This website uses cookies to ensure you have the best experience. Learn more

Ethics In Cyberspace Essay

956 words - 4 pages

Cyberspace is a global community of people using computers in networks. In order to function well, the virtual communities supported by the Internet depend upon rules of conduct, the same as any society. Librarians and information technologists must be knowledgeable about ethical issues for the welfare of their organizations and to protect and advise users.What is ethics? Ethics is the art of determining what is right or good. It can also be defined as a general pattern or way of life, a set of rules of conduct or moral code. Ethical guidelines are based on values.The Association of Computing Machinery (ACM) is one national organization which has developed a statement of its values. Every member of ACM is expected to uphold the Code of Ethics and Professional Conduct which includes these general moral imperatives:1) contribute to society and human well-being2) avoid harm to others3) be honest and trustworthy4) be fair and take action not to discriminate5) honor property rights including copyrights and patents6) give proper credit for intellectual property7) respect the privacy of others8) honor confidentiality.The very nature of electronic communication raises new moral issues. Individuals and organizations should be proactive in examining these concerns and developing policies which protect liabilities. Issues which need to be addressed include: privacy of mail, personal identities, access and control of the network, pornographic or unwanted messages, copyright, and commercial uses of the network. An Acceptable Use Policy (AUP) is recommended as the way an organization should inform users of expectations and responsibilities. Sample AUPs are available on the Internet at gopher sites and can be retrieved by using Veronica to search keywords 'acceptable use policies' or 'ethics.'The Computer Ethics Institute in Washington, D.C. has developed a 'Ten Commandments of Computing':1) Thou shalt not use a computer to harm other people.2) Thou shalt not interfere with other people's computer work.3) Thou shalt not snoop around in other people's computer files.4) Thou shalt not use a computer to steal.5) Thou shalt not use a computer to bear false witness.6) Thou shalt not copy or use proprietary software for which you have not paid.7) Thou shalt not use other people's computer resources without authorization or proper compensation.8) Thou shalt not appropriate other people's intellectual output.9) Though shalt think about the social consequences of the program you are writing or the system you are designing.10) Thou shalt always use a computer in ways that show consideration and respect for your fellow humans (Washington Post, 15 June 1992: WB3).The University of Southern California Network Ethics Statement specifically identifies types of network misconduct which are forbidden: intentionally disrupting network traffic or crashing the network and connected systems; commercial or fraudulent use of university computing resources; theft of data, equipment,...

Find Another Essay On Ethics in cyberspace

William Gibson and the internet Essay

5058 words - 20 pages off your back.the Extropians want to go beyond the limits of nature and biology and move on up to the stars, they believe that computers have kick started the human evolution.Chapter 2CyberspaceThe term 'Cyberspace' was first coined by the sci-fi writer William Gibson in his 1984 novel 'Neuromancer'. Gibson first identified the emergence of Cyberspace as the most recent moment in the development of electromechanical communications, telematics and

Policy and Compliance (Tracey) Essay

2173 words - 9 pages payroll last year, though there was no evidence of fraud. (Cyberspace and Cybersecurity: Interactive Case study II). During the assessment, various security policy weaknesses were discovered which will be discussed in more detail in Privacy and Protection of Data sections below. Sarbanes-Oxley (SOX) (Tracey) Established in 2002 by congress, Sarbanes-Oxley (Sox) was established by Congress in an effort to sustain ethics and integrity in

Crime in the Cyber Realm

1032 words - 5 pages Lessig (2006) takes a more technology-based approach to cybercrime, which he terms “Code” (p.5-6). Code is the hardware and software that composes cyberspace, therefore cyberspace administrators and developers are responsible for what is permitted and restricted over the Internet. With the Code theory, administrators and developers share some responsibility for the crimes in both mentioned cases because their lack of diligence led to the

Computer Ethics And The Constitution

698 words - 3 pages Amendments onto "cyberspace" in this information age.The following are examples of cases where the Amendments to the Constitution have been used or could have been used to defend court cases in computer ethics.The First Amendment is arguably the Amendment that applies most frequently to computer ethics issues. The First Amendment assures the right to freedom of speech. The First Amendment guarantees that "Congress shall make no law...abridging the

Internet Ethics: Issues that Push the Boundaries

1371 words - 5 pages the types of information that go on the web, in particular personal, self-created web sites, without violating this right? It is difficult to foresee a law being able to enter the households of people and prevent them from typing lies into their computers. While the lies that conveyed in cyberspace certainly seem to violate the very core and principle of the world ETHICS, their prevention, and prohibition of them, does not seem near. Internet

Code of Ethics in Computing and Information Systems

1400 words - 6 pages Ethics are the moral principles by which we govern our lives. Ethics are an important part society because without them the general population that we call society would behave no better than the general population in prison. With this said, Ethics in computing and information systems are the behaviors that are considered acceptable by users and the functionality of the system being used. The information that passes through an information

Elements of Contract

1205 words - 5 pages January). U.S. Newswire. Retrieved January 25, 2012, from ProQuest Newsstand. (Document ID: 2565558681). Chirelstein, Marvin A. 2001. Concepts and Case Analysis in the Law of Contracts. 4th ed. New York: Foundation. Koepsell, D.R. (2000). An emerging ontology of jurisdiction in cyberspace. Ethics and Information Technology, 2(2), 99.

The Importance of Legal and Ethnical Standards for Technology

997 words - 4 pages other do unto you. The second rule of Netiquette is to "adhere to the same standards of behavior online that you follow in real life" (Shea). Because people sometimes forget that there is a human being on the other side of the computer, some people think that a lower standard of ethics or personal behavior is acceptable in the Internet. The third rule of Netiquette is to "know where you are in cyberspace" (Shea). What is perfectly acceptable in

Computer Hackers and Ethics

1639 words - 7 pages break in and steal information until 1994. On Christmas day, he broke into the computer of Tsutomu Shimomura, an expert at computer security. Shimomura began to track Mitnick. He was finally arrested in 1995. Twenty five thousand stolen credit card numbers were found on his PC. This brings us to the question are hacking and ethics compatible? Believe it or not, there is an actual Code of Hacker Ethics that exists. Many hacker organizations and

The Sun Will Come Out Amara A study of the language development of a Cambodian girl in the United States

2341 words - 9 pages , Verso: New York.Atkinson.P, (1990) The Ethnographic Imagination, Routledge: London.Baudrillard,J. (1988) Simulacra and Simulations in Poster,M. (1988) (ed)Burgess.R, (1989) Gray Areas: Ethical Dilemmas in Educational Ethnography, in Burgess.R, (1989) (ed.) The Ethics of Educational Research, the Farmer Press, East Sussex.Button.G, (1991) (eds) Ethnomethodology and the Human Sciences,: Cambridge University Press: CambridgeCole.M, Gay.J, Glick.A

CyberSecurity and the Threat to National Security

1974 words - 8 pages rather a culture that exists in cyberspace and is a compilation of numerous new technologies and capabilities, used by diverse people in diverse real – world locations. Cyberculture, a twentieth century phenomena, has brought challenges unlike any other that the United States has seen in the areas of cyber security and its impact on our most critical institutions. This presentation will focus on the aforementioned three entities where national

Similar Essays

Security Issues In Cyberspace Essay

1325 words - 6 pages It is held by many people today that the World seems to be a small global village because of internet and use of ICT and computers. There are many different issues and cases in Information and Communication Technology as well as in other fields that need proper analysis leading to correct decisions for solutions. Because of the brevity of the assignment, I would like to talk about security in cyberspace to deal with hacktivism and hacker ethics

Developing A Framework For Cyberlaw Essay

1863 words - 7 pages ) Cyberspace has not just grown, it has exploded. Some estimates place its growth at 20 percent a month.(4) Because of its exponential growth, its norms, ethics and values are constantly changing.(5) It is growing at such a rate that the "real world societies" find it difficult to apply formal legal rules to cyberspace. Indeed, applying current law may result in unwanted consequences, such as imposing the standards of the most restrictive American

Cyber Crime: Cybersecurity For Cyberspace Essay

2123 words - 9 pages imposed in accordance with federal, state, and local laws. In addition to these ethics and code of conduct, it is recommended that all state jurisdictions implement the following framework as the bases to build upon within their localities. Securing “Cyberspace” (.gov domain) from becoming another statistical victim of “Cyberterrorism”, all implementations must be compliant with federal, state, and local laws, depending on jurisdiction, as well as

History Of Internet Essay

3150 words - 13 pages already exists. At the present time the ethics of business on the net are very unclear. The perception of commercial use as inappropriate use of the net still exists among many segments of the net community. Incidents such as the mass advertisements from the law team of Canter&Siegel have made many people fearful of the potential of abuse of access in cyberspace. On the other hand, useful services are coming on-line, especially with the advent