Hands are shown typing on a backlit keyboard to communicate with a computer

Cyberethics is "a branch of ethics concerned with behavior in an online environment".[1] In another definition, it is the "exploration of the entire range of ethical and moral issues that arise in cyberspace" while cyberspace is understood to be "the electronic worlds made visible by the Internet."[2] For years, various governments have enacted regulations while organizations have defined policies about cyberethics.

Effects of cybercrime

edit

It is complicated to estimate losses due to cybercrime since there are various types of incidents that can be reported, losses vary with different types of incidents and cybercrime is underreported.[3] In 2014, Center for Strategic and International Studies estimated global losses due to cybercrime to be at $400 billion.[4] In 2023, global victim losses were estimated to be $714 billion with 88.5 victims globally (a rate of 1096 per 100 000 people).[3] Another estimate, from late 2022, estimated costs to the global economy in 2023 to be $8 trillion (short-scale).[5] Statista reported estimates of $8.15 trillion (2023), $9.22 trillion (2024) and $10.29 trillion (2025).[6]

In Canada, the Royal Canadian Mountain Police reports that "the number of Canadians reporting cyber-related incidents continues to rise and cybercrime results in $3 billion in economic losses each year".[7]

Privacy

edit

Cyberspace can be used to either "preserve or destroy" the anonymity of individuals.[8] In terms of ethical issues, privacy is claimed to be "often the most discussed".[9]

History

edit

In the late 19th century, the invention of cameras spurred similar ethical debates as the internet does today. During a seminar of Harvard Law Review in 1890, Samuel D. Warren II and Brandeis defined privacy from an ethical and moral point of view to be:

"central to dignity and individuality and boyhood. Privacy is also indispensable to a sense of autonomy—to 'a feeling that there is an area of an individual's life that is totally under his or her control, an area that is free from outside intrusion.' The deprivation of privacy can even endanger a person's health."[10]

Over 100 years later, the internet and proliferation of private data through governments[11] and ecommerce is an area which requires a new round of ethical debate involving a person's privacy.

Privacy can be decomposed to the limitation of others' access to an individual with "three elements of secrecy, anonymity, and solitude."[12] Anonymity refers to the individual's right to protection from undesired attention. Solitude refers to the lack of physical proximity of an individual to others. Secrecy refers to the protection of personalized information from being freely distributed.

Individuals surrender private information when conducting transactions and registering for services. Ethical business practice protects the privacy of their customers by securing information which may contribute to the loss of secrecy, anonymity, and solitude. Credit card information, social security numbers, phone numbers, mothers' maiden names, addresses and phone numbers freely collected and shared over the internet may lead to a loss of Privacy.

Public records search engines and databases are the main culprits contributing to the rise of cybercrime.

Listed below are a few recommendations to restrict online databases from proliferating sensitive personnel information.

  1. Exclude sensitive unique identifiers from database records such as social security numbers, birth dates, hometown and mothers' maiden names.
  2. Exclude phone numbers that are normally unlisted.
  3. Clear provision of a method which allows people to have their names removed from a database.
  4. Banning the reverse social security number lookup services.[13][page needed]

Private collection

edit

Data warehouses are used today to collect and store huge amounts of personal data and consumer transactions. These facilities can preserve large volumes of consumer information for an indefinite amount of time. Some of the key architectures contributing to the erosion of privacy include databases, cookies and spyware.[13][page needed]

Some may argue that data warehouses are supposed to stand alone and be protected. However, the fact is enough personal information can be gathered from corporate websites and social networking sites to initiate a reverse lookup. Therefore, is it not important to address some of the ethical issues regarding how protected data ends up in the public domain?

Identity theft

edit

Seven million Americans fell victim to identity theft in 2002.[14] According to the U.S. Federal Trade Commission, there were 1.1 million cases of identity theft in 2022 and insurance exists against it.[15] As of 2016, it was estimated that identity theft was the most frequent consumer complaint globally for the past fifteen years.[16]

As with other cybercrime, identity theft becomes more prevalent as the number of connected devices as well as the servers that store information keeps growing. The COVID-19 pandemic also provided an opportunity for identity thieves.[16] Another issue is the collection of personal data from devices that users have discarded without a clean up of data. Personal information can be stored in cache, internet history or other temporary files.[17]

Property

edit

Ethical debate has long included the concept of property. This concept has created many clashes in the world of cyberethics. One philosophy of the internet is centered around the freedom of information. The controversy over ownership occurs when the property of information is infringed upon or uncertain.[18]

Intellectual property rights

edit

According to Richard Spinello, a lot of research has been done on intellectual property, not much has been done on fair use.[19]

The ever-increasing speed of the internet and the emergence of compression technology, such as mp3 opened the doors to Peer-to-peer file sharing, a technology that allowed users to anonymously transfer files to each other, previously seen on programs such as Napster or now seen through communications protocol such as BitTorrent. Much of this, however, was copyrighted music and illegal to transfer to other users. Whether it is ethical to transfer copyrighted media is another question.

Proponents of unrestricted file sharing point out how file sharing has given people broader and faster access to media, has increased exposure to new artists, and has reduced the costs of transferring media (including less environmental damage). Supporters of restrictions on file sharing argue that we must protect the income of our artists and other people who work to create our media. This argument is partially answered by pointing to the small proportion of money artists receive from the legitimate sale of media.

A similar debate can be seen over intellectual property rights in respect to software ownership. The two opposing views are for closed source software distributed under restrictive licenses or for free and open source software.[20][page needed] The argument can be made that restrictions are required because companies would not invest weeks and months in development if there were no incentive for revenue generated from sales and licensing fees. A counter argument to this is that standing on shoulders of giants is far cheaper when the giants do not hold IP rights. Some proponents for open source believe that all programs should be available to anyone who wants to study them.

Digital rights management (DRM)

edit

With the introduction of digital rights management software, new issues are raised over whether the subverting of DRM is ethical. Some champion the hackers of DRM as defenders of users' rights, allowing the blind to make audio books of PDFs they receive, allowing people to burn music they have legitimately bought to CD or to transfer it to a new computer. Others see this as nothing but simply a violation of the rights of the intellectual property holders, opening the door to uncompensated use of copyrighted media. Another ethical issue concerning DRMs involves the way these systems could undermine the fair use provisions of the copyright laws. The reason is that these allow content providers to choose who can view or listen to their materials making the discrimination against certain groups possible.[21] In addition, the level of control given to content providers could lead to the invasion of user privacy since the system is able to keep tabs on the personal information and activities of users who access their materials.[22] In the United States, the Digital Millennium Copyright Act (DMCA) reinforces this aspect to DRM technology, particularly in the way the flow of information is controlled by content providers. Programs or any technologies that attempt to circumvent DRM controls are in violation of one of its provisions (Section 1201).[23]

Accessibility, censorship and filtering

edit

Accessibility, censorship and filtering bring up many ethical issues that have several branches in cyberethics. Many questions have arisen which continue to challenge our understanding of privacy, security and our participation in society. Throughout the centuries mechanisms have been constructed in the name of protection and security. Today the applications are in the form of software that filters domains and content so that they may not be easily accessed or obtained without elaborate circumvention or on a personal and business level through free or content-control software.[24] Internet censorship and filtering are used to control or suppress the publishing or accessing of information. The legal issues are similar to offline censorship and filtering. The same arguments that apply to offline censorship and filtering apply to online censorship and filtering; whether people are better off with free access to information or should be protected from what is considered by a governing body as harmful, indecent or illicit. The fear of access by minors drives much of the concern and many online advocate groups have sprung up to raise awareness and of controlling the accessibility of minors to the internet.

Censorship and filtering occurs on small to large scales, whether it be a company restricting their employees' access to cyberspace by blocking certain websites which are deemed as relevant only to personal usage and therefore damaging to productivity or on a larger scale where a government creates large firewalls which censor and filter access to certain information available online frequently from outside their country to their citizens and anyone within their borders. One of the most famous examples of a country controlling access is the Golden Shield Project, also referred to as the Great Firewall of China, a censorship and surveillance project set up and operated by the People's Republic of China. Another instance is the 2000 case of the League Against Racism and Antisemitism (LICRA), French Union of Jewish Students, vs. Yahoo! Inc (USA) and Yahoo! France, where the French Court declared that "access by French Internet users to the auction website containing Nazi objects constituted a contravention of French law and an offence to the 'collective memory' of the country and that the simple act of displaying such objects (e.g. exhibition of uniforms, insignia or emblems resembling those worn or displayed by the Nazis) in France constitutes a violation of the Article R645-1 of the Penal Code and is therefore considered as a threat to internal public order."[25] Since the French judicial ruling many websites must abide by the rules of the countries in which they are accessible.

Freedom of information

edit

Freedom of information, that is the freedom of speech as well as the freedom to seek, obtain and impart information brings up the question of who or what, has the jurisdiction in cyberspace. The right of freedom of information is commonly subject to limitations dependent upon the country, society and culture concerned.

Generally there are three standpoints on the issue as it relates to the internet. First is the argument that the internet is a form of media, put out and accessed by citizens of governments and therefore should be regulated by each individual government within the borders of their respective jurisdictions. Second, is that, "Governments of the Industrial World... have no sovereignty [over the Internet] ... We have no elected government, nor are we likely to have one,... You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear."[26] A third party believes that the internet supersedes all tangible borders such as the borders of countries, authority should be given to an international body since what is legal in one country may be against the law in another.[27]

Digital divide

edit

Digital divide refers to "the uneven distribution of information and communication technologies in society."[28]

The term includes differences on a global scale, differences between socioeconomic groups and differences in terms of political engagement of ICT users. Access to technology as well as its usage are considered. The metaphor became popular in the 1990s after the US agency National Telecommunications and Information Administration published its report “Falling Through the Net: A Survey of the ‘Have Nots’ in Rural and Urban America” in 1995. The report detailed inequalities in the access of Americans to ICTs. Later studies confirmed that "In single nation-states, access to and usage of computer technology was stratified by age, education, ethnicity, race, family structure, gender, income, occupation, and place of residence" while at the global scale, additional factors are added: "gross domestic product, international trade volume, degree of democratization, deregulation of the telecommunications market, density of communication infrastructure, and investments in research and development".[28] The first and second level of the digital divide create another divide, the knowledge divide.[29]page 989

Digital divide is an ethical issue.[30][31] Writing in particular about Africa, Essien Essien even called it an "ethical crisis".[32] Herman Tavani agrees with Jeremy Moss that not having access to the ICT hinders people's access to knowledge as well as to political decision-making and important information and decreases their economic prosperity.[30] As to what can be done by ICT professionals, Tavani mentions the World Wide Web Consortium's Web Accessibility Initiative to improve the use of the Internet by disabled persons and the TEK search engine developed by MIT that enables Internet searching via e-mail. He also notes that software and hardware designers need to think about the unintended consequences of their work.[33]

The gap of access between countries or regions of the world is called the global digital divide.

Sexuality and pornography

edit

Sexuality in terms of sexual orientation, infidelity, sex with or between minors, public display and pornography have always stirred ethical controversy. These issues are reflected online to varying degrees. In terms of its resonance, the historical development of the online pornography industry and user-generated content have been the studied by media academics.[34][page needed] One of the largest cyberethical debates is over the regulation, distribution and accessibility of pornography online. Hardcore pornographic material is generally controlled by governments with laws regarding how old one has to be to obtain it and what forms are acceptable or not. The availability of pornography online calls into question jurisdiction as well as brings up the problem of regulation,[35] in particular over child pornography,[36] which is illegal in most countries, as well as pornography involving violence or animals, which is restricted within most countries.

Gambling

edit

Gambling is often a topic in ethical debate as some view it as inherently wrong and support prohibition or controls while others advocate for no legal restrictions. "Between these extremes lies a multitude of opinions on what types of gambling the government should permit and where it should be allowed to take place. Discussion of gambling forces public policy makers to deal with issues as diverse as addiction, tribal rights, taxation, senior living, professional and college sports, organized crime, neurobiology, suicide, divorce, and religion."[37] Due to its controversy, gambling is either banned or heavily controlled on local or national levels. The accessibility of the internet and its ability to cross geographic-borders have led to illegal online gambling, often offshore operations.[38] Over the years online gambling, both legal and illegal, has grown exponentially which has led to difficulties in regulation. This enormous growth has even called into question by some the ethical place of gambling online.

Ethical considerations in emerging technology

edit

Though it is impossible to predict all potential ethical implications resulting from new or emerging technology, ethical considerations early in the Research and Development (R&D) phases of a system or technology's lifecycle can help ensure the development of technology that adheres to ethical standards. [39][40] Several methodologies, to include frameworks and checklists, have been proposed by researchers for the purpose of conducting ethical impact assessments on developing technology.[39][40][41] The goal of these assessments is to identify potential ethical scenarios prior to deployment and adoption of an emerging technology.[39] The output from these assessments allow for the mitigation of potential ethical risk and ultimately helps to ensure ethical standards are upheld as technology evolves.[42]

edit

The following organizations are of notable interest in cyberethics debates:

See also

edit

References

edit
  1. ^ Blackburn, Ashley; Chen, Irene Linlin; Pfeffer, Rebecca, eds. (2019). "Praface". Emerging trends in cyber ethics and education. Advances in Educational Technologies and Instructional Design (AETID) book series. Hershey, PA: Information Science Reference. pp. xiii. ISBN 978-1-5225-5934-4.
  2. ^ Baird, Robert M.; Ramsower, Reagan Mays; Rosenbaum, Stuart E., eds. (2001). "Introduction". Cyberethics: social & moral issues in the computer age (Nachdr. ed.). Amherst, New York: Prometheus Books. p. 10. ISBN 978-1-57392-790-1.
  3. ^ a b Bischoff, Paul (2021-08-11). "Cybercrime victims lose an estimated $714 billion annually". Comparitech (published 2023-12-05). Retrieved 2024-04-14.
  4. ^ "Net Losses: Estimating the Global Cost of Cybercrime". Center for Strategic and International Studies. 2014-06-05.
  5. ^ Morgan, Steve (2022-10-13). "Cybercrime To Cost The World 8 Trillion Annually In 2023". Cybercrime Magazine. Cybersecurity Ventures. Retrieved 2024-04-14.
  6. ^ Petrosyan, Ani. "Global cybercrime estimated cost 2028". Statista. Retrieved 2024-04-14.
  7. ^ Government of Canada, Royal Canadian Mounted Police (2020-06-10). "Cyber safety | Royal Canadian Mounted Police". www.rcmp-grc.gc.ca. Retrieved 2024-04-14.
  8. ^ Baird, Robert M.; Ramsower, Reagan Mays; Rosenbaum, Stuart E., eds. (2001). "Introduction". Cyberethics: social & moral issues in the computer age (Nachdr. ed.). Amherst, New York: Prometheus Books. p. 11. ISBN 978-1-57392-790-1.
  9. ^ Baird, Robert M.; Ramsower, Reagan Mays; Rosenbaum, Stuart E., eds. (2001). "Introduction". Cyberethics: social & moral issues in the computer age (Nachdr. ed.). Amherst, New York: Prometheus Books. p. 13. ISBN 978-1-57392-790-1.
  10. ^ Warren, Samuel; Brandeis, Louis (February 1998). "Privacy, photography, and the press". Harvard Law Review. 111 (4): 1086–103. doi:10.2307/1342012. JSTOR 1342012.
  11. ^ "Privacy". Electronic Frontier Foundation.
  12. ^ Gavison, Ruth E. (January 1980). "Privacy and the Limits of Law". The Yale Law Journal. 89 (3): 421–71. doi:10.2307/795891. JSTOR 795891. SSRN 2060957.
  13. ^ a b Spinello, Richard (2006). Cyberethics: Morality and Law in Cyberspace (3rd ed.). Sudbury, MA: Jones and Bartlett Publishers. ISBN 0-7637-3783-6.
  14. ^ Latak, Andy (February 2005). "Identity Crisis: To make its players safe the NFL is tackling schemers and scammers". Legal Affairs. Retrieved 2008-05-01.
  15. ^ "Identity Theft Insurance: What It Is And What It Covers – Forbes Advisor". www.forbes.com. Retrieved 2024-02-13.
  16. ^ a b Hummer, Don; Rebovich, Donald J. (2023-03-02). "Identity theft and financial loss". In Hummer, Donald C.; Byrne, James M. (eds.). Handbook on Crime and Technology. Edward Elgar Publishing. pp. 38–39. ISBN 978-1-80088-664-3.
  17. ^ Hummer, Don; Rebovich, Donald J. (2023-03-02). "Identity theft and financial loss". In Hummer, Donald C.; Byrne, James M. (eds.). Handbook on Crime and Technology. Edward Elgar Publishing. pp. 39–40. ISBN 978-1-80088-664-3.
  18. ^ "Intellectual Property Policy and Programs". Computer Crime & Intellectual Property Section. United States Department of Justice. Archived from the original on 15 January 2009.
  19. ^ Spinello, Richard A. (2011). Cyberethics: morality and law in cyberspace (4. ed ed.). Sudbury, Mass: Jones & Bartlett Learning. pp. x. ISBN 978-0-7637-9511-5. {{cite book}}: |edition= has extra text (help)
  20. ^ Freeman, Lee; Peace, Graham (2004). Information Ethics: Privacy and Intellectual Property. Hersey, Pennsylvania: Information Science Publishing. ISBN 1-59140-491-6.
  21. ^ Spinello, Richard (2011). Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones & Bartlett Learning. p. 123. ISBN 9780763795115.
  22. ^ Spinello, Richard A. (2006). Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones & Bartlett Learning. pp. 116. ISBN 9780763737832.
  23. ^ Tavani, Herman (2011). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, Third Edition. Hoboken, NJ: John Wiley & Sons. p. 270. ISBN 9780470509500.
  24. ^ Chanda, A.; Westphal, C.; Raychaudhuri, D. (April 2013). "Content based traffic engineering in software defined information centric networks". 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). pp. 357–362. doi:10.1109/INFCOMW.2013.6970717. ISBN 978-1-4799-0056-5. S2CID 2104031.
  25. ^ Akdeniz, Yaman (November 2001). "Case Analysis of League Against Racism and Antisemitism (LICRA), French Union of Jewish Students, v Yahoo! Inc. (USA), Yahoo France, Tribunal de Grande Instance de Paris (The County Court of Paris), Interim Court Order, 20 November 2000" (PDF). Cyber-Rights & Cyber-Liberties (UK). Archived (PDF) from the original on 5 February 2009. Retrieved 19 August 2017.
  26. ^ Barlow, John Perry (8 February 1996). "A Declaration of the Independence of Cyberspace". Electronic Frontier Foundation.
  27. ^ Clift, Steven (11 July 2001), "[DW] Cross-Broder Jurisdiction over Internet Content/Use", Democracies Online Newswire, The Mail Archive
  28. ^ a b Schweitzer, Eva Johanna (2024-03-03). "Digital divide | Bridging the Gap in Society | Britannica". www.britannica.com. Retrieved 2024-03-08.
  29. ^ Resta, Paul; Laferrière, Thérèse; McLaughlin, Robert; Kouraogo, Assetou (2018), Voogt, Joke; Knezek, Gerald; Christensen, Rhonda; Lai, Kwok-Wing (eds.), "Issues and Challenges Related to Digital Equity: An Overview", Second Handbook of Information Technology in Primary and Secondary Education, Springer International Handbooks of Education, Cham: Springer International Publishing, pp. 987–1004, doi:10.1007/978-3-319-71054-9_67, ISBN 978-3-319-71054-9, retrieved 2024-03-08
  30. ^ a b Tavani, Herman T (2003-01-01). "Ethical reflections on the digital divide". Journal of Information, Communication and Ethics in Society. 1 (2): 102–105. doi:10.1108/14779960380000230. ISSN 1477-996X.
  31. ^ "Smart Information Systems and the Digital Divide".
  32. ^ Essien, Essien D. (2018). Oncioiu, Ionica (ed.). Ethics and Decision-Making for Sustainable Business Practices:. Advances in Business Strategy and Competitive Advantage. IGI Global. p. 74. doi:10.4018/978-1-5225-3773-1.ch005. ISBN 978-1-5225-3773-1.
  33. ^ Tavani, Herman T (2003-05-01). "Ethical reflections on the digital divide". Journal of Information, Communication and Ethics in Society. 1 (2): 105–106. doi:10.1108/14779960380000230. ISSN 1477-996X.
  34. ^ Paasonen, Susanna (2011). Carnal resonance affect and online pornography. Cambridge, MA: MIT Press. ISBN 978-0-262-01631-5.
  35. ^ Summers, Chris (29 April 2008). "When does kinky porn become illegal?". Magazine. BBC News. Retrieved 2010-04-30.
  36. ^ Vicini, James (21 January 2009). Wiessler, David (ed.). "Online pornography law appeal denied". Reuters.
  37. ^ McGowan, Richard A. (21 September 2007). "Ethics of gambling". Opinion. The Boston Globe.
  38. ^ Richtel, Matt (31 May 2004). "U.S. Steps Up Push Against Online Casinos By Seizing Cash". Business Day. The New York Times. Retrieved 2010-04-30.
  39. ^ a b c Brey, Philip A. E. (April 2012). "Anticipatory Ethics for Emerging Technologies". NanoEthics. 6 (1): 1–13. doi:10.1007/s11569-012-0141-7. ISSN 1871-4757. S2CID 255319211.
  40. ^ a b Moor, James H. (2008-03-31), "Why We Need Better Ethics for Emerging Technologies", Information Technology and Moral Philosophy, Cambridge University Press, pp. 26–39, doi:10.1017/cbo9780511498725.003, ISBN 978-0-521-85549-5, retrieved 2024-01-28
  41. ^ Wright, David (2010-07-08). "A framework for the ethical impact assessment of information technology". Ethics and Information Technology. 13 (3): 199–226. doi:10.1007/s10676-010-9242-6. ISSN 1388-1957. S2CID 10596481.
  42. ^ Dhirani, Lubna Luxmi; Mukhtiar, Noorain; Chowdhry, Bhawani Shankar; Newe, Thomas (2023-01-19). "Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review". Sensors. 23 (3): 1151. Bibcode:2023Senso..23.1151D. doi:10.3390/s23031151. ISSN 1424-8220. PMC 9921682. PMID 36772190.
  43. ^ "International Journal of Cyber Ethics in Education (IJCEE)". IGI Global.
  44. ^ "Center for Digital Ethics and Policy". CDEP.


Category:Computer ethics Ethics Ethics