Article

Ethical Issues in Cyberspace and IT Society

Authors:
Article

Ethical Issues in Cyberspace and IT Society

If you want to read the PDF, try requesting it from the authors.

Abstract

Ethics is a branch of philosophy that deals with what is considered to be right or wrong. As information in cyberspace can be accessed globally, a research field of "computer ethics" is needed to examine what is right and wrong for Internet users can do, and what are the social impacts of Information Technology (IT) in general. Such research will underpin action that must be taken not only to harness the power of the IT itself, but also to survive its revolution. It is especially important to understand security, privacy issues, and major negative impacts of IT on cyberspace. Although some technical approaches such as: encryption, digital ID, and firewall methods have been developed to overcome some of the problems, legal actions must also be enforced worldwide which will address a growing number of ethical problems resulting from the negative impacts of IT in our global society. As data, information, and computer networks can be threatened by many internal and external hazards internationally, computer ethics should be the concern of everyone. Governments in every country, public policy makers, computer professionals, organizations and private citizens must all take an interest and make their contributions, so that this global information can be exploited in a socially and ethically sensitive way for our future benefit and applications.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... A CNN reporter Elizabeth Cohen used a fellow colleague, Gary Tuchman's birth and social security number to access 18 months of his medical records [7]. Securing the availability, confidentiality and integrity of a patient's medical and health information, requires the implementation of robust and reliable clinical applications as well as Information Teclmology (IT) infrastructure. ...
... Owners and users of medical information expect confidentiality, an act of secrecy and integrity by ensuring the information is honest and true. The protection of privacy by ensuring confidentiality, integrity and availability of patient information is not only considered an advancement in technology but also a legal requirement in many countries today [7]. Technologies such as EHRs and on-line personal health services have improved the dissemination of information on one hand, but also raised challenges of security on the other hand. ...
Conference Paper
Full-text available
Research findings have revealed that our world today is greatly influenced by the digital cyberspace and the corresponding information flow resulting in huge societal and economic impacts. Cyberspace offers an imagined place or notional realm in which electronic information exists or is exchanged. The explosion of the Internet has placed increasing demands on businesses, industries, commerce, government, education, entertainment and health, thereby creating vulnerabilities within the cyberspace and increasing criminal, hostile actions and potential threats. In the health sector, application of Electronic Healthcare Records (EHRs) provide a means to sustain patient safety and care while allowing better efficiency in the exchange of information, but with the risk of privacy violation and identity theft. In view of the foregoing, developing economies especially in sub-Saharan Africa, seem reluctant to key into this aspect of healthcare management, which has harmed greatly certain initiatives to implement and sustain healthcare schemes. Whereas consensus efforts have been made to stem the tide, such as the exploration of threat combative mechanisms such as cryptography; a technique that can maintain authentication, integrity, availability, confidentiality, identification and privacy of data by encryption and decryption, the cyber-security war cannot be said to have been won. Other security means involve the integration of privacy settings into hardware and the use of biometrics. This research focuses on the various challenges that exist in today's cyberspace, especially the impact observed in the medical and healthcare field, with respect to securing information and harnessing steps, that could be implemented to mitigate and if possible, totally eradicate the causes and effects, and consequently suggest action steps which developing economies can adopt in implementing robust EHR systems.
... Communication among computers and other devices is made easy with technological advancements (Hary Gunarto et al. 2003). This made the need for having ethics and law regulation in the cyberworld, because the access of the private data, information and altering them have become now completely open (Alfreda Dudley et al. 2012). ...
... Communication among computers and other devices is made easy with technological advancements (Hary Gunarto et al. 2003). This made the need for having ethics and law regulation in the cyberworld, because the access of the private data, information and altering them have become now completely open (Alfreda Dudley et al. 2012). ...
Book
This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book will advance understanding of the ethical and legal aspects of cyberspace followed by the risks involved along with current and proposed cyber policies. This book serves as a summary of the state of the art of cyber laws in the United States and considers more than 50 cyber laws. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers risk identification, risk analysis, risk assessment, risk management, and risk remediation. The very important and exquisite topic of cyber insurance is covered as well—its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc. Each chapter is followed by an overall summary and review that highlights the key points as well as questions for readers to evaluate their understanding based on the chapter content. Cybersecurity: Ethics, Legal, Risks, and Policies is a valuable resource for a large audience that includes instructors, students, professionals in specific fields as well anyone and everyone who is an essential constituent of cyberspace. With increasing cybercriminal activities, it is more important than ever to know the laws and how to secure data and devices.
Chapter
Full-text available
The 21st century is at the thresh-hold of information age, while insecurity thrives in academic libraries. This chapter adopted a conceptual security model which focuses on the use of contemporary technologies to curtail information resources vandalism, theft and mutilation. The adoption of these technologies requires competency of; technical operational skills, trending ICT literacy skills among others by Librarians to function effectively. Types of those contemporary technologies to avert insecurity in the libraries includes; CCTV, biometric technology, KOHA Application software and Inventro Pro (Integrated Library) Technology. It therefore suffices that, academic libraries have continued to witness advances in the emerging technologies. However, the period under assessment has relatively witnessed disrupting insecurity in academic libraries. Therefore, monitoring of library users in regard to copyright violations or unlawful use of digital resources and the security of information resources in academic libraries is a necessity. It recommended stringent observation of ethics in technology, computer, cyber, and training in the Internet of Things (IoT) to curtail cybercrimes while using the libraries. It is relevant to redesign library structures to adopt the use of contemporary technologies to counter insufficient as well as architectural defects which could pave ways to enabled insecurities.
Book
Full-text available
The book aims to promote high-quality research by bringing together researchers and experts in cyber-physical system security and privacy from around the world to share their knowledge of the different aspects of CPS security and we have integrated these chapters into a comprehensive book. This book will present the state of the art and state of practice on how to address the following unique challenges in cybersecurity and privacy in CPS. This book is ideally suited for policymakers, Industrial Engineers, researchers, academics and professionals seeking a thorough understanding of the principles of security and privacy in Cyber-physical Systems. They will learn about promising solutions to these research problems and identify an unresolved and challenging problem for their own research. Readers of this book will have an overview of CPS cyber security and privacy design.
Article
Full-text available
As engineering work becomes more complex, an understanding of engineering ethics becomes as important to the proper education of engineers as their knowledge of differential equations. In the engineering world of the future, a sound understanding of the theoretical and practical sides of engineering ethics will be as necessary to the proper education of engineers as a knowledge of differential equations is today, if not more so. The author supports this assertion with three arguments: 1) engineering ethics is now a mature, practical academic discipline whose practitioners deal primarily with real engineering cases, not just abstract philosophical theories; 2) engineering work is now more complex than ever, and its ethical, social, and cultural effects can no longer be dealt with on the "seat-of-the-pants" basis that sufficed when engineered systems were simpler; 3) while most engineering students come to college with a working understanding of general ethical principles already, they need classroom practice to understand and deal with the complex and subtle issues of professional responsibility in engineering before they encounter ethical problems in the real engineering world.
Internet Revolution & Japanese IT Industry, Symposium on Development of Information Industry in the Asia-Pacific Region
  • Takeaki Kubo
Kubo, Takeaki, 1999, Internet Revolution & Japanese IT Industry, Symposium on Development of Information Industry in the Asia-Pacific Region, 5-8 October 1999, Srilanka, page 21-93.
  • Ning Zhong
  • Jiming Liu
  • Yiju Yao
Zhong, Ning, Jiming Liu, and Yiju Yao, 2002, In Search of the Wisdom Web, IEEE Computer, IEEE, Volume 35, No. 11, page 27-31.