Social Networks and Computer Ethics
For the past 20 years, there have been many changes caused by the internet on many aspects of the contemporary life. The internet is growing rapidly. As of 2006, it was recorded that the number of internet users was about four million. For a long time, there have been promises made on how internet changes will positively impact people worldwide. These promises have reached many people throughout the world. Some of the promises have been fulfilled, while some have not been completely achieved. Among the main reasons for that is the decrease in people's faith in the system (Sund, 2007).
Sund (2007) stated that creating confidence and faith is a major factor for ensuring that the internet continues to grow, and for it to be used more. The increased growth of the internet has opened up doors for crime. Cyber criminals can now exploit the internet's weaknesses and also invade the important infrastructures of governments. Such attacks on the internet as zero-day exploits, viruses, zombie botnets, phishing, spyware, identity theft and denial of service attacks, are the hazards faced by cyberspace and internet growth. Those exploitations such as spam add up to 90% of the email circulation in the internet. This puts us in a critical position in the continuing growth of the internet and with the development of a worldwide information society. There needs to be a lot of effort in improving the safety and confidence in using ICTs to prevent a reduction in the growth and development level of the internet. It is very important that the faith people once had in the safety of the internet is regained, for it to continue growing and being used.
Online Social Networks
According to Herzberg, Elovici, Shulman and Fire (2013), social media, also known as OSNs (Online Social Networks), are now an important part of the public. They are broadly used by people, and have a lot of private and sensitive information. It is this huge source of relevant data which enables innovations in the social media, and most of them are made to suit both individuals and the public in identification of potential hazards they may face. For instance, researching on social media can help us find out the number of suicidal or terrorist cases, which can help prevent such occurrences. There are, however, various ways in which social media can be used in committing dangerous and illegal acts.
Johnson (1997) is of the opinion that communication through the internet has developed and improved at an unexpectedly high rate, and that there are high chances of its demand continuing to grow. Nonetheless, these developments have brought about many problems, especially those to do with people's behavior. These disrupting and worrying behaviors include defamation, unauthorized access, racial discrimination, harassment, theft of electronic property, launching of harmful viruses and worms, and to an instance, a certain kind of internet rape. The kind of reaction we have to such behavior is what will determine the development of communication over the internet, and the rate and methods in which the assurance of the technology of electronic networking will be fulfilled later on.
Computer Ethics
The term ethics has been defined by many thinkers, including Plato, Kant and Aristotle. It is a set of values, or a code that guides people's lives, and which is based on self-analysis. Ethics is neither a religion, nor is it based on any religious beliefs. This statement is due to the fact that ethics does not center on the illogical notions of people based on individual values or culture, and also ignores the approval, prejudice and unpredictability acquired from people's religions and the law (Kesar & Rogerson, 1998).
According to Kesar and Rogerson (1998), the matters of ethics that are faced by technology have led to a lot of research by people studying various disciplines. Computer ethics has handled most of those issues involving misuse of computers. "Computer ethics" was the term used to describe a discipline that studies the ethical problems created, transformed or intensified by the innovations of computers. However, ethics involve decision making. Ethical issues seem not to have much change over time, though the type of decisions and available remedies may change quite much. There are other researchers who have stated that computer ethics is finding and evaluating the influence of information technology on individual and social values such as work, wealth, health, security, self-actualization and opportunity. This is a broad definition which embraces many fields such as the laws of computer, applied ethics and sociological matters of computing....
3). A sample screenshot from JADSoftware's Internet Evidence Finder application is shown in Figure 2 below. Figure 2. Sample screenshot of Internet Evidence Finder Interface Source: JAD Software at http://www.jadsoftware.com/go/wp-content/themes/jadsoftv2 / images/iefv4-1.png Moreover, IEF v4 also has some useful features for social networking site applications, including: 1. Facebook live chat search has been updated to locate additional chat (including damaged fragments); the vendor adds that messages sent and received using the Facebook live
Clearly from this case and others there is a critical need for the development of safeguards on consumer data captured over the Internet, both of the opt-in (where the customer approves the data being captured) and the non-opt-in variety. An Explicit Requirement for Transparency and Ethical Use of Data Consumers have become increasingly concerned that their data, however acquired, will eventually be sold without their knowledge, eventually leading to the potential
Social Media The objective of this study is to identify one of the major social media outlets and discuss the four components of a legally astute social media marketing manager who utilizes social media outlets for consumer transactions and how each component can mitigate the risk involved in doing business in cyberspace. This work in writing will additionally list and analyze methods of alternative dispute resolution and determine which would be
This information, stored on a computer and used to correlate with other data could be considered invaluable by many researchers, but the patients have a right to keep certain information private, and to suggest anything else would be an ethical violation of the patient's privacy. Because computer ethics is such a volatile issue, an entire branch of study has grown up around computer ethics, which proponents who believe the computer
But research is very mixed on what that answer is when the data is voluntarily revealed. For example, if someone "likes" Apple on Facebook and Apple then in turn markets Apple products to that person, it should be asked whether Apple is acting improperly. Companies with products that compete with Apple could do the same thing. Research bears out that this question comes down to personal and professional ethics
The problem is that there is no protection against this issue. This is due to the newsfeed in the profile of each user. The argument of the company is that the news feed will ensure the users get to see more content from others. however, this means that there is no certainty of the next item that the user will see on the news feed. This is a serious
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now