Transcript
Page 1: Ethical Dilemmas/Issues in CyberWorld

ETHICAL DILEMMAS/ ISSUES IN CYBERWORLD

Page 2: Ethical Dilemmas/Issues in CyberWorld

Ethical dilemma is a complex situation that will often involve an apparent mental conflict between moral imperatives, in which to obey one would result in transgressing another.

also called an ethical paradox.

Ethical Dilemma

Page 3: Ethical Dilemmas/Issues in CyberWorld

- occurs when there is an intrusion upon your reasonable expectation to be left alone.

Privacy Invasion

Page 4: Ethical Dilemmas/Issues in CyberWorld

Intrusion of Solitude

Four Categories of Privacy Invasion

Appropriation of Name or Likeness

Public Disclosure of Private Facts

False Light

Page 5: Ethical Dilemmas/Issues in CyberWorld

Intrusion of Solitude

This type of invasion of privacy is commonly associated with "peeping Toms," someone illegally intercepting private phone calls, or snooping through someone's private records.

Page 6: Ethical Dilemmas/Issues in CyberWorld

occurs when someone uses the name or likeness of another for their own benefit.

Appropriation of Name or Likeness

Page 7: Ethical Dilemmas/Issues in CyberWorld

occurs when someone publishes hurtful, embarrassing or offensive facts about a person's private life

Public disclosure of private facts

Page 8: Ethical Dilemmas/Issues in CyberWorld

False Light

arises anytime you unflatteringly portray - in words or pictures- a person as something that he or she is not.

Page 9: Ethical Dilemmas/Issues in CyberWorld

HACKINGThe word “hacking” has two definitions.

the first definition refers to the hobby/profession of working with computers.

the second definition refers to breaking into computer systems.

In the Web site wisegeek.com they defines computer "hacking" as "the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose."

Page 10: Ethical Dilemmas/Issues in CyberWorld

There are three category of hackers:

Hacktivists - those who hack as a form of political activism.

Hobbyist hackers - those who hack to learn, for fun or to share with other hobbyists.

Research and Security Hackers - those concerned with discovering security vulnerabilities and writing the code fixes.

Page 11: Ethical Dilemmas/Issues in CyberWorld

Ethical Theories ofHACKING

From a Utilitarian PerspectiveFrom a Rights Perspective

From Fairness or Justice Perspective

From a Common Good Perspective

From a Virtue Perspective

ETHICAL QUESTIONS

Page 12: Ethical Dilemmas/Issues in CyberWorld

Is there any information that should really be kept

secret?

How do we balance the need for transparency with

the need to protect ourselves, for example, from

groups who do not believe in transparency and

other democratic values?

Do we trust the ability of hackers to balance out

the good and the harm that may result from their

disclosures?

Do we trust governments or corporations more,

when it comes to striking that balance?

From a Utilitarian Perspective

Page 13: Ethical Dilemmas/Issues in CyberWorld

• Do all of us have an absolute right to access all the

information available on the Internet?

• Do we have a right to communicate and associate

freely?• And, if so, does hacking promote freedom of

speech and of association by breaking barriers set up around certain information?

• Should hacking be seen as a way of critiquing a system in order to reform it, somewhat similar to parody?

From a Rights Perspective

Page 14: Ethical Dilemmas/Issues in CyberWorld

From Fairness or Justice Perspective

• Does hacking then make Internet use more

fair, by allowing to any user access to

information that would otherwise be

available only to some?

• Or is hacking an unjust takeover of

information from those who don't have the

know-how or resources to protect it?

Page 15: Ethical Dilemmas/Issues in CyberWorld

From a Common Good Perspective

• Is unrestricted access to information one

path to individual and communal

fulfillment?

• Or does hacking undermine the

usefulness of the Internet as a common

good because it makes users reluctant to

share information online?

• Overall, does hacking promote or hinder

the development of relationships and the

building of community?

Page 16: Ethical Dilemmas/Issues in CyberWorld

From a Virtue Perspective

• Are hackers pushing individuals to become

more virtuous users of the Internet—or are

they mostly tearing down what others

have built, and ultimately limiting the

usefulness of the Internet?

• Does hacking promote the

development of ethical character?

Page 17: Ethical Dilemmas/Issues in CyberWorld

SECURITY Security as a form of protection are

structures and processes that provide or improve security as a condition.

Information security (IS) is designed to

protect the confidentiality, integrity and

availability of computer system data from

those with malicious intentions.

Page 18: Ethical Dilemmas/Issues in CyberWorld

C-I-AConfidentiality - protecting information from being disclosed to unauthorized parties.Integrity - protecting information from being changed by unauthorized parties.

Availability - to the availability of information to authorized parties only when requested.

Page 19: Ethical Dilemmas/Issues in CyberWorld

• Restricting access both to the hardware locations (physical access) and into the system itself (over the network) using firewalls

• Implementing a plan to prevent break-ins

• Changing passwords frequently• Making backup copies• Using anti-virus software• Encrypting data to frustrate

interception• Anticipating disasters (disaster

recovery plan) • Hiring trustworthy employees

MEASURES TO PROTECT COMPUTER SECURITY

Page 20: Ethical Dilemmas/Issues in CyberWorld

THEFT(Identity Theft)

it happens when someone steals your personal information and uses it without your permission

a serious crime

can disrupt your finances, credit history, and reputation

take time, money, and patience to resolve.

Page 21: Ethical Dilemmas/Issues in CyberWorld

OCCURS BY: Stealing your wallets and purses containing

identification cards, credit cards and bank information.

Stealing your mail including credit and bank statements, phone or utility bills, new checks, and tax information.

Completing a “change of address form” to redirect the destination of your mail.

Rummaging through your trash for discarded personal data in a practice known as “dumpster diving.”

Taking personal information that you share or post on the Internet.

 

Page 22: Ethical Dilemmas/Issues in CyberWorld

PREVENTION1. Use passwords on all your credit card, bank, and phone accounts.2. Never keep passwords, “PINs” or your SSN card in your wallet or purse.3. Learn about security procedures in your workplace.4. Never give out personal information on the phone, through mail, or over the internet unless you know the receiver and have initiated the contact.5. Guard your mail and trash from theft.6. Shred or destroy discarded financial statements in your trash.7. Give your SSN only when absolutely necessary.8. Keep your purse or wallet in a safe place at work.


Recommended