Verified Document

Analyzing Social Networks And Computer Ethics Research Paper

Social Networks and Computer Ethics For the past 20 years, there have been many changes caused by the internet on many aspects of the contemporary life. The internet is growing rapidly. As of 2006, it was recorded that the number of internet users was about four million. For a long time, there have been promises made on how internet changes will positively impact people worldwide. These promises have reached many people throughout the world. Some of the promises have been fulfilled, while some have not been completely achieved. Among the main reasons for that is the decrease in people's faith in the system (Sund, 2007).

Sund (2007) stated that creating confidence and faith is a major factor for ensuring that the internet continues to grow, and for it to be used more. The increased growth of the internet has opened up doors for crime. Cyber criminals can now exploit the internet's weaknesses and also invade the important infrastructures of governments. Such attacks on the internet as zero-day exploits, viruses, zombie botnets, phishing, spyware, identity theft and denial of service attacks, are the hazards faced by cyberspace and internet growth. Those exploitations such as spam add up to 90% of the email circulation in the internet. This puts us in a critical position in the continuing growth of the internet and with the development of a worldwide information society. There needs to be a lot of effort in improving the safety and confidence in using ICTs to prevent a reduction in the growth and development level of the internet. It is very important that the faith people once had in the safety of the internet is regained, for it to continue growing and being used.

Online Social Networks

According to Herzberg, Elovici, Shulman and Fire (2013), social media, also known as OSNs (Online Social Networks), are now an important part of the public. They are broadly used by people, and have a lot of private and sensitive information. It is this huge source of relevant data which enables innovations in the social media, and most of them are made to suit both individuals and the public in identification of potential hazards they may face. For instance, researching on social media can help us find out the number of suicidal or terrorist cases, which can help prevent such occurrences. There are, however, various ways in which social media can be used in committing dangerous and illegal acts.

Johnson (1997) is of the opinion that communication through the internet has developed and improved at an unexpectedly high rate, and that there are high chances of its demand continuing to grow. Nonetheless, these developments have brought about many problems, especially those to do with people's behavior. These disrupting and worrying behaviors include defamation, unauthorized access, racial discrimination, harassment, theft of electronic property, launching of harmful viruses and worms, and to an instance, a certain kind of internet rape. The kind of reaction we have to such behavior is what will determine the development of communication over the internet, and the rate and methods in which the assurance of the technology of electronic networking will be fulfilled later on.

Computer Ethics

The term ethics has been defined by many thinkers, including Plato, Kant and Aristotle. It is a set of values, or a code that guides people's lives, and which is based on self-analysis. Ethics is neither a religion, nor is it based on any religious beliefs. This statement is due to the fact that ethics does not center on the illogical notions of people based on individual values or culture, and also ignores the approval, prejudice and unpredictability acquired from people's religions and the law (Kesar & Rogerson, 1998).

According to Kesar and Rogerson (1998), the matters of ethics that are faced by technology have led to a lot of research by people studying various disciplines. Computer ethics has handled most of those issues involving misuse of computers. "Computer ethics" was the term used to describe a discipline that studies the ethical problems created, transformed or intensified by the innovations of computers. However, ethics involve decision making. Ethical issues seem not to have much change over time, though the type of decisions and available remedies may change quite much. There are other researchers who have stated that computer ethics is finding and evaluating the influence of information technology on individual and social values such as work, wealth, health, security, self-actualization and opportunity. This is a broad definition which embraces many fields such as the laws of computer, applied ethics and sociological matters of computing....

In addition, it has used notions, methodologies and concepts from those subjects, and other related disciplines.
According to Moor (2001), computer ethics can be seen as an area of growth. The technology in computer ethics is a unique factor. Computers have an uncommon feature; they can be described as worldwide machines that are unique in principle. They are flexible in logic, both in their semantics and syntactically. Their functioning can be regulated almost infinitely, through creation of new interpretations or algorithms. They can be shaped, trained and developed to perform whatever function they are required to perform. The most important machines are computers. For this reason, we are focused on confronting a revolution of computers, not that of toasters. In the modern world, it is common to find us asking a computer if it can help us do the jobs we have. There are unlimited applications, and we can find computers in unexpected places.

The high usage of computers has brought about numerous opportunities. The ways in which computers are in many situations so rare that we lack policies that have been set up to guide their appropriate usage. There are policy vacuums. There should be policies, whether formal or informal, in order to ensure that we perform functions that are ethical. For instance, there are parents who use computers for monitoring their young children and toddlers in their rooms. There is nothing wrong, but at what rate do we need to use computers for monitoring? We can as well use computer chips to monitor and locate our children by putting them in their clothes. We can also insert those chips in our young children and babies. We may insert the computer chips into people working on delicate ventures or adults that have been released on bail. Your opinion on what is right or wrong on these issues is now a matter of concern due to the evolution of computing, which has made it possible to implant computer chips. The new usage of computer innovations bring about the need for policy vacuums to be filled with suitable policies, which should be logically justified (Moor, 2001).

Online Social Networks and Ethics

According to Johnson (1997), the prime reactions to disturbing online behavior can for now be described as technological and legal. Just as the existing issues have been found and defined, there have been formulated and extended laws, and the law enforcers have become part of this new system. New innovations have been made for encrypting and decrypting data, and for detecting viruses. There has been a great enhancement on our awareness of how our systems are kept safe, and on the transactions of detect or trace. These strategies, nevertheless, are not enough to act as a control of online behavior. The best solution is for people to adopt standards of behavior. Individuals do know those types of behavior that are inappropriate, unwelcome or unacceptable, and hence behave accordingly. For this to be possible, internet behavior and its character needs to be discussed. Its primary meaning needs to be understood, along with the reasons behind its description as illegal or legal, wrong or right, undesirable or desirable, unacceptable or acceptable. The users of computers need to understand the impact their actions may cause. Computer innovations were not developed as a vacuum. They were developed and trained to fit in with our culture, lifestyle, social lives and political affairs.

The ethical matters that surround computer technology have brought about many generic morality issues. This can be seen in internet-based communication among other computer technologies. These generic issues are of property, confidentiality, creating disparity between personal (private and public) freedoms, and factors such as respect, authority, and ascribing responsibility. New features are created when there are activities implemented and mediated by computers. These matters have new changes which have made them abnormal, but the primary issue has not been affected. For instance, before the invention of computers, there was no need to look into property rights based on code lines of code which can be executed using a machine, yet over time, there have been new innovations which have challenged outdated concepts of property over and over again. There has never been confrontation of a confidentiality threats brought about by computer technology, yet there have previously been such threats in other technologies like phones and cameras. This also applies to electronic networks. There are special features in various networking activities, though these activities are not part of any human behavior. Our activities include: playing, working, exchanging…

Sources used in this document:
REFERENCES

Elovici, Y., Fire, M., Herzberg, A., Shulman, H. (2013, October 7). Ethical Considerations when Employing Fake Identities in OSN for Research. Retrieved June 28, 2016, from Arxiv.Org: https://arxiv.org

Huff, C., & Martin, C. D. (1995). Computing Consequences: A Framework for Teaching Ethical Computing. Communications of the ACM, Vol 38, No. 12, 75-84. Retrieved from ACM Digital Library: http://dl.acm.org

Johnson, D. G. (1997). Shaping social behavior online takes more than new laws and modified edicts. Ethics Online, Vol 40, No. 1, 60-65. Retrieved from ACM Digital Library: http://dl.acm.org

Kesar, S., & Rogerson, S. (1998). Developing Ethical Practices to Minimize Computer Misuse. Social Science Computer Review, Vol 16, No. 3, 240-251. Retrieved from SAGE Publications: http://ssc.sagepub.com
Moor, J. H. (2001). The future of computer ethics: You ain't seen nothin' yet! Ethics and Information Technology, Vol 3, Issue 2, 89-91. Retrieved from Springer Link: http://link.springer.com
Sund, C. (2007). Towards an international road-map for cybersecurity. Online Information Review, Vol 31, Issue 5, 566-582. Retrieved from Emerald Insight: http://www.emeraldinsight.com
Cite this Document:
Copy Bibliography Citation

Related Documents

Social Network Forensics: Approach to
Words: 2191 Length: 6 Document Type: Research Proposal

3). A sample screenshot from JADSoftware's Internet Evidence Finder application is shown in Figure 2 below. Figure 2. Sample screenshot of Internet Evidence Finder Interface Source: JAD Software at http://www.jadsoftware.com/go/wp-content/themes/jadsoftv2 / images/iefv4-1.png Moreover, IEF v4 also has some useful features for social networking site applications, including: 1. Facebook live chat search has been updated to locate additional chat (including damaged fragments); the vendor adds that messages sent and received using the Facebook live

Computer Ethics the Internet's Rapid
Words: 3784 Length: 10 Document Type: Term Paper

Clearly from this case and others there is a critical need for the development of safeguards on consumer data captured over the Internet, both of the opt-in (where the customer approves the data being captured) and the non-opt-in variety. An Explicit Requirement for Transparency and Ethical Use of Data Consumers have become increasingly concerned that their data, however acquired, will eventually be sold without their knowledge, eventually leading to the potential

Social Media the Objective of This Study
Words: 1555 Length: 5 Document Type: Essay

Social Media The objective of this study is to identify one of the major social media outlets and discuss the four components of a legally astute social media marketing manager who utilizes social media outlets for consumer transactions and how each component can mitigate the risk involved in doing business in cyberspace. This work in writing will additionally list and analyze methods of alternative dispute resolution and determine which would be

Ethics of Privacy Is a
Words: 2370 Length: 7 Document Type: Research Proposal

This information, stored on a computer and used to correlate with other data could be considered invaluable by many researchers, but the patients have a right to keep certain information private, and to suggest anything else would be an ethical violation of the patient's privacy. Because computer ethics is such a volatile issue, an entire branch of study has grown up around computer ethics, which proponents who believe the computer

Social Networking Privacy Online Privacy
Words: 3284 Length: 10 Document Type: Essay

But research is very mixed on what that answer is when the data is voluntarily revealed. For example, if someone "likes" Apple on Facebook and Apple then in turn markets Apple products to that person, it should be asked whether Apple is acting improperly. Companies with products that compete with Apple could do the same thing. Research bears out that this question comes down to personal and professional ethics

Ethics and the Internet Use
Words: 3424 Length: 9 Document Type: Term Paper

The problem is that there is no protection against this issue. This is due to the newsfeed in the profile of each user. The argument of the company is that the news feed will ensure the users get to see more content from others. however, this means that there is no certainty of the next item that the user will see on the news feed. This is a serious

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now