SlideShare a Scribd company logo
1 of 22
ETHICAL DILEMMAS/ ISSUES IN 
CYBERWORLD
 Ethical dilemma is a complex situation that will often involve an apparent 
mental conflict between moral imperatives, in which to obey one would 
result in transgressing another. 
 also called an ethical paradox.
- occurs when there is an intrusion upon your reasonable 
expectation to be left alone.
 Intrusion of Solitude 
 Appropriation of Name or Likeness 
 Public Disclosure of Private Facts 
 False Light
Intrusion of Solitude 
 This type of invasion of privacy is commonly associated with 
"peeping Toms," someone illegally intercepting private phone 
calls, or snooping through someone's private records.
 occurs when someone uses the name or likeness of another for 
their own benefit.
Public disclosure of private facts 
 occurs when someone publishes hurtful, embarrassing or offensive facts 
about a person's private life
False Light 
 arises anytime you unflatteringly portray - in words or pictures- a 
person as something that he or she is not.
HACKING 
The word “hacking” has two definitions. 
the first definition refers to the 
hobby/profession of working with 
computers. 
the second definition refers to breaking into 
computer systems. 
In the Web site wisegeek.com they defines computer "hacking" as 
"the practice of modifying computer hardware and software to 
accomplish a goal outside of the creator's original purpose. "
There are three category of hackers: 
Hacktivists - those who hack as a form of political 
activism. 
Hobbyist hackers - those who hack to learn, for fun or 
to share with other hobbyists. 
Research and Security Hackers - those concerned with discovering 
security vulnerabilities and writing the code fixes.
Ethical Theories of 
HACKING 
ETHICAL QUESTIONS 
From a Utilitarian Perspective 
From a Rights Perspective 
From Fairness or Justice Perspective 
From a Common Good Perspective 
From a Virtue Perspective
 Is there any information that should really be kept secret? 
 How do we balance the need for transparency with the need to protect ourselves, 
for example, from groups who do not believe in transparency and other democratic 
values? 
 Do we trust the ability of hackers to balance out the good and the harm that may 
result from their disclosures? 
 Do we trust governments or corporations more, when it comes to striking that 
balance? 
From a Utilitarian Perspective
From a Rights Perspective 
• Do all of us have an absolute right to access all the information available on the 
Internet? 
• Do we have a right to communicate and associate freely? 
• And, if so, does hacking promote freedom of speech and of association by breaking 
barriers set up around certain information? 
• Should hacking be seen as a way of critiquing a system in order 
to reform it, somewhat similar to parody?
From Fairness or Justice Perspective 
• Does hacking then make Internet use more fair, by allowing to any user 
access to information that would otherwise be available only to some? 
• Or is hacking an unjust takeover of information from those who don't 
have the know-how or resources to protect it?
From a Common Good Perspective 
• Is unrestricted access to information one path to individual and 
communal fulfillment? 
• Or does hacking undermine the usefulness of the Internet as a 
common good because it makes users reluctant to share information 
online? 
• Overall, does hacking promote or hinder the development of 
relationships and the building of community?
From a Virtue Perspective 
• Are hackers pushing individuals to become more virtuous users of the 
Internet—or are they mostly tearing down what others have built, and 
ultimately limiting the usefulness of the Internet? 
• Does hacking promote the development of ethical character?
SECURITY 
 Security as a form of protection are structures and processes that provide 
or improve security as a condition. 
Information security (IS) is designed to protect the confidentiality, 
integrity and availability of computer system data from those with 
malicious intentions.
C-I-A 
Confidentiality - protecting information from being 
disclosed to unauthorized parties. 
Integrity - protecting information from being changed by 
unauthorized parties. 
Availability - to the availability of information to 
authorized parties only when requested.
MEASURES TO PROTECT COMPUTER SECURITY 
• Restricting access both to the hardware locations (physical 
access) and into the system itself (over the network) using 
firewalls 
• Implementing a plan to prevent break-ins 
• Changing passwords frequently 
• Making backup copies 
• Using anti-virus software 
• Encrypting data to frustrate interception 
• Anticipating disasters (disaster recovery plan) 
• Hiring trustworthy employees
THEFT 
(Identity Theft) 
 it happens when someone steals your personal information 
and uses it without your permission 
 a serious crime 
 can disrupt your finances, credit history, and reputation 
 take time, money, and patience to resolve.
OCCURS BY: 
 Stealing your wallets and purses containing identification cards, credit 
cards and bank information. 
 Stealing your mail including credit and bank statements, phone or utility 
bills, new checks, and tax information. 
 Completing a “change of address form” to redirect the destination of 
your mail. 
 Rummaging through your trash for discarded personal data in a practice 
known as “dumpster diving.” 
 Taking personal information that you share or post on the Internet.
PREVENTION 
1. Use passwords on all your credit card, bank, and phone accounts. 
2. Never keep passwords, “PINs” or your SSN card in your wallet or purse. 
3. Learn about security procedures in your workplace. 
4. Never give out personal information on the phone, through mail, or over 
the internet unless you know the receiver and have initiated the contact. 
5. Guard your mail and trash from theft. 
6. Shred or destroy discarded financial statements in your trash. 
7. Give your SSN only when absolutely necessary. 
8. Keep your purse or wallet in a safe place at work.

More Related Content

What's hot

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and securityAwais Haider
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protectionsajeena81
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 

What's hot (20)

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security
Information securityInformation security
Information security
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 

Viewers also liked

Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Ethical dilemmas presentation
Ethical dilemmas presentationEthical dilemmas presentation
Ethical dilemmas presentationmansine
 
Ethical Dilemma
Ethical DilemmaEthical Dilemma
Ethical Dilemmapurval
 
Ethical Decision Making Process
Ethical Decision Making ProcessEthical Decision Making Process
Ethical Decision Making ProcessCoky Fauzi Alfi
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Ethical dilemma outline.show
Ethical dilemma outline.showEthical dilemma outline.show
Ethical dilemma outline.showMedgine Ascencio
 
Role of IPR in creativity and knowledge economy vinay & kathir
Role of IPR in creativity and knowledge economy   vinay & kathirRole of IPR in creativity and knowledge economy   vinay & kathir
Role of IPR in creativity and knowledge economy vinay & kathirVinay Prajapati
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesAysha Rahman
 
Introduction to Data-Oriented Design
Introduction to Data-Oriented DesignIntroduction to Data-Oriented Design
Introduction to Data-Oriented DesignIT Weekend
 
Ethical group presentation final
Ethical group presentation  finalEthical group presentation  final
Ethical group presentation finalpoindexk
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom SectorSagar Patekar
 
Working Through Ethical Dilemmas: When the Deciding Gets Tough
Working Through Ethical Dilemmas: When the Deciding Gets ToughWorking Through Ethical Dilemmas: When the Deciding Gets Tough
Working Through Ethical Dilemmas: When the Deciding Gets ToughBarry Casey
 
Model for Ethical Dilemmas
Model for Ethical DilemmasModel for Ethical Dilemmas
Model for Ethical Dilemmasfdaniel1
 

Viewers also liked (20)

Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethical dilemmas presentation
Ethical dilemmas presentationEthical dilemmas presentation
Ethical dilemmas presentation
 
Cs106 professional-ethics
Cs106 professional-ethicsCs106 professional-ethics
Cs106 professional-ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethical Dilemma
Ethical DilemmaEthical Dilemma
Ethical Dilemma
 
Ethical Decision Making Process
Ethical Decision Making ProcessEthical Decision Making Process
Ethical Decision Making Process
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Ethical dilemma outline.show
Ethical dilemma outline.showEthical dilemma outline.show
Ethical dilemma outline.show
 
Role of IPR in creativity and knowledge economy vinay & kathir
Role of IPR in creativity and knowledge economy   vinay & kathirRole of IPR in creativity and knowledge economy   vinay & kathir
Role of IPR in creativity and knowledge economy vinay & kathir
 
Ethics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage ratesEthics on hiring Chinese labors at cheaper wage rates
Ethics on hiring Chinese labors at cheaper wage rates
 
Introduction to Data-Oriented Design
Introduction to Data-Oriented DesignIntroduction to Data-Oriented Design
Introduction to Data-Oriented Design
 
Ethical group presentation final
Ethical group presentation  finalEthical group presentation  final
Ethical group presentation final
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
ETHICAL DILEMMA
ETHICAL DILEMMA ETHICAL DILEMMA
ETHICAL DILEMMA
 
Working Through Ethical Dilemmas: When the Deciding Gets Tough
Working Through Ethical Dilemmas: When the Deciding Gets ToughWorking Through Ethical Dilemmas: When the Deciding Gets Tough
Working Through Ethical Dilemmas: When the Deciding Gets Tough
 
Model for Ethical Dilemmas
Model for Ethical DilemmasModel for Ethical Dilemmas
Model for Ethical Dilemmas
 

Similar to Ethical Dilemmas/Issues in CyberWorld

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptxMouradAKenk
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 

Similar to Ethical Dilemmas/Issues in CyberWorld (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
E commerce
E commerce E commerce
E commerce
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Users guide
Users guideUsers guide
Users guide
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 

More from Rownel Cerezo Gagani

Pope Francis is Coming to the Philippines
Pope Francis is Coming to the PhilippinesPope Francis is Coming to the Philippines
Pope Francis is Coming to the PhilippinesRownel Cerezo Gagani
 
Trophic Levels, Bioenergetics, Chemical Energy and ATP
Trophic Levels, Bioenergetics, Chemical Energy and ATPTrophic Levels, Bioenergetics, Chemical Energy and ATP
Trophic Levels, Bioenergetics, Chemical Energy and ATPRownel Cerezo Gagani
 
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga FilipinaKabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga FilipinaRownel Cerezo Gagani
 
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga FilipinaKabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga FilipinaRownel Cerezo Gagani
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 

More from Rownel Cerezo Gagani (8)

Pope Francis is Coming to the Philippines
Pope Francis is Coming to the PhilippinesPope Francis is Coming to the Philippines
Pope Francis is Coming to the Philippines
 
Trophic Levels, Bioenergetics, Chemical Energy and ATP
Trophic Levels, Bioenergetics, Chemical Energy and ATPTrophic Levels, Bioenergetics, Chemical Energy and ATP
Trophic Levels, Bioenergetics, Chemical Energy and ATP
 
Online shopping
Online shoppingOnline shopping
Online shopping
 
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga FilipinaKabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
Kabanata 21 Ang pangalawang Pag uwi at pagtatatag ng la Liga Filipina
 
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga FilipinaKabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
Kabanata 21- Ang pangalawang pag-uwi at ang La Liga Filipina
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
World literature (mao zedong)
World literature (mao zedong)World literature (mao zedong)
World literature (mao zedong)
 
Mencius (Meng Tzu)
Mencius (Meng Tzu)Mencius (Meng Tzu)
Mencius (Meng Tzu)
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

Ethical Dilemmas/Issues in CyberWorld

  • 1. ETHICAL DILEMMAS/ ISSUES IN CYBERWORLD
  • 2.  Ethical dilemma is a complex situation that will often involve an apparent mental conflict between moral imperatives, in which to obey one would result in transgressing another.  also called an ethical paradox.
  • 3. - occurs when there is an intrusion upon your reasonable expectation to be left alone.
  • 4.  Intrusion of Solitude  Appropriation of Name or Likeness  Public Disclosure of Private Facts  False Light
  • 5. Intrusion of Solitude  This type of invasion of privacy is commonly associated with "peeping Toms," someone illegally intercepting private phone calls, or snooping through someone's private records.
  • 6.  occurs when someone uses the name or likeness of another for their own benefit.
  • 7. Public disclosure of private facts  occurs when someone publishes hurtful, embarrassing or offensive facts about a person's private life
  • 8. False Light  arises anytime you unflatteringly portray - in words or pictures- a person as something that he or she is not.
  • 9. HACKING The word “hacking” has two definitions. the first definition refers to the hobby/profession of working with computers. the second definition refers to breaking into computer systems. In the Web site wisegeek.com they defines computer "hacking" as "the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. "
  • 10. There are three category of hackers: Hacktivists - those who hack as a form of political activism. Hobbyist hackers - those who hack to learn, for fun or to share with other hobbyists. Research and Security Hackers - those concerned with discovering security vulnerabilities and writing the code fixes.
  • 11. Ethical Theories of HACKING ETHICAL QUESTIONS From a Utilitarian Perspective From a Rights Perspective From Fairness or Justice Perspective From a Common Good Perspective From a Virtue Perspective
  • 12.  Is there any information that should really be kept secret?  How do we balance the need for transparency with the need to protect ourselves, for example, from groups who do not believe in transparency and other democratic values?  Do we trust the ability of hackers to balance out the good and the harm that may result from their disclosures?  Do we trust governments or corporations more, when it comes to striking that balance? From a Utilitarian Perspective
  • 13. From a Rights Perspective • Do all of us have an absolute right to access all the information available on the Internet? • Do we have a right to communicate and associate freely? • And, if so, does hacking promote freedom of speech and of association by breaking barriers set up around certain information? • Should hacking be seen as a way of critiquing a system in order to reform it, somewhat similar to parody?
  • 14. From Fairness or Justice Perspective • Does hacking then make Internet use more fair, by allowing to any user access to information that would otherwise be available only to some? • Or is hacking an unjust takeover of information from those who don't have the know-how or resources to protect it?
  • 15. From a Common Good Perspective • Is unrestricted access to information one path to individual and communal fulfillment? • Or does hacking undermine the usefulness of the Internet as a common good because it makes users reluctant to share information online? • Overall, does hacking promote or hinder the development of relationships and the building of community?
  • 16. From a Virtue Perspective • Are hackers pushing individuals to become more virtuous users of the Internet—or are they mostly tearing down what others have built, and ultimately limiting the usefulness of the Internet? • Does hacking promote the development of ethical character?
  • 17. SECURITY  Security as a form of protection are structures and processes that provide or improve security as a condition. Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions.
  • 18. C-I-A Confidentiality - protecting information from being disclosed to unauthorized parties. Integrity - protecting information from being changed by unauthorized parties. Availability - to the availability of information to authorized parties only when requested.
  • 19. MEASURES TO PROTECT COMPUTER SECURITY • Restricting access both to the hardware locations (physical access) and into the system itself (over the network) using firewalls • Implementing a plan to prevent break-ins • Changing passwords frequently • Making backup copies • Using anti-virus software • Encrypting data to frustrate interception • Anticipating disasters (disaster recovery plan) • Hiring trustworthy employees
  • 20. THEFT (Identity Theft)  it happens when someone steals your personal information and uses it without your permission  a serious crime  can disrupt your finances, credit history, and reputation  take time, money, and patience to resolve.
  • 21. OCCURS BY:  Stealing your wallets and purses containing identification cards, credit cards and bank information.  Stealing your mail including credit and bank statements, phone or utility bills, new checks, and tax information.  Completing a “change of address form” to redirect the destination of your mail.  Rummaging through your trash for discarded personal data in a practice known as “dumpster diving.”  Taking personal information that you share or post on the Internet.
  • 22. PREVENTION 1. Use passwords on all your credit card, bank, and phone accounts. 2. Never keep passwords, “PINs” or your SSN card in your wallet or purse. 3. Learn about security procedures in your workplace. 4. Never give out personal information on the phone, through mail, or over the internet unless you know the receiver and have initiated the contact. 5. Guard your mail and trash from theft. 6. Shred or destroy discarded financial statements in your trash. 7. Give your SSN only when absolutely necessary. 8. Keep your purse or wallet in a safe place at work.