اخلاقيات الثالث

26
1 Ethics of the Internet 1 . Intellectual property protection: 2. Privacy : It is difficult to ensure that the attack on privacy in the Internet, and to convince the public that they are not a secure network to penetrate the user's privacy .

description

 

Transcript of اخلاقيات الثالث

Page 1: اخلاقيات الثالث

1

Ethics of the Internet

1.Intellectual property protection:2. Privacy :

It is difficult to ensure that the attack on privacy in the Internet, and to convince the public that they are not a secure network to penetrate the user's privacy.

Page 2: اخلاقيات الثالث

2

3 .Protect the network from pollution: some people misuse the freedom of publication on the internet sites to serve bad sexual pornography, or incitement to violence, and implant the spirit of hatred among the people, or encourage suicide, and therefore an ethical action and legal deterrent should be taken to protect the network from these behaviors.

Page 3: اخلاقيات الثالث

3

4 .Strengthen confidence in the Internet: some locations available in the network lack confidence in the validity or accuracy of the information, which prevents the users from

citation .

Page 4: اخلاقيات الثالث

4

5 .Widening the knowledge gap :the problem emerged sharply in recent times between rich countries in sources of information and poor countries in this aspect .

Page 5: اخلاقيات الثالث

5

6 .Ethical transgressions :You must protect the network from some common ethical transgressions, including the following:

Theft: caused from penetrating the local system or forcing up the process forged

through the network .

Page 6: اخلاقيات الثالث

6

Terrorism and espionage-mail: is one of the ethical problems faced by the information society in the current era.

Data manipulation: this problem may occur from some workers in the institution where the information changed for several

considerations .

Page 7: اخلاقيات الثالث

7

Phenomenon of internet addiction: because of the desire to make more friends , exchange views with the new people, and escape from reality.

Page 8: اخلاقيات الثالث

8

Policy of digitization projects

Digitization process means converting data to electronic format for processing by computer, and the resulting need for a policy on the following aspects:

Page 9: اخلاقيات الثالث

9

Copyright: Laws of copyrights should be updated to fit in with the digital world , facing the issues and problems, and should preserve the rights of

authors and publishers and literary material .

Page 10: اخلاقيات الثالث

10

Economic rights reserve to the author the right to physical exploitation of his work. And moral rights reserve for the author the right not to distort his work, or modify it.

Page 11: اخلاقيات الثالث

11

The material and moral rights of authors have become violated in light of the use of the internet. Despite the achieved of the advantages of electronic publishing, on the other hand, it made several disadvantages such as ease of copying digital materials, academic theft, espionage , cyber terrorism, fraud, and plagiarism. Laws should fit the requirements of digital sources.

Page 12: اخلاقيات الثالث

12

Another difficulty facing the protection of copyright is the lack of legal deposit system, forcing the creator of digital information to deposit copies of their work at the body responsible for legal deposit in the country, which leads to the difficulty of keeping the national heritage.

Page 13: اخلاقيات الثالث

13

Against this problem resorted copyright holders to find multiple methods to restrict access, which deprived the user from certain rights and exemptions enjoyed by under the laws of copyright protection. The previous, such as exceptions to use the fair use taken vanish under the application of conventions, and the use of digital rights.

Page 14: اخلاقيات الثالث

14

Academic thefts in the electronic environment

Appeared in cyberspace a new term is the electronic crimes, or CYBERCRIMES, including thefts, academic, dissemination of vice, disable the devices, the destruction of sites, data manipulation, penetration of e-mail, use copies of original programs, copyrighted, the distribution of viruses, published, copy-protected programs, and access to the files, as well as others.

Page 15: اخلاقيات الثالث

15

Robbery means hefting ideas of others on the internet of articles, research and scientific studies without reference to the original source. This differs from the transport and the quote which is legitimate right for all. Within the scope of theft, plagiarism, fraud cheating, piracy, and the like methods of attack on the ideas of others.

Page 16: اخلاقيات الثالث

16

Internet helped the emergence of the problem of computer crimes or thefts, particularly the online piracy, which impact on the ethics of the information society. Laws in this area not clear as a result of the complexity of internet crime.

Page 17: اخلاقيات الثالث

17

Publishing on the internet is available to all, contributing to the violation of the rights of authors, which calls for laws to address this contemporary phenomenon. There are Masters and PhD theses were stolen. Also there are foreign books and articles have been translated in full text from the internet.

Page 18: اخلاقيات الثالث

18

What increases the size of the problem is that the law does not follow the technical developments. Internet crimes are characterized by ambiguity, where it is difficult to prove and investigate, as is the

case in traditional crimes .

Page 19: اخلاقيات الثالث

19

One can not identify the location of the offender on the internet, and the mental image of the criminal of the Internet is often the image of the hero and so smart, it is not an admirable picture of the criminal who should be prosecuted.

Page 20: اخلاقيات الثالث

20

There are many terms that are used as an expression of the reciprocal of the forms of cybercrime, including:HIGH-TICK CRIME

E-CRIMECOMPUTER CRIMEINFORMATICS CRIMEDIGITAL CRIMECOMPUTER ABUSE

Page 21: اخلاقيات الثالث

21

TURNITIN company has developed a program capable of detecting cases of theft, fraud, and plagiarism, where theft is discovered by downloading the article, and compare it with the billions of pages available on the internet .

Page 22: اخلاقيات الثالث

22

Another program helps address the academic thefts called WORDCHECK, and the site COPYSCAPE on the internet assists in the discovery of the stolen articles.

Page 23: اخلاقيات الثالث

23

With respect to the laws addressing the theft of electronic crimes, it is mainly THE DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA) of 1998 in the United States of America, is special legislation covering material available online. As some European countries enacted laws on cyber crime, and the establishment of a special section to combat these crimes.

Page 24: اخلاقيات الثالث

24

The Arab initiatives in this regard are weak. The Arab gate for libraries and information the design of a site that helps to discover the stolen research and studies in the area of interest. It was discovered that some of the articles published in CYBRARIANS JOURNAL

have been published in other sites .

Page 25: اخلاقيات الثالث

25

The Kingdom of Saudi Arabia became a member of the Organization of Intellectual Property Rights (WIPO) in 1982. There are in the Kingdom three sides responsible for the protection of intellectual property rights. For publishing, the Ministry of Information, for the trademark rights the Ministry of Commerce, and for tracking of human inventions and innovations King Abdulaziz City for Science and Technology.

Page 26: اخلاقيات الثالث

26

In the Kingdom certain laws that govern use of the Internet were issued, including the Anti-Crime Act, which was issued in 1428 for trying to criminalize abuse and infringement on the rights of others, to help achieve information security, and the protection of public morals.