SlideShare uma empresa Scribd logo
1 de 16
 Explain what cyberspace means;
 Cite at least three ethical issues in the use of
cyberspace;
 Take an informed stand on the issue on
cyberspace as boon or bane; and
 Describe efforts at cyberspace protection.
Introductio
n:
Understanding
Cyberspace
The space which shrouds the earth is
electrically charged. The streak of lightning in our
skies shows the powerful, often destructive,
electrical energy around us. However, man the
fashioner, has learn to tap natural resources like
fire, air for his benefit. Therefore, man has
enlivened his cities with light, supply potable
water to homes, and has tapped the air for
leisure, travel and communication.
The Positive Role of Information and
Communication Technology
3 Main Types Issues with Ethical
Implications
Unethical and Illegal Practice Examples
Illegal Information: Fraudulent information, violation of privacy,
false rumors, obscene information, libelous
information, civil rights violation, gambling
information.
Prejudicial Information: False rumors, drug information, sex
information, violent information.
Infringement on Privacy and Security: e.g. The publication of the topless
photograph of the Duchess of Cambridge
which was in the news recently.
Conclusion:
1. Cyberspace is used to describe the virtual world of
computers. For example, an object in cyberspace
refers to a block of data floating around a computer
system or network of computers . So, after sending
an email to your friend you could say you sent the
message to her through cyberspace.
2. Cyberspace is both a boon and a curse. It is
delivering untold benefits to individuals, businesses,
government and society as a whole. But it is also tool
and a target for those with more evil intensions.
3. A lot of measure have been introduced to protect ICT
users.
NEED TO REMEMBER
Cyberspace is used to describe the virtual world of
computers. For example, an object in cyberspace refers
to a block of data floating around a computer system or
network. With the advent of the internet, cyberspace
now extends to the global network of computers. So,
after sending an e-mail to your friend, you could say you
send the message to her through cyberspace.
Special topics

Mais conteúdo relacionado

Mais procurados

Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital DivideDeniz Cengiz
 
NILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentNILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentnilakshisharma9
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Joel D'souza
 
History and Future of the Internet in 20 slides
History and Future of the Internet in 20 slidesHistory and Future of the Internet in 20 slides
History and Future of the Internet in 20 slidesDenis Balencourt
 
Should Government Control the Internet and its contents
Should Government Control the Internet and its contentsShould Government Control the Internet and its contents
Should Government Control the Internet and its contentsAnirban Roy
 
Social interaction within 10 years
Social interaction within 10 yearsSocial interaction within 10 years
Social interaction within 10 yearssilvia garzon
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)JIEMS Akkalkuwa
 
internet filtering and government legislation
internet filtering and government legislationinternet filtering and government legislation
internet filtering and government legislationlily_ji
 
Internet Basics Tutorial
Internet Basics TutorialInternet Basics Tutorial
Internet Basics TutorialStud Mentor
 
A Brief Synopsis of the Internet
A Brief Synopsis of the InternetA Brief Synopsis of the Internet
A Brief Synopsis of the InternetLauragall
 
Should government control_internet
Should government control_internetShould government control_internet
Should government control_internetSumeet Kagwade
 
Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project GabrielleTawyer
 
Digital Rights and Responsibilities
Digital Rights and ResponsibilitiesDigital Rights and Responsibilities
Digital Rights and Responsibilitiesmikaylarae17
 
Internet and technology
Internet and  technologyInternet and  technology
Internet and technologyAnirudh Damani
 
Cyber harassment ppt umt
Cyber harassment ppt umtCyber harassment ppt umt
Cyber harassment ppt umtMuhammad Ahmad
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNETSaleh Ibne Omar
 

Mais procurados (20)

Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
NILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentNILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its content
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
 
History and Future of the Internet in 20 slides
History and Future of the Internet in 20 slidesHistory and Future of the Internet in 20 slides
History and Future of the Internet in 20 slides
 
Should Government Control the Internet and its contents
Should Government Control the Internet and its contentsShould Government Control the Internet and its contents
Should Government Control the Internet and its contents
 
Internet culture
Internet cultureInternet culture
Internet culture
 
Social interaction within 10 years
Social interaction within 10 yearsSocial interaction within 10 years
Social interaction within 10 years
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)
 
internet filtering and government legislation
internet filtering and government legislationinternet filtering and government legislation
internet filtering and government legislation
 
Internet Basics Tutorial
Internet Basics TutorialInternet Basics Tutorial
Internet Basics Tutorial
 
A Brief Synopsis of the Internet
A Brief Synopsis of the InternetA Brief Synopsis of the Internet
A Brief Synopsis of the Internet
 
Should government control_internet
Should government control_internetShould government control_internet
Should government control_internet
 
Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project Fmcs3100 Digital Culture Production Project
Fmcs3100 Digital Culture Production Project
 
Digital Rights and Responsibilities
Digital Rights and ResponsibilitiesDigital Rights and Responsibilities
Digital Rights and Responsibilities
 
Internet and technology
Internet and  technologyInternet and  technology
Internet and technology
 
advantages and disadvantages of internet
advantages and disadvantages of internet advantages and disadvantages of internet
advantages and disadvantages of internet
 
Cyber harassment ppt umt
Cyber harassment ppt umtCyber harassment ppt umt
Cyber harassment ppt umt
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNET
 
Digital technology impacts by 2020
Digital technology impacts by 2020Digital technology impacts by 2020
Digital technology impacts by 2020
 

Destaque

Strengthening research to improve schooling outcomes
Strengthening research to improve schooling outcomesStrengthening research to improve schooling outcomes
Strengthening research to improve schooling outcomesJared Ram Juezan
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Privileges of Teaching Personnel in Public and Private schools
Privileges of Teaching Personnel in Public and Private schoolsPrivileges of Teaching Personnel in Public and Private schools
Privileges of Teaching Personnel in Public and Private schoolsVictoria Superal
 
sample lesson plan in science five senses
sample lesson plan in science five sensessample lesson plan in science five senses
sample lesson plan in science five sensesaivarose
 
Effects of teenage pregnancy
Effects of teenage pregnancyEffects of teenage pregnancy
Effects of teenage pregnancyDrTeachermiss
 
Republic act no. 4670 magna carta for public school teachers
Republic act no. 4670   magna carta for public school teachersRepublic act no. 4670   magna carta for public school teachers
Republic act no. 4670 magna carta for public school teachersJared Ram Juezan
 
Teen Pregnancy Powerpoint
Teen Pregnancy PowerpointTeen Pregnancy Powerpoint
Teen Pregnancy PowerpointLeanne Potts
 
Teen Pregnancy Powerpoint
Teen Pregnancy PowerpointTeen Pregnancy Powerpoint
Teen Pregnancy Powerpointmarcginsberg
 
39 Rules to Help You Rock Your Next Presentation
39 Rules to Help You Rock Your Next Presentation39 Rules to Help You Rock Your Next Presentation
39 Rules to Help You Rock Your Next PresentationStan Phelps
 

Destaque (12)

Teen Pregnancy
Teen PregnancyTeen Pregnancy
Teen Pregnancy
 
Teenage pregnancy
Teenage pregnancyTeenage pregnancy
Teenage pregnancy
 
Strengthening research to improve schooling outcomes
Strengthening research to improve schooling outcomesStrengthening research to improve schooling outcomes
Strengthening research to improve schooling outcomes
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Privileges of Teaching Personnel in Public and Private schools
Privileges of Teaching Personnel in Public and Private schoolsPrivileges of Teaching Personnel in Public and Private schools
Privileges of Teaching Personnel in Public and Private schools
 
sample lesson plan in science five senses
sample lesson plan in science five sensessample lesson plan in science five senses
sample lesson plan in science five senses
 
Effects of teenage pregnancy
Effects of teenage pregnancyEffects of teenage pregnancy
Effects of teenage pregnancy
 
Republic act no. 4670 magna carta for public school teachers
Republic act no. 4670   magna carta for public school teachersRepublic act no. 4670   magna carta for public school teachers
Republic act no. 4670 magna carta for public school teachers
 
Teen Pregnancy Powerpoint
Teen Pregnancy PowerpointTeen Pregnancy Powerpoint
Teen Pregnancy Powerpoint
 
Teen Pregnancy Powerpoint
Teen Pregnancy PowerpointTeen Pregnancy Powerpoint
Teen Pregnancy Powerpoint
 
39 Rules to Help You Rock Your Next Presentation
39 Rules to Help You Rock Your Next Presentation39 Rules to Help You Rock Your Next Presentation
39 Rules to Help You Rock Your Next Presentation
 
Causes of teenage pregnancy
Causes of teenage pregnancyCauses of teenage pregnancy
Causes of teenage pregnancy
 

Semelhante a Special topics

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Cybercrime and Warfare: All that matters
Cybercrime and Warfare: All that mattersCybercrime and Warfare: All that matters
Cybercrime and Warfare: All that matters- Mark - Fullbright
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence AnalysisAshley Thomas
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Brent Guglielmino
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - CybercultureKim Flintoff
 
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial ResponseCyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Responseijtsrd
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 

Semelhante a Special topics (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Essay Of Internet
Essay Of InternetEssay Of Internet
Essay Of Internet
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cybercrime and Warfare: All that matters
Cybercrime and Warfare: All that mattersCybercrime and Warfare: All that matters
Cybercrime and Warfare: All that matters
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Ict homework
Ict homeworkIct homework
Ict homework
 
Cyber law
Cyber lawCyber law
Cyber law
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 
History of the Internet
History of the InternetHistory of the Internet
History of the Internet
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
 
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial ResponseCyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Response
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 

Último

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Último (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Special topics

  • 1.
  • 2.  Explain what cyberspace means;  Cite at least three ethical issues in the use of cyberspace;  Take an informed stand on the issue on cyberspace as boon or bane; and  Describe efforts at cyberspace protection.
  • 4.
  • 5.
  • 6. Understanding Cyberspace The space which shrouds the earth is electrically charged. The streak of lightning in our skies shows the powerful, often destructive, electrical energy around us. However, man the fashioner, has learn to tap natural resources like fire, air for his benefit. Therefore, man has enlivened his cities with light, supply potable water to homes, and has tapped the air for leisure, travel and communication.
  • 7.
  • 8.
  • 9. The Positive Role of Information and Communication Technology
  • 10. 3 Main Types Issues with Ethical Implications
  • 11.
  • 12. Unethical and Illegal Practice Examples Illegal Information: Fraudulent information, violation of privacy, false rumors, obscene information, libelous information, civil rights violation, gambling information. Prejudicial Information: False rumors, drug information, sex information, violent information. Infringement on Privacy and Security: e.g. The publication of the topless photograph of the Duchess of Cambridge which was in the news recently.
  • 13.
  • 14. Conclusion: 1. Cyberspace is used to describe the virtual world of computers. For example, an object in cyberspace refers to a block of data floating around a computer system or network of computers . So, after sending an email to your friend you could say you sent the message to her through cyberspace. 2. Cyberspace is both a boon and a curse. It is delivering untold benefits to individuals, businesses, government and society as a whole. But it is also tool and a target for those with more evil intensions. 3. A lot of measure have been introduced to protect ICT users.
  • 15. NEED TO REMEMBER Cyberspace is used to describe the virtual world of computers. For example, an object in cyberspace refers to a block of data floating around a computer system or network. With the advent of the internet, cyberspace now extends to the global network of computers. So, after sending an e-mail to your friend, you could say you send the message to her through cyberspace.