SlideShare a Scribd company logo
1 of 2
Ethical Dilemma/Issues in the Cyberworld
"[To] do this to the right person, to the right extent, at the right time, with the right motive, and in the right way, that is not for everyone nor is it easy;
wherefore goodness is both rare and laudable and noble."(Aristotle, Ethics II.9)
Ethical dilemma is a complex situation that will often involve an apparent mental conflict between moral imperatives, in
which to obey one would result in transgressing another. This is also called an ethical paradox since in moral philosophy, paradox plays
a central role in ethics debates.
Ethical dilemmas...
An ethical dilemma emerges in a context of conflict between at least two goods(values) which require different responses.

Ethical Dilemmas:
1. I n v a s i o n o f P r i v a c y
The wrongful intrusion into a person's private activities by other individuals or by the government. Tort law protects one's
private affairs with which the public has no concern against unwarranted exploitation or publicity that causes mental suffering
or humiliation to the average person. The right to be left alone is not always superior to the rights of the public and it may or may not exist
or may exist to a lesser degree with regard to the life of a public figure, such as a politician or other person in whom the
public has a rightful interest. The right to personal privacy is encompassed as an aspect of liberty protected against government interference
by the Constitution's duep r o c e s s c l a u s e .
2. T h e f t
In common usage, theft is the taking of another person's property without that person's permission or consent with the
intent to deprive the rightful owner of it. The word is also used as an informal shorthand term for some crimes against
property, such asburglary, embezzlement, larceny, looting, robbery, shoplifting, library theft and fraud. In some
jurisdictions, theft is considered to be synonymous with larceny; in others, theft has replaced larceny. Someone who
carries out an act of or makes a career of theft is known as a thief. The act of theft is known by terms such
as stealing, thieving,wicksing, and filching.
3. Hacking
The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The
second definition refers to breaking into computer systems. While the first definition is older and is still used by many
computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used. In
particular, the web pages here refer to "hackers" simply because our web-server logs show that every one who reaches
these pages are using the second definition as part of their search criteria.
4. S e c u r i t y
Computer security (Also known as cybersecurity or IT Security) is information security as applied to computers and
networks. The field covers all the processes and mechanisms by which computer-based equipment, information and
services are protected from unintended or unauthorized access, change or destruction. Computer security also includes
protection from unplanned events and natural disasters.
5. C o p y r i g h t i n f r i n g e m e n t
Copyright infringement (or copyright violation) is the unauthorized or prohibited use of works covered by copyright law, in
a way that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the
copyrighted work, or to make derivative works. For electronic and audio-visual media, unauthorized reproduction and distribution is also
commonly referred to as pirac y
6. U n f a i r c o m p e t i t i o n
A branch of intellectual property law, unfair competition is a term applied to all dishonest or fraudulent rivalry in trade and
commerce. This term is particularly applied to the practice of endeavoring to substitute one’s own goods or products in the
market for those of another for the purpose of deceiving the public.
7. V i r u s
A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into
other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected
areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as
stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous
messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a
destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating
computer programs which install themselves without the user's consent.
8. V i d e o c o n f e r e n c i n g
Videoconferencing is the conduct of a videoconference (also known as a video conference or videoteleconference)
by a set of telecommunication technologies which allow two or more locations to communicate by simultaneous two-way
video and audio transmissions. It has also been called 'visual collaboration' and is a type of groupware.
9. P i r a c y

Cyber piracy involves various deceptive practices that companies or individuals engage in to profit from online
users. Within the legal aid community, these deceptive practices result in confusion for the public (particularly clients
and potential clients) as well as take advantage of the good-will and reputation of legal aid organizations. Without a
system to address cyber piracy, legal aid programs risk the chance that the public, especially unsophisticated online
users, will not reach legitimate legal aid website and will be confused and possibly extorted on websites posing as
legal aid.
10. O n l i n e

Defamation

Generally, defamation is a false and unprivileged statement of fact that is harmful to someone's reputation, and
published "with fault," meaning as a result of negligence or malice. State laws often define defamation in specific
ways. Libel is a written defamation; slander is a spoken defamation.
11. F r a u d
The definition of what constitutes computer fraud becomes ever more complex with the ingenuity of people who intend to
deceive, misrepresent, destroy, steal information, or cause harm to others by accessing information through deceptive
and illegal means. Just as individuals have to be careful when they are walking down the street or in their homes when
they lock the doors at night, they need to be careful of the many examples of fraud that will make their way onto their
computers.

More Related Content

What's hot

Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
LIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptxLIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptxRussel Carilla
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship cleo barawid
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it eraFroilan Cantillo
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 

What's hot (20)

Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 
LIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptxLIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
12 security policies
12 security policies12 security policies
12 security policies
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it era
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 

Viewers also liked

Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Ethical dilemma outline.show
Ethical dilemma outline.showEthical dilemma outline.show
Ethical dilemma outline.showMedgine Ascencio
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesAysha Rahman
 
Introduction to Data-Oriented Design
Introduction to Data-Oriented DesignIntroduction to Data-Oriented Design
Introduction to Data-Oriented DesignIT Weekend
 
Ethical group presentation final
Ethical group presentation  finalEthical group presentation  final
Ethical group presentation finalpoindexk
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom SectorSagar Patekar
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
Model for Ethical Dilemmas
Model for Ethical DilemmasModel for Ethical Dilemmas
Model for Ethical Dilemmasfdaniel1
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber WorldEmil Tan
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Thomas Lee
 
A Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on CybersecurityA Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on CybersecurityEmil Tan
 

Viewers also liked (20)

Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Cs106 professional-ethics
Cs106 professional-ethicsCs106 professional-ethics
Cs106 professional-ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical dilemma outline.show
Ethical dilemma outline.showEthical dilemma outline.show
Ethical dilemma outline.show
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage rates
 
Introduction to Data-Oriented Design
Introduction to Data-Oriented DesignIntroduction to Data-Oriented Design
Introduction to Data-Oriented Design
 
Ethical group presentation final
Ethical group presentation  finalEthical group presentation  final
Ethical group presentation final
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
ETHICAL DILEMMA
ETHICAL DILEMMA ETHICAL DILEMMA
ETHICAL DILEMMA
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
Model for Ethical Dilemmas
Model for Ethical DilemmasModel for Ethical Dilemmas
Model for Ethical Dilemmas
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
 
A Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on CybersecurityA Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on Cybersecurity
 

Similar to Ethical Dilemma/Issues is Cyberworld

Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfDesireDelosSantos
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Jevaughan Edie
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 

Similar to Ethical Dilemma/Issues is Cyberworld (20)

Ethical dilemma
Ethical dilemmaEthical dilemma
Ethical dilemma
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology Presentatiopdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 

Recently uploaded

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Ethical Dilemma/Issues is Cyberworld

  • 1. Ethical Dilemma/Issues in the Cyberworld "[To] do this to the right person, to the right extent, at the right time, with the right motive, and in the right way, that is not for everyone nor is it easy; wherefore goodness is both rare and laudable and noble."(Aristotle, Ethics II.9) Ethical dilemma is a complex situation that will often involve an apparent mental conflict between moral imperatives, in which to obey one would result in transgressing another. This is also called an ethical paradox since in moral philosophy, paradox plays a central role in ethics debates. Ethical dilemmas... An ethical dilemma emerges in a context of conflict between at least two goods(values) which require different responses. Ethical Dilemmas: 1. I n v a s i o n o f P r i v a c y The wrongful intrusion into a person's private activities by other individuals or by the government. Tort law protects one's private affairs with which the public has no concern against unwarranted exploitation or publicity that causes mental suffering or humiliation to the average person. The right to be left alone is not always superior to the rights of the public and it may or may not exist or may exist to a lesser degree with regard to the life of a public figure, such as a politician or other person in whom the public has a rightful interest. The right to personal privacy is encompassed as an aspect of liberty protected against government interference by the Constitution's duep r o c e s s c l a u s e . 2. T h e f t In common usage, theft is the taking of another person's property without that person's permission or consent with the intent to deprive the rightful owner of it. The word is also used as an informal shorthand term for some crimes against property, such asburglary, embezzlement, larceny, looting, robbery, shoplifting, library theft and fraud. In some jurisdictions, theft is considered to be synonymous with larceny; in others, theft has replaced larceny. Someone who carries out an act of or makes a career of theft is known as a thief. The act of theft is known by terms such as stealing, thieving,wicksing, and filching. 3. Hacking The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used. In particular, the web pages here refer to "hackers" simply because our web-server logs show that every one who reaches these pages are using the second definition as part of their search criteria. 4. S e c u r i t y Computer security (Also known as cybersecurity or IT Security) is information security as applied to computers and networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. 5. C o p y r i g h t i n f r i n g e m e n t Copyright infringement (or copyright violation) is the unauthorized or prohibited use of works covered by copyright law, in a way that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. For electronic and audio-visual media, unauthorized reproduction and distribution is also commonly referred to as pirac y 6. U n f a i r c o m p e t i t i o n A branch of intellectual property law, unfair competition is a term applied to all dishonest or fraudulent rivalry in trade and commerce. This term is particularly applied to the practice of endeavoring to substitute one’s own goods or products in the market for those of another for the purpose of deceiving the public.
  • 2. 7. V i r u s A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. 8. V i d e o c o n f e r e n c i n g Videoconferencing is the conduct of a videoconference (also known as a video conference or videoteleconference) by a set of telecommunication technologies which allow two or more locations to communicate by simultaneous two-way video and audio transmissions. It has also been called 'visual collaboration' and is a type of groupware. 9. P i r a c y Cyber piracy involves various deceptive practices that companies or individuals engage in to profit from online users. Within the legal aid community, these deceptive practices result in confusion for the public (particularly clients and potential clients) as well as take advantage of the good-will and reputation of legal aid organizations. Without a system to address cyber piracy, legal aid programs risk the chance that the public, especially unsophisticated online users, will not reach legitimate legal aid website and will be confused and possibly extorted on websites posing as legal aid. 10. O n l i n e Defamation Generally, defamation is a false and unprivileged statement of fact that is harmful to someone's reputation, and published "with fault," meaning as a result of negligence or malice. State laws often define defamation in specific ways. Libel is a written defamation; slander is a spoken defamation. 11. F r a u d The definition of what constitutes computer fraud becomes ever more complex with the ingenuity of people who intend to deceive, misrepresent, destroy, steal information, or cause harm to others by accessing information through deceptive and illegal means. Just as individuals have to be careful when they are walking down the street or in their homes when they lock the doors at night, they need to be careful of the many examples of fraud that will make their way onto their computers.