Professional Documents
Culture Documents
Chapter 1
Chapter 1
Chapter 1
1.1 Introduction
In the era where technologies being widely used and applied in everyday life, the
number of people being IT literate increases and computers will continue to have
greater impacts in the society when the technology advances. As the technologies
revolutionised and we produce data or information every day and it was thousands of
them, leading to the newly current issue which is big data. Easiest way to describe
collection and generation of data that is being produced every day, issues will arise,
particularly from the privacy perspective. There is no more anonymity over the data
and the privacy will be violated as the data not only available for the illegitimate user
but also the non-illegitimate user. There is issue whether the cyberethics is violated
when using the data, or is the owner aware of his data being shared and made public
by certain organization.
The latest example of the how privacy is threaten by big data was the biggest leak
last year, Panama Papers. It was first published on April 3 rd 2016, contains the list of
people consisted of politicians and wealthy figures around the world together with
their private financial information. 2.6 terabytes worth of data made up from torrents
reveal the patterns, association with people,interaction events and also the locations.
The same case happened way back in April 2013 with Offshore Leaks. A report was
released with the detailed information of over 130 000 offshore accounts of the elites,
devices. Digital traces were being left behind as we are using the cyberspace. This
will become an accumulate data that be used and analyse. Even with protected data
or information, it can become quite useless even with anonymity, when the other
information can be dig out with other variable that being made available. In the early
days, those torrents of data may take a while to process as there was no advance
technologies at that time, and there were possibilities that they were done manually.
But now, the process of analysing and crossing the data in the database to find the
patterns and association become easier with all the advance technologies, no longer
Where almost every information available in digital space, most of the users of the
digital space still do not understand the ethical side of being in the virtual space.
People dont have high awareness of ethics conduct while surfing the net, and may
accidentally break them. While most of the information you can have at your
fingertips, are all information are public information? What about the information
that supposed to be private, but being publicize by the third party? Wouldnt that
1.3 Objectives
Based on the authors personal observation about how people behaving on the
has on privacy
c) To develop an online application that works similarly to the way
These are the research questions that will be answered through this research :
The authors motivation behind this research was stem from her curiosity about
human behaviour in general. With everyday tasks such as bill paying or shopping for
groceries can be done online which can be factor into the creation of big data
together with the widespread use of social networking services, people nowadays
have no boundaries or a clear indication of when not to cross the line based on her
personal observation. Some of the things that were meant to be private are sometimes
being shared with hundreds of cyberspace users without the consent of the owners.
The sharer have no clear indication whether a piece of information can be shared
without threatening the owner or not. Most of the reason they gave is that if a piece
opinion, some of the cyberspace users do not know how to ethically use the
cyberspace, or the ethics while surfing the internet. She wants to know what is the
level of understanding about the ethical use of the internet regarding privacy of the
CHAPTER 2
the way of document keeping, where instead of analogue, the document being kept
with the rapid growth of technology along the years, it has been adopted and
continues to the present day. As more and more information can be get online with
everything is basically at our fingertip, there will be more issues and risks arise due
to it.
information and data in online space can be classified into four. Mason proposed a
PAPA model which is the acronym of Privacy, Accuracy, Property and Accessibility
as a guideline to tackle the ethical issues in information age and also to be used in the
Privacy involves with ones ability to access any personal information in the
database. According to Mason, there are two factors that being a threat to privacy
matter, the growth of information technology and the increased value of information
in decision making. The activities of a person and his information are being recorded
into files, which then will be integrated into one single large database, revealing
intimate details. Sometimes, the data that we gave to the health agency or financial
institution can be reveal to the other parties and used by them for market research,
but do they have the right to reveal our intimate information? The data that we
provided is being used for another purpose other than our intended purpose without
information is being taken as truth when there is no evidence that proves the
information is accurate, misinformation can affect peoples lives and the impact is
bigger when someone that holds the wrong information is someone in power. A
can be generated even by a slight simple mistake. Apart from the data itself, the
accuracy also depends on the system itself. The systems should be error free and the
produces data should also be accurate and up-to-date, so the system is able to
produce accurate and error-free result to the person who enquires it.
browsing through the information space, people must keep in mind that all the
information and data have their owners. This is the concerns involving intellectual
properties right or copyright. All the information, data and computer software are
programmes can be costly, but after it already be produced, it later can be easily
reproduced without being credited back to the author. It can also be altered, creating
a false information which can be misleading and different from the authors original
intentions. Royalty is another issue related with copyright. The author can be robbed
out of his right to the portion of the sale from the merchandised.
Lastly, the final issue that is being discussed is access. Access basically deals with
provided. To have access and using the information available online, a person must
be literate, which means he must has an intellectual skills to handle the information.
He must also have a physical access to hardware, software, database, internet or any
devices that is use to process and retrieve the information. Some may not afford to
have their own devices at home, they can go to the centralized facilities such as
public libraries or school. Finally, the person himself, must has the access to the
information.
According to a paper written by Brey.P (2007), privacy is being valued the most in
the modern society, because of the belief that they have the autonomy over their own
destiny, but also at the same being under surveillances is also expected in the modern
society. It is also being accepted as a norm in the corporate world and being
being valued in the modern society as being under surveillance also means that you
tend to lose your privacy. Not only their data or information was being recorded, it
The surveillance technique being upgraded throughout the years with increasing
scale, ease and speed and also made a dataveillance, a large scale computerized
record and process the actions and communications possible, along with other new
technologies of CCTV, biometrics and intelligent user interface. Dispute arises from
the society views of autonomy control of their own privacy and corporate interest in
surveillance.
Being in virtual space, ones personal information can sometimes publicly available
without the owner giving his consent explicitly, and the information often contains
sensitive information which by doing a simple search using the search engine can
reveal them. The third parties can also collected your information and monitoring
your online behaviour while you are connected to the internet, which than can be
leaked to another parties for their own purpose that will give them advantages and
profits. As now, most of the transactions and activities being deal online, sometimes
concerning privacy.
These databases are often combined to create a new data structure. The process of
the information about a person is being collected from different databases into one
large record while matching is done by cross checking two or more unrelated
databases to provide a hit. This situation altogether lead to data mining. As the
technology progressed, the impact on the privacy issue will be bigger, there will be
more new technology that can threatens the privacy and a new prevention is always
Apart from the given discussion above, people who are being responsible for the
their purposes, the information professionals should never use the given information
other than their original intended purpose and they must be treated as confidential.
The purpose also should be explicitly stated to the individual. There are also certain
Meaning, they should conform to the expectation of an individual that any of the
information given to them will remain private until a consent is given for them to use
the information. If the information is no longer useful or no longer serve their
purposes, they are expected to be destroyed. A policy also must be ruled out to
Britz(1996).
Given all the reasons stated above, it is obvious the biggest threat to the data is data
privacy and confidentiality in the era of growing big data. There are challenges that
need to be faced in order to keep the data confidentiality, a proper steps need to be
taken to ensure that. With the fast paced evolution with technology, there is increased
illegal data breach for their own gains, we should worry more about the ignorant
ones. They are more dangerous than the one committing a very clear and obvious
crime in the cyberspace. They can be intentionally intruding the privacy of private
information that belong to owner and spreading them, encouraging more shares,
understand the rationality of each human decisions, and the factor that incite human
reasoning is progressed in a series of stage. The stage is being divided into three
The first level is Pre-conventional level, this is the level where people is abide by the
cultural rules and the perception of people towards them. The behaviour can only be
labelled as bad or good, which can be found generally in elementary school level.
Any behaviours that are not condone by the socially acceptable norms is being
threaten by application of punishment, resulting in obedience. This level is then
punishment for any misconduct behaviour or not obeying certain cultural norm or
rules usually exerted by someone with authority in their hands. As it being discussed
in the previous lines, punishment is one of the way to gain obedience from people.
While the first stage focus on punishment to gain obedience, the second stage is more
about the behaviour that being done is being controlled by the view of what is the
Moving on to the next level, the Conventional level. This is mostly found in the
society, hence the name. In this level and individual strives to behave in the way that
is expected from his family, group, or nation regardless the consequences. This
conform to the expectation of maintaining, supporting and justifying the order and
The interpersonal or good boy-nice girl orientation and stage 4, The law and
order orientation. In stage 3, people behave in a way to please people and gaining
approval from them, and the latter is more about abiding and behaving by the law.
level, an effort is made by an individuals to define moral value with the universal
principle and the relation that both share. Stage 5 and 6 fall into this level. Stage 5 is
Special Contract Orientation, where individuals start valuing and looking at different
opinions from other people and reaching a mutual social understanding. Stage 6 is
where a person conscience is called and the standard of normal behaviour is being
define universally.
Kohlberg stated that the progress is done by one level at a time, and one cannot
simply jump a level or a stage. People should be presented with moral dilemmas to
encourage their moral development. Based on Kohlbergs theory, James Rest devised
acronym DIT.
A Defining Issues Test or DIT is used to measure the moral judgement development
and is based from the Kohlbergs Moral Development theory. DIT works by
providing all the participants in the test with moral dilemmas and rank and rate the
12 items in each of them. A particular issue is raised for each item representing
central features of the dilemma based on moral schema and consideration. If the
dilemma make sense to them, a high ranking and rating will be given, if not, the item
will be given low rating. Three specific schema of moral reasoning information will
Referring back to the question, is the decision making is influenced by the moral
moral judgement is DIT. We have to look into the relationship between the variables.
There are factors that should be taken into consideration when linking moral
judgement and decision making, one of them being moral flexibility. People will
make decision based on those that will resonate to their moral standard, but that
decision will be influenced by their own belief and perception. Like how some
parents believe on letting a child experiencing on his own or enforcing a strict rule to
avoid any misconduct or misbehaviour in the future. A decision is made based on
moral judgement but also depends on the context. (Daniel M. Bartels 2015)
positively, however, it was not fully supported. Counting in the other aspects that
might affect the process of moral judgement for individuals ethical behaviour. An
individuals ethical behaviour cannot be inferred from the P-score of DIT alone. A
person with high P-score cannot be inferred as ethical person and vice versa. (P.
Ballantine 1999)
According to a research done by Mustafa Sami in 2010, revealed that in the present
study, males have higher scores than female students in terms of maintaining norms,
and female students have higher scores than male students in terms of post
conventional schema. These findings may be interpreted that since females had a
higher empathy levels than males. Childrens moral attitude is greatly influenced by
parental attitude. Mother coming from a good educated background tends to be more
While for the age and educational level of a person do not have any relationship
participants schema scores and their universities. But some of the studies say
otherwise for the relationship between the schemas and the age and educational level
of a person.
In conclusion, there are factors that need to be taken into consideration while doing
DIT to asses an individuals moral judgement. There are studies that stated that DIT
does not influenced by cultural background, but there are quite a number of studies
that stated otherwise. In the authors opinion, educational background does play
some role in regards of this research, because in order to investigate either people is
CHAPTER 3
3.1 Methodology
The purpose of this research is to gain insight on the level of understanding of the
cyberspace user on the privacy of data and how it impacts on privacy. It will be a
combination of both qualitative and quantitative research methods. This research will
dive more into understanding the underlying reasons behind their moral judgement
This research target audience will be taken from several universities and it will be
two sample one with computer science background and the other is non and it will
students with these backgrounds may have the gist on how data privacy works and
the ethical use of cyberspace, the author wants to eliminate any probability of these
sample influencing the result that the author intended it to be. The author wants to
see the differences in level of awareness in these two sample. Students are selected
because most of them are relatively young in age (18 to 30 years old) and know their
questions will be crafted and will be distributed via online survey to the students. The
gathered data then will be analyse by using Defining Issue Test (DIT). DIT is a test
development of a person.
An online application will be created and will be made available online. The
structure will be similar to the online psychological/personality test but the result will
Systems and Applications Security, Privacy, and Trust in Modern Data Management,
21-36. doi:10.1007/978-3-540-69861-6_3
(https://www.utwente.nl/bms/wijsb/organization/brey/publicaties_brey/brey_2007_in
formation_security.pdf)
Mason, R. O. (1986). Four Ethical Issues of the Information Age. MIS Quarterly,
10(1), 5. doi:10.2307/248873
(http://www.wseas.us/e-library/conferences/2014/Florence/CSCCA/CSCCA-41.pdf)
(http://web.simmons.edu/~chen/nit/NIT'96/96-013-breit.html)
https://www.csudh.edu/dearhabermas/kohlberg01bk.htm.
http://info.psu.edu.sa/psu/maths/Stages%20of%20Moral%20Development
%20According%20to%20Kohlberg.pdf
http://psycnet.apa.org/journals/bdb/19/3/55.pdf.
http://www.adultdevelopment.org/ThomaDong2012.pdf
M. Sami, "A Reliability and Validity Study of the Defining Issues Test: The
Available:
http://www.kuyeb.com/pdf/en/b8f0b254c7ab99e8fb4ae578770766edpcuEN.pdf
DIT and Schema Theory", University of Notre Dame, 1999. [Online]. Available:
https://www3.nd.edu/~dnarvaez/documents/EdPsyRev99Rest.pdf
and A. Peter McGraw, "Moral Judgment and Decision Making," in The Wiley
Blackwell Handbook of Judgment and Decision Making, G. Keren and G. Wu, Eds.,
Available:http://home.uchicago.edu/~bartels/papers/BartelsEtAl-MoralJDM-
2015.pdf.
http://www.anzmac.org/conference_archive/1999/Site/B/Ballantine.pdf.