Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 48

INTERNET ETHICS

CYBERSPACE
 Cyberspace is like a big city. There are
libraries, universities, museums, places to
have fun, and plenty of opportunities to meet
wonderful people. But, like any community,
there are also some people and areas that
you need to avoid and others that you should
approach with caution.
ADVANTAGES OF THE INTERNET

Access Information ShoppingOnline Chat
Downloading Software(free ones)Social
Networks Navigations

Disadvantages of the Internet


Illegal music/movie/program downloads Chat
room behavior Fake accounts Hackers
Crakers Spamming Pornography
CYBERSPACE
 By knowing the dangers and how to avoid
them, you can take advantage of all the
positive aspects of the Internet while
avoiding most of its pitfalls. (
www.sdcyberspace.com)
EVOLUTION OF THE INTERNET

The internet is a worldwide public network of
computers on which people can join and use
multiple services such as sharing of
information.
 Started life in 1969 as a network for the
American Military(arpanet)Started by
connecting terminals in 70s-80s Internet
evolved into a network for the American
academic community
 WWW BACKGROUND?WWW was developed by British
scientist Tim Berners-Lee in 1989Published in 1992In
1988 thru the early 90s, worms found their way
around the Net-WWW Worms(W4),joined by Spiders,
Wanderers, Crawlers, and Snakes
WHAT ARE THE EFFECTS OF THIS EVOLUTION IN THE
ETHICS ISSUE?

Internet originaly designed for,and used by,the
few and the intellectual Internet was originally
used exclusively by Americans,who value
freedom of expression and are hostile towards
goverment intervention or control
 As Internet growth continues, more users in
Third World,the ethics debate will not simply
be an American vs Europeans one because of
wide diversity of cultures and value sstems of
users.

WHAT ARE THE EFFECTS OF THE RANGE OF
INTERNET SERVICES FOR THE ETHICS
DEBATE?

The internet is not one network but many networks
connected to each other.The Internet has many users
with different interests.The debate about the content
of the Internet is not national but global,not by
specialists but populace
ETHICS DEBATE WHAT IS THIS ETHICS DEBATE OVER
THE INTERNET?

Is there a place for legal ethics on the
Internet and,if so,how would this manifest
itself?How do we define Internet Ethics?

 Definitions Ethics is about what is good,and


how we should think about goodLogic is
about truth
 

 Internet Ethics Seeks to come up with a code


of conduct and disclosure obligation for those
who communicate on the Internet
ISSUES ON INTERNET ETHICS

Should we apply our moral standards to the
Internet,or should we develop new norms?If Internet is
borderless, how do we accommodate multiplicity of
values?Are we to follow the established rules of
conduct?Whose is responsibility of ethics on the
Internet?
ISSUES ON ETHICS OF INTERNET RESEARCH
  
Consist of codes of conduct relating to
behavior in computer mediated groups and
communities and conduct relating to the
practise of research generally relate to Issues
of informed consent Privacy Confidentiality
Dignity Avoidance of harm
 Another ethical issue is technology
assisted plagiarism
Users,especially students/faculty can
download entire term papers these research
articles modules.Internet makes it easy for
users to simply sit at home,search millions of
articles instantly,be taken to the exact
paragraph in a text that deals with their
subjects, cut and paste it, and pass the work
as their own.
MONETARY LOSSES: CYBER CRIMES

 The overall monetary losses from cyber


crime can be immense. According to a report,
more than 1.5 million people fall victim to
some sort of cyber crime every day, ranging
from simple password theft to extensive
monetary swindles. With an average loss of
$197 per victim, this adds up to more than
$110 billion dollars lost to cyber crime
worldwide every year. As consumers get wise
to traditional avenues of attack, cyber
criminals have developed new techniques
involving mobile devices and social networks
to keep their illicit gains flowing
CYBER CRIMES
 Cyberbullying or cyberharassment is a form of 
bullying or harassment using electronic means.
Cyberbullying and cyberharassment are also known
as online bullying. It has become increasingly
common, especially among teenagers.
 
 Cyberbullying is when someone, typically teens, bully
or harass others on the internet, particularly on social
media sites. Harmful bullying behavior can include
posting rumors, threats, sexual remarks, a 
victims' personal information, or pejorative labels (i.e. 
hate speech).[2] 
IN GAMING

 Harassment in gaming culture can occur in 


online gaming.
 Of those who reported having experienced
online harassment in a Pew Research poll,
16% said the most recent incident had
occurred in an online game.[12] A study from
National Sun Yat-sen University observed that
children who enjoyed violent video games
were significantly more likely to both
experience and perpetrate cyberbullying.
IN SOCIAL MEDIA

 Cyberbullying can take place on social media


sites such as Facebook, Myspace, and Twitter.
"By 2008, 93% of young people between the
ages of 12 and 17 were online. In fact, youth
spend more time with media than any single
other activity besides sleeping."

 The last decade has witnessed a surge of


cyberbullying, bullying that occurs through
the use of electronic communication
technologies, such as e-mail, instant
messaging, social media, online gaming, or
through digital messages or images sent to a
cellular phone.[26]
CONT..
 There are many risks attached to social media
sites, and cyberbullying is one of the larger
risks. One million children were harassed,
threatened or subjected to other forms of
cyberbullying on

 Facebook during the past year, while 90 percent


of social-media-using teens who have witnessed
online cruelty say they have ignored mean
behavior on social media, and 35 percent have
done so frequently. 95 percent of social-media-
using teens who have witnessed cruel behavior
on social networking sites say they have seen
others ignoring the mean behavior, and 55
percent have witnessed this frequently.
CONT..
 According to a 2013 Pew Research study,
eight out of ten teens who use social media
now share more information about
themselves than they have in the past. This
includes their location, images, and contact
information.[28] In order to protect children, it
is important that personal information such as
age, birthday, school/church, phone number,
etc. be kept confidential.[29]
 Two studies from 2014 found that 80% of
body-shaming tweets are sent by women,
while they also accounted for 50% of 
misogynistic tweets
IN SEARCH ENGINES

 Information cascades happen when users start


passing along information they assume to be
true, but cannot know to be true, based on
information on what other users are doing. This
can be accelerated by search engines' ranking
technologies and their 
tendency to return results relevant to a user's pre
vious interests
. This type of information spreading is hard to
stop. Information cascades over social media and
the Internet may also be harmless, and may
contain truthful information.

 Bullies use Google bombs (a term applicable to


any search engine)[51] to increase the prominence
of favored posts sorted by the most popular
searches, done by linking to those posts from as
many other web pages as possible. 
CONT..
 Bullying or harassment can be identified by repeated
behavior and an intent to harm.[3] Victims may
experience lower self-esteem, increased 
suicidal ideation, and a variety of negative emotional
responses, including being scared, frustrated, angry,
and depressed.
HARMFUL EFFECTS

 Research has demonstrated a number of


serious consequences of cyberbullying
victimization.
 Victims may have lower self-esteem, increased
suicidal ideation, and a variety of emotional
responses, including being scared, frustrated,
angry, and depressed.
 Cyberbullying may be more harmful than
traditional bullying, because there is no
escaping it.One of the most damaging effects
is that a victim begins to avoid friends and
activities, which is often the very intention of
the bully.
CONT..
 Cyberbullying campaigns are sometimes so
damaging that victims have committed
suicide. There are at least four examples in
the United States in which cyberbullying has
been linked to the suicide of a teenager.

 The suicide of Megan Meier is a recent


example that led to the conviction of the
adult perpetrator of the attacks. Holly Grogan
committed suicide by jumping off a 30-foot
bridge near Gloucester in the UK. It was
reported that a number of her schoolmates
had posted a number of hateful messages on
her Facebook page.
UNITED STATES 2004

 The 2004 I-Safe.org survey of 1,500 students


between grades 4 and 8 found:[86]
 42% of children had been bullied online. One in
four had experienced it more than once.
 35% had been threatened online. Nearly one in
five had experienced it more than once.
 21% had received mean or threatening e-mails or
other messages.
 58% admitted that someone had said hurtful
things to them online. More than four out of ten
said this had happened more than once.
 58% had not told their parents or an adult about
something hurtful that had happened to them onli
TYPES OF CYBER BULLYING
 Cyberstalking
 Cyberstalking is a form of online harassment in which
the perpetrator uses electronic communications to 
stalk a victim. This is considered more dangerous than
other forms of cyberbullying because it generally
involves a credible threat to the victim's safety.
Cyberstalkers may send repeated messages intended
to threaten or harass. They may encourage others to
do the same, either explicitly or by impersonating
their victim and asking others to contact them.[13]
CONT..
 Trolling
 Internet trolls intentionally try to provoke or
offend others in order to elicit a reaction.[11]
 Trolls and cyberbullies do not always have
the same goals: while some trolls engage in
cyberbullying, others may be engaged in
comparatively harmless mischief. A troll may
be disruptive either for their own amusement
or because they are genuinely a combative
person.[19]
DIGITAL MEDIA USE AND MENTAL
HEALTH
 The relationships between digital media
use and mental health have been
investigated by various researchers—
predominantly psychologists, sociologists, an
thropologists, and medical experts—
especially since the mid-1990s, after
the growth of the World Wide Web. A
significant body of research has explored
"overuse" phenomena, commonly known as
"digital addictions", or
"digital dependencies".
 These phenomena manifest differently in
many societies and cultures. Some experts
have investigated the benefits of
moderate digital media use in various
domains, including in mental health, and the
treatment of mental health problems with
novel technological solutions.
COMPUTER SAFETY

 Keep your computer safe from hackers and identity


thieves by watching out for the following: Phishing-
when a person pretends to be a company through to
steal personal information, and passwords from
people.
 Viruses- a program that replicates itself after it has
entered your computer Trojan horse- a malicious
program that is designed to look like a benign
program to infiltrate your computer Worms- are
programs that bury themselves inside your computer
that spread through
IN PAKISTAN CYBER CRIME AND LAWS
 Making /  Spreading Explicit Images or Videos
of an Individual: up to 5 Years in Prison or up
to Rs. 5 Million in Fine or both
 Whoever intentionally and publicly exhibits or
displays or transmits any information which.
 Superimposes a photograph of the face of a natural
person over any sexually explicit image or video
 Includes a photograph or a video of a natural
person in sexually explicit conduct
 Intimidates a natural person with any sexual act, or
any sexually explicit image or video of a natural
person
 Cultivates, entices or induces a natural person to
engage in a sexually explicit act,
CONT..
 through an information system to harm a natural
person or his reputation or to take revenge, or to
create hatred or to blackmail, shall be punished
with imprisonment for a term which may extend
to five years or with line which may extend to five
million rupees or with both.
 Examples
 You photoshop an Image of a person in a manner
that face is used along side a nude body
 You make an sexually explicit video or images of
someone in private
 You broadcast / post such video or images on
Facebook or through any other medium (such as
Whatsapp)
 You use any explicit video to blackmail someone
CHAT ROOM BEHAVIOR
 Remember:
 Anything you say may be accessed by others.
 You don’t really know who you are talking to.
 Use your manners.
 Some messages could be considered as harassment,
which is a federal crime.
 Ifyou are on your parents account, it could get
them into trouble
GUIDELINES:
 1. Do not give out personal information.
 Address
 Phone number

 School name or location

 Credit card number

 Pictures
GUIDELINES
 2. Do not agree to get together with someone you
meet online.
 Chat rooms are the most dangerous area on the Internet.
 You never know for certain if they are who they say they are.

 Discuss it with your parents and meet in a public place with your

parents
GUIDELINES
 3. Do not give our your Internet account
password or use someone else’s password.
GUIDELINES
 4. Do not download or install from Internet or open
e-mail attachments.
 Don’t open e-mail if you don’t know who sent it to you, you could
spread a virus. It would be best to delete the message.
 It is possible to get a virus from someone you know. It is best to

purchase a virus scanning software program.


GUIDELINES
 5. Do not send or display offensive or
inappropriate messages or pictures.
 Harassment is illegal.
 Respect others.
GUIDELINES
 6. Do not damage computers, computer
systems, or computer networks.
 Hacking is illegal.
 Respect other’s property.
GUIDELINES
 7. Do not violate copyright laws. Respect other’s rights to
ownership.
 Public Domain Programs – They are not copyrighted and you
can put them on as many computers as you want to for free.
 Freeware Programs – The author retains the copyright. They
are free to use or give away, but you can’t sell them or modify
them.
 Shareware Programs – The author retains the copyright. You
can use these programs for a short evaluation period, then
you must pay a small fee or erase the program. You can’t
give this away to your friends; they must also pay the fee.
GUIDELINES
 Do not trespass in another’s folder, work, or
files.
 Respect others’ right to privacy.
NETIQUETTE DO’S AND DONT’S

Treat others like you want to be treated.
 Do remember that once it is on the internet it is there
for ever
 Do be brief
 Do your research before you post
 Do respect others and their opinion
Don’ts
 Don’t verbally abuse others Use foul language
 Don’t take it personally
 Internet safety tips Prevent identity theft by: To
protect passwords
keeping as much personal information off of the
internet as possible
 installing antivirus, firewall software protection on
your computer only use secure sites
 To protect passwords
 Do not use the same password,Use “safer” passwords
with numbers, lower case and uppercase
lettersChange your password at least once a year
 Do not share or reveal passwords to anyone
 Protect your reputation: once you have
posted it online it is there for anyone to see
and forever. If you would not say it or do it in
public don’t put it online
INTERNET SAFETY TIPS

 Cyberbullying: verbally abusing a person online for


whatever reason
 What to do about cyberbullies Tell an adult Tell the
person to stop
 Contact authorities and internet service provider
 Save all communication for possible proof later on
Cyberstalking: usually done by an adult (unlike
cyberbullying)
 What to do Save communications unaltered
 Contact authorities and keep a record
SPAM MAIL
 Spam is bulk e-mail advertising for
some product or service that is sent to
you through e-mail.
 Don’t reply to Spam mail. Spammers
sell this information to others
spammers.
 To avoid spam stay anonymous.
 When a website asks for your name and e-mail
address, leave the e-mail field blank or make up
and address like lsdkfklsdj@hotmail.com
SURFING THE ‘NET
 Always use a search engine like www.google.com
 Use Boolean Logic to narrow down a search.
 Boolean search is a type of search allowing users to
combine keywords with operators (or modifiers) such
as AND, NOT and OR to further produce more relevant
results. For example, a Boolean search could be
"hotel" AND "New York". This would limit
the search results to only those documents
containing the two keywords.
BOOLEAN LOGIC
 A search for . . .  Returns pages with…

 Ruby slippers  Ruby or slippers


 +ruby slippers
 Ruby, maybe slippers
 “wicked witch”
 The words wicked next to the word witch
 Dorothy-Kansas  The name Dorothy; Kansas is ranked lower
 Dorothy Gale
 The name Dorothy Gale
 Dorothy, Gale
 Either Dorothy or Gale
REPORTING INTERNET CRIME
 Call your Internet provider.
 Call local law enforcement.

 Go to www.cybertipline.com
POSTER
 Design a poster to display good Internet
ethics.
 Example:
 Don’t give out personal information; they’ll track
down your location.
 Don’t be a computer hacker, be a virus cracker.

 Be creative.

You might also like