0% found this document useful (0 votes)
94 views

Ethics and Internet

The document discusses ethics and the internet, covering topics like anonymity, reproducibility, hacking, netiquette, and policy approaches. It describes how the internet enables global, many-to-many communication and notes both positive and negative ethical implications of its features such as anonymity and ease of copying information.

Uploaded by

Rana Noman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views

Ethics and Internet

The document discusses ethics and the internet, covering topics like anonymity, reproducibility, hacking, netiquette, and policy approaches. It describes how the internet enables global, many-to-many communication and notes both positive and negative ethical implications of its features such as anonymity and ease of copying information.

Uploaded by

Rana Noman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Ethics and Internet

What is Internet?
Internet
• More Scope then other communication
• Three special features
 Provide many to many communication on
global scale
 Facilitate a certain kind of anonymity
 Has reproducibility
Global, Many to Many Scope
• Human reach is limited by the structure of human throat and
the character of human ear
• These capabilities are expanded by the internet
 Fast communication than radio and television
 Multidirectional
 Interactive
 Many to many communication
 Puts the power in the hands of many
“ The internet has created a new kind of environment in
which individuals who want to wreak havoc can do so with
relatively little effort”
Anonymity
• Provide much more anonymity by that is misleading
because “we do not routinely see each other when we
communicate on the internet”.
Most of our work is traceable. Internet service provider can see
and track what we do.
Example
“ Grocery Shop”
• On Internet we do not see each other. We are used to using
information about appearance.
• We rely on this linking of information.
• Certain kind of information about the person (like physical
appearance) is not available.
Anonymity
• Innovation in computer technology have increased ( Visual
and vice connection )
• Pseudo-nymity on the internet is another way anonymity
• Individual can tell lie who he is and what he want.
• Can wear mask and distort his voice
• It possible to take control of some one’s else identity
credit card stolen
• Disconnection between computer/ computer account and user
leads to anonymity
Anonymity
In any case , kind and degree of anonymity we have on internet
is a function of the link-ability of information about individual
who are acting and interacting.
This important from an ethical perspective because it affect the
accountability and trust.
Reproducibility
“Copy of data or information and software”
• There is no evidence of copy
example
Car stolen and copy data have the difference
• Make disconnection between word and person making it
possible for one person to copy words of another and change
them or keep them the same and attribute then to another.
• Facilitate anonymity and pseudonymity that cause serious
issues to integrity of the information
“ How do we know that these word are related to that
person”
Ethical Significance

There are wide range of ethical issues


there is good deal of power at fingertips
people use for heinous purpose
Hacker and Hacking

• Who uses the computer for illegal actions


• Gain unauthorized access to computer system and
stealing proprietary software.
Hacker and Cracker
• Hacker undermine the security and integrity of the
internet
• Intentionally sending virus and worms that damage the
computer system. Denial of service attacks and
unauthorized taking control of web site.
Hacker and Hacking
• Ethical perspective, hacking is not interesting
Internet user want a secure and reliable system. Has
privacy and integrity, do not require lot of efforts to make
secure
So hacker cause
• Copy and distribution of proprietary software
• Expensive denial of service delay
• Force every one to invest more and more effort and
resources in security
Hacker and Hacking

• Questions about hackers


• Why is it mostly male teenager?
• Why do they believe they can get away without being
detected even through the technology is now highly
traceable?
• Why individual wants to break into computer system?
Hacker arguments
• All information should be free
• Security problems to those who can do something about
them
• Hacking illustrate the weaknesses
• Does not harm as long as the hacker make change
• Learn about how to design computer system
• They would help keep Big Brothers at boy
Steps against Hacking

• We could create National Data Protection


Commission
• To monitor information practices
• Propose legislation
• Prosecute violation
• We could develop laws
• We could assign special obligation to the computer
professionals.
• We could encourage users to report suspicious
behavior.
New Species of Old Crime

Internet create a new instrumentation for


familiar or common crime.
New instruments allows us to do things in
new way
Netiquette
• Behavior that promote effective, Civil and pleasant
interaction online
• “ dos and don’ts of online communication” or
• “ informal rules of the road”
• “ common courtesy online”
• Violation of netiquette may be unethical but not illegal
Netiquette

• www.darkmountain.com/netiquette/index.html
• How to behave in email, classroom, groups, international
interaction and virus alert
• Three simple rules
 Be polite
 Be patient
 Do not break any law
Example of “Flame” an insulting message
What should if we receive flame ?
Ans. “throw in the trash”
If you response, there would be flame war
Netiquette

• Yelling and screaming” offline


• Flaming and yelling are the same
• Reproducibility of internet extends the
flaming and yelling
Policy Approach

• To shape behavior on the internet


• Technology has influence on how individual behave
food and transportation
three features of internet are functions of computer and IT
• Cryptography: is being used to developed technological
behavior. Make hacking and other crime much difficult
• Make law enforcement more difficult
• Law and Education to minimize violation

• Legislators, Lawyer and judges need to understand computer


Thank you

You might also like