………………………………………………………
Cyberspace Ethics
………………………………………………………
TABLE OF CONTENTS
S. No Subject Pg. No.
1 Introduction to Cyberspace and Ethics
2 Cyberspace: Legal Stand in India
3 Internet Flows across the World
4 Analysis of Issues
5 Conclusion
6 Recommendation
7 Bibliography and References
Introduction
“You affect the world by what you browse” – Tim Berners-Lee, Inventor of WWW
We indeed affect the world by what we browse. The advent of the World Wide Web (WWW) has shaped the 21st century. What we commonly term as the Internet is defined as a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols. It has become
…show more content…
Whether the collection of information about an individual using an automated online model be encouraged? What does it support and what consequences can it lead to?
Whether monitoring of websites or browsing information of a person should be carried out? Should Digital Surveillance exist by Government or any other authority?
Case study: Whether the freedom on social networking websites be restricted to a certain extent in order to prevent cases where it is misutilized by the society and various netizens? Is it ethical to reasonably restrict online freedom due to a lack of security cover on the internet?
Whether the collection of information about an individual using an automated online model be encouraged? What does it support and what consequences can it lead to?
Collection of confidential or private information using an automated online system is a common feature which is found in most of the online portals today. Most of the E-Commerce websites in an attempt to prevent fraud or misrepresentation collect personal information of their E-Customers using the online systems and some even validate them by sending the One-Time Passwords and others to the mobile numbers and email addresses. This validates the data or ensures the accuracy of the data. Large scale websites with high number of users often have massive data which is usually authentic including Blogs, forums and many other portals which
…show more content…
The question shall be dealt with taking into view the Cyberspace Ethics. In January 1989, the Internet Architecture Board, defines an activity unacceptable if it compromises the privacy of users. The Norms of Internet Usage often codenamed RFC 1087 find it unacceptable to use them so. Apart from that, the Ten Commandments of Computer Ethics defined in 1992 by Computer Ethics Institute, the first commandment is that ‘Thou shall not use a computer to harm other people’. The action of a Government agency violates the First commandment.
Every netizen has an inherent right to privacy which shall be maintained by the State at all times. The Right to Privacy has been granted by the US Constitution as well as the Constitution of India by way of Article 21 and inherently within the scope of Article 21’s Right to life with Dignity. Apart from the same, you have a right to use your body and resources as you wish and in private. Applying the principle of Moral Absolutism in the current case, the researcher is of the opinion that the action of the Government agency is not justified in intruding with the personal issues or privacy which is guaranteed by the law maker
We are now just one click away from buying a car or communicating with someone halfway across the world. “The Internet has revolutionized the computer and communications world like nothing before. ”("Internet Society."). Scientists and engineers like Roberts and Kleinrock worked very hard to put their ideas down on paper to describe this global communication through a network. The first form of the Internet was originally called ARPANET.
"(p. 93). We see the argument that the Internet is a useful tool but it is negatively impacting our
In the digital age, social media platforms have become an integral part of our daily lives. Facebook, the world's largest social network, has been the subject of intense scrutiny over the years due to its handling of user data and privacy concerns. In a recent article published on Vox, titled "Facebook’s data collection tactics and algorithms threaten our privacy and democracy," author Rani Molla explores the ways in which Facebook's data collection and algorithmic systems pose a threat to both user privacy and democratic values. Through a combination of rhetorical strategies, Molla successfully argues that Facebook's actions represent a clear danger to both individuals and society as a whole.
“Black Code: Surveillance, Privacy, and the Dark Side of the Internet,” written by Ronald J. Deibert, outlines different issues and benefits that have arised due to the growing use of the internet. Deibert begins his essay providing information about the internet such as the rapid growth of smartphones, how the internet has taken over most of societies lives, and key differences between previous technological innovations compared to the internet. He continues his essay by discussing the U.S.A. Patriot Act and how this law should be retracted based on the fact that various companies, like Google, can give the government our personal searches if they ask. Then, he talks about various types of cyber crimes and how we need stronger regulations to control the internet so these crimes would not be possible. Deibert concludes his essay explaining how the internet has provided many benefits in today’s nation, but the internet needs stricter regulations for our own protection.
Psychological profiling has been around for many years dating back to about 1960. It was credited to Howard Teten and Patrick Mullany because they made the first behavioral analyses for difficult cases (psychologytoday.com n.d.). It first started with Howard Teten compiling a collection of analysis and comparisons. He would than reviewed a few homicides from several police departments and then tested himself with them and how he would approach the case by setting up an experiment. Therefore, once he received all of the data he would prepare a tentative description of the perpetrator (psychologytoday.com. n.d.).
The issue focused on a technique that law enforcement officers call psychological profiling. Psychological profiling is defined as an analytic technique used to analyze criminal behaviors in order to identify an offenders characteristic (Kocsis, Hayes & Irwin, 2002). However, profiling has been used periodically in police investigating practices over the last year. Therefore, the use of profiling reoccurrence missed the support of empirical research validity. As a result, Kocsis et al (2004) were the first to consider examining the empirical skills related to criminal profile accuracy.
The internet could be the most valuable invention that was made in the modern age. With the force of the web individuals basically can do anything. From learning how to cook to building a car. The possibility is endless. The modernization of the internet can have positive and negative effects on the world.
In 1988, the Internet was opened to the public. At that time, not many people were aware of what a huge impact the Internet would have on the lives of future generations and cultures. While it was at first widely accepted by many users because of its astonishingly convenient and unlimited access to information, the enthusiasm for the Internet has more recently diminished and even disappeared in some cases. Many people no longer view the Internet as a helpful tool, but more as a harmful weapon, attacking every area of our lives, including education, communication, literacy, attention span, memory, intelligence, relationships, politics, economics, even sleep, diet, and physical activity. The Internet is ultimately affecting and determining the
In our world, Society gets watched twenty-four seven and some people know it, but they either do not care or just go along. So in reality, Society could prevent this problem by removing social media off of their habits and be spy free. “Young adults (85% of whom are smartphone owners) are also incorporating their mobile devices into a host of information seeking and transactional behaviors. About three-quarters of 18-29 year old smartphone owners have used their phone in the last year to get information about a health condition; about seven-in-ten have used their phone to do online banking or to look up information about job; 44% have consumed educational content on their phone; and 34% have used their phone to apply for a job.” “Behind Winston’s back the voice from the telescreen was still babbling away...of course no way of knowing whether you were being watched at any given moment” (2-3).
Nicholas Carr's argument against the internet was very strong, and it persuaded me. It is very difficult for me to go against his opinion. I agree that the internet is changing us, but not in ways we think. There are long-term effects of using the internet as often as we do. He states that the internet is changing the way our brains function such as having a shorter attention span, negatively changing the way we critically think, and negatively changing our reading skills.
The rapid proliferation of information technology has led to a significant rise in the number of people who use the internet in one way or another. With the growth in the number of persons who have an internet connection; certain individuals have begun to exploit this resource through the unethical practice of Identity theft. As more and more individuals are posting their personal information online, cybercriminals are stealing this information with the aim of assuming the victim's identity so as to either obtain financial advantage or benefits that are associated with the victim (Jewkes, 2013). The act of stealing other people's identity cannot be considered as ethical because it violates the victim's right to privacy.
"  In our World, threats to our Country are common and are becoming frequent. Issues like bullying, extremism, terrorism, and even the illegal production and distribution of drugs threaten all parts of the world more than ever. Not to mention, our increasing dependence on technology for business transactions, work, school, and storage of information has opened up a medium to effectuate these actions. The use of the internet no doubt is beneficial but like anything else, it can, and has been put to ill use. Controversy has been stirred up concerning the monitoring of internet content by the government.
Internet is developing day to day. Internet and networks are binding us in new ways. As Rheingold argues, “There is a huge social issue at work in digital literacy, one that goes beyond personal authority. Every intercourse creates new association in a child’s brain, every email, tweet, search, or post is contributing and nourishing connections in our global brain, changing the shape of the Internet that we billions of people are progressing together. Young child brain or an internet brain both are always trying to make connections.
The Internet Privacy also has a risk because there are many ways in which people can divulge their personal information, for instance by use of “Social Media” and by sending bank and credit card information to various websites. Moreover, directly observed
In this era of globalisation, the Internet has gone far beyond networking