Ethical Dilemmas/Issues in CyberWorld
-
Upload
rownel-cerezo-gagani -
Category
Education
-
view
518 -
download
6
description
Transcript of Ethical Dilemmas/Issues in CyberWorld
![Page 1: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/1.jpg)
ETHICAL DILEMMAS/ ISSUES IN CYBERWORLD
![Page 2: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/2.jpg)
Ethical dilemma is a complex situation that will often involve an apparent mental conflict between moral imperatives, in which to obey one would result in transgressing another.
also called an ethical paradox.
Ethical Dilemma
![Page 3: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/3.jpg)
- occurs when there is an intrusion upon your reasonable expectation to be left alone.
Privacy Invasion
![Page 4: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/4.jpg)
Intrusion of Solitude
Four Categories of Privacy Invasion
Appropriation of Name or Likeness
Public Disclosure of Private Facts
False Light
![Page 5: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/5.jpg)
Intrusion of Solitude
This type of invasion of privacy is commonly associated with "peeping Toms," someone illegally intercepting private phone calls, or snooping through someone's private records.
![Page 6: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/6.jpg)
occurs when someone uses the name or likeness of another for their own benefit.
Appropriation of Name or Likeness
![Page 7: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/7.jpg)
occurs when someone publishes hurtful, embarrassing or offensive facts about a person's private life
Public disclosure of private facts
![Page 8: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/8.jpg)
False Light
arises anytime you unflatteringly portray - in words or pictures- a person as something that he or she is not.
![Page 9: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/9.jpg)
HACKINGThe word “hacking” has two definitions.
the first definition refers to the hobby/profession of working with computers.
the second definition refers to breaking into computer systems.
In the Web site wisegeek.com they defines computer "hacking" as "the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose."
![Page 10: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/10.jpg)
There are three category of hackers:
Hacktivists - those who hack as a form of political activism.
Hobbyist hackers - those who hack to learn, for fun or to share with other hobbyists.
Research and Security Hackers - those concerned with discovering security vulnerabilities and writing the code fixes.
![Page 11: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/11.jpg)
Ethical Theories ofHACKING
From a Utilitarian PerspectiveFrom a Rights Perspective
From Fairness or Justice Perspective
From a Common Good Perspective
From a Virtue Perspective
ETHICAL QUESTIONS
![Page 12: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/12.jpg)
Is there any information that should really be kept
secret?
How do we balance the need for transparency with
the need to protect ourselves, for example, from
groups who do not believe in transparency and
other democratic values?
Do we trust the ability of hackers to balance out
the good and the harm that may result from their
disclosures?
Do we trust governments or corporations more,
when it comes to striking that balance?
From a Utilitarian Perspective
![Page 13: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/13.jpg)
• Do all of us have an absolute right to access all the
information available on the Internet?
• Do we have a right to communicate and associate
freely?• And, if so, does hacking promote freedom of
speech and of association by breaking barriers set up around certain information?
• Should hacking be seen as a way of critiquing a system in order to reform it, somewhat similar to parody?
From a Rights Perspective
![Page 14: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/14.jpg)
From Fairness or Justice Perspective
• Does hacking then make Internet use more
fair, by allowing to any user access to
information that would otherwise be
available only to some?
• Or is hacking an unjust takeover of
information from those who don't have the
know-how or resources to protect it?
![Page 15: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/15.jpg)
From a Common Good Perspective
• Is unrestricted access to information one
path to individual and communal
fulfillment?
• Or does hacking undermine the
usefulness of the Internet as a common
good because it makes users reluctant to
share information online?
• Overall, does hacking promote or hinder
the development of relationships and the
building of community?
![Page 16: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/16.jpg)
From a Virtue Perspective
• Are hackers pushing individuals to become
more virtuous users of the Internet—or are
they mostly tearing down what others
have built, and ultimately limiting the
usefulness of the Internet?
• Does hacking promote the
development of ethical character?
![Page 17: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/17.jpg)
SECURITY Security as a form of protection are
structures and processes that provide or improve security as a condition.
Information security (IS) is designed to
protect the confidentiality, integrity and
availability of computer system data from
those with malicious intentions.
![Page 18: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/18.jpg)
C-I-AConfidentiality - protecting information from being disclosed to unauthorized parties.Integrity - protecting information from being changed by unauthorized parties.
Availability - to the availability of information to authorized parties only when requested.
![Page 19: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/19.jpg)
• Restricting access both to the hardware locations (physical access) and into the system itself (over the network) using firewalls
• Implementing a plan to prevent break-ins
• Changing passwords frequently• Making backup copies• Using anti-virus software• Encrypting data to frustrate
interception• Anticipating disasters (disaster
recovery plan) • Hiring trustworthy employees
MEASURES TO PROTECT COMPUTER SECURITY
![Page 20: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/20.jpg)
THEFT(Identity Theft)
it happens when someone steals your personal information and uses it without your permission
a serious crime
can disrupt your finances, credit history, and reputation
take time, money, and patience to resolve.
![Page 21: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/21.jpg)
OCCURS BY: Stealing your wallets and purses containing
identification cards, credit cards and bank information.
Stealing your mail including credit and bank statements, phone or utility bills, new checks, and tax information.
Completing a “change of address form” to redirect the destination of your mail.
Rummaging through your trash for discarded personal data in a practice known as “dumpster diving.”
Taking personal information that you share or post on the Internet.
![Page 22: Ethical Dilemmas/Issues in CyberWorld](https://reader035.fdocuments.us/reader035/viewer/2022081416/55936fc21a28abef5b8b4639/html5/thumbnails/22.jpg)
PREVENTION1. Use passwords on all your credit card, bank, and phone accounts.2. Never keep passwords, “PINs” or your SSN card in your wallet or purse.3. Learn about security procedures in your workplace.4. Never give out personal information on the phone, through mail, or over the internet unless you know the receiver and have initiated the contact.5. Guard your mail and trash from theft.6. Shred or destroy discarded financial statements in your trash.7. Give your SSN only when absolutely necessary.8. Keep your purse or wallet in a safe place at work.