CyberEthics
Encyclopedia
Cyberethics is the study of ethics pertaining to computer networks, encompassing user behavior and what networked computers are programmed to do, and how this affects individuals and society. Examples of cyberethical questions include "Is it OK to display personal information about others on the Internet (such as their online status or their present location via GPS)? "Should users be protected from false information?" "Who owns digital data (such as music, movies, books, web pages, etc.) and what should users be allowed to do with it?" "How much access should there be to gambling and porn online?" "Is access to the Internet a basic right that everyone should have?"
seminal in 1890, Warren and Brandeis defined privacy from an ethical and moral point of view to be "central to dignity and individuality and personhood. Privacy is also indispensable to a sense of autonomy - to 'a feeling that there is an area of an individual's life that is totally under his or her control, an area that is free from outside intrusion.' The deprivation of privacy can even endanger a person's health." (Warren & Brandeis, 1890).
Over 100 years later, the internet and proliferation of private data through governments and ecommerce is a phenomenon which requires a new round of ethical debate involving a person's privacy.
Privacy can be decomposed to the limitation of others' access to an individual with "three elements of secrecy, anonymity, and solitude" (Gavison, 1984).
Anonymity refers to the individual's right to protection from undesired attention. Solitude refers to the lack of physical proximity of an individual to others. Secrecy refers to the protection of personalized information from being freely distributed.
Individuals surrender private information when conducting transactions and registering for services. Ethical business practice protects the privacy
of their customers by securing information which may contribute to the loss of secrecy
, anonymity
, and solitude
. Credit card information, social security numbers, phone numbers, mothers' maiden names, addresses and phone numbers freely collected and shared over the internet may lead to a loss of Privacy.
Fraud and impersonation are some of the malicious activities that occur due to the direct or indirect abuse of private information. Identity theft
is rising rapidly due to the availability of private information in the internet. For instance, seven million Americans have fallen victim to identity theft in 2002, making it the fastest growing crime in the United States (Latak, 2005).
Public records search engines and databases are the main culprits contributing to the rise of cybercrime
.
Listed below are a few recommendations to restrict online databases from proliferating sensitive personnel information.
.
Some may argue that data warehouses are supposed to stand alone and be protected. However, the fact is enough personal information can be gathered from corporate websites and social networking sites to initiate a reverse lookup. Therefore, is it not important to address some of the ethical issues regarding how protected data ends up in the public domain?
As a result, identity theft protection businesses are on the rise. Companies such as LifeLock
and JPMorgan Chase have begun to capitalize on selling identity theft protection insurance.
. This concept has created many clashes in the world of cyberethics. One philosophy of the internet is centered around the freedom of information. The controversy over ownership occurs when the property of information is infringed upon or uncertain.
opened the doors to Peer-to-peer
file sharing
, a technology that allowed users to anonymously transfer files to each other, previously seen on programs such as Napster
or now seen through communications protocol
such as BitTorrent. Much of this, however, was copyrighted music and illegal
to transfer to other users. Whether it is ethical to transfer copyrighted media is another question.
Proponents of unrestricted file sharing point out how file sharing has given people broader and faster access to media, has increased exposure to new artists, and has reduced the costs of transferring media (including less environmental damage). Supporters of restrictions on file sharing argue that we must protect the income of our artists and other people who work to create our media. This argument is partially answered by pointing to the small proportion of money artists receive from the legitimate sale of media.
We also see a similar debate over intellectual property rights in respect to software ownership. The two opposing views are for closed source software distributed under restrictive licenses or for free and open source software (Freeman & Peace, 2004).
The argument can be made that restrictions are required because companies would not invest weeks and months in development if there is no incentive for revenue generated from sales and licensing fees. Proponents for open source
believe that all programs should be available to anyone who wants to study them.
software, new issues are raised over whether the subverting of DRM is ethical. Some champion the hackers of DRM as defenders of users' rights, allowing the blind to make audio books of PDFs they receive, allowing people to burn music they have legitimately bought to CD or to transfer it to a new computer. Others see this as nothing but simply a violation of the rights of the intellectual property holders, opening the door to uncompensated use of copyrighted media.
, cyber crimes and computer hacking
. This also leads to the question of who has the right to regulate the internet in the interest of security?
does the offense lay?
. Internet censorship
and filtering are used to control or suppress the publishing or accessing of information. The legal issues are similar to offline censorship
and filtering. The same arguments that apply to offline censorship and filtering apply to online censorship and filtering; whether people are better off with free access to information or should be protected from what is considered by a governing body as harmful, indecent or illicit. The fear of access by minors drives much of the concern and many online advocate groups have sprung up to raise awareness and of controlling the accessibility of minors to the internet.
Censorship and filtering occurs on small to large scales, whether it be a company restricting their employees' access to cyberspace by blocking certain websites which are deemed as relevant only to personal usage and therefore damaging to productivity or on a larger scale where a government creates large firewalls which censor and filter access to certain information available online frequently from outside their country to their citizens and anyone within their borders. One of the most famous examples of a country controlling access is the Golden Shield Project
, also referred to as the Great Firewall of China, a censorship and surveillance project set up and operated by the People's Republic of China. Another instance is the 2000 case of the League Against Racism and Antisemitism (LICRA), French Union of Jewish Students, vs. Yahoo! Inc (USA) and Yahoo! France, where the French Court declared that "access by French Internet users to the auction website containing Nazi objects constituted a contravention of French law and an offence to the 'collective memory' of the country and that the simple act of displaying such objects (e.g. exhibition of uniforms, insignia or emblems resembling those worn or displayed by the Nazis) in France constitutes a violation of the Article R645-1 of the Penal Code and is therefore considered as a threat to internal public order."(Akdeniz, 2001).
Since the French judicial ruling many websites must abide by the rules of the countries in which they are accessible.
as well as the freedom to seek, obtain and impart information brings up the question of who or what, has the jurisdiction in cyberspace. The right of freedom of information is commonly subject to limitations dependant upon the country, society and culture concerned.
Generally there are three standpoints on the issue as it relates to the internet. First is the argument that the internet is a form of media, put out and accessed by citizens of governments and therefore should be regulated by each individual government within the borders of their respective jurisdictions. Second, is that, "Governments of the Industrial World… have no sovereignty [over the internet] … We have no elected government, nor are we likely to have one, … You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear." (Barlow, 1996).
A third party believes that the internet supersedes all tangible borders such as the borders of countries, authority should be given to an international body since what is legal in one country may be against the law in the other.
.
have always stirred ethical controversy. These issues are reflected online to varying degrees. One of the largest cyberethical debates is over the regulation, distribution and accessibility of pornography online
. Hardcore pornographic material is generally controlled by governments with laws regarding how old one has to be to obtain it and what forms are acceptable or not. The availability of pornography online calls into question jurisdiction as well as brings up the problem of regulation in particular over child pornography
, which is illegal in most countries, as well as pornography involving violence or animals, which is restricted within most countries.
Due to its controversy gambling is either banned or heavily controlled on local or national levels. The accessibility of the internet and its ability to cross geographic-borders have led to illegal online gambling, often offshore operations. Over the years online gambling, both legal and illegal, has grown exponentially which has led to difficulties in regulation. This enormous growth has even called into question by some the ethical place of gambling online.
•International Federation for Information Processing (IFIP) IFIP
•Association for Computer Machinery, Special Interest Group: Computers and Society (SIGCAS)
•Ethical and Professional Issues in Computing (EPIC) Electronic Privacy Information Center
•Electronic Frontier Foundation (EFF) Electronic Frontier Foundation
•International Center for Information Ethics (ICIE)
•Directions and Implications in Advanced Computing (DIAC)
•The Centre for Computing and Social Responsibility (CCSR)
•Cyber-Rights and Cyber-liberties
•International Journal of Cyber Ethics in Education IJCEE (www.igi-global.com/ijcee)
currently published that can be tailored to fit any organization. Code of ethics is an instrument that establishes a common ethical framework for a large group of people. Four well known examples of Code of Ethics for IT professionals are listed below:
(IAB) in RFC 1087 defines an activity as unethical and unacceptable if it:
Privacy
In the late 18th century, the invention of cameras spurred similar ethical debates as the internet does today. During a Harvard Law ReviewHarvard Law Review
The Harvard Law Review is a journal of legal scholarship published by an independent student group at Harvard Law School.-Overview:According to the 2008 Journal Citation Reports, the Review is the most cited law review and has the second-highest impact factor in the category "law" after the...
seminal in 1890, Warren and Brandeis defined privacy from an ethical and moral point of view to be "central to dignity and individuality and personhood. Privacy is also indispensable to a sense of autonomy - to 'a feeling that there is an area of an individual's life that is totally under his or her control, an area that is free from outside intrusion.' The deprivation of privacy can even endanger a person's health." (Warren & Brandeis, 1890).
Over 100 years later, the internet and proliferation of private data through governments and ecommerce is a phenomenon which requires a new round of ethical debate involving a person's privacy.
Privacy can be decomposed to the limitation of others' access to an individual with "three elements of secrecy, anonymity, and solitude" (Gavison, 1984).
Anonymity refers to the individual's right to protection from undesired attention. Solitude refers to the lack of physical proximity of an individual to others. Secrecy refers to the protection of personalized information from being freely distributed.
Individuals surrender private information when conducting transactions and registering for services. Ethical business practice protects the privacy
Privacy
Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively...
of their customers by securing information which may contribute to the loss of secrecy
Secrecy
Secrecy is the practice of hiding information from certain individuals or groups, perhaps while sharing it with other individuals...
, anonymity
Anonymity
Anonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown.There are many reasons why a...
, and solitude
Solitude
Solitude is a state of seclusion or isolation, i.e., lack of contact with people. It may stem from bad relationships, deliberate choice, infectious disease, mental disorders, neurological disorders or circumstances of employment or situation .Short-term solitude is often valued as a time when one...
. Credit card information, social security numbers, phone numbers, mothers' maiden names, addresses and phone numbers freely collected and shared over the internet may lead to a loss of Privacy.
Fraud and impersonation are some of the malicious activities that occur due to the direct or indirect abuse of private information. Identity theft
Identity theft
Identity theft is a form of stealing another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name...
is rising rapidly due to the availability of private information in the internet. For instance, seven million Americans have fallen victim to identity theft in 2002, making it the fastest growing crime in the United States (Latak, 2005).
Public records search engines and databases are the main culprits contributing to the rise of cybercrime
CyberCrime
CyberCrime was an innovative, weekly America television program on TechTV that focused on the dangers facing computer users. Filmed in San Francisco, California, the show was hosted by Alex Wellen and Jennifer London...
.
Listed below are a few recommendations to restrict online databases from proliferating sensitive personnel information.
- Exclude sensitive unique identifiers from database records such as social security numbers, birth dates, hometown and mothers' maiden names.
- Exclude phone numbers that are normally unlisted.
- Clear provision of a method which allows people to have their names removed from a database.
- Banning the reverse social security number lookup services (Spinello, 2006).
Private Data Collection
Data warehouses are used today to collect and store huge amounts of personal data and consumer transactions. These facilities can preserve large volumes of consumer information for an indefinite amount of time. Some of the key architectures contributing to the erosion of privacy include databases, cookies and spywareSpyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's...
.
Some may argue that data warehouses are supposed to stand alone and be protected. However, the fact is enough personal information can be gathered from corporate websites and social networking sites to initiate a reverse lookup. Therefore, is it not important to address some of the ethical issues regarding how protected data ends up in the public domain?
As a result, identity theft protection businesses are on the rise. Companies such as LifeLock
LifeLock
LifeLock Inc. which was founded in 2005, is an American identity theft protection company.According to the LifeLock website, for a minimum fee of $10 a month, the LifeLock Identity Alert system can identify fraudulent applications for some forms of credit and non-credit related services...
and JPMorgan Chase have begun to capitalize on selling identity theft protection insurance.
Property
Ethical debate has long included the concept of propertyProperty
Property is any physical or intangible entity that is owned by a person or jointly by a group of people or a legal entity like a corporation...
. This concept has created many clashes in the world of cyberethics. One philosophy of the internet is centered around the freedom of information. The controversy over ownership occurs when the property of information is infringed upon or uncertain.
Intellectual Property Rights
The ever-increasing speed of the internet and the emergence of compression technology, such as mp3MP3
MPEG-1 or MPEG-2 Audio Layer III, more commonly referred to as MP3, is a patented digital audio encoding format using a form of lossy data compression...
opened the doors to Peer-to-peer
Peer-to-peer
Peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application...
file sharing
File sharing
File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia , documents, or electronic books. It may be implemented through a variety of ways...
, a technology that allowed users to anonymously transfer files to each other, previously seen on programs such as Napster
Napster
Napster is an online music store and a Best Buy company. It was originally founded as a pioneering peer-to-peer file sharing Internet service that emphasized sharing audio files that were typically digitally encoded music as MP3 format files...
or now seen through communications protocol
Communications protocol
A communications protocol is a system of digital message formats and rules for exchanging those messages in or between computing systems and in telecommunications...
such as BitTorrent. Much of this, however, was copyrighted music and illegal
File sharing and the law
The legal issues in file sharing involve violation of copyright laws as digital copies of copyrighted materials are transferred between users.The application of national copyright laws to peer-to-peer and file sharing networks is of global significance...
to transfer to other users. Whether it is ethical to transfer copyrighted media is another question.
Proponents of unrestricted file sharing point out how file sharing has given people broader and faster access to media, has increased exposure to new artists, and has reduced the costs of transferring media (including less environmental damage). Supporters of restrictions on file sharing argue that we must protect the income of our artists and other people who work to create our media. This argument is partially answered by pointing to the small proportion of money artists receive from the legitimate sale of media.
We also see a similar debate over intellectual property rights in respect to software ownership. The two opposing views are for closed source software distributed under restrictive licenses or for free and open source software (Freeman & Peace, 2004).
The argument can be made that restrictions are required because companies would not invest weeks and months in development if there is no incentive for revenue generated from sales and licensing fees. Proponents for open source
Open source
The term open source describes practices in production and development that promote access to the end product's source materials. Some consider open source a philosophy, others consider it a pragmatic methodology...
believe that all programs should be available to anyone who wants to study them.
Digital Rights Management (DRM)
With the introduction of Digital Rights ManagementDigital rights management
Digital rights management is a class of access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals with the intent to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses of digital content that...
software, new issues are raised over whether the subverting of DRM is ethical. Some champion the hackers of DRM as defenders of users' rights, allowing the blind to make audio books of PDFs they receive, allowing people to burn music they have legitimately bought to CD or to transfer it to a new computer. Others see this as nothing but simply a violation of the rights of the intellectual property holders, opening the door to uncompensated use of copyrighted media.
Security
Security has long been a topic of ethical debate. Is it better to protect the common good of the community or rather should we safeguard the rights of the individual? There is a continual dispute over the boundaries between the two and which compromises are right to make. As an ever increasing amount of people connect to the internet and more and more personal data is available online there is susceptibility to identity theftIdentity theft
Identity theft is a form of stealing another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name...
, cyber crimes and computer hacking
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...
. This also leads to the question of who has the right to regulate the internet in the interest of security?
Accuracy
Due to the ease of accessibility and sometimes collective nature of the internet we often come across issues of accuracy e.g. who is responsible for the authenticity and fidelity of the information available online? Ethically this includes debate over who should be allowed to contribute content and who should be held accountable if there are errors in the content or if it is false. This also brings up the question of how is the injured party, if any, to be made whole and under which jurisdictionJurisdiction
Jurisdiction is the practical authority granted to a formally constituted legal body or to a political leader to deal with and make pronouncements on legal matters and, by implication, to administer justice within a defined area of responsibility...
does the offense lay?
Accessibility, Censorship and Filtering
Accessibility, censorship and filtering bring up many ethical issues that have several branches in cyberethics. Many questions have arisen which continue to challenge our understanding of privacy, security and our participation in society. Throughout the centuries mechanisms have been constructed in the name of protection and security. Today the applications are in the form of software that filters domains and content so that they may not be easily accessed or obtained without elaborate circumvention or on a personal and business level through free or content-control softwareContent-control software
Content-control software, also known as censorware or web filtering software, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web...
. Internet censorship
Internet censorship
Internet censorship is the control or suppression of the publishing of, or access to information on the Internet. It may be carried out by governments or by private organizations either at the behest of government or on their own initiative...
and filtering are used to control or suppress the publishing or accessing of information. The legal issues are similar to offline censorship
Censorship
thumb|[[Book burning]] following the [[1973 Chilean coup d'état|1973 coup]] that installed the [[Military government of Chile |Pinochet regime]] in Chile...
and filtering. The same arguments that apply to offline censorship and filtering apply to online censorship and filtering; whether people are better off with free access to information or should be protected from what is considered by a governing body as harmful, indecent or illicit. The fear of access by minors drives much of the concern and many online advocate groups have sprung up to raise awareness and of controlling the accessibility of minors to the internet.
Censorship and filtering occurs on small to large scales, whether it be a company restricting their employees' access to cyberspace by blocking certain websites which are deemed as relevant only to personal usage and therefore damaging to productivity or on a larger scale where a government creates large firewalls which censor and filter access to certain information available online frequently from outside their country to their citizens and anyone within their borders. One of the most famous examples of a country controlling access is the Golden Shield Project
Golden Shield Project
The Golden Shield Project , colloquially referred to as the Great Firewall of China is a censorship and surveillance project operated by the Ministry of Public Security division of the government of the People's Republic of China...
, also referred to as the Great Firewall of China, a censorship and surveillance project set up and operated by the People's Republic of China. Another instance is the 2000 case of the League Against Racism and Antisemitism (LICRA), French Union of Jewish Students, vs. Yahoo! Inc (USA) and Yahoo! France, where the French Court declared that "access by French Internet users to the auction website containing Nazi objects constituted a contravention of French law and an offence to the 'collective memory' of the country and that the simple act of displaying such objects (e.g. exhibition of uniforms, insignia or emblems resembling those worn or displayed by the Nazis) in France constitutes a violation of the Article R645-1 of the Penal Code and is therefore considered as a threat to internal public order."(Akdeniz, 2001).
Since the French judicial ruling many websites must abide by the rules of the countries in which they are accessible.
Freedom of Information
Freedom of information, that is the freedom of speechFreedom of speech
Freedom of speech is the freedom to speak freely without censorship. The term freedom of expression is sometimes used synonymously, but includes any act of seeking, receiving and imparting information or ideas, regardless of the medium used...
as well as the freedom to seek, obtain and impart information brings up the question of who or what, has the jurisdiction in cyberspace. The right of freedom of information is commonly subject to limitations dependant upon the country, society and culture concerned.
Generally there are three standpoints on the issue as it relates to the internet. First is the argument that the internet is a form of media, put out and accessed by citizens of governments and therefore should be regulated by each individual government within the borders of their respective jurisdictions. Second, is that, "Governments of the Industrial World… have no sovereignty [over the internet] … We have no elected government, nor are we likely to have one, … You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear." (Barlow, 1996).
A third party believes that the internet supersedes all tangible borders such as the borders of countries, authority should be given to an international body since what is legal in one country may be against the law in the other.
Digital Divide
An issue specific to the ethical issues of the Freedom of Information is what is known as the digital divide. This refers to the unequal socio-economic divide between those who have access to digital and information technology such as cyberspace and those who have limited or no access at all. This gap of access between countries or regions of the world is called the global digital divideGlobal digital divide
The global digital divide is a term used to describe “great disparities in opportunity to access the Internet and the information and educational/business opportunities tied to this access … between developed and developing countries”...
.
Sexuality and Pornography
Sexuality in terms of sexual orientation, infidelity, sex with or between minors, public display and pornographyPornography
Pornography or porn is the explicit portrayal of sexual subject matter for the purposes of sexual arousal and erotic satisfaction.Pornography may use any of a variety of media, ranging from books, magazines, postcards, photos, sculpture, drawing, painting, animation, sound recording, film, video,...
have always stirred ethical controversy. These issues are reflected online to varying degrees. One of the largest cyberethical debates is over the regulation, distribution and accessibility of pornography online
Internet pornography
Internet pornography is pornography that is distributed by means of various sectors of the Internet, primarily via websites, peer-to-peer file sharing, or Usenet newsgroups...
. Hardcore pornographic material is generally controlled by governments with laws regarding how old one has to be to obtain it and what forms are acceptable or not. The availability of pornography online calls into question jurisdiction as well as brings up the problem of regulation in particular over child pornography
Child pornography
Child pornography refers to images or films and, in some cases, writings depicting sexually explicit activities involving a child...
, which is illegal in most countries, as well as pornography involving violence or animals, which is restricted within most countries.
Gambling
Gambling is often a topic in ethical debate as some view it as inherently wrong and support prohibition while others support no legal interference at all. "Between these extremes lies a multitude of opinions on what types of gambling the government should permit and where it should be allowed to take place. Discussion of gambling forces public policy makers to deal with issues as diverse as addiction, tribal rights, taxation, senior living, professional and college sports, organized crime, neurobiology, suicide, divorce, and religion." (McGowan, 2007).Due to its controversy gambling is either banned or heavily controlled on local or national levels. The accessibility of the internet and its ability to cross geographic-borders have led to illegal online gambling, often offshore operations. Over the years online gambling, both legal and illegal, has grown exponentially which has led to difficulties in regulation. This enormous growth has even called into question by some the ethical place of gambling online.
Organizations Related to Cyberethics
The following organizations are of notable interest in the cyberethics debate:•International Federation for Information Processing (IFIP) IFIP
•Association for Computer Machinery, Special Interest Group: Computers and Society (SIGCAS)
•Ethical and Professional Issues in Computing (EPIC) Electronic Privacy Information Center
Electronic Privacy Information Center
Electronic Privacy Information Center is a public interest research group in Washington, D.C. It was established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values in the information age...
•Electronic Frontier Foundation (EFF) Electronic Frontier Foundation
Electronic Frontier Foundation
The Electronic Frontier Foundation is an international non-profit digital rights advocacy and legal organization based in the United States...
•International Center for Information Ethics (ICIE)
•Directions and Implications in Advanced Computing (DIAC)
•The Centre for Computing and Social Responsibility (CCSR)
•Cyber-Rights and Cyber-liberties
•International Journal of Cyber Ethics in Education IJCEE (www.igi-global.com/ijcee)
Codes of Ethics in Computing
Information Technology managers are required to establish a set of ethical standards common to their organization. There are many examples of ethical codeEthical code
An ethical code is adopted by an organization in an attempt to assist those in the organization called upon to make a decision understand the difference between 'right' and 'wrong' and to apply this understanding to their decision...
currently published that can be tailored to fit any organization. Code of ethics is an instrument that establishes a common ethical framework for a large group of people. Four well known examples of Code of Ethics for IT professionals are listed below:
RFC 1087
In January 1989, the Internet Architecture BoardInternet Architecture Board
The Internet Architecture Board is the committee charged with oversight of the technical and engineering development of the Internet by the Internet Society ....
(IAB) in RFC 1087 defines an activity as unethical and unacceptable if it:
- Seeks to gain unauthorized access to the resources of the Internet.
- Disrupts the intended use of the Internet.
- Wastes resources (people, capacity, computer) through such actions.
- Destroys the integrity of computer-based information, or
- Compromises the privacy of users (RFC 1087, 1989).
The Code of Fair Information Practices
The Code of Fair Information Practices is based on five principles outlining the requirements for records keeping systems. This requirement was implemented in 1973 by the U.S. Department of Health, Education and Welfare.- There must be no personal data record-keeping systems whose very existence is secret.
- There must be a way for a person to find out what information about the person is in a record and how it is used.
- There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent.
- There must be a way for a person to correct or amend a record of identifiable information about the person.
- Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data (Harris, 2003).
Ten Commandments of Computer Ethics
The ethical values as defined in 1992 by the Computer Ethics Institute; a nonprofit organization whose mission is to advance technology by ethical means, lists these rules as a guide to computer ethics:- Thou shalt not use a computer to harm other people.
- Thou shalt not interfere with other people's computer work.
- Thou shalt not snoop around in other people's computer files.
- Thou shalt not use a computer to steal.
- Thou shalt not use a computer to bear false witness.
- Thou shalt not copy or use proprietary software for which you have not paid.
- Thou shalt not use other people's computer resources without authorization or proper compensation.
- Thou shalt not appropriate other people's intellectual output.
- Thou shalt think about the social consequences of the program you are writing or the system you are designing.
- Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans (Computer Ethics Institute, 1992).
(ISC)2 Code of Ethics
(ISC)2 an organization committed to certification of computer security professional has further defined its own Code of Ethics generally as:- Act honestly, justly, responsibly, and legally, and protecting the commonwealth.
- Work diligently and provide competent services and advance the security profession.
- Encourage the growth of research – teach, mentor, and value the certification.
- Discourage unsafe practices, and preserve and strengthen the integrity of public infrastructures.
- Observe and abide by all contracts, expressed or implied, and give prudent advice.
- Avoid any conflict of interest, respect the trust that others put in you, and take on only those jobs you are qualified to perform.
- Stay current on skills, and do not become involved with activities that could injure the reputation of other security professionals (Harris, 2003).
See also
- Ethics of TechnologyEthics of technologyEthics in technology is a subfield of ethics addressing the ethical questions specific to the Technology Age. Some prominent works of philosopher Hans Jonas are devoted to ethics of technology. It is often held that technology itself is incapable of possessing moral or ethical qualities, since...
- Internet Research: Ethics
- Computer EthicsComputer ethicsComputer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct....
- Information Privacy Law
- Internet PrivacyInternet privacyInternet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information or non-PII information such as a...
- Digital RightsDigital rightsThe term digital rights describes the permissions of individuals legitimately to perform actions involving the use of a computer, any electronic device, or a communications network...
- Open Source: Ethics
- Computer CrimeComputer crimeComputer crime, or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Such crimes may threaten a nation’s security and financial health...
- Internet Bias
- International Freedom of Expression eXchange (IFEX)International Freedom of Expression ExchangeThe International Freedom of Expression eXchange , founded in 1992, is a global network of around 90 non-governmental organisations that promotes and defends the right to freedom of expression....
- Network NeutralityNetwork neutralityNetwork neutrality is a principle that advocates no restrictions by Internet service providers or governments on consumers' access to networks that participate in the Internet...
- E-democracyE-democracyE-democracy refers to the use of information technologies and communication technologies and strategies in political and governance processes...
External links
- Association for Computer Machinery, Special Interest Group: Computers and Society website
- International Center for Information Ethics website
- The Centre for Computing and Social Responsibility website
- Safer Internet Center which includes Awareness Node, Helpline and Hotline
- Cyber-Rights and Cyber-Liberties website
- IEEE Website
- ACM Website
- ISC2 Website
- Internet Architecture Board