Ethical Dilemmas/Issues in CyberWorld

Preview:

DESCRIPTION

This Presentation is my report on Professional Ethics

Citation preview

ETHICAL DILEMMAS/ ISSUES IN CYBERWORLD

Ethical dilemma is a complex situation that will often involve an apparent mental conflict between moral imperatives, in which to obey one would result in transgressing another.

also called an ethical paradox.

Ethical Dilemma

- occurs when there is an intrusion upon your reasonable expectation to be left alone.

Privacy Invasion

Intrusion of Solitude

Four Categories of Privacy Invasion

Appropriation of Name or Likeness

Public Disclosure of Private Facts

False Light

Intrusion of Solitude

This type of invasion of privacy is commonly associated with "peeping Toms," someone illegally intercepting private phone calls, or snooping through someone's private records.

occurs when someone uses the name or likeness of another for their own benefit.

Appropriation of Name or Likeness

occurs when someone publishes hurtful, embarrassing or offensive facts about a person's private life

Public disclosure of private facts

False Light

arises anytime you unflatteringly portray - in words or pictures- a person as something that he or she is not.

HACKINGThe word “hacking” has two definitions.

the first definition refers to the hobby/profession of working with computers.

the second definition refers to breaking into computer systems.

In the Web site wisegeek.com they defines computer "hacking" as "the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose."

There are three category of hackers:

Hacktivists - those who hack as a form of political activism.

Hobbyist hackers - those who hack to learn, for fun or to share with other hobbyists.

Research and Security Hackers - those concerned with discovering security vulnerabilities and writing the code fixes.

Ethical Theories ofHACKING

From a Utilitarian PerspectiveFrom a Rights Perspective

From Fairness or Justice Perspective

From a Common Good Perspective

From a Virtue Perspective

ETHICAL QUESTIONS

Is there any information that should really be kept

secret?

How do we balance the need for transparency with

the need to protect ourselves, for example, from

groups who do not believe in transparency and

other democratic values?

Do we trust the ability of hackers to balance out

the good and the harm that may result from their

disclosures?

Do we trust governments or corporations more,

when it comes to striking that balance?

From a Utilitarian Perspective

• Do all of us have an absolute right to access all the

information available on the Internet?

• Do we have a right to communicate and associate

freely?• And, if so, does hacking promote freedom of

speech and of association by breaking barriers set up around certain information?

• Should hacking be seen as a way of critiquing a system in order to reform it, somewhat similar to parody?

From a Rights Perspective

From Fairness or Justice Perspective

• Does hacking then make Internet use more

fair, by allowing to any user access to

information that would otherwise be

available only to some?

• Or is hacking an unjust takeover of

information from those who don't have the

know-how or resources to protect it?

From a Common Good Perspective

• Is unrestricted access to information one

path to individual and communal

fulfillment?

• Or does hacking undermine the

usefulness of the Internet as a common

good because it makes users reluctant to

share information online?

• Overall, does hacking promote or hinder

the development of relationships and the

building of community?

From a Virtue Perspective

• Are hackers pushing individuals to become

more virtuous users of the Internet—or are

they mostly tearing down what others

have built, and ultimately limiting the

usefulness of the Internet?

• Does hacking promote the

development of ethical character?

SECURITY Security as a form of protection are

structures and processes that provide or improve security as a condition.

Information security (IS) is designed to

protect the confidentiality, integrity and

availability of computer system data from

those with malicious intentions.

C-I-AConfidentiality - protecting information from being disclosed to unauthorized parties.Integrity - protecting information from being changed by unauthorized parties.

Availability - to the availability of information to authorized parties only when requested.

• Restricting access both to the hardware locations (physical access) and into the system itself (over the network) using firewalls

• Implementing a plan to prevent break-ins

• Changing passwords frequently• Making backup copies• Using anti-virus software• Encrypting data to frustrate

interception• Anticipating disasters (disaster

recovery plan) • Hiring trustworthy employees

MEASURES TO PROTECT COMPUTER SECURITY

THEFT(Identity Theft)

it happens when someone steals your personal information and uses it without your permission

a serious crime

can disrupt your finances, credit history, and reputation

take time, money, and patience to resolve.

OCCURS BY: Stealing your wallets and purses containing

identification cards, credit cards and bank information.

Stealing your mail including credit and bank statements, phone or utility bills, new checks, and tax information.

Completing a “change of address form” to redirect the destination of your mail.

Rummaging through your trash for discarded personal data in a practice known as “dumpster diving.”

Taking personal information that you share or post on the Internet.

 

PREVENTION1. Use passwords on all your credit card, bank, and phone accounts.2. Never keep passwords, “PINs” or your SSN card in your wallet or purse.3. Learn about security procedures in your workplace.4. Never give out personal information on the phone, through mail, or over the internet unless you know the receiver and have initiated the contact.5. Guard your mail and trash from theft.6. Shred or destroy discarded financial statements in your trash.7. Give your SSN only when absolutely necessary.8. Keep your purse or wallet in a safe place at work.