
Cyberethics is "a branch of ethics concerned with behavior in an online environment".
In another definition, it is the "exploration of the entire range of
ethical
Ethics is the philosophical study of moral phenomena. Also called moral philosophy, it investigates normative questions about what people ought to do or which behavior is morally right. Its main branches include normative ethics, applied e ...
and
moral
A moral (from Latin ''morālis'') is a message that is conveyed or a lesson to be learned from a story or event. The moral may be left to the hearer, reader, or viewer to determine for themselves, or may be explicitly encapsulated in a maxim. ...
issues that arise in
cyberspace
Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
" while cyberspace is understood to be "the electronic worlds made visible by the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
."
For years, various governments have enacted regulations while organizations have defined policies about cyberethics.
Theory
According to
Larry Lessig in ''
Code and Other Laws of Cyberspace'', there are four constraints that govern human behavior:
law
Law is a set of rules that are created and are enforceable by social or governmental institutions to regulate behavior, with its precise definition a matter of longstanding debate. It has been variously described as a science and as the ar ...
,
(social) norms, the market and the
code
In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communicati ...
/architecture. The same four apply in cyberspace. Ethics are outside these four and complementary to them.
In 2001, Herman T. Tavani considered whether
computer ethics
Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.
Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Geor ...
were different from cyberethics. While he agreed that "The internet has perpetuated and, in certain cases, exacerbated many of the ethical issues associated with the use of earlier computing technologies",
he did not agree that there is enough difference and that a new field should be introduced. He extended the same opinion to internet ethics.
Challenges
According to, Baird, Ramsower and Rosenbaum, it is difficult to unravel cyberethical issues since "the building material of cyberspace is
information
Information is an Abstraction, abstract concept that refers to something which has the power Communication, to inform. At the most fundamental level, it pertains to the Interpretation (philosophy), interpretation (perhaps Interpretation (log ...
and that is invisible and carries "value and ethical implications.""
They also point out that new ethical issues will arise since technology is changing and growing.
Another challenge is that the internet is a borderless phenomenon and according to some, it is "quite difficult for any nation to exercise local jurisdiction over information available in cyberspace" and so governments are better left with a "modest" role in Internet regulation.
According to the
International Telecommunication Union
The International Telecommunication Union (ITU)In the other common languages of the ITU:
*
* is a list of specialized agencies of the United Nations, specialized agency of the United Nations responsible for many matters related to information ...
, 5.4 billion were using the internet in 2023. That amounted to 67% of the world population. The number increased by 45% since 2018.
Privacy history
In the late 19th century, the invention of
camera
A camera is an instrument used to capture and store images and videos, either digitally via an electronic image sensor, or chemically via a light-sensitive material such as photographic film. As a pivotal technology in the fields of photograp ...
s spurred similar ethical debates as the
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
does today. During a seminar of ''
Harvard Law Review
The ''Harvard Law Review'' is a law review published by an independent student group at Harvard Law School. According to the ''Journal Citation Reports'', the ''Harvard Law Review''s 2015 impact factor of 4.979 placed the journal first out of ...
'' in 1890,
Samuel D. Warren II and Brandeis defined privacy from an ethical and moral point of view to be:
: "central to dignity and individuality and boyhood. Privacy is also indispensable to a sense of autonomy—to 'a feeling that there is an area of an individual's life that is totally under his or her control, an area that is free from outside intrusion.' The deprivation of privacy can even endanger a person's health."
Over the past century, the advent of the internet and the rapid expansion of
e-commerce
E-commerce (electronic commerce) refers to commercial activities including the electronic buying or selling products and services which are conducted on online platforms or over the Internet. E-commerce draws on technologies such as mobile co ...
have ushered in a new era of privacy concerns. Governments and organizations collect vast amounts of private data, raising questions about individual autonomy and control over personal information. With the rise of online transactions and digital footprints,
individuals face increased risks of privacy breaches and identity theft. This modern landscape necessitates a renewed ethical debate surrounding privacy rights in the digital age.
Privacy can be decomposed to the limitation of others' access to an individual with "three elements of secrecy, anonymity, and solitude."
Anonymity refers to the individual's right to protection from undesired attention. Solitude refers to the lack of physical proximity of an individual to others. Secrecy refers to the protection of personalized information from being freely distributed.
Moreover, digital security encompasses psychological and technical aspects, shaping users' perceptions of trust and safety in online interactions. Users' awareness of cybersecurity risks, alongside incident response protocols, authentication mechanisms, and
encryption protocols, are pivotal in protecting
digital environments. Despite advancements in defensive technologies, the cybersecurity landscape presents ongoing challenges, evident through a continuous influx of data breaches and cyber incidents reported across diverse sectors. This emphasizes the significance of comprehending user behavior and perceptions within the realm of cyberethics, as individuals navigate the intricacies of digital security in their online endeavors.
Individuals surrender private information when conducting transactions and registering for services. Ethical business practice protects the
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
of their customers by securing information which may contribute to the loss of
secrecy
Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.
Secrecy is often controver ...
,
anonymity
Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
, and
solitude
Solitude, also known as social withdrawal, is a state of seclusion or isolation, meaning lack of socialisation. Effects can be either positive or negative, depending on the situation. Short-term solitude is often valued as a time when one may wo ...
. Credit card information, social security numbers, phone numbers, mothers' maiden names, addresses and phone numbers freely collected and shared over the internet may lead to a loss of Privacy.
Fraud and impersonation are some of the malicious activities that occur due to the direct or indirect abuse of private information.
Identity theft
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
is rising rapidly due to the availability of private information in the internet. For instance, seven million Americans fell victim to identity theft in 2002, and nearly 12 million Americans were victims of identity theft in 2011 making it the fastest growing crime in the United States.
Moreover, with the widespread use of social media and online transactions, the chances of identity theft are increasing. It's essential for people and businesses to stay cautious and implement strong security measures to prevent identity theft and financial fraud.
Public records
search engines
Search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites have a search facility for online databases.
By content/topic
Gene ...
and
databases
In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and ana ...
are the main culprits contributing to the rise of
cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
.
Listed below are a few recommendations to restrict online databases from proliferating sensitive personnel information.
# Exclude sensitive unique identifiers from database records such as social security numbers, birth dates, hometown and mothers' maiden names.
# Exclude phone numbers that are normally unlisted.
# Clear provision of a method which allows people to have their names removed from a database.
# Banning the reverse social security number lookup services.
History of Cyberethics in Hacking
The evolution of hacking raises ethical questions in cybersecurity. Once a hobby driven by curiosity, hacking has transformed into a profitable underground industry, with cybercriminals exploiting vulnerabilities for personal gain or political motives. This shift raises concerns about privacy violations, financial losses, and societal harm resulting from cyberattacks.
The emergence of cybercriminals exploiting vulnerabilities in digital systems for personal gain or political motives has led to ethical dilemmas surrounding hacking practices. Bug bounty programs and vulnerability disclosure introduce complexities, blurring the lines between legitimate security research and malicious exploitation. Balancing security imperatives with respect for privacy rights presents challenges in safeguarding critical infrastructure while upholding individual liberties.
Addressing the ethical dimensions of hacking requires collaborative efforts across industry sectors, governmental agencies, and academia. Establishing ethical frameworks for vulnerability disclosure, bug bounty programs, and penetration testing is essential to ensure responsible cybersecurity practices. International cooperation and information sharing are imperative to combat cyber threats that transcend national borders and jurisdictions.
Private collection
Data warehouses are used today to collect and store huge amounts of personal data and consumer transactions. These facilities can preserve large volumes of consumer information for an indefinite amount of time. Some of the key architectures contributing to the erosion of privacy include databases, cookies and
spyware
Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
.
Some may argue that data warehouses are supposed to stand alone and be protected. However, the fact is enough personal information can be gathered from corporate websites and social networking sites to initiate a reverse lookup. Therefore, is it not important to address some of the ethical issues regarding how protected data ends up in the public domain?
As a result, identity theft protection businesses are on the rise. The market is predicted to reach 34.7 billion (USD) by 2032, according to Market.us.
Property
Ethical debate has long included the concept of
property
Property is a system of rights that gives people legal control of valuable things, and also refers to the valuable things themselves. Depending on the nature of the property, an owner of property may have the right to consume, alter, share, re ...
. This concept has created many clashes in the world of cyberethics. One philosophy of the internet is centered around the freedom of information. The controversy over ownership occurs when the property of information is infringed upon or uncertain.
Intellectual property rights
The ever-increasing speed of the internet and the emergence of compression technology, such as
mp3
MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg. It was designed to greatly reduce the amount ...
opened the doors to
Peer-to-peer file sharing
Peer-to-peer file sharing is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology. P2P file sharing allows users to access media files such as books, music, movies, and games using a P2P software program th ...
, a technology that allowed users to anonymously transfer files to each other, previously seen on programs such as
Napster
Napster was an American proprietary peer-to-peer (P2P) file sharing application primarily associated with digital audio file distribution. Founded by Shawn Fanning and Sean Parker, the platform originally launched on June 1, 1999. Audio shared ...
or now seen through
communications protocol
A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of a physical quantity. The protocol defines the rules, syntax, semantics (computer science), sem ...
such as
BitTorrent
BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
. Much of this, however, was copyrighted music and
illegal to transfer to other users. Whether it is
ethical
Ethics is the philosophical study of moral phenomena. Also called moral philosophy, it investigates normative questions about what people ought to do or which behavior is morally right. Its main branches include normative ethics, applied e ...
to transfer copyrighted media is another question.
Proponents of unrestricted file sharing point out how file sharing has given people broader and faster access to media, has increased exposure to new artists, and has reduced the costs of transferring media (including less environmental damage). Supporters of restrictions on file sharing argue that we must protect the income of our artists and other people who work to create our media. This argument is partially answered by pointing to the small proportion of money artists receive from the legitimate sale of media.
A similar debate can be seen over intellectual property rights in respect to software ownership. The two opposing views are for closed source software distributed under restrictive
licenses
A license (American English) or licence (Commonwealth English) is an official permission or permit to do, use, or own something (as well as the document of that permission or permit).
A license is granted by a party (licensor) to another part ...
or for free and
Free software
Free software, libre software, libreware sometimes known as freedom-respecting software is computer software distributed open-source license, under terms that allow users to run the software for any purpose as well as to study, change, distribut ...
.
The argument can be made that restrictions are required because companies would not invest weeks and months in development if there were no incentive for revenue generated from sales and licensing fees. A counter argument to this is that standing on shoulders of giants is far cheaper when the giants do not hold IP rights. Some proponents for
Free software
Free software, libre software, libreware sometimes known as freedom-respecting software is computer software distributed open-source license, under terms that allow users to run the software for any purpose as well as to study, change, distribut ...
believe that source code for most programs should be available to anyone who use them, in a manner which respects their freedoms.
Digital rights management (DRM)
With the introduction of
digital rights management
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures, such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM ...
software, new issues are raised over whether the subverting of DRM is ethical. Some champion the hackers of DRM as defenders of users' rights, allowing the blind to make audio books of PDFs they receive, allowing people to burn music they have legitimately bought to CD or to transfer it to a new computer. Others see this as nothing but simply a violation of the rights of the intellectual property holders, opening the door to uncompensated use of copyrighted media. Another ethical issue concerning DRMs involves the way these systems could undermine the fair use provisions of the copyright laws. The reason is that these allow content providers to choose who can view or listen to their materials making the discrimination against certain groups possible. In addition, the level of control given to content providers could lead to the invasion of user privacy since the system is able to keep tabs on the personal information and activities of users who access their materials. In the United States, the
Digital Millennium Copyright Act (DMCA) reinforces this aspect to DRM technology, particularly in the way the flow of information is controlled by content providers. Programs or any technologies that attempt to circumvent DRM controls are in violation of one of its provisions (Section 1201).
Accessibility, censorship and filtering
Accessibility, censorship and filtering bring up many ethical issues that have several branches in cyberethics. Many questions have arisen which continue to challenge our understanding of privacy, security and our participation in society. Throughout the centuries mechanisms have been constructed in the name of protection and security. Today the applications are in the form of software that filters domains and content so that they may not be easily accessed or obtained without elaborate circumvention or on a personal and business level through free or
content-control software
An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Such restrictions can be appl ...
.
Internet censorship
Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as ''Wikipedia.org'', for example) but exceptionally may ...
and filtering are used to control or suppress the publishing or accessing of information. The legal issues are similar to offline
censorship
Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
and filtering. The same arguments that apply to offline censorship and filtering apply to online censorship and filtering; whether people are better off with free access to information or should be protected from what is considered by a governing body as harmful, indecent or illicit. The fear of access by minors drives much of the concern and many online advocate groups have sprung up to raise awareness and of controlling the accessibility of minors to the internet.
Censorship and filtering occurs on small to large scales, whether it be a company restricting their employees' access to cyberspace by blocking certain websites which are deemed as relevant only to personal usage and therefore damaging to productivity or on a larger scale where a government creates large firewalls which censor and filter access to certain information available online frequently from outside their country to their citizens and anyone within their borders. One of the most famous examples of a country controlling access is the
Golden Shield Project, also referred to as the Great Firewall of China, a censorship and surveillance project set up and operated by the People's Republic of China. Another instance is the 2000 case of the League Against Racism and Antisemitism (LICRA), French Union of Jewish Students, vs. Yahoo! Inc (USA) and Yahoo! France, where the French Court declared that "access by French Internet users to the auction website containing Nazi objects constituted a contravention of French law and an offence to the '
collective memory
Collective memory is the shared pool of memories, knowledge and information of a social group that is significantly associated with the group's identity. The English phrase "collective memory" and the equivalent French phrase "la mémoire collect ...
' of the country and that the simple act of displaying such objects (e.g. exhibition of uniforms, insignia or emblems resembling those worn or displayed by the Nazis) in France constitutes a violation of the Article R645-1 of the Penal Code and is therefore considered as a threat to internal public order."
Since the French judicial ruling many websites must abide by the rules of the countries in which they are accessible.
Freedom of information
Freedom of information, that is the
freedom of speech
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
as well as the freedom to seek, obtain and impart information brings up the question of who or what, has the jurisdiction in cyberspace. The right of freedom of information is commonly subject to limitations dependent upon the country, society and culture concerned.
Generally there are three standpoints on the issue as it relates to the internet. First is the argument that the internet is a form of media, put out and accessed by citizens of governments and therefore should be regulated by each individual government within the borders of their respective jurisdictions. Second, is that, "Governments of the Industrial World... have no sovereignty
ver the Internet... We have no elected government, nor are we likely to have one,... You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear."
A third party believes that the internet supersedes all tangible borders such as the borders of countries, authority should be given to an international body since what is legal in one country may be against the law in another.
Digital divide
An issue specific to the ethical issues of the freedom of information is what is known as the digital divide. This refers to the unequal
socio-economic
Economics () is a behavioral science that studies the production, distribution, and consumption of goods and services.
Economics focuses on the behaviour and interactions of economic agents and how economies work. Microeconomics analys ...
divide between those who had access to digital and information technology, such as
cyberspace
Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
, and those who have had limited or no access at all. This gap of access between countries or regions of the world is called the
global digital divide.
Sexuality and pornography
Sexuality in terms of sexual orientation, infidelity, sex with or between minors, public display and
pornography
Pornography (colloquially called porn or porno) is Sexual suggestiveness, sexually suggestive material, such as a picture, video, text, or audio, intended for sexual arousal. Made for consumption by adults, pornographic depictions have evolv ...
have always stirred ethical controversy. These issues are reflected online to varying degrees. In terms of its resonance, the historical development of the online pornography industry and
user-generated content
User-generated content (UGC), alternatively known as user-created content (UCC), emerged from the rise of web services which allow a system's User (computing), users to create Content (media), content, such as images, videos, audio, text, testi ...
have been the studied by media academics. One of the largest cyberethical debates is over the regulation, distribution and accessibility of
pornography online. Hardcore pornographic material is generally controlled by governments with laws regarding how old one has to be to obtain it and what forms are acceptable or not. The availability of pornography online calls into question jurisdiction as well as brings up the problem of regulation, in particular over
child pornography
Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is Eroticism, erotic ma ...
, which is illegal in most countries, as well as pornography involving violence or animals, which is restricted within most countries.
Gambling
Gambling is often a topic in ethical debate as some view it as inherently wrong and support prohibition or controls while others advocate for no legal restrictions. "Between these extremes lies a multitude of opinions on what types of gambling the government should permit and where it should be allowed to take place. Discussion of gambling forces public policy makers to deal with issues as diverse as addiction, tribal rights, taxation, senior living, professional and college sports, organized crime, neurobiology, suicide, divorce, and religion."
Due to its controversy, gambling is either banned or heavily controlled on local or national levels. The accessibility of the internet and its ability to cross geographic-borders have led to
illegal online gambling, often offshore operations. Over the years online gambling, both legal and illegal, has grown exponentially which has led to difficulties in regulation. This enormous growth has even called into question by some the ethical place of gambling online.
In education
There are particular cyberethics concerns in an educational setting:
plagiarism
Plagiarism is the representation of another person's language, thoughts, ideas, or expressions as one's own original work.From the 1995 ''Random House Dictionary of the English Language, Random House Compact Unabridged Dictionary'': use or close ...
or other appropriation of
intellectual property
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
,
cyberbullying
Cyberbullying (cyberharassment or online bullying) is a form of bullying or harassment using electronic means. Since the 2000s, it has become increasingly common, especially among teenagers and adolescents, due to young people's increased u ...
and other activities harmful activities, as well as accessing inappropriate material such as a test key.
There is also the issue of bringing to the classroom material that was meant for a different audience on a social media platform and its authors did not give permission for its classroom use.
Another issue is the authenticity and accuracy of online material used for learning. On the other hand, however, some might only feel able to express themselves under anonymous conditions where true collaboration happens.
Cyberbullying
Cyberbullying occurs when "a student is threatened, humiliated, harassed, embarrassed or target by another student".
It encompasses many of the same issues that come with bullying but it extends beyond "the physical schoolyard".
Cyberbullying takes place "on Web or social networking sites, or using email, text messaging or instant messaging".
It evolved with the increased use of information and communication technology.
It can also reach a victim 24 hours, 7 days a week in places that are outside of the traditional forms of bullying.
The issue of
cyberstalking
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, thr ...
, "the use of electronic communication to harass or threaten someone with physical harm", is sometimes used interchangeably with cyberbullying. However, cyberstalking is a form of cyberbullying. Cyberstalking is a
federal crime in the United States
In the United States, a federal crime or federal offense is an act that is made illegal by U.S. federal legislation enacted by both the United States Senate and United States House of Representatives and signed into law by the president. Prosec ...
as part of the
Violence Against Women Act of 2005. This law was amended in 2013 to include stalking over the Internet and by telephone and introduces penalties of up to five years in prison and a 250 000
USD
The United States dollar (symbol: $; currency code: USD) is the official currency of the United States and several other countries. The Coinage Act of 1792 introduced the U.S. dollar at par with the Spanish silver dollar, divided it int ...
fine.
The
UK-based
Internet Watch Foundation reported in September 2023 that
sextortion was on the rise as numbers for the first half of that year "surged by 257%* compared with the whole of 2022".
Similarly, the American
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
reported in January 2024 that in the period of October 2022 to March 2023 there was "at least a 20% increase" in cases as compared to the same period the previous year. Between October 2021 to March 2023, 12 600 victims were registered and 20
suicide
Suicide is the act of intentionally causing one's own death.
Risk factors for suicide include mental disorders, physical disorders, and substance abuse. Some suicides are impulsive acts driven by stress (such as from financial or ac ...
s were link to sextortion.
The victims of sextortion are most often young boys.
Related organizations
The following organizations are of notable interest in cyberethics debates:
*
International Federation for Information Processing
The International Federation for Information Processing (IFIP) is a global organisation for researchers and professionals working in the field of computing to conduct research, develop standards and promote information sharing.
Established in 19 ...
(IFIP)
*
Association for Computing Machinery
The Association for Computing Machinery (ACM) is a US-based international learned society for computing. It was founded in 1947 and is the world's largest scientific and educational computing society. The ACM is a non-profit professional membe ...
, Special Interest Group: Computers and Society (SIGCAS)
*
Electronic Privacy Information Center
The Electronic Privacy Information Center (EPIC) is an independent nonprofit research center established in 1994 to protect privacy, freedom of expression, and democratic values in the information age. Based in Washington, D.C., their mission i ...
(EPIC)
*
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
(EFF)
* International Center for Information Ethics (ICIE)
* Directions and Implications in Advanced Computing (DIAC)
* The Centre for Computing and Social Responsibility (CCSR)
* Cyber-Rights and Cyber-liberties
* ''International Journal of Cyber Ethics in Education'' (''IJCEE'')
* The Center for Digital Ethics and Policy (CDEP)
Codes of ethics in computing
Four notable examples of
ethics codes for
IT professionals are listed below:
The Code of Fair Information Practices
The Code of Fair Information Practices is based on five principles outlining the requirements for records keeping systems. This requirement was implemented in 1973 by the
U.S. Department of Health, Education and Welfare.
# There must be no personal data record-keeping systems whose very existence is secret.
# There must be a way for a person to find out what information about the person is in a record and how it is used.
# There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent.
# There must be a way for a person to correct or amend a record of identifiable information about the person.
# Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data.
RFC 1087
In January 1989, the
Internet Architecture Board
The Internet Architecture Board (IAB) is a committee of the Internet Engineering Task Force (IETF) and an advisory body of the Internet Society (ISOC). Its responsibilities include architectural oversight of IETF activities, Internet Standards ...
(IAB) in RFC 1087, titled "Ethics and the Internet," defines an activity as unethical and unacceptable if it:
# Seeks to gain unauthorized access to the resources of the Internet.
# Disrupts the intended use of the internet.
# Wastes resources (people, capacity, computer) through such actions.
# Destroys the integrity of computer-based information, or
# Compromises the privacy of users.
They defined the role of the government and the users.
However, these were seen as intended for the protection of U.S. government investment into the infrastructure of the Internet.
Ten Commandments of Computer Ethics
In 1992, Ramon C. Barquin authored a set of principles based on the IAB RFC 1087, it was called “In Pursuit of a ‘Ten Commandments’ for Computer Ethics”.
These were published in 1992 (or 1996
) by the
Computer Ethics Institute; a nonprofit organization whose mission is to advance technology by ethical means.
It lists these rules:
# Thou shalt not use a computer to harm other people.
# Thou shalt not interfere with other people's computer work.
# Thou shalt not snoop around in other people's computer files.
# Thou shalt not use a computer to steal.
# Thou shalt not use a computer to bear false witness.
# Thou shalt not copy or use proprietary software for which you have not paid.
# Thou shalt not use other people's computer resources without authorization or proper compensation.
# Thou shalt not appropriate other people's intellectual output.
# Thou shalt think about the social consequences of the program you are writing or the system you are designing.
# Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
(ISC)² Code of Ethics
The
International Information System Security Certification Consortium, is a
professional association
A professional association (also called a professional body, professional organization, or professional society) is a group that usually seeks to advocacy, further a particular profession, the interests of individuals and organisations engaged in ...
known as (ISC)², which seeks to inspire a safe and secure cyber world. It has further defined its own code of ethics. The code is based on four canons, under a general preamble:
Code of Ethics Preamble:
* The safety and welfare of society and the common good, duty to our principals, and duty to each other, require that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
Code of Ethics Canons:
* Protect society, the common good, necessary public trust and confidence, and the infrastructure.
* Act honorably, honestly, justly, responsibly, and legally.
* Provide diligent and competent service to principals.
* Advance and protect the profession.
Ethical considerations in emerging technology
Though it is impossible to predict all potential ethical implications resulting from new or emerging technology, ethical considerations early in the Research and Development (R&D) phases of a system or technology's lifecycle can help ensure the development of technology that adheres to ethical standards.
Several methodologies, to include frameworks and checklists, have been proposed by researchers for the purpose of conducting ethical impact assessments on developing technology.
The goal of these assessments is to identify potential ethical scenarios prior to deployment and adoption of an emerging technology.
The output from these assessments allow for the mitigation of potential ethical risk and ultimately helps to ensure ethical standards are upheld as technology evolves.
Additionally, the overlap of ethics and cybersecurity reveals a complex situation. Safeguarding important infrastructure and private data often clashes with worries about privacy.
Deciding on security measures must balance protecting national interests with preserving civil liberties.
Ethical concerns are crucial in dealing with the differences in cybersecurity practices between public and private sectors.
Despite efforts to improve funding and cooperation, challenges remain in finding and stopping cyber threats, especially in government agencies.
This shows the need for clear ethical guidelines to guide cybersecurity decisions.
See also
References
External links
Association for Computing Machinery, Special Interest Group: Computers and Societywebsite
International Center for Information Ethicswebsite
The Centre for Computing and Social Responsibilitywebsite
Safer Internet Center which includes Awareness Node, Helpline and Hotline*
Cyprus Safer Internet Helpline,
Cyprus Safer Internet HotlineCyber-Rights and Cyber-Libertieswebsite
IEEE WebsiteAssociation for Computing Machinery websiteISC2 websiteInternet Architecture BoardGet Cyber Space (Canada)
{{emerging technologies, topics=yes
Computer ethics
Computing and society
Cyberspace