SlideShare a Scribd company logo
1 of 22
ETHICAL DILEMMAS/ ISSUES IN 
CYBERWORLD
 Ethical dilemma is a complex situation that will often involve an apparent 
mental conflict between moral imperatives, in which to obey one would 
result in transgressing another. 
 also called an ethical paradox.
- occurs when there is an intrusion upon your reasonable 
expectation to be left alone.
 Intrusion of Solitude 
 Appropriation of Name or Likeness 
 Public Disclosure of Private Facts 
 False Light
Intrusion of Solitude 
 This type of invasion of privacy is commonly associated with 
"peeping Toms," someone illegally intercepting private phone 
calls, or snooping through someone's private records.
 occurs when someone uses the name or likeness of another for 
their own benefit.
Public disclosure of private facts 
 occurs when someone publishes hurtful, embarrassing or offensive facts 
about a person's private life
False Light 
 arises anytime you unflatteringly portray - in words or pictures- a 
person as something that he or she is not.
HACKING 
The word “hacking” has two definitions. 
the first definition refers to the 
hobby/profession of working with 
computers. 
the second definition refers to breaking into 
computer systems. 
In the Web site wisegeek.com they defines computer "hacking" as 
"the practice of modifying computer hardware and software to 
accomplish a goal outside of the creator's original purpose. "
There are three category of hackers: 
Hacktivists - those who hack as a form of political 
activism. 
Hobbyist hackers - those who hack to learn, for fun or 
to share with other hobbyists. 
Research and Security Hackers - those concerned with discovering 
security vulnerabilities and writing the code fixes.
Ethical Theories of 
HACKING 
ETHICAL QUESTIONS 
From a Utilitarian Perspective 
From a Rights Perspective 
From Fairness or Justice Perspective 
From a Common Good Perspective 
From a Virtue Perspective
 Is there any information that should really be kept secret? 
 How do we balance the need for transparency with the need to protect ourselves, 
for example, from groups who do not believe in transparency and other democratic 
values? 
 Do we trust the ability of hackers to balance out the good and the harm that may 
result from their disclosures? 
 Do we trust governments or corporations more, when it comes to striking that 
balance? 
From a Utilitarian Perspective
From a Rights Perspective 
• Do all of us have an absolute right to access all the information available on the 
Internet? 
• Do we have a right to communicate and associate freely? 
• And, if so, does hacking promote freedom of speech and of association by breaking 
barriers set up around certain information? 
• Should hacking be seen as a way of critiquing a system in order 
to reform it, somewhat similar to parody?
From Fairness or Justice Perspective 
• Does hacking then make Internet use more fair, by allowing to any user 
access to information that would otherwise be available only to some? 
• Or is hacking an unjust takeover of information from those who don't 
have the know-how or resources to protect it?
From a Common Good Perspective 
• Is unrestricted access to information one path to individual and 
communal fulfillment? 
• Or does hacking undermine the usefulness of the Internet as a 
common good because it makes users reluctant to share information 
online? 
• Overall, does hacking promote or hinder the development of 
relationships and the building of community?
From a Virtue Perspective 
• Are hackers pushing individuals to become more virtuous users of the 
Internet—or are they mostly tearing down what others have built, and 
ultimately limiting the usefulness of the Internet? 
• Does hacking promote the development of ethical character?
SECURITY 
 Security as a form of protection are structures and processes that provide 
or improve security as a condition. 
Information security (IS) is designed to protect the confidentiality, 
integrity and availability of computer system data from those with 
malicious intentions.
C-I-A 
Confidentiality - protecting information from being 
disclosed to unauthorized parties. 
Integrity - protecting information from being changed by 
unauthorized parties. 
Availability - to the availability of information to 
authorized parties only when requested.
MEASURES TO PROTECT COMPUTER SECURITY 
• Restricting access both to the hardware locations (physical 
access) and into the system itself (over the network) using 
firewalls 
• Implementing a plan to prevent break-ins 
• Changing passwords frequently 
• Making backup copies 
• Using anti-virus software 
• Encrypting data to frustrate interception 
• Anticipating disasters (disaster recovery plan) 
• Hiring trustworthy employees
THEFT 
(Identity Theft) 
 it happens when someone steals your personal information 
and uses it without your permission 
 a serious crime 
 can disrupt your finances, credit history, and reputation 
 take time, money, and patience to resolve.
OCCURS BY: 
 Stealing your wallets and purses containing identification cards, credit 
cards and bank information. 
 Stealing your mail including credit and bank statements, phone or utility 
bills, new checks, and tax information. 
 Completing a “change of address form” to redirect the destination of 
your mail. 
 Rummaging through your trash for discarded personal data in a practice 
known as “dumpster diving.” 
 Taking personal information that you share or post on the Internet.
PREVENTION 
1. Use passwords on all your credit card, bank, and phone accounts. 
2. Never keep passwords, “PINs” or your SSN card in your wallet or purse. 
3. Learn about security procedures in your workplace. 
4. Never give out personal information on the phone, through mail, or over 
the internet unless you know the receiver and have initiated the contact. 
5. Guard your mail and trash from theft. 
6. Shred or destroy discarded financial statements in your trash. 
7. Give your SSN only when absolutely necessary. 
8. Keep your purse or wallet in a safe place at work.

More Related Content

What's hot

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily lifepanitiaict
 
IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado Mark John Lado, MIT
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it usersBhanja Kishor Samudra
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxRbalasubramani
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and InternetJanecatalla
 
The Emergence of E-organization and E-commerce
The Emergence of E-organization and E-commerceThe Emergence of E-organization and E-commerce
The Emergence of E-organization and E-commercePrateekSaxena73
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and componentsmrmwood
 

What's hot (20)

Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
1 ICT in Society
1 ICT in Society1 ICT in Society
1 ICT in Society
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily life
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
The Emergence of E-organization and E-commerce
The Emergence of E-organization and E-commerceThe Emergence of E-organization and E-commerce
The Emergence of E-organization and E-commerce
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and components
 

Viewers also liked

Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Ethical dilemmas presentation
Ethical dilemmas presentationEthical dilemmas presentation
Ethical dilemmas presentationmansine
 
Ethical Dilemma
Ethical DilemmaEthical Dilemma
Ethical Dilemmapurval
 
Ethical Decision Making Process
Ethical Decision Making ProcessEthical Decision Making Process
Ethical Decision Making ProcessCoky Fauzi Alfi
 
Ethical dilemma outline.show
Ethical dilemma outline.showEthical dilemma outline.show
Ethical dilemma outline.showMedgine Ascencio
 
Role of IPR in creativity and knowledge economy vinay & kathir
Role of IPR in creativity and knowledge economy   vinay & kathirRole of IPR in creativity and knowledge economy   vinay & kathir
Role of IPR in creativity and knowledge economy vinay & kathirVinay Prajapati
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesAysha Rahman
 
Introduction to Data-Oriented Design
Introduction to Data-Oriented DesignIntroduction to Data-Oriented Design
Introduction to Data-Oriented DesignIT Weekend
 
Ethical group presentation final
Ethical group presentation  finalEthical group presentation  final
Ethical group presentation finalpoindexk
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom SectorSagar Patekar
 
Working Through Ethical Dilemmas: When the Deciding Gets Tough
Working Through Ethical Dilemmas: When the Deciding Gets ToughWorking Through Ethical Dilemmas: When the Deciding Gets Tough
Working Through Ethical Dilemmas: When the Deciding Gets ToughBarry Casey
 
Model for Ethical Dilemmas
Model for Ethical DilemmasModel for Ethical Dilemmas
Model for Ethical Dilemmasfdaniel1
 
Ethical dilemmas
Ethical dilemmasEthical dilemmas
Ethical dilemmastlansaw
 

Viewers also liked (20)

Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Ethical dilemmas presentation
Ethical dilemmas presentationEthical dilemmas presentation
Ethical dilemmas presentation
 
Cs106 professional-ethics
Cs106 professional-ethicsCs106 professional-ethics
Cs106 professional-ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethical Dilemma
Ethical DilemmaEthical Dilemma
Ethical Dilemma
 
Ethical Decision Making Process
Ethical Decision Making ProcessEthical Decision Making Process
Ethical Decision Making Process
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical dilemma outline.show
Ethical dilemma outline.showEthical dilemma outline.show
Ethical dilemma outline.show
 
Role of IPR in creativity and knowledge economy vinay & kathir
Role of IPR in creativity and knowledge economy   vinay & kathirRole of IPR in creativity and knowledge economy   vinay & kathir
Role of IPR in creativity and knowledge economy vinay & kathir
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage rates
 
Introduction to Data-Oriented Design
Introduction to Data-Oriented DesignIntroduction to Data-Oriented Design
Introduction to Data-Oriented Design
 
Ethical group presentation final
Ethical group presentation  finalEthical group presentation  final
Ethical group presentation final
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
ETHICAL DILEMMA
ETHICAL DILEMMA ETHICAL DILEMMA
ETHICAL DILEMMA
 
Working Through Ethical Dilemmas: When the Deciding Gets Tough
Working Through Ethical Dilemmas: When the Deciding Gets ToughWorking Through Ethical Dilemmas: When the Deciding Gets Tough
Working Through Ethical Dilemmas: When the Deciding Gets Tough
 
Model for Ethical Dilemmas
Model for Ethical DilemmasModel for Ethical Dilemmas
Model for Ethical Dilemmas
 
Ethical dilemmas
Ethical dilemmasEthical dilemmas
Ethical dilemmas
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 

Similar to Ethical Dilemmas/Issues in CyberWorld

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptxMouradAKenk
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxgadisaAdamu
 

Similar to Ethical Dilemmas/Issues in CyberWorld (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
E commerce
E commerce E commerce
E commerce
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Users guide
Users guideUsers guide
Users guide
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 

More from Rownel Cerezo Gagani

Pope Francis is Coming to the Philippines
Pope Francis is Coming to the PhilippinesPope Francis is Coming to the Philippines
Pope Francis is Coming to the PhilippinesRownel Cerezo Gagani
 
Trophic Levels, Bioenergetics, Chemical Energy and ATP
Trophic Levels, Bioenergetics, Chemical Energy and ATPTrophic Levels, Bioenergetics, Chemical Energy and ATP
Trophic Levels, Bioenergetics, Chemical Energy and ATPRownel Cerezo Gagani
 
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga FilipinaKabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga FilipinaRownel Cerezo Gagani
 
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga FilipinaKabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga FilipinaRownel Cerezo Gagani
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 

More from Rownel Cerezo Gagani (8)

Pope Francis is Coming to the Philippines
Pope Francis is Coming to the PhilippinesPope Francis is Coming to the Philippines
Pope Francis is Coming to the Philippines
 
Trophic Levels, Bioenergetics, Chemical Energy and ATP
Trophic Levels, Bioenergetics, Chemical Energy and ATPTrophic Levels, Bioenergetics, Chemical Energy and ATP
Trophic Levels, Bioenergetics, Chemical Energy and ATP
 
Online shopping
Online shoppingOnline shopping
Online shopping
 
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga FilipinaKabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
 
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga FilipinaKabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
World literature (mao zedong)
World literature (mao zedong)World literature (mao zedong)
World literature (mao zedong)
 
Mencius (Meng Tzu)
Mencius (Meng Tzu)Mencius (Meng Tzu)
Mencius (Meng Tzu)
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Ethical Dilemmas/Issues in CyberWorld

  • 1. ETHICAL DILEMMAS/ ISSUES IN CYBERWORLD
  • 2.  Ethical dilemma is a complex situation that will often involve an apparent mental conflict between moral imperatives, in which to obey one would result in transgressing another.  also called an ethical paradox.
  • 3. - occurs when there is an intrusion upon your reasonable expectation to be left alone.
  • 4.  Intrusion of Solitude  Appropriation of Name or Likeness  Public Disclosure of Private Facts  False Light
  • 5. Intrusion of Solitude  This type of invasion of privacy is commonly associated with "peeping Toms," someone illegally intercepting private phone calls, or snooping through someone's private records.
  • 6.  occurs when someone uses the name or likeness of another for their own benefit.
  • 7. Public disclosure of private facts  occurs when someone publishes hurtful, embarrassing or offensive facts about a person's private life
  • 8. False Light  arises anytime you unflatteringly portray - in words or pictures- a person as something that he or she is not.
  • 9. HACKING The word “hacking” has two definitions. the first definition refers to the hobby/profession of working with computers. the second definition refers to breaking into computer systems. In the Web site wisegeek.com they defines computer "hacking" as "the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. "
  • 10. There are three category of hackers: Hacktivists - those who hack as a form of political activism. Hobbyist hackers - those who hack to learn, for fun or to share with other hobbyists. Research and Security Hackers - those concerned with discovering security vulnerabilities and writing the code fixes.
  • 11. Ethical Theories of HACKING ETHICAL QUESTIONS From a Utilitarian Perspective From a Rights Perspective From Fairness or Justice Perspective From a Common Good Perspective From a Virtue Perspective
  • 12.  Is there any information that should really be kept secret?  How do we balance the need for transparency with the need to protect ourselves, for example, from groups who do not believe in transparency and other democratic values?  Do we trust the ability of hackers to balance out the good and the harm that may result from their disclosures?  Do we trust governments or corporations more, when it comes to striking that balance? From a Utilitarian Perspective
  • 13. From a Rights Perspective • Do all of us have an absolute right to access all the information available on the Internet? • Do we have a right to communicate and associate freely? • And, if so, does hacking promote freedom of speech and of association by breaking barriers set up around certain information? • Should hacking be seen as a way of critiquing a system in order to reform it, somewhat similar to parody?
  • 14. From Fairness or Justice Perspective • Does hacking then make Internet use more fair, by allowing to any user access to information that would otherwise be available only to some? • Or is hacking an unjust takeover of information from those who don't have the know-how or resources to protect it?
  • 15. From a Common Good Perspective • Is unrestricted access to information one path to individual and communal fulfillment? • Or does hacking undermine the usefulness of the Internet as a common good because it makes users reluctant to share information online? • Overall, does hacking promote or hinder the development of relationships and the building of community?
  • 16. From a Virtue Perspective • Are hackers pushing individuals to become more virtuous users of the Internet—or are they mostly tearing down what others have built, and ultimately limiting the usefulness of the Internet? • Does hacking promote the development of ethical character?
  • 17. SECURITY  Security as a form of protection are structures and processes that provide or improve security as a condition. Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions.
  • 18. C-I-A Confidentiality - protecting information from being disclosed to unauthorized parties. Integrity - protecting information from being changed by unauthorized parties. Availability - to the availability of information to authorized parties only when requested.
  • 19. MEASURES TO PROTECT COMPUTER SECURITY • Restricting access both to the hardware locations (physical access) and into the system itself (over the network) using firewalls • Implementing a plan to prevent break-ins • Changing passwords frequently • Making backup copies • Using anti-virus software • Encrypting data to frustrate interception • Anticipating disasters (disaster recovery plan) • Hiring trustworthy employees
  • 20. THEFT (Identity Theft)  it happens when someone steals your personal information and uses it without your permission  a serious crime  can disrupt your finances, credit history, and reputation  take time, money, and patience to resolve.
  • 21. OCCURS BY:  Stealing your wallets and purses containing identification cards, credit cards and bank information.  Stealing your mail including credit and bank statements, phone or utility bills, new checks, and tax information.  Completing a “change of address form” to redirect the destination of your mail.  Rummaging through your trash for discarded personal data in a practice known as “dumpster diving.”  Taking personal information that you share or post on the Internet.
  • 22. PREVENTION 1. Use passwords on all your credit card, bank, and phone accounts. 2. Never keep passwords, “PINs” or your SSN card in your wallet or purse. 3. Learn about security procedures in your workplace. 4. Never give out personal information on the phone, through mail, or over the internet unless you know the receiver and have initiated the contact. 5. Guard your mail and trash from theft. 6. Shred or destroy discarded financial statements in your trash. 7. Give your SSN only when absolutely necessary. 8. Keep your purse or wallet in a safe place at work.