ETHICAL DILEMMAS/ ISSUES IN CYBERWORLD
Ethical dilemma is a complex situation that will often involve an apparent mental conflict between moral imperatives, in which to obey one would result in transgressing another.
also called an ethical paradox.
Ethical Dilemma
- occurs when there is an intrusion upon your reasonable expectation to be left alone.
Privacy Invasion
Intrusion of Solitude
Four Categories of Privacy Invasion
Appropriation of Name or Likeness
Public Disclosure of Private Facts
False Light
Intrusion of Solitude
This type of invasion of privacy is commonly associated with "peeping Toms," someone illegally intercepting private phone calls, or snooping through someone's private records.
occurs when someone uses the name or likeness of another for their own benefit.
Appropriation of Name or Likeness
occurs when someone publishes hurtful, embarrassing or offensive facts about a person's private life
Public disclosure of private facts
False Light
arises anytime you unflatteringly portray - in words or pictures- a person as something that he or she is not.
HACKINGThe word “hacking” has two definitions.
the first definition refers to the hobby/profession of working with computers.
the second definition refers to breaking into computer systems.
In the Web site wisegeek.com they defines computer "hacking" as "the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose."
There are three category of hackers:
Hacktivists - those who hack as a form of political activism.
Hobbyist hackers - those who hack to learn, for fun or to share with other hobbyists.
Research and Security Hackers - those concerned with discovering security vulnerabilities and writing the code fixes.
Ethical Theories ofHACKING
From a Utilitarian PerspectiveFrom a Rights Perspective
From Fairness or Justice Perspective
From a Common Good Perspective
From a Virtue Perspective
ETHICAL QUESTIONS
Is there any information that should really be kept
secret?
How do we balance the need for transparency with
the need to protect ourselves, for example, from
groups who do not believe in transparency and
other democratic values?
Do we trust the ability of hackers to balance out
the good and the harm that may result from their
disclosures?
Do we trust governments or corporations more,
when it comes to striking that balance?
From a Utilitarian Perspective
• Do all of us have an absolute right to access all the
information available on the Internet?
• Do we have a right to communicate and associate
freely?• And, if so, does hacking promote freedom of
speech and of association by breaking barriers set up around certain information?
• Should hacking be seen as a way of critiquing a system in order to reform it, somewhat similar to parody?
From a Rights Perspective
From Fairness or Justice Perspective
• Does hacking then make Internet use more
fair, by allowing to any user access to
information that would otherwise be
available only to some?
• Or is hacking an unjust takeover of
information from those who don't have the
know-how or resources to protect it?
From a Common Good Perspective
• Is unrestricted access to information one
path to individual and communal
fulfillment?
• Or does hacking undermine the
usefulness of the Internet as a common
good because it makes users reluctant to
share information online?
• Overall, does hacking promote or hinder
the development of relationships and the
building of community?
From a Virtue Perspective
• Are hackers pushing individuals to become
more virtuous users of the Internet—or are
they mostly tearing down what others
have built, and ultimately limiting the
usefulness of the Internet?
• Does hacking promote the
development of ethical character?
SECURITY Security as a form of protection are
structures and processes that provide or improve security as a condition.
Information security (IS) is designed to
protect the confidentiality, integrity and
availability of computer system data from
those with malicious intentions.
C-I-AConfidentiality - protecting information from being disclosed to unauthorized parties.Integrity - protecting information from being changed by unauthorized parties.
Availability - to the availability of information to authorized parties only when requested.
• Restricting access both to the hardware locations (physical access) and into the system itself (over the network) using firewalls
• Implementing a plan to prevent break-ins
• Changing passwords frequently• Making backup copies• Using anti-virus software• Encrypting data to frustrate
interception• Anticipating disasters (disaster
recovery plan) • Hiring trustworthy employees
MEASURES TO PROTECT COMPUTER SECURITY
THEFT(Identity Theft)
it happens when someone steals your personal information and uses it without your permission
a serious crime
can disrupt your finances, credit history, and reputation
take time, money, and patience to resolve.
OCCURS BY: Stealing your wallets and purses containing
identification cards, credit cards and bank information.
Stealing your mail including credit and bank statements, phone or utility bills, new checks, and tax information.
Completing a “change of address form” to redirect the destination of your mail.
Rummaging through your trash for discarded personal data in a practice known as “dumpster diving.”
Taking personal information that you share or post on the Internet.
PREVENTION1. Use passwords on all your credit card, bank, and phone accounts.2. Never keep passwords, “PINs” or your SSN card in your wallet or purse.3. Learn about security procedures in your workplace.4. Never give out personal information on the phone, through mail, or over the internet unless you know the receiver and have initiated the contact.5. Guard your mail and trash from theft.6. Shred or destroy discarded financial statements in your trash.7. Give your SSN only when absolutely necessary.8. Keep your purse or wallet in a safe place at work.