edu/ehost/pdf?vid=5&hid=2&sid=2044c42f-be18-4a49-8757-e1b4177d895b%40sessionmgr9
accessdate = 2008-04-29] Over 100 years later, theInternet and proliferation of private data throughecommerce is a phenomenon which requires a new round of ethical debate involving a person's privacy.
Privacy can be decomposed to the limitation of others' access to an individual with "three elements of secrecy, anonymity, and solitude" (Gavison, 1984).cite paper
author = Gavison, R.
title = Privacy and the Limits of the Law
publisher =The Yale Law Journal 8:421
date = 1984] Anonymity refers to the individual's right to protection from undesired attention. Solitude refers to the lack of physical proximity of an individual to others. Secrecy refers to the protection of personalized information from being freely distributed.
Individuals surrender private information when conducting transactions and registering for services. Ethical business practice protects theprivacy of their customers by securing information which may attribute to the loss ofsecrecy ,anonymity , andsolitude . Credit card information, social security numbers, phone numbers, mothers' maiden names, addresses and phone numbers freely collected and shared over the internet may lead to a loss of Privacy.
Fraud and impersonation are some of the malicious activities that occurr due to the direct or indirect abuse of private information.Identity theft is rising rapidly due to the availability of private information in theinternet . For instance, seven million Americans have fallen victim toIdentity Theft in 2003, makingidentity theft as the fastest growing crime in the United States (Latak, 2005).cite web
author = Latak, A
publisher = Legal Affairs
year = 2005, February
title = Identity Crisis: To make its players safe the NFL is tackling schemers and scammers
url = http://www.legalaffairs.org/issues/January-February-2005/scene_latack_janfeb05.msp
accessdate = 2008-05-01] Public recordssearch engines anddatabases are the main culprits contributing to the rise ofcybercrime . Listed below are a few recommendations to restrict online databases from proliferating sensitive personnel information.- Exclude sensitive unique identifiers from database records such as social security numbers, birth dates, hometown and mothers' maiden names.
- Exclude phone numbers that are normally unlisted.
- Clear provision of a method which allows people to have their names removed from a database.
- Banning the reverse social security number lookup services (Spinello, 2006).cite book
last = Spinello
first = Richard
authorlink = Richard Spinello
publisher =Jones and Bartlett Publishers
location = Sudbury, Massachusetts|Sudbury, MA
title = Cyberethics: Morality and Law in Cyberspace, Third Edition
year = 2006
isbn = 0-7637-3783-6]
Private Data Collection
Data warehouses are used today to collect and store huge amounts of personal data and consumer transactions. These facilities can preserve large volumes of consumer information for an indefinite amount of time. Some of the key architectures contributing to the erosion of privacy include databases, cookies and spyware.
Some may argue that data warehouses are supposed to stand alone and be protected. However, the fact is enough personal information can be gathered from corporate websites and social networking sites to initiate a reverse lookup. Therefore, is it not important to address some of the ethical issues regarding how protected data ends up in the public domain?
As a result,
identity theft protection businesses are on the rise. Companies such asLifeLock andJPMorgan Chase have begun to capitalize on sellingidentity theft protection insurance.Intellectual Property Rights
The ever-increasing speed of the internet and the
mp3 compression technology opened the doors tofile sharing , a technology that allowed users to anonymously transfer files to each other. Much of this, however, was copyrighted music, illegal to transfer to other users. Whether it is "ethical" to transfer copyrighted media is another question.Proponents of unrestricted file sharing point out how file sharing has given people broader and faster access to media, has increased exposure to new artists, and has reduced the costs of transferring media (including less environmental damage). Supporters of restrictions on file sharing argue that we must protect the income of our artists and other people who work to create our media. This argument is partially answered by pointing to the small proportion of money artists receive from the legitimate sale of media.
With the introduction of
Digital Rights Management software, new issues are raised over whether the subverting of DRM is ethical. Some champion the hackers of DRM as defenders of users' rights, allowing the blind to make audio books of PDFs they receive, allowing people to burn music they have legitimately bought to CD or to transfer it to a new computer. Others see this as nothing but simply a violation of the rights of the intellectual property holders, opening the door to uncompensated use of copyrighted media.oftware Ownership
Software ownership is an issue related to intellectual property rights. The two opposing views are for closed source software distributed under restrictive licenses or for free and
open source software (Freeman & Peace, 2004).cite web
author =Computer Ethics Institute
publisher =Computer Ethics Institute
year = 1992
title = The Ten Commandments of Computer Ethics
url = http://www.computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf
accessdate = 2008-05-01]RFC 1087
In January 1989, the
Internet Architecture Board (IAB) in RFC 1087 defines an activity as unethical and unacceptable if they:- Seeks to gain unauthorized access to the resources of the Internet.
- Disrupts the intended use of the Internet.
- Wastes resources (people, capacity, computer) through such actions.
- Destroys the integrity of computer-based information, or
- Compromises the privacy of users (RFC 1087, 1989). cite web
author = Network Working Group.
publisher = Network Working Group
year = 1989
title = Ethics and the Internet
url = http://tools.ietf.org/html/rfc1087
accessdate = 2008-05-01]
= [https://www.isc2.org/cgi-bin/content.cgi?category=12 (ISC)2 Code of Ethics] =(ISC)2 an organization committed to certification of computer security professional has further defined its own Code of Ethics generally as:
- Act honestly, justly, responsibly, and legally, and protecting the commonwealth.
- Work diligently and provide competent services and advance the security profession.
- Encourage the growth of research – teach, mentor, and value the certification.
- Discourage unsafe practices, and preserve and strengthen the integrity of public infrastructures.
- Observe and abide by all contracts, expressed or implied, and give prudent advice.
- Avoid any conflict of interest, respect the trust that others put in you, and take on only those jobs you are qualified to perform.
- Stay current on skills, and do not become involved with activities that could injure the reputation of other security professionals (Harris, 2003).cite book
last = Harris
first = Shon
authorlink = Shon Harris
publisher =McGraw-Hill /Osbourne
location = New York, NY
title = CISSP Certification: Exam Guide Second Edition
year = 2003
isbn = 0-07-222966-7]
[http://epic.org/privacy/consumer/code_fair_info.html The Code of Fair Information Practices]
The Code of Fair Information Practices is based on five principles outlining the requirements for records keeping systems. This requirement was implemented in 1973 by the U.S. Department of Health, Education and Welfare.
- There must be no personal data record-keeping systems whose very existence is secret.
- There must be a way for a person to find out what information about the person is in a record and how it is used.
- There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent.
- There must be a way for a person to correct or amend a record of identifiable information about the person.
- Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data (Harris, 2003).
ee also
* Computer Ethics
* Computer Crime
*Cyber Law
*Information Privacy Laws References
External links
* [http://www.ieee.org/portal/site IEEE Website]
* [http://www.acm.org/ ACM Website]
* [https://www.isc2.org/cgi-bin/index.cgi ISC2 Website]
* [http://www.iab.org Internet Architecture Board]
Wikimedia Foundation. 2010.