Comm28 - Lecture Bullet No. 7 (Cyberethics)
Comm28 - Lecture Bullet No. 7 (Cyberethics)
SCHOOL OF COMMUNICATION
Pilgrim Christian College
Cagayan de Oro City
Cyberethics
Cyberethics is the philosophic study of ethics pertaining to computers, encompassing user
behavior and what computers are programmed to do, and how this affects individuals and
society.
Examples of cyberethical questions include:
Is it OK to display personal information about others on the Internet (such as their online
status or their present location via GPS)?
Should users be protected from false information?
Who owns digital data (such as music, movies, books, web pages, etc.) and what should
users be allowed to do with it?
How much access should there be to gambling and pornography online?
Is access to the Internet a basic right that everyone should have?
Privacy history
In the late 19th century, the invention of cameras spurred similar ethical debates as the internet
does today.
During a Harvard Law Review seminar in 1890, Warren and Brandeis defined privacy from an
ethical and moral point of view to be "central to dignity and individuality and personhood.
Privacy is also indispensable to a sense of autonomy — to 'a feeling that there is an area of an
individual's life that is totally under his or her control, an area that is free from outside intrusion.'
The deprivation of privacy can even endanger a person's health." (Warren & Brandeis, 1890).[1]
Over 100 years later, the internet and proliferation of private data through governments[2] and
ecommerce is a phenomenon which requires a new round of ethical debate involving a person's
privacy.
Privacy can be decomposed to the limitation of others' access to an individual with "three
elements of secrecy, anonymity, and solitude" (Gavison, 1984).[3]
Anonymity refers to the individual's right to protection from undesired attention.
Solitude refers to the lack of physical proximity of an individual to others.
Secrecy refers to the protection of personalized information from being freely distributed.
Individuals surrender private information when conducting transactions and registering for
services.
Ethical business practice protects the privacy of their customers by securing information which
may contribute to the loss of secrecy, anonymity, and solitude.
Credit card information, social security numbers, phone numbers, mothers' maiden names,
addresses and phone numbers freely collected and shared over the internet may lead to a loss of
Privacy.
2
Fraud and impersonation are some of the malicious activities that occur due to the direct or
indirect abuse of private information. Identity theft is rising rapidly due to the availability of
private information in the internet.
For instance, seven million Americans fell victim to identity theft in 2002,and nearly 12 million
Americans were victims of identity theft in 2011 making it the fastest growing crime in the United
States (Latak, 2005).[4]
Public records search engines and databases are the main culprits contributing to the rise of
cybercrime.
Listed below are a few recommendations to restrict online databases from proliferating sensitive
personnel information:
Exclude sensitive unique identifiers from database records such as social security
numbers, birth dates, hometown and mothers' maiden names.
Exclude phone numbers that are normally unlisted.
Clear provision of a method which allows people to have their names removed from
a database.
Banning the reverse social security number lookup services (Spinello, 2006).[5]
Some may argue that data warehouses are supposed to stand alone and be protected.
However, the fact is enough personal information can be gathered from corporate websites and
social networking sites to initiate a reverse lookup.
Therefore, is it not important to address some of the ethical issues regarding how protected data
ends up in the public domain?
As a result, identity theft protection businesses are on the rise.
Companies such as LifeLock and JPMorgan Chase have begun to capitalize on selling identity
theft protection insurance.
Property
Ethical debate has long included the concept of property.
This concept has created many clashes in the world of cyberethics.
One philosophy of the internet is centered around the freedom of information.
The controversy over ownership occurs when the property of information is infringed upon or
uncertain.[6]
This argument is partially answered by pointing to the small proportion of money artists receive
from the legitimate sale of media.
We also see a similar debate over intellectual property rights in respect to software ownership.
The two opposing views are for closed source software distributed under restrictive licenses or
for free and open source software (Freeman & Peace, 2004).[7]
The argument can be made that restrictions are required because companies would not invest
weeks and months in development if there is no incentive for revenue generated from sales and
licensing fees.
Proponents for open source believe that all programs should be available to anyone who wants to
study them.
Security
Security has long been a topic of ethical debate.
Is it better to protect the common good of the community or rather should we safeguard the
rights of the individual?
There is a continual dispute over the boundaries between the two and which compromises are
right to make.
As an ever increasing amount of people connect to the internet and more and more personal
data is available online there is susceptibility to identity theft, cyber crimes and computer
hacking.
This also leads to the question of who has the right to regulate the internet in the interest of
security.
Accuracy
Due to the ease of accessibility and sometimes collective nature of the internet we often come
across issues of accuracy e.g. who is responsible for the authenticity and fidelity of the
information available online?
Ethically this includes debate over who should be allowed to contribute content and who should
be held accountable if there are errors in the content or if it is false.
This also brings up the question of how is the injured party, if any, to be made whole and under
which jurisdiction does the offense lay?[8]
Censorship and filtering occurs on small to large scales, whether it be a company restricting their
employees' access to cyberspace by blocking certain websites which are deemed as relevant only
to personal usage and therefore damaging to productivity or on a larger scale where a
government creates large firewalls which censor and filter access to certain information available
online frequently from outside their country to their citizens and anyone within their borders.
One of the most famous examples of a country controlling access is the Golden Shield Project,
also referred to as the Great Firewall of China, a censorship and surveillance project set up and
operated by the People's Republic of China.
Another instance is the 2000 case of the League Against Racism and Antisemitism (LICRA),
French Union of Jewish Students, vs. Yahoo! Inc (USA) and Yahoo! France, where the French
Court declared that "access by French Internet users to the auction website containing Nazi
objects constituted a contravention of French law and an offence to the 'collective memory' of
the country and that the simple act of displaying such objects (e.g. exhibition of uniforms,
insignia or emblems resembling those worn or displayed by the Nazis) in France constitutes a
violation of the Article R645-1 of the Penal Code and is therefore considered as a threat to
internal public order "(Akdeniz, 2001).[9]
Since the French judicial ruling many websites must abide by the rules of the countries in which
they are accessible.
Freedom of information
Freedom of information, that is the freedom of speech as well as the freedom to seek, obtain and
impart information brings up the question of who or what, has the jurisdiction in cyberspace.
The right of freedom of information is commonly subject to limitations dependent upon the
country, society and culture concerned.
Generally there are three standpoints on the issue as it relates to the internet.
First is the argument that the internet is a form of media, put out and accessed by citizens of
governments and therefore should be regulated by each individual government within the
borders of their respective jurisdictions.
Second, is that, "Governments of the Industrial World... have no sovereignty [over the internet]
... We have no elected government, nor are we likely to have one, ... You have no moral right to
rule us nor do you possess any methods of enforcement we have true reason to fear." (Barlow,
1996).[10]
A third party believes that the internet supersedes all tangible borders such as the borders of
countries, authority should be given to an international body since what is legal in one country
may be against the law in the other.[11]
Digital divide
An issue specific to the ethical issues of the freedom of information is what is known as the
digital divide. This refers to the unequal socio-economic divide between those who have access
to digital and information technology such as cyberspace and those who have limited or no
access at all.
This gap of access between countries or regions of the world is called the global digital divide.
Related organizations
The following organizations are of notable interest in the cyberethics debate:
International Federation for Information Processing (IFIP) IFIP
Association for Computer Machinery, Special Interest Group: Computers and
Society (SIGCAS)
Ethical and Professional Issues in Computing (EPIC) Electronic Privacy
Information Center
Electronic Frontier Foundation (EFF) Electronic Frontier Foundation
International Center for Information Ethics (ICIE)
Directions and Implications in Advanced Computing (DIAC)
The Centre for Computing and Social Responsibility (CCSR)
Cyber-Rights and Cyber-liberties
International Journal of Cyber Ethics in Education IJCEE (www.igi-
global.com/ijcee)
***/gup.comm28.0314.16