Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cyber bullying, and why is it especially common in today's culture
Abstract on cyber bullying
Abstract on cyber bullying
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Computer ethics is a set of moral rules that set social rules of what is to be known as appropriate for when you are using the computer. The first thing software developer should consider is what to save and what not to save. Log files are one thing that needs to be back up and protected, you also need to know who else may be able to see these files. Another ethic is to not us users as products. This basically means that it is unethical to make shady deals with another ad network and thus transforming customers or users into products.one ethical dilemma that exists is how to charge for a product or service online. For example business that depend on providing content without paying the creator and then sell ads or charge a fee for the product. To avoid this you have to find out things like is the creator happy to work for exposure alone and not profit and to not overly price the consumer for the product at hand. Protection is also an ethic that is unclear to people there are the developers that want to put protection on everything then there are people who don’t want to protect anything. Then …show more content…
Cyber bully and harassment are very serious issues going on in the computer world right now people are trying to solve this but harassment though the internet is thriving because of the anonymous way to insult someone without them never knowing. There can even be worse cases of harassment that involve lawsuit, jail and sometimes death due to harassment over the internet. That is why one the most important ethics is to always treat people like human beings many people who write rude or inappropriate things over the internet have said that they never stopped to think of how the comment would personally effect the people they were sending it to. That is why computer ethics is so important in the computer
McMillan, M. (2012, February 17). Codes of Ethics: If You Adopt One, Will They Behave? Retrieved November 06, 2016, from https://blogs.cfainstitute.org/investor/2012/02/20/codes-of-ethics-if-you-adopt-one-will-they-behave/
Bullying has occurred for many years and via the internet is a new form of bullying, giving higher chances for bullying to occur more often due to technology.
1. What is the difference between a. and a. There are a few reasons that there could be a gap between the knowledge of ethics and being an ethical person. A person may not incorporate the ethical theories that they have learned into their lives, they may choose to be unethical, they may follow a code of ethics that is morally corrupt, or they might have psychological problems. We can be educated and knowledgeable in something, but not incorporate that subject or theory into our day-to-day lives. Sometimes it is because it conflicts with our beliefs or our moral code.
Ethics and morality are among the most difficult subjects to define and discuss. Opinions concerning these matters are frequently automatic, held on a preconceived notions and are never subject to verification until after the fact and, often, not even then. To some critics, any use of technology leads to increasing alienation and dehumanization therefore, technology is considered far from moral. However, most people recognize great improvement of the quality of human existence which has been possible only with technology.
Cyberbullying is defined as behavior online that is “repeated, hostile, and severe with the intent to embarrass, threaten, or harass”, and it has become a serious problem. With the new popularity of social media and technology, victims of bullying have been finding it impossible to escape the onslaught of rude and embarrassing comments. Because of this, Congress has been trying to pass a law that states that people should be held responsible for the comments they make. Individuals should be prosecuted if the cyberbullying endangers someone's life, or severely affects the victim. First, cyberbullying can lead to embarrassment and shame, which can be amplified by the wide audience.
Ethics are the policies you internalize and use to measure your functioning. The criterion that others apply to you or that you’re obligated to adhere to by external forces, such as licensing bodies, can be called ethics, but they are more accurately described as laws. Many professions now call these laws codes of professional conduct or responsibility (Bill Nelson, 2010).
Many ethical dilemmas are philosophical in nature, an ethical issue can be described as a problem with no clear resolution. In order to solve the issue or dilemma a consensus between the parties involved must be reached. There are several reasons to come to an agreement over an ethical dilemma, it is the basis for all aspects of personal and professional dealings. Each one of us is part of a civilized society and as such it is our responsibility to be rational, honest and loyal in our dealings with others. (Alakavuklar, 2012) states that individuals make decisions for different situations in business life involving various ethical dilemmas. Each time either consciously or unconsciously individuals may follow some ethical approaches
The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly ‘computer literate,' the gap between technology and peoples' intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of computers are a reactive approach. A proactive approach is to teach students about computer ethics in classrooms. An effective teaching method are the presentation of ethical scenarios. It is anticipated that through this method, students will personalize the need for developing ethical standards of behavior. The ultimate goal is for students, if necessary, to change their set of personal beliefs to include ethics.
In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The question of whether an action or choice is ethical or not is fundamentally based on whether something is right or wrong. From an ethical standpoint, unethical choices and risky behavior can lead to increased liabilities. The liabilities result in the loss or damage sustained by a company or other party as result of an unethical and sometimes illegal decision. Although we exercise free will on a continuous basis, we are governed by the decisions we make and my belief is that the decisions we make daily do not just affect us. These decisions affect other people, such as family, friends, coworkers, instructors, neighbors, etc. The most prominent example of ethics can be recognized in the field of technology based on the growing amount of rapidly changing legislation and acts that under consideration in order to protect people from unethical practices.
All around the United States, the prevalence of cyberbullying ranges from 10-40% of people who get bullied through electronics. Furthermore, this is a problem caused by kids, teens, and adults who target one another online by repeating harmful threats and harassments. This conflict negatively impacts the victims’ life which is why anyone who cyberbullies should pay the consequences and be prosecuted.
The issue with tackling the ethical hacker scenario is that the event is almost entirely action based. There is no end to give meaning to the action and there is no finalized result or indication that it impacted happiness, which many ethical theories depend on. Namely consequentialism, utilitarianism and ethical egotism require an end result in one form or another. There is also no purpose in committing the hackings which makes applying moral theories that deal with motivation and intent, ethical egotism and aspects of virtue ethics, increasingly more difficult to do effectively. Therefore moral theories that apply almost exclusively to the action itself will be utilized in this argument.
When the internet was considered a global information system in 1995 millions of Americans participated in virtual communication. People began to communicate with each other and personal information began to be placed online by the stroke of the fingertips to their own computer. So the question is the privacy of individuals trusted online? Can people snoop around and see personal information? Of course people can if guidelines are not set in place to protect them. Public and private information can be complex when some individual(s) do not expect their communication to be read outside of their online community. What will be discussed are some ethical responsibilities that need to take place in the United States. Respecting the individual privacy and honor confidentiality is a must in this country.
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
Public opinion is often emotional rather than rational, so it is extremely easy to be incited and would possibly cause cyber bullying, which means to attack one person or a small group of persons by using offensive language. The damage caused by cyber bullying to a person is not virtual but real. An article from PR Newswire called “Cyber Hunting and Cyber Bullying” tells a st...