Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.

Similar presentations


Presentation on theme: " Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy."— Presentation transcript:

1

2  Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy related to the cyber world.

3

4  Privacy can be decomposed to the limitation of others' access to an individual with "three elements of secrecy, anonymity, and solitude”.  Individuals surrender private information when conducting transactions and registering for services  Ethical business practice protects the privacy of their customers by securing information which may contribute to the loss of secrecy, anonymity, and solitude.

5

6  Security has long been a topic of ethical debate.  As an ever increasing amount of people connect to the internet and more and more personal data is available online there is susceptibility to identity theft, cyber crimes and computer hacking.

7

8  Due to the ease of accessibility and sometimes collective nature of the internet we often come across issues of accuracy e.g. who is responsible for the authenticity and fidelity of the information available online?  This includes debate over who should be allowed to contribute content and who should be held accountable if there are errors in the content or if it is false.  This also brings up the question of how is the injured party, if any, to be made whole and under which jurisdiction does the offense lay.

9

10 Accessibility, censorship and filtering bring up many ethical issues that have several branches in cyber ethics.

11

12  The ever-increasing speed of the internet and the emergence of compression technology, such as mp3 opened the doors to Peer-to-peer file sharing, a technology that allowed users to anonymously transfer files to each other, previously seen on programs such as Napster or now seen through communications protocol such as Bit Torrent.  Much of this however, was copyrighted music, illegal to transfer to other users. Whether it is ethical to transfer copyrighted media is another question.

13

14  Term digital rights describes the permissions of individuals legitimately to perform actions involving the use of a computer, any electronic device, or a communications network.  Term is particularly related to the protection and realization of existing rights, such as the right to privacy or freedom of expression, in the context of new digital technologies, especially the Internet.

15

16  Internet privacy consists of privacy over the media of the Internet: the ability to control what information one reveals about oneself over the Internet, and to control who can access that information.  Many people use the term to mean universal Internet privacy: every user of the Internet possessing Internet privacy.

17

18  Those concerned about Internet privacy often cite a number of privacy risks — events that can compromise privacy — which may be encountered through Internet use.  The following are a few of risks which one may encounter through the Internet Use:

19

20  Cookies, tools which are sometimes used for user-tracking, are a common concern in the field of privacy.  As a result, some types of cookies are classified as a tracking cookie.  Cookies are extensively being used by social networking sites.

21

22  Flash cookies, also known as Local Shared Objects, work the same ways as normal cookies and are used by the Adobe Flash Player to store information at the user's computer.  They exhibit a similar privacy risk as normal cookies, but are not as easily blocked, meaning that the option in most browsers to not accept cookies does not affect flash cookies.

23

24  Consumers obtain Internet access through an Internet Service Provider (ISP).  Internet data to and from the consumer must pass through the consumer's ISP.  Given this, any ISP has the capability to observe everything about the consumer's (unencrypted) Internet.

25

26  Many programs and operating systems are set up to perform data logging of usage.  This may include recording times when the computer is in use, or which web sites are visited.  If a third party has sufficient access to the computer, legitimately or not, the user's privacy may be compromised.

27

28

29  Cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.  Net crime refers, more precisely, to criminal exploitation of the Internet.  Surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming.

30

31  Examples of crimes that primarily target computer networks or devices would include:  Computer viruses  Denial-of-service attacks  Malware (malicious code)  Examples of crimes that merely use computer networks or devices would include:  Cyber stalking  Fraud and identity theft  Information warfare  Phishing scams

32  Examples of crimes that merely use computer networks or devices would include:  Cyber stalking  Fraud and identity theft  Information warfare  Phishing scams

33

34  Network neutrality is a principle proposed for user access networks participating in the Internet that advocates no restrictions by Internet Service Providers and governments on content, sites, platforms, on the kinds of equipment that may be attached, and no restrictions on the modes of communication allowed.  At its simplest network neutrality is the principle that all Internet traffic should be treated equally.

35

36 The following organizations are of notable interest in the cyber ethics debate: International Federation for Information Processing (IFIP) IFIP Association for Computer Machinery, Special Interest Group: Computers and Society (SIGCAS) Ethical and Professional Issues in Computing (EPIC) Electronic Privacy Information Center Electronic Frontier Foundation (EFF) Electronic Frontier Foundation International Center for Information Ethics (ICIE) Directions and Implications in Advanced Computing (DIAC) The Centre for Computing and Social Responsibility (CCSR) Cyber-Rights and Cyber-liberties International Journal of Cyber Ethics in Education IJCEE (www.igi- global.com/ijcee).

37


Download ppt " Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy."

Similar presentations


Ads by Google