introduction

14
Introduction Introduction Social Implications & Ethics Social Implications & Ethics Since the introduction of the Internet, Since the introduction of the Internet, many policies have been introduced as a way many policies have been introduced as a way to govern the use of computers. to govern the use of computers. The Internet has become wide spread The Internet has become wide spread throughout the world and everyone is has throughout the world and everyone is has the ability to obtain any piece of the ability to obtain any piece of information they choose to download just by information they choose to download just by searching for it. searching for it. The capabilities of users to get any The capabilities of users to get any information about someone increases the information about someone increases the vulnerability of the other users of the vulnerability of the other users of the system. system.

Upload: sigourney-wyatt

Post on 31-Dec-2015

15 views

Category:

Documents


3 download

DESCRIPTION

Introduction. Social Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way to govern the use of computers. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Introduction

IntroductionIntroduction• Social Implications & EthicsSocial Implications & Ethics• Since the introduction of the Internet, many Since the introduction of the Internet, many

policies have been introduced as a way to policies have been introduced as a way to govern the use of computers. govern the use of computers.

• The Internet has become wide spread The Internet has become wide spread throughout the world and everyone is has the throughout the world and everyone is has the ability to obtain any piece of information they ability to obtain any piece of information they choose to download just by searching for it.choose to download just by searching for it.

• The capabilities of users to get any The capabilities of users to get any information about someone increases the information about someone increases the vulnerability of the other users of the system. vulnerability of the other users of the system.

Page 2: Introduction

Increasing the Increasing the Capabilities of an Capabilities of an

IndividualIndividual• Fraud and Identity theft Fraud and Identity theft

– The internet makes it easy to have your The internet makes it easy to have your information stolen by somebody because information stolen by somebody because they don’t have to have face verification they don’t have to have face verification when using a credit card and can easily use when using a credit card and can easily use this to go online and buy anything they want.this to go online and buy anything they want.

• The extent of the damage done to you is The extent of the damage done to you is at the will of the person who steals your at the will of the person who steals your identity. identity.

• The computer is the new tool of a super-The computer is the new tool of a super-criminal.criminal.

Page 3: Introduction

User VulnerabilityUser Vulnerability

• Have you ever received an e-mail Have you ever received an e-mail that asked for your bank account that asked for your bank account numbers? Or have you ever had a numbers? Or have you ever had a website asking for your username website asking for your username and password on a site that is not and password on a site that is not the site you know?the site you know?

• Emails and messages that you Emails and messages that you receive online do not always have receive online do not always have the integrity that they should. This the integrity that they should. This makes you makes you vulnerable.vulnerable...

Page 4: Introduction

Ethics of Internet usersEthics of Internet users

byby

Wm. Eric EgglestonWm. Eric Eggleston

Page 5: Introduction

EthicsEthics

• Ethics are often summed up in what Ethics are often summed up in what is considered the “golden rule”—do is considered the “golden rule”—do unto others as you would have them unto others as you would have them do unto you. While this makes sense do unto you. While this makes sense as a general rule of thumb, it does as a general rule of thumb, it does not truly offer much in terms of not truly offer much in terms of helping one to make moral decisions helping one to make moral decisions in daily life.in daily life.

Page 6: Introduction

The Main Points of The Main Points of EthicsEthics

• IntegrityIntegrity• CommitmentCommitment• TruthTruth• Confidentiality Confidentiality • Legality Legality

Page 7: Introduction

Ethics of Internet Users Ethics of Internet Users • False information False information

– Users going on websites and posting Users going on websites and posting information that is not true. “information that is not true. “Wikipedia”Wikipedia”

• Downloading Downloading – Users downloading music, movies or softer Users downloading music, movies or softer

ware for there own personal use. “ limewire , ware for there own personal use. “ limewire , Kasa”Kasa”

• PrivacyPrivacy– User posting pictures and videos of friends User posting pictures and videos of friends

and family on websites “ Myspace, Facebook and family on websites “ Myspace, Facebook and Youtube” and Youtube”

Page 8: Introduction

Ethics of Internet UsersEthics of Internet Users

• Computer AbuseComputer Abuse– Computer CrimesComputer Crimes

• Users hacking in to personal information Users hacking in to personal information and taking identities of people.and taking identities of people.

• stealing a username and passwordstealing a username and password• creating or releasing a malicious computer creating or releasing a malicious computer

program “virus”program “virus”

Page 9: Introduction

Ethics of Internet Service Provider (ISP)Ethics of Internet Service Provider (ISP)

ByBy

Indira PabbathiIndira Pabbathi

Page 10: Introduction

What is an Internet Service Provider (ISP)What is an Internet Service Provider (ISP)

• A company or organization that supplies Internet connectivity A company or organization that supplies Internet connectivity to home and/or business customers. ISPs support one or more to home and/or business customers. ISPs support one or more forms of Internet access, ranging from traditional modem dial-forms of Internet access, ranging from traditional modem dial-up to DSL and cable modem broadband service. An ISP may up to DSL and cable modem broadband service. An ISP may provide a combination of services including Internet access, provide a combination of services including Internet access,

domain name registration, hosting, and Web hosting.domain name registration, hosting, and Web hosting.

• ISPs policies concerns, 'cookies,' third party sites and access, ISPs policies concerns, 'cookies,' third party sites and access, collection of personal information - what, how and usage, collection of personal information - what, how and usage, security of information, regulation of children's access to the security of information, regulation of children's access to the

Internet, globalization issues and legal issues.Internet, globalization issues and legal issues.

Page 11: Introduction

What is prohibited content?What is prohibited content?

• ISP prohibits sexual activity, child pornography, depictions ISP prohibits sexual activity, child pornography, depictions of bestiality, material containing excessive violence or of bestiality, material containing excessive violence or sexual violence, detailed instruction in crime, violence or sexual violence, detailed instruction in crime, violence or drug use, and/or material that advocates the doing of a drug use, and/or material that advocates the doing of a

terrorist act.terrorist act.

Page 12: Introduction

What other responsibilities do ISPs have?What other responsibilities do ISPs have? • ISPs to take appropriate steps to protect the public from ISPs to take appropriate steps to protect the public from

prohibited content. The codes set out opt-in filtering prohibited content. The codes set out opt-in filtering arrangements that require ISPs to offer customers filters on a arrangements that require ISPs to offer customers filters on a cost recovery basis. Filters are made available either directly cost recovery basis. Filters are made available either directly or via a filter software portal maintained by the Internet or via a filter software portal maintained by the Internet

Industry Association.Industry Association. • Consider the use of law enforcement or civil action against Consider the use of law enforcement or civil action against

spammers and hackers when appropriate.spammers and hackers when appropriate. • Providers has to protect the users information. Example: Providers has to protect the users information. Example:

credit card, address or personal information.credit card, address or personal information.

• ISP uses cookies to collect non-personally identifiable ISP uses cookies to collect non-personally identifiable informationinformation

Page 13: Introduction

What if an ISP does not comply with an industry code What if an ISP does not comply with an industry code of practiceof practice

– Some mechanisms, such as withdrawal of industry Some mechanisms, such as withdrawal of industry association rights or privileges, and compliance incentives, association rights or privileges, and compliance incentives, such as the right to display compliance symbols will need such as the right to display compliance symbols will need to be approved by government authorities.to be approved by government authorities.

– Otherwise Contravention of an online provider rule is a Otherwise Contravention of an online provider rule is a criminal offence and a continuing offence for each day the criminal offence and a continuing offence for each day the

contravention continues.contravention continues.

Page 14: Introduction

ReferencesReferences

• http://nemesis.lonestar.org/reference/internet/mail/anti-spam/isp-general.html

• http://www.yourdictionary.com/dictionary-articles/Define-Ethics.html

• http://plato.stanford.edu/entries/ethics-it-phenomenology