Your SlideShare is downloading. ×
0
Ethics of the Internet1.Intellectual property protection:2. Privacy:It is difficult to ensure that the attack onprivacy in...
3. Protect the network from pollution: somepeople misuse the freedom of publication onthe internet sites to serve bad sexu...
4. Strengthen confidence in the Internet: somelocations available in the network lackconfidence in the validity or accurac...
5. Widening the knowledge gap:the problem emerged sharply in recent timesbetween rich countries in sources ofinformation a...
6. Ethical transgressions:You must protect the network from somecommon ethical transgressions, including thefollowing: Th...
 Terrorism and espionage-mail: is one of theethical problems faced by the informationsociety in the current era. Data ma...
 Phenomenon of internet addiction: becauseof the desire to make more friends , exchangeviews with the new people, and esc...
Policy of digitization projectsDigitization process means converting data toelectronic format for processing by computer,a...
Copyright :Laws of copyrights should be updated to fit inwith the digital world , facing the issues andproblems, and shoul...
Economic rights reserve to the author the rightto physical exploitation of his work. Andmoral rights reserve for the autho...
The material and moral rights of authors havebecome violated in light of the use of theinternet. Despite the achieved of t...
Another difficulty facing the protection ofcopyright is the lack of legal deposit system,forcing the creator of digital in...
Against this problem resorted copyright holdersto find multiple methods to restrict access,which deprived the user from ce...
Academic thefts in the electronic             environmentAppeared in cyberspace a new term is the electroniccrimes, or CYB...
Robbery means hefting ideas of others on theinternet of articles, research and scientificstudies without reference to the ...
Internet helped the emergence of the problemof computer crimes or thefts, particularly theonline piracy, which impact on t...
Publishing on the internet is available to all,contributing to the violation of the rights ofauthors, which calls for laws...
What increases the size of the problem is thatthe law does not follow the technicaldevelopments. Internet crimes arecharac...
One can not identify the location of theoffender on the internet, and the mentalimage of the criminal of the Internet is o...
There are many terms that are used as anexpression of the reciprocal of the forms ofcybercrime, including:HIGH-TICK CRIMEE...
TURNITIN company has developed a programcapable of detecting cases of theft, fraud, andplagiarism, where theft is discover...
Another program helps address the academicthefts called WORDCHECK, and the siteCOPYSCAPE on the internet assists in thedis...
With respect to the laws addressing the theft ofelectronic crimes, it is mainly THE DIGITALMILLENNIUM COPYRIGHT ACT (DMCA)...
The Arab initiatives in this regard are weak. TheArab gate for libraries and information thedesign of a site that helps to...
The Kingdom of Saudi Arabia became a memberof the Organization of Intellectual PropertyRights (WIPO) in 1982. There are in...
In the Kingdom certain laws that govern use ofthe Internet were issued, including the Anti-Crime Act, which was issued in ...
Upcoming SlideShare
Loading in...5
×

اخلاقيات الثالث

133

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
133
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "اخلاقيات الثالث"

  1. 1. Ethics of the Internet1.Intellectual property protection:2. Privacy:It is difficult to ensure that the attack onprivacy in the Internet, and to convince thepublic that they are not a secure network topenetrate the users privacy.
  2. 2. 3. Protect the network from pollution: somepeople misuse the freedom of publication onthe internet sites to serve bad sexualpornography, or incitement to violence, andimplant the spirit of hatred among thepeople, or encourage suicide, and thereforean ethical action and legal deterrent shouldbe taken to protect the network from thesebehaviors.
  3. 3. 4. Strengthen confidence in the Internet: somelocations available in the network lackconfidence in the validity or accuracy of theinformation, which prevents the users fromcitation.
  4. 4. 5. Widening the knowledge gap:the problem emerged sharply in recent timesbetween rich countries in sources ofinformation and poor countries in this aspect.
  5. 5. 6. Ethical transgressions:You must protect the network from somecommon ethical transgressions, including thefollowing: Theft: caused from penetrating the localsystem or forcing up the process forgedthrough the network.
  6. 6.  Terrorism and espionage-mail: is one of theethical problems faced by the informationsociety in the current era. Data manipulation: this problem may occurfrom some workers in the institution wherethe information changed for severalconsiderations.
  7. 7.  Phenomenon of internet addiction: becauseof the desire to make more friends , exchangeviews with the new people, and escape fromreality.
  8. 8. Policy of digitization projectsDigitization process means converting data toelectronic format for processing by computer,and the resulting need for a policy on thefollowing aspects:
  9. 9. Copyright :Laws of copyrights should be updated to fit inwith the digital world , facing the issues andproblems, and should preserve the rights ofauthors and publishers and literary material.
  10. 10. Economic rights reserve to the author the rightto physical exploitation of his work. Andmoral rights reserve for the author the rightnot to distort his work, or modify it.
  11. 11. The material and moral rights of authors havebecome violated in light of the use of theinternet. Despite the achieved of theadvantages of electronic publishing, on theother hand, it made several disadvantagessuch as ease of copying digital materials,academic theft, espionage , cyber terrorism,fraud, and plagiarism. Laws should fit therequirements of digital sources.
  12. 12. Another difficulty facing the protection ofcopyright is the lack of legal deposit system,forcing the creator of digital information todeposit copies of their work at the bodyresponsible for legal deposit in the country,which leads to the difficulty of keeping thenational heritage.
  13. 13. Against this problem resorted copyright holdersto find multiple methods to restrict access,which deprived the user from certain rightsand exemptions enjoyed by under the laws ofcopyright protection. The previous, such asexceptions to use the fair use taken vanishunder the application of conventions, and theuse of digital rights.
  14. 14. Academic thefts in the electronic environmentAppeared in cyberspace a new term is the electroniccrimes, or CYBERCRIMES, including thefts,academic, dissemination of vice, disable thedevices, the destruction of sites, data manipulation,penetration of e-mail, use copies of originalprograms, copyrighted, the distribution of viruses,published, copy-protected programs, and access tothe files, as well as others.
  15. 15. Robbery means hefting ideas of others on theinternet of articles, research and scientificstudies without reference to the originalsource. This differs from the transport andthe quote which is legitimate right for all.Within the scope of theft, plagiarism, fraudcheating, piracy, and the like methods ofattack on the ideas of others.
  16. 16. Internet helped the emergence of the problemof computer crimes or thefts, particularly theonline piracy, which impact on the ethics ofthe information society. Laws in this area notclear as a result of the complexity of internetcrime.
  17. 17. Publishing on the internet is available to all,contributing to the violation of the rights ofauthors, which calls for laws to address thiscontemporary phenomenon. There areMasters and PhD theses were stolen. Alsothere are foreign books and articles havebeen translated in full text from the internet.
  18. 18. What increases the size of the problem is thatthe law does not follow the technicaldevelopments. Internet crimes arecharacterized by ambiguity, where it isdifficult to prove and investigate, as is thecase in traditional crimes.
  19. 19. One can not identify the location of theoffender on the internet, and the mentalimage of the criminal of the Internet is oftenthe image of the hero and so smart, it is notan admirable picture of the criminal whoshould be prosecuted.
  20. 20. There are many terms that are used as anexpression of the reciprocal of the forms ofcybercrime, including:HIGH-TICK CRIMEE-CRIMECOMPUTER CRIMEINFORMATICS CRIMEDIGITAL CRIMECOMPUTER ABUSE
  21. 21. TURNITIN company has developed a programcapable of detecting cases of theft, fraud, andplagiarism, where theft is discovered bydownloading the article, and compare it withthe billions of pages available on the internet.
  22. 22. Another program helps address the academicthefts called WORDCHECK, and the siteCOPYSCAPE on the internet assists in thediscovery of the stolen articles.
  23. 23. With respect to the laws addressing the theft ofelectronic crimes, it is mainly THE DIGITALMILLENNIUM COPYRIGHT ACT (DMCA) of1998 in the United States of America, isspecial legislation covering material availableonline. As some European countries enactedlaws on cyber crime, and the establishment ofa special section to combat these crimes.
  24. 24. The Arab initiatives in this regard are weak. TheArab gate for libraries and information thedesign of a site that helps to discover thestolen research and studies in the areaof ​interest. It was discovered that some of thearticles published in CYBRARIANS JOURNALhave been published in other sites.
  25. 25. The Kingdom of Saudi Arabia became a memberof the Organization of Intellectual PropertyRights (WIPO) in 1982. There are in theKingdom three sides responsible for theprotection of intellectual property rights. Forpublishing, the Ministry of Information, forthe trademark rights the Ministry ofCommerce, and for tracking of humaninventions and innovations King AbdulazizCity for Science and Technology.
  26. 26. In the Kingdom certain laws that govern use ofthe Internet were issued, including the Anti-Crime Act, which was issued in 1428 for tryingto criminalize abuse and infringement on therights of others, to help achieve informationsecurity, and the protection of public morals.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×