Chapter 5 - Ethical Issues in Digital Age

Download as pdf or txt
Download as pdf or txt
You are on page 1of 53

Chapter 5 - Ethical Issues in

Digital Age
Prepared by : Mr. Shelbert Lloyd Duncil

Living in the IT Era


Learning Objectives
At the end of this, we are expected to:
• Identify the different ethical issues in digital age.
• Describe the threats posed by hackers, fraud, piracy, and
internet pornography
• Identity the different types of theft
• Discuss the copyright infringement
• Discuss the freedom of expression and online defamation

Living in the IT Era


Ethical Issues in Digital Age

Living in the IT Era


1) Privacy

Living in the IT Era


Privacy
According to law, privacy is the right of every
individual to make personal decisions and
conduct their life in a reasonable manner away
from public observation. In other terms, it is an
individual's or a group's capacity to choose
express themselves and keep themselves or
information about themselves private
Living in the IT Era
Privacy
Privacy Invasion - It is a legal term that describes
a circumstance or condition in which a person
intrudes on the privacy of others, such as the
abuse or disclosure of sensitive information and
unlawful monitoring. Invasion of privacy is an
unlawful conduct that carries legal ramifications
since it causes loss or hurt to people's life.
Living in the IT Era
Privacy
Types of Privacy Invasion:
• Intrusion into seclusion – It refers to the purposeful
intrusion of another person's private affairs. It also
involves the act of looking for private information of
a confidential nature, even if the information is not
publicly available. In this sort of tort, the legal
criterion should be deliberate and extremely
offensive to a reasonable person.
Living in the IT Era
Privacy
Types of Privacy Invasion:
• Appropriation of name or likeness – it refers to the
act of using the name and likeness of other person
publicly without authorization for his/her own
benefit such as trading and advertising purposes.

Living in the IT Era


Privacy
Types of Privacy Invasion:
• Public disclosure of private facts – it refers to the
publication of other person’s private affairs with the
state that it is highly offensive to a reasonable
person and in legitimate public concern.

Living in the IT Era


Privacy
Types of Privacy Invasion:
• Placing a person in a false light – act of stating
information that is based on opinion and may be
technically true, but indicates to a reasonable
person that anything bad and/or incorrect about
the target is true. It is similar to defamation, except
that no false statements are required.

Living in the IT Era


2) Hacking

Living in the IT Era


Hacking
Hacking or System penetration is the act of
getting unauthorized access to data via a system
or other digital device such as a computer.
Because information in digital form is subject to
numerous forms of assaults, it is one of the most
prevalent dangers in cybersecurity.

Living in the IT Era


Hacking
Different types of Hacker:
• Black-hat hacker – it refers to an act that takes
advantage of security vulnerabilities to gain
unlawful access to private networks for the purpose
of private advantage.
• White-hat hacker – it is a type of hacker that works
for the common good by hacking networks to call
attention to flaws in security to be fixed.
Living in the IT Era
Hacking
Different types of Hacker:
• Gray-hat hacker – It refers to the person who enact
activities of both black hat and white hat hacker
• Script Kiddie – a novice in hacking. To hack
networks, it follows instructions and use pre-
existing software.

Living in the IT Era


Hacking
Different tools and methods in hacking
• Key-logging software – it is remotely installed on a
computer to record keystrokes and commands.
• Packet-sniffing software – it is used to steal private data
that is being transported over a network. It focuses on
capturing and analyzing packets that flows over the
network or Internet. It might capture important
information such as passwords and credit card numbers.

Living in the IT Era


Hacking
Different tools and methods in hacking
• Port-scanning software – it is used to search
random IP addresses for open ports to be hacked.
• Social Engineering – it refers to the exploitation of
natural human tendency to trust others. For
example, pretending to be an administrator through
phone call to make the person to provide a
password or other important information
Living in the IT Era
Hacking
Different tools and methods in hacking
• Dumpster diving – a method of going through trash
of other user to steal personal information such as
credit card numbers.

Living in the IT Era


3) Theft

Living in the IT Era


Theft
Another ethical issue concerning the use of computer is
theft. The most popular type of theft is known as identity
theft – an act of stealing other’s personal information to
commit fraud. It can also be in the form of pretending to be
someone else, using the information of other people for
money and other benefits. An identity thief can make
unauthorized purchases and transactions using other
person’s credit card information.

Living in the IT Era


Theft
Personal information can be obtained using computer
technology by accessing computer based public
records, hard drives of discarded and stolen
computers, hacking computer networks using
information-gathering software/malware, or by
simply sending deceptive text messages or emails,
and browsing social networking sites.

Living in the IT Era


4) Copyright Infringement

Living in the IT Era


Copyright Infringement
The act of using the copyrighted works or covered
by copyright law without permission. Specifically,
reproducing, distributing, displaying, performing
protected work, or making derivative works
without authorization of the copyright holder.

Living in the IT Era


Copyright Infringement
A copyright holder can be a creator of the work,
publisher, or other business that copyright was
assigned where they invoke legal and
technological measures to prevent and penalize
copyright infringement.

Living in the IT Era


Copyright Infringement
Copyright infringement in the Philippines
constitutes the following statement:

“Under Philippine law, copyright infringement


occurs when there is a violation of any of the
exclusive economic or moral rights granted to the
copyright owner.”
Living in the IT Era
Copyright Infringement
Different forms of copyright infringement:
• Film recording in a movie theater
• Posting a video on your company’s website that features
copyrighted contents such as songs, wordings, and images
• Modifying copyrighted image or videos and displaying it to
company’s website
• Creating merchandise for sale that features copyrighted works
• Downloading films or music without paying their use
• Copying any artistic or literary work without license

Living in the IT Era


5) Freedom of Expression and Online Defamation

Living in the IT Era


Freedom of Expression and Online Defamation
Freedom of expression is the right to search,
receive, and impart information of your choice
regardless of boundary without interference. It is
the right of every person to express themselves
even online and to access information, opinions,
and expressions of others including views on
religion, political speech, opinions,
Living in the IT Era
Freedom of Expression and Online Defamation
and expressions that are inoffensive, but also
expressions and opinions that might be offensive
and disturbing to others. Having the right to
express yourself should consider the rights of
others and right to privacy.

Living in the IT Era


Freedom of Expression and Online Defamation
Online Defamation is the act of giving false
statement that is harmful to someone’s
reputation verbally or in written form using
online platforms such as social media
platform.

Living in the IT Era


Freedom of Expression and Online Defamation
There are two types of defamation:
a) Libel – it refers to the written defamatory
statement
b) Slander – it refers to the spoken defamatory
statement

Living in the IT Era


Freedom of Expression and Online Defamation
For example, if the defamatory statement is
posted online such as comment in a Facebook
post, it is considered as libel and identified as
online defamation. Other example includes public
comments on media websites such as online
newspapers or magazine, chatrooms, and blog
posting comments.
Living in the IT Era
Is freedom of expression can be a
defamation?

Living in the IT Era


Is freedom of expression can be a defamation?
Statements that are labeled as merely opinions
does not make it as defamation. Courts focuses
on statement of verifiable facts which means the
statement conveys probable false factual
assertion such as cheating on his/her spouse, or
someone committed murder.

Living in the IT Era


6) Piracy

Living in the IT Era


Piracy
Piracy entails the unauthorized reproduction, use, and
distribution of digital intellectual property such as
software, music, and movies. Piracy and plagiarism
are types of violations of intellectual property laws,
such as copyright offenses. Pirated software, music,
and films can be obtained via file sharing networks or
handmade CDs and DVDs.

Living in the IT Era


Piracy
Examples of Piracy includes the following:
• Illegal use or interception of internet connection of
other people
• Publication, reproduction, and/or use of patented
or copyrighted work without permission
• Unauthorized copying of protected software
• Using protected software without license

Living in the IT Era


7) Fraud

Living in the IT Era


Fraud
In general, it is a wrongful act and criminal
deception resulting in financial or personal
gain. Computer fraud is the term used in
executing the illegal act using computer
system or attacking a computer intends to
alter, damage, or worst disable it.
Living in the IT Era
Fraud
Types of fraud includes:
• Mail Fraud – fraudulent activity that uses mails
or emails such as sending a letter to someone
to scam money or gain personal information. It
also includes using chain letters to collect items
or money, or by simply stealing and opening
someone else’s mail
Living in the IT Era
Fraud
Types of fraud includes:
• Health Care Fraud – it refers to a situation
where an individual such as insurance provider
or medical office misuse the insurance
information for their own personal gain

Living in the IT Era


Fraud
Types of fraud includes:
• Debit and Credit Card Fraud – accessing other
people’s debit or credit cards that can
completely drain bank accounts.
• Internet Fraud – fraudulent activity using
internet to take advantage to other people. It
includes data breaches, malware, and phishing.
Living in the IT Era
8) Internet Pornography

Living in the IT Era


Internet Pornography
Internet Pornography is the accessing pictures or
films that contains representation of sexual
behavior using Internet. It is accessible over the
Internet via file sharing and websites. The
increasing availability of public access via the
World Wide Web fuels the proliferation of
internet pornography.
Living in the IT Era
Internet Pornography
Pornography is illegal for children, yet it has
grown so accessible and widely available that it is
seen as one of the most serious hazards to
children's internet safety. Internet pornography is
regard as illegal when there are minor children
involved.

Living in the IT Era


Internet Pornography
Online child pornography has become a major issue,
and it can take the form of pictures, movies, drawings,
animations, and even computer-generated imagery. In
certain circumstances, child pornography involves an
adult being portrayed as a kid. Child pornography can
also entail the alteration of a picture to make it appear
like a child

Living in the IT Era


Internet Pornography
Internet pornography includes uploading and
downloading pornographic materials via internet
illegally, this is also regard as internet
pornography crime.

Living in the IT Era


Summary

Living in the IT Era


Summary
• Privacy invasion is a legal phrase that describes a
circumstance or condition in which a person
intrudes on the privacy of another, such as the
abuse or disclosure of personal information or
unlawful monitoring.
• Hacking is the act of getting illegal access to data
using a system or other digital equipment, such as a
computer, and is also known as system penetration
Living in the IT Era
Summary
• Theft is an act of stealing other’s personal
information to commit fraud.
• Copyright infringement is the act of using the
copyrighted works or covered by copyright law
without permission.
• Freedom of expression is the right to search,
receive, and impart information of your choice
regardless of boundary without interference
Living in the IT Era
Summary
• Online Defamation is the act of giving false
statement that is harmful to someone’s reputation
verbally or in written form using online platforms
such as social media platform.
• Piracy involves illegal copying, use, and distribution
of digital intellectual property such as software,
music, and movies

Living in the IT Era


Summary
• Fraud is a wrongful act and criminal
deception resulting in financial or personal
gain.
• Internet pornography refers to accessing
pictures or films that contains
representation of sexual behavior using
Internet.
Living in the IT Era
Is there any Question?

Living in the IT Era


Thank you!!!

Living in the IT Era

You might also like