SlideShare a Scribd company logo
1. 1. Ethical Dilemma/Issues in the Cyberworld "[To] do this to the right person, to the right
extent, at the right time, with the right motive, and in the right way, that is not for everyone
nor is it easy; wherefore goodness is both rare and laudable and noble."(Aristotle, Ethics II.9)
Ethical dilemma is a complex situation that will often involve an apparent mental conflict
between moral imperatives, in which to obey one would result in transgressing another. This
is also called an ethical paradoxsince in moral philosophy, paradoxplays a central role in
ethics debates. Ethical dilemmas... An ethical dilemma emerges in a context of conflict
between at least two goods(values) which require different responses. Ethical Dilemmas: 1. I
n v a s i o n o f P r i v a c y The wrongful intrusion into a person's private activities by other
individuals or by the government. Tort law protects one's private affairs with which the public
has no concern against unwarranted exploitation or publicity that causes mental suffering or
humiliation to the average person. The right to be left alone is not always superior to the
rights of the public and it may or may not exist or may exist to a lesser degree with regard to
the life of a public figure, such as a politician or other person in whom the public has a
rightful interest. The right to personal privacy is encompassed as an aspect of liberty
protected against government interference by the Constitution's duep r o c e s s c l a u s e .
2. T h e f t In common usage, theft is the taking of another person's property without that
person's permission or consent with the intent to deprive the rightful owner of it. The word is
also used as an informal shorthand term for some crimes against property, such asburglary,
embezzlement, larceny, looting, robbery, shoplifting, library theft and fraud. In some
jurisdictions, theft is considered to be synonymous with larceny; in others, theft has replaced
larceny. Someone who carries out an act of or makes a career of theft is known as a thief.
The act of theft is known by terms such as stealing, thieving,wicksing, and filching. 3.
Hacking The word "hacking" has two definitions. The first definition refers to the
hobby/profession of working with computers. The second definition refers to breaking into
computer systems. While the first definition is older and is still used by many computer
enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more
commonly used. In particular, the web pages here refer to "hackers" simply because our
web-server logs show that every one who reaches these pages are using the second
definition as part of their search criteria. 4. S e c u r i t y Computer security (Also known as
cybersecurity or IT Security) is information security as applied to computers and networks.
The field covers all the processes and mechanisms by which computer-based equipment,
information and services are protected from unintended or unauthorized access, change or
destruction. Computer security also includes protection from unplanned events and natural
disasters. 5. C o p y r i g h t i n f r i n g e m e n t Copyright infringement (or copyright
violation) is the unauthorized or prohibited use of works covered by copyright law, in a way
that violates one of the copyright owner's exclusive rights, such as the right to reproduce or
perform the copyrighted work, or to make derivative works. For electronic and audio-visual
media, unauthorized reproduction and distribution is also commonly referred to as pirac y 6.
U n f a i r c o m p e t i t i o n A branch of intellectual property law, unfair competition is a term
applied to all dishonest or fraudulent rivalry in trade and commerce. This term is particularly
applied to the practice of endeavoring to substitute one’s own goods or products in the
market for those of another for the purpose of deceiving the public.
2. 2. 7. V i r u s A computer virus is a type of malware that, when executed, replicates by
inserting copies of itself (possibly modified) into other computer programs, data files, or the
boot sector of the hard drive; when this replication succeeds, the affected areas are then
said to be "infected". Viruses often perform some type of harmful activity on infected hosts,
such as stealing hard disk space or CPU time, accessing private information, corrupting
data, displaying political or humorous messages on the user's screen, spamming their
contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or
attempt to hide themselves—the defining characteristic of viruses is that they are self-
replicating computer programs which install themselves without the user's consent. 8. V i d e
o c o n f e r e n c i n g Videoconferencing is the conduct of a videoconference (also known as
a video conference or videoteleconference) by a set of telecommunication technologies
which allow two or more locations to communicate by simultaneous two-way video and audio
transmissions. It has also been called 'visual collaboration' and is a type of groupware. 9. P i
r a c y Cyber piracy involves various deceptive practices that companies or individuals
engage in to profit from online users. Within the legal aid community, these deceptive
practices result in confusion for the public (particularly clients and potential clients) as well as
take advantage of the good-will and reputation of legal aid organizations. Without a system
to address cyber piracy, legal aid programs risk the chance that the public, especially
unsophisticated online users, will not reach legitimate legal aid website and will be confused
and possibly extorted on websites posing as legal aid. 10. O n l i n e Defamation Generally,
defamation is a false and unprivileged statement of fact that is harmful to someone's
reputation, and published "with fault," meaning as a result of negligence or malice. State
laws often define defamation in specific ways. Libel is a written defamation; slander is a
spoken defamation. 11. F r a u d The definition of what constitutes computer fraud becomes
ever more complex with the ingenuity of people who intend to deceive, misrepresent,
destroy, steal information, or cause harm to others by accessing information through
deceptive and illegal means. Just as individuals have to be careful when they are walking
down the street or in their homes when they lock the doors at night, they need to be careful
of the many examples of fraud that will make their way onto their computers.

More Related Content

What's hot

80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
skimkiper
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq Ramadani
RiziqRamadani
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
Yogesh Pandit
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
kannanchirayath
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
Don Edwards
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalGraham Smith
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
Jyrki Kasvi
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
ITM UNIVERSITY, RAIPUR- SCHOOL OF LAW
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
n|u - The Open Security Community
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber law
Cyber lawCyber law
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
gagan deep
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
cyb1337
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
- Mark - Fullbright
 
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
International Islamic University Malaysia
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
jwilso
 

What's hot (20)

80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq Ramadani
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Power and Leverage in the XXI Century
Power and Leverage in the XXI CenturyPower and Leverage in the XXI Century
Power and Leverage in the XXI Century
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 

Viewers also liked

Dia Awa Rainforest and the Thirst for Resources
Dia Awa Rainforest and the Thirst for Resources Dia Awa Rainforest and the Thirst for Resources
Dia Awa Rainforest and the Thirst for Resources
Alejandro Zapata
 
Legea cu privire la mediere
Legea cu privire la mediereLegea cu privire la mediere
Legea cu privire la mediere
Ion Cirtica
 
Apresentação trabalho sincult 2015 salvador
Apresentação trabalho sincult 2015 salvadorApresentação trabalho sincult 2015 salvador
Apresentação trabalho sincult 2015 salvador
Vera Lúcia Vieira (Vera Vernareccia)
 
Olwen Williams 2016email
Olwen Williams 2016emailOlwen Williams 2016email
Olwen Williams 2016emailolwen williams
 
טרמינל 3 - חניון 25
טרמינל 3 - חניון 25טרמינל 3 - חניון 25
טרמינל 3 - חניון 25
Tsur Shaham
 
Phrases ppt
Phrases pptPhrases ppt
Phrases ppt
Chariya Athan
 
Steve Morrow Supply Chain Resume
Steve Morrow Supply Chain ResumeSteve Morrow Supply Chain Resume
Steve Morrow Supply Chain ResumeSteve Morrow
 
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
sanaullah noonari
 

Viewers also liked (10)

CompTIA Sec+
CompTIA Sec+CompTIA Sec+
CompTIA Sec+
 
Dia Awa Rainforest and the Thirst for Resources
Dia Awa Rainforest and the Thirst for Resources Dia Awa Rainforest and the Thirst for Resources
Dia Awa Rainforest and the Thirst for Resources
 
Legea cu privire la mediere
Legea cu privire la mediereLegea cu privire la mediere
Legea cu privire la mediere
 
Apresentação trabalho sincult 2015 salvador
Apresentação trabalho sincult 2015 salvadorApresentação trabalho sincult 2015 salvador
Apresentação trabalho sincult 2015 salvador
 
Olwen Williams 2016email
Olwen Williams 2016emailOlwen Williams 2016email
Olwen Williams 2016email
 
טרמינל 3 - חניון 25
טרמינל 3 - חניון 25טרמינל 3 - חניון 25
טרמינל 3 - חניון 25
 
Phrases ppt
Phrases pptPhrases ppt
Phrases ppt
 
Daltons Resume
Daltons ResumeDaltons Resume
Daltons Resume
 
Steve Morrow Supply Chain Resume
Steve Morrow Supply Chain ResumeSteve Morrow Supply Chain Resume
Steve Morrow Supply Chain Resume
 
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
Impact of Microcredit on Agricultural Development in DistrictMastung Balochis...
 

Similar to Ethical dilemma

Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
Amae OlFato
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mukul Kumar
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology Presentatiopdf
DesireDelosSantos
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
chrixymae
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
Agustina
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Jevaughan Edie
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Yash Kothari
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx

Similar to Ethical dilemma (20)

Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Ethical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology PresentatiopdfEthical Issue Digital Age Technology Presentatiopdf
Ethical Issue Digital Age Technology Presentatiopdf
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 

Recently uploaded

Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 

Recently uploaded (20)

Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 

Ethical dilemma

  • 1. 1. 1. Ethical Dilemma/Issues in the Cyberworld "[To] do this to the right person, to the right extent, at the right time, with the right motive, and in the right way, that is not for everyone nor is it easy; wherefore goodness is both rare and laudable and noble."(Aristotle, Ethics II.9) Ethical dilemma is a complex situation that will often involve an apparent mental conflict between moral imperatives, in which to obey one would result in transgressing another. This is also called an ethical paradoxsince in moral philosophy, paradoxplays a central role in ethics debates. Ethical dilemmas... An ethical dilemma emerges in a context of conflict between at least two goods(values) which require different responses. Ethical Dilemmas: 1. I n v a s i o n o f P r i v a c y The wrongful intrusion into a person's private activities by other individuals or by the government. Tort law protects one's private affairs with which the public has no concern against unwarranted exploitation or publicity that causes mental suffering or humiliation to the average person. The right to be left alone is not always superior to the rights of the public and it may or may not exist or may exist to a lesser degree with regard to the life of a public figure, such as a politician or other person in whom the public has a rightful interest. The right to personal privacy is encompassed as an aspect of liberty protected against government interference by the Constitution's duep r o c e s s c l a u s e . 2. T h e f t In common usage, theft is the taking of another person's property without that person's permission or consent with the intent to deprive the rightful owner of it. The word is also used as an informal shorthand term for some crimes against property, such asburglary, embezzlement, larceny, looting, robbery, shoplifting, library theft and fraud. In some jurisdictions, theft is considered to be synonymous with larceny; in others, theft has replaced larceny. Someone who carries out an act of or makes a career of theft is known as a thief. The act of theft is known by terms such as stealing, thieving,wicksing, and filching. 3. Hacking The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used. In particular, the web pages here refer to "hackers" simply because our web-server logs show that every one who reaches these pages are using the second definition as part of their search criteria. 4. S e c u r i t y Computer security (Also known as cybersecurity or IT Security) is information security as applied to computers and networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. 5. C o p y r i g h t i n f r i n g e m e n t Copyright infringement (or copyright violation) is the unauthorized or prohibited use of works covered by copyright law, in a way that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. For electronic and audio-visual media, unauthorized reproduction and distribution is also commonly referred to as pirac y 6. U n f a i r c o m p e t i t i o n A branch of intellectual property law, unfair competition is a term applied to all dishonest or fraudulent rivalry in trade and commerce. This term is particularly applied to the practice of endeavoring to substitute one’s own goods or products in the market for those of another for the purpose of deceiving the public. 2. 2. 7. V i r u s A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self- replicating computer programs which install themselves without the user's consent. 8. V i d e o c o n f e r e n c i n g Videoconferencing is the conduct of a videoconference (also known as
  • 2. a video conference or videoteleconference) by a set of telecommunication technologies which allow two or more locations to communicate by simultaneous two-way video and audio transmissions. It has also been called 'visual collaboration' and is a type of groupware. 9. P i r a c y Cyber piracy involves various deceptive practices that companies or individuals engage in to profit from online users. Within the legal aid community, these deceptive practices result in confusion for the public (particularly clients and potential clients) as well as take advantage of the good-will and reputation of legal aid organizations. Without a system to address cyber piracy, legal aid programs risk the chance that the public, especially unsophisticated online users, will not reach legitimate legal aid website and will be confused and possibly extorted on websites posing as legal aid. 10. O n l i n e Defamation Generally, defamation is a false and unprivileged statement of fact that is harmful to someone's reputation, and published "with fault," meaning as a result of negligence or malice. State laws often define defamation in specific ways. Libel is a written defamation; slander is a spoken defamation. 11. F r a u d The definition of what constitutes computer fraud becomes ever more complex with the ingenuity of people who intend to deceive, misrepresent, destroy, steal information, or cause harm to others by accessing information through deceptive and illegal means. Just as individuals have to be careful when they are walking down the street or in their homes when they lock the doors at night, they need to be careful of the many examples of fraud that will make their way onto their computers.