SlideShare a Scribd company logo
1 of 2
Download to read offline
Some ethicists argue that the very conduct that results in resistance from
participants—interference, invasiveness in their lives, denial of privacy rights—has encouraged
researchers to investigate topics online that have long been the principal commodity of offline
investigation. The novelty and convenience of communicating by computer has led researchers
to cyberspace in search of abundant sources of data. Whether we call it the “wired society,”
“digital life,” “computer-mediated communication,” or “cyberculture,” the growth of
cyberstudies causes us to question how we gather data online, deal with participants, and present
results.
In a special ethics issue of Information Society, scholars involved in cyberspace research
concluded:
All participants agree that research in cyberspace provides no special dispensation to ignore
ethical precepts. Researchers are obligated to protect human subjects and “do right” in electronic
venues as in more conventional ones. Second, each participant recognizes that cyberspace poses
complex ethical issues that may lack exact analogs in other types of inquiry. The ease of covert
observation, the occasional blurry distinction between public and private venues, and the
difficulty of obtaining the informed consent of subjects make cyber-research particularly
vulnerable to ethical breaches by even the most scrupulous scholars. Third, all recognize that
because research procedures or activities may be permissible or not precluded by law or policy, it
does not follow that they are necessarily ethical or allowable. Fourth, all agree that the individual
researcher has the ultimate responsibility for assuring that inquiry is not only done honestly, but
done with ethical integrity.7
Issues relating to cyberspace in research also relate to data mining. The information collection
devices available today were once the tools of the spy, the science fiction protagonist, or the
superhero. Smart cards, biometrics (finger printing, retinal scans, facial recognition), electronic
monitoring (closed circuit television, digital camera monitoring), global surveillance, and genetic
identification (DNA) are just some of the technological tools being used by today’s organizations
to track and understand employees, customers, and suppliers. The data mining of all this
information, collected from advanced and not necessarily obvious sources, offers infinite
possibilities for research abuse.
show your reaction to that, how it can damage and can be destructive to a research, how it can be
destructive to research results, how it can be destructive to the name of the researcher, etc. Is
there any positive side that you see in that ethical matter? Write your assignment based on what
was just explained. Your assignment will be a large paragraph to a maximum of one page
Solution
A cyber event can be instigated either from external parties (remote, unauthorized access) or by
insider misuse:
Resulting in theft, disruption and/or damage to data and intellectual property, as well as to
physical property:
Financially, cyber attacks result in multiple costs, including customer/third-party liabilities and
lost revenues (direct and from subsequent reputational damage), notification costs, fines and
penalties, legal fees, repair/reinstatement costs for data and physical property and increased costs
of working, e.g. for crisis management and public relations.

More Related Content

Similar to Some ethicists argue that the very conduct that results in resistanc.pdf

Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocationsferguspitt
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensicsijtsrd
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingDr. Michael Agbaje
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docxLoudymerTimagos1
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryCSCJournals
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 

Similar to Some ethicists argue that the very conduct that results in resistanc.pdf (20)

Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
ICT and Citizenship
ICT and CitizenshipICT and Citizenship
ICT and Citizenship
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 

More from libowskymcinnisell69

On this image, please label all marked structures Definedescribe t.pdf
On this image, please label all marked structures  Definedescribe t.pdfOn this image, please label all marked structures  Definedescribe t.pdf
On this image, please label all marked structures Definedescribe t.pdflibowskymcinnisell69
 
Meniere’s disease - named for its discoverer, the nineteenth-century.pdf
Meniere’s disease - named for its discoverer, the nineteenth-century.pdfMeniere’s disease - named for its discoverer, the nineteenth-century.pdf
Meniere’s disease - named for its discoverer, the nineteenth-century.pdflibowskymcinnisell69
 
Iodine serves as a mordant in the Gram stain procedure. What is the .pdf
Iodine serves as a mordant in the Gram stain procedure. What is the .pdfIodine serves as a mordant in the Gram stain procedure. What is the .pdf
Iodine serves as a mordant in the Gram stain procedure. What is the .pdflibowskymcinnisell69
 
In the days before refrigeration, a common practice to preserve me.pdf
In the days before refrigeration, a common practice to preserve me.pdfIn the days before refrigeration, a common practice to preserve me.pdf
In the days before refrigeration, a common practice to preserve me.pdflibowskymcinnisell69
 
In a typical organization, databases and communications technology a.pdf
In a typical organization, databases and communications technology a.pdfIn a typical organization, databases and communications technology a.pdf
In a typical organization, databases and communications technology a.pdflibowskymcinnisell69
 
in JAVA Jagged Array recall that in Java 2D arrays are jagged in t.pdf
in JAVA Jagged Array recall that in Java 2D arrays are jagged in t.pdfin JAVA Jagged Array recall that in Java 2D arrays are jagged in t.pdf
in JAVA Jagged Array recall that in Java 2D arrays are jagged in t.pdflibowskymcinnisell69
 
If the elasticity of ethyl alcohol and water are 1.0610^9 Pa and 2.1.pdf
If the elasticity of ethyl alcohol and water are 1.0610^9 Pa and 2.1.pdfIf the elasticity of ethyl alcohol and water are 1.0610^9 Pa and 2.1.pdf
If the elasticity of ethyl alcohol and water are 1.0610^9 Pa and 2.1.pdflibowskymcinnisell69
 
Hi there! Im having trouble answering these tow questions could yo.pdf
Hi there! Im having trouble answering these tow questions could yo.pdfHi there! Im having trouble answering these tow questions could yo.pdf
Hi there! Im having trouble answering these tow questions could yo.pdflibowskymcinnisell69
 
For graph to the right Amplitude Midline Period Equation using.pdf
For graph to the right  Amplitude  Midline  Period  Equation using.pdfFor graph to the right  Amplitude  Midline  Period  Equation using.pdf
For graph to the right Amplitude Midline Period Equation using.pdflibowskymcinnisell69
 
Explain what exactly is going on with this picture. SolutionIn.pdf
Explain what exactly is going on with this picture.  SolutionIn.pdfExplain what exactly is going on with this picture.  SolutionIn.pdf
Explain what exactly is going on with this picture. SolutionIn.pdflibowskymcinnisell69
 
Do you agree that rich countries have systematically impoverished lo.pdf
Do you agree that rich countries have systematically impoverished lo.pdfDo you agree that rich countries have systematically impoverished lo.pdf
Do you agree that rich countries have systematically impoverished lo.pdflibowskymcinnisell69
 
Differentiate between physical and chemical methods used to control m.pdf
Differentiate between physical and chemical methods used to control m.pdfDifferentiate between physical and chemical methods used to control m.pdf
Differentiate between physical and chemical methods used to control m.pdflibowskymcinnisell69
 
Describe the complexities stemming from U. S.-based companies operat.pdf
Describe the complexities stemming from U. S.-based companies operat.pdfDescribe the complexities stemming from U. S.-based companies operat.pdf
Describe the complexities stemming from U. S.-based companies operat.pdflibowskymcinnisell69
 
An elevator starts with five passengers and stops on eight floors. I.pdf
An elevator starts with five passengers and stops on eight floors. I.pdfAn elevator starts with five passengers and stops on eight floors. I.pdf
An elevator starts with five passengers and stops on eight floors. I.pdflibowskymcinnisell69
 
Write a recursive function to print portion of a linked list in r.pdf
Write a recursive function to print portion of a linked list in r.pdfWrite a recursive function to print portion of a linked list in r.pdf
Write a recursive function to print portion of a linked list in r.pdflibowskymcinnisell69
 
Why might a transposon screen for genes required for virulence in a .pdf
Why might a transposon screen for genes required for virulence in a .pdfWhy might a transposon screen for genes required for virulence in a .pdf
Why might a transposon screen for genes required for virulence in a .pdflibowskymcinnisell69
 
Why does salt dissolve in waterThe positive charges of sodium (Na.pdf
Why does salt dissolve in waterThe positive charges of sodium (Na.pdfWhy does salt dissolve in waterThe positive charges of sodium (Na.pdf
Why does salt dissolve in waterThe positive charges of sodium (Na.pdflibowskymcinnisell69
 
Which of the terms below is most appropriate for describing the natu.pdf
Which of the terms below is most appropriate for describing the natu.pdfWhich of the terms below is most appropriate for describing the natu.pdf
Which of the terms below is most appropriate for describing the natu.pdflibowskymcinnisell69
 
What was the type of donor cell if the recipient genotype changes bu.pdf
What was the type of donor cell if the recipient genotype changes bu.pdfWhat was the type of donor cell if the recipient genotype changes bu.pdf
What was the type of donor cell if the recipient genotype changes bu.pdflibowskymcinnisell69
 
What is evolution What is it when we say the theory of evolution.pdf
What is evolution What is it when we say the theory of evolution.pdfWhat is evolution What is it when we say the theory of evolution.pdf
What is evolution What is it when we say the theory of evolution.pdflibowskymcinnisell69
 

More from libowskymcinnisell69 (20)

On this image, please label all marked structures Definedescribe t.pdf
On this image, please label all marked structures  Definedescribe t.pdfOn this image, please label all marked structures  Definedescribe t.pdf
On this image, please label all marked structures Definedescribe t.pdf
 
Meniere’s disease - named for its discoverer, the nineteenth-century.pdf
Meniere’s disease - named for its discoverer, the nineteenth-century.pdfMeniere’s disease - named for its discoverer, the nineteenth-century.pdf
Meniere’s disease - named for its discoverer, the nineteenth-century.pdf
 
Iodine serves as a mordant in the Gram stain procedure. What is the .pdf
Iodine serves as a mordant in the Gram stain procedure. What is the .pdfIodine serves as a mordant in the Gram stain procedure. What is the .pdf
Iodine serves as a mordant in the Gram stain procedure. What is the .pdf
 
In the days before refrigeration, a common practice to preserve me.pdf
In the days before refrigeration, a common practice to preserve me.pdfIn the days before refrigeration, a common practice to preserve me.pdf
In the days before refrigeration, a common practice to preserve me.pdf
 
In a typical organization, databases and communications technology a.pdf
In a typical organization, databases and communications technology a.pdfIn a typical organization, databases and communications technology a.pdf
In a typical organization, databases and communications technology a.pdf
 
in JAVA Jagged Array recall that in Java 2D arrays are jagged in t.pdf
in JAVA Jagged Array recall that in Java 2D arrays are jagged in t.pdfin JAVA Jagged Array recall that in Java 2D arrays are jagged in t.pdf
in JAVA Jagged Array recall that in Java 2D arrays are jagged in t.pdf
 
If the elasticity of ethyl alcohol and water are 1.0610^9 Pa and 2.1.pdf
If the elasticity of ethyl alcohol and water are 1.0610^9 Pa and 2.1.pdfIf the elasticity of ethyl alcohol and water are 1.0610^9 Pa and 2.1.pdf
If the elasticity of ethyl alcohol and water are 1.0610^9 Pa and 2.1.pdf
 
Hi there! Im having trouble answering these tow questions could yo.pdf
Hi there! Im having trouble answering these tow questions could yo.pdfHi there! Im having trouble answering these tow questions could yo.pdf
Hi there! Im having trouble answering these tow questions could yo.pdf
 
For graph to the right Amplitude Midline Period Equation using.pdf
For graph to the right  Amplitude  Midline  Period  Equation using.pdfFor graph to the right  Amplitude  Midline  Period  Equation using.pdf
For graph to the right Amplitude Midline Period Equation using.pdf
 
Explain what exactly is going on with this picture. SolutionIn.pdf
Explain what exactly is going on with this picture.  SolutionIn.pdfExplain what exactly is going on with this picture.  SolutionIn.pdf
Explain what exactly is going on with this picture. SolutionIn.pdf
 
Do you agree that rich countries have systematically impoverished lo.pdf
Do you agree that rich countries have systematically impoverished lo.pdfDo you agree that rich countries have systematically impoverished lo.pdf
Do you agree that rich countries have systematically impoverished lo.pdf
 
Differentiate between physical and chemical methods used to control m.pdf
Differentiate between physical and chemical methods used to control m.pdfDifferentiate between physical and chemical methods used to control m.pdf
Differentiate between physical and chemical methods used to control m.pdf
 
Describe the complexities stemming from U. S.-based companies operat.pdf
Describe the complexities stemming from U. S.-based companies operat.pdfDescribe the complexities stemming from U. S.-based companies operat.pdf
Describe the complexities stemming from U. S.-based companies operat.pdf
 
An elevator starts with five passengers and stops on eight floors. I.pdf
An elevator starts with five passengers and stops on eight floors. I.pdfAn elevator starts with five passengers and stops on eight floors. I.pdf
An elevator starts with five passengers and stops on eight floors. I.pdf
 
Write a recursive function to print portion of a linked list in r.pdf
Write a recursive function to print portion of a linked list in r.pdfWrite a recursive function to print portion of a linked list in r.pdf
Write a recursive function to print portion of a linked list in r.pdf
 
Why might a transposon screen for genes required for virulence in a .pdf
Why might a transposon screen for genes required for virulence in a .pdfWhy might a transposon screen for genes required for virulence in a .pdf
Why might a transposon screen for genes required for virulence in a .pdf
 
Why does salt dissolve in waterThe positive charges of sodium (Na.pdf
Why does salt dissolve in waterThe positive charges of sodium (Na.pdfWhy does salt dissolve in waterThe positive charges of sodium (Na.pdf
Why does salt dissolve in waterThe positive charges of sodium (Na.pdf
 
Which of the terms below is most appropriate for describing the natu.pdf
Which of the terms below is most appropriate for describing the natu.pdfWhich of the terms below is most appropriate for describing the natu.pdf
Which of the terms below is most appropriate for describing the natu.pdf
 
What was the type of donor cell if the recipient genotype changes bu.pdf
What was the type of donor cell if the recipient genotype changes bu.pdfWhat was the type of donor cell if the recipient genotype changes bu.pdf
What was the type of donor cell if the recipient genotype changes bu.pdf
 
What is evolution What is it when we say the theory of evolution.pdf
What is evolution What is it when we say the theory of evolution.pdfWhat is evolution What is it when we say the theory of evolution.pdf
What is evolution What is it when we say the theory of evolution.pdf
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Some ethicists argue that the very conduct that results in resistanc.pdf

  • 1. Some ethicists argue that the very conduct that results in resistance from participants—interference, invasiveness in their lives, denial of privacy rights—has encouraged researchers to investigate topics online that have long been the principal commodity of offline investigation. The novelty and convenience of communicating by computer has led researchers to cyberspace in search of abundant sources of data. Whether we call it the “wired society,” “digital life,” “computer-mediated communication,” or “cyberculture,” the growth of cyberstudies causes us to question how we gather data online, deal with participants, and present results. In a special ethics issue of Information Society, scholars involved in cyberspace research concluded: All participants agree that research in cyberspace provides no special dispensation to ignore ethical precepts. Researchers are obligated to protect human subjects and “do right” in electronic venues as in more conventional ones. Second, each participant recognizes that cyberspace poses complex ethical issues that may lack exact analogs in other types of inquiry. The ease of covert observation, the occasional blurry distinction between public and private venues, and the difficulty of obtaining the informed consent of subjects make cyber-research particularly vulnerable to ethical breaches by even the most scrupulous scholars. Third, all recognize that because research procedures or activities may be permissible or not precluded by law or policy, it does not follow that they are necessarily ethical or allowable. Fourth, all agree that the individual researcher has the ultimate responsibility for assuring that inquiry is not only done honestly, but done with ethical integrity.7 Issues relating to cyberspace in research also relate to data mining. The information collection devices available today were once the tools of the spy, the science fiction protagonist, or the superhero. Smart cards, biometrics (finger printing, retinal scans, facial recognition), electronic monitoring (closed circuit television, digital camera monitoring), global surveillance, and genetic identification (DNA) are just some of the technological tools being used by today’s organizations to track and understand employees, customers, and suppliers. The data mining of all this information, collected from advanced and not necessarily obvious sources, offers infinite possibilities for research abuse. show your reaction to that, how it can damage and can be destructive to a research, how it can be destructive to research results, how it can be destructive to the name of the researcher, etc. Is there any positive side that you see in that ethical matter? Write your assignment based on what was just explained. Your assignment will be a large paragraph to a maximum of one page Solution
  • 2. A cyber event can be instigated either from external parties (remote, unauthorized access) or by insider misuse: Resulting in theft, disruption and/or damage to data and intellectual property, as well as to physical property: Financially, cyber attacks result in multiple costs, including customer/third-party liabilities and lost revenues (direct and from subsequent reputational damage), notification costs, fines and penalties, legal fees, repair/reinstatement costs for data and physical property and increased costs of working, e.g. for crisis management and public relations.