ArticlePDF Available

Ethics in cyberspace- a philosophical approach

Authors:

Abstract

Encouraging students to expand their search for knowledge in cyberspace has brought in new dimension, on the handling of the new technology by the students and brought to light whether or not our curriculum demand such leap development and furthermore will student use the Internet in more socially responsible way. Children begin to learn ethical values right from birth through?families?and?religious?institution.?They?are?considered?as?primary?sources?for?a?childís?ethical?education?while?schools have the responsibility to teach and reinforce some moral values. New technologies bring about the need to interpret old values in new ways, but also may call for the creation of new codes of conduct when new actions are made possible with the use of technology. Children can quickly identify whether the behavior is right or wrong in real world but when students use virtual world behavior may not be as easily judged to be right or wrong. This study attempts to show the prevailing misconception thecyber ethics among students. This paper examines basis ethical issues when students have had to make ethical decisions. The study will qualitatively explore the level of understanding of teachers concerns and role in bringing in an ethical behavior on students on the Internet. If a student encounters unsafe behavior on the Internet, the student will be able to behave and act appropriately.
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 1
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
Ethics in cyberspace- a philosophical approach
Lourdu vesna.J ** Dr. D. Niveditha
Lourdu Vesna.J) Department of Electronic Media and Mass Communication, Pondicherry University, Puducherry, India; 2(Dr. D. Nivedhitha) De-
partment of Electronic Media and Mass Communication, Pondicherry University, Puducherry, India
Email: vesnaj20@gmail.com
ABSTRACT
Encouraging students to expand their search for knowledge in cyberspace has brought in new dimension, on the handling of the
new technology by the students and brought to light whether or not our curriculum demand such leap development and fur-
thermore will student use the Internet in more socially responsible way. Children begin to learn ethical values right from birth
ols
have the responsibility to teach and reinforce some moral values. New technologies bring about the need to interpret old values
in new ways, but also may call for the creation of new codes of conduct when new actions are made possible with the use of
technology. Children can quickly identify whether the behavior is right or wrong in real world but when students use virtual
world behavior may not be as easily judged to be right or wrong. This study attempts to show the prevailing misconception the
cyber ethics among students. This paper examines basis ethical issues when students have had to make ethical decisions. The
study will qualitatively explore the level of understanding of teachers concerns and role in bringing in an ethical behavior on
students on the Internet. If a student encounters unsafe behavior on the Internet, the student will be able to behave and act ap-
propriately.
Keywords : Ethics, cyberspace
1 INTRODUCTION
Ethics is a branch of study which deals with moral judgments,
issues of right and wrong, and determining what behaviors
are humane and inhumane. An action is said to be ethical if it
does not have a damaging impact on oneself, other individual
or on society. . o-
        At the
Centre for the Advancement of Ethics and Character, the guid-

 
         x-
  re-engage the hearts, minds and hands
of our children in forming their own characters, helping them
           
1996).
Children begin to learn ethical values right from birth
through families and religious institution. They are considered

have the responsibility to teach and reinforce some moral val-
ues. Since the first appearance of the
term in 1988, this topic more commonly has been referred to as
Information Ethics (IE). Robert Hauptman (1988) used the term
in the first chapter of Ethical Challenges in Librarianship, which
is the first use in English. Capurro (1988) challenged informa-
tion professionals to take responsibility and action for infor-
mation policy in professional and public settings. He saw IE as
the appropriate term for the contemporary information ethos
or environment. The third appeared in the criminal justice
literature (DeMaio, 1988). But still Children do not know what
they can or cannot do with intellectual property on the inter-
net ,many computer-savvy kids as well as educators, adminis-
trators and parents are unclear about what is and what is not
ethical when dealing with the World Wide Web (Janna J.
Baum, 2008).
the document, select “Page Layout” from the “View” menu
in
IJOART staff will edit and complete the final formatting of
your paper.
2 REVIEW OF LITERATURE
2.1 Ethics in Internet
Aristotle, the founder of ethics as an academic discipline ar-
gued ethics as a reflection of morality. As Rafael Capurro
(2008), who heads the International Center for Information
-referential process ethics is
an unending quest on explicit and implicit use of the moral
code, that is to say of respect or disrespect, with regard to in-
dividual and social communication. In other words, ethics
observes the ways we communicate with each other as moral
persons and the ways this moral identity is understood. There

Definition of Information Ethics includes concern with the
moral dilemmas and ethical conflicts that arise in Interactions
between human beings and information (creation, organiza-
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 2
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
tion, dissemination, and use), information and communica-
tions technologies (ICTs), and information systems. (Toni Car-
bo ,2008).Cyber ethics (information and communication ethics)
differs from the rest and requires a special attention because
we       
that happens within the computer network, a new phenome-
non that is not always well understood because they receive
all the basic moral values from primary institution like school,
religion and family which does not represent the virtual
world. These are two different worlds and it is easy for stu-
dents to judge what is right from wrong in real world for the
same behavior than the virtual world. Ethical decisions can be
as simple as to choose a drink or as complicated as whether to
support the cloning of human beings. The ability to make and
evaluate arguments appears even more important in a modern
world where people have to deal with a lot of new information
in diversifying technology convergence. Argumentation is a
process of making and justifying arguments. To justify an ar-
gument is to support it with evidence because people may
        
just be a personal opinion (Reznitskaya, A, 2002)
2.2 Two Different World
Children can quickly identify whether the behavior is right or
wrong in real world but when students use internet (described
as virtual world) behavior may not be as easily judged to be
right or wrong. (Janna J. Baum, 2008) New technologies bring
about the need to interpret old values in new ways, but also
may call for the creation of new codes of conduct when new
actions are made possible with the use of technology such as
The ability to send unsolicited commercial messages to mil-
lions of Internet email users (spamming) was not possible be-
fore there was email or the Internet. Digital photography has
made the manipulation of images undetectable, an impossible
feat with chemical photography. Prior to the Internet, minors
faced physical barriers of access to sexually explicit materials.
What safeguards do schools, libraries, and parents need to
take to keep children from freely accessing inappropriate ma-
terials? Intellectual property in digital format can now be dup-
licated with incredible ease. Do we need clearer definitions of
property? Capurro, R. (2008). One of the most significant rea-
sons that computer ethics deserve special attention is because
of our rather human ability to view one's actions in the intang-
ible, virtual world of information technologies as being less
serious than one's actions in the real world. Most of us, adults
or children, would never contemplate walking into a computer
store and shoplifting a computer program. Yet software piracy
(the illegal duplication of computer programs) costs the com-
puter business billions of dollars each year. Most of us would
never pick a lock, but guessing passwords to gain access to

Teachers who need to give students opportunities to construct
value judgments and counter-arguments, to compare their
own ethical decision with opposing arguments and to develop
their reasoning ability (Patronis, T, et al 1999). Students also
need chances to improve their conceptual understanding and
value judgments Most of the students developed low level
arguments consisting of either claims only or claims and data.
Due to the lack of rebuttal in arguments, (Chun-Hsu Lin, et al
2010). Teachers need to develop learning objectives and activi-
ties that specifically address technology ethics. Proper use
needs to be taught at the same time that other computer skills
are taught. Capurro, R. (2008).
.
2.3 Ethical Dilemma
The usage of internet has grown explosively as fast internet
connections get cheaper. However, a Lot of the children who
uses internet are not aware of the fact that personal informa-
tion may be revealed when they go online (Sonia Livingstone
,2003). Information technology misuse by many people, espe-
cially the young, is viewed as a low-risk, game-like challenge.
There is a physical risk when breaking into a real office that
does not exist when hacking into a computer database from
one's living room or den. Illegally copying a book is costly and
time consuming; illegally copying a computer program can be
done in seconds at very small expense. Media plays a vital
role in the ethical dilemma, Movies, as well as book and tele-
vision programs, often make questionably ethical actions such
as breaking into secure computer systems seem heroic or at
least sympathetic .( Doug Johnson, 1999 ) as these action are
not questions ethically but approached as a outcome of intelli-
gence. The viewed pornography on a website seems to dis-
appear as soon as the browser window is closed. Not long ago,
ethical technology questions were only of interest to a very
few specialists. But as the use of information technologies
spreads throughout society and its importance to our national
economies and individual careers grows, everyone will need
to make good ethical decisions when using computers. Studies
show that persons involved in computer crimes acquire both
their interest and skills at an early age.
Association for Computing Machinery's Code of Ethics and
Professional Conduct (1993) stresses many of the same ideas
as The 10 Commandments of Computer Ethics. Their "moral
imperatives" include:
1. I will contribute to society and human well-being
2. I will avoid harm to others.
3. I will be honest and trustworthy.
4. I will be fair and not discriminate.
5. I will honor property rights including copyrights and pa-
tents.
6. I will give proper credit for intellectual property.
7. I will respect the privacy of others.
8. I will honor confidentiality.
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 3
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
Deborah Johnson in Computer Ethics,2nd Edition (Prentice-Hall,
1994) include: Johnson's 3 P's of Technology Ethics: Privacy - I will
protect my privacy and respect the privacy of others. Property - I will
protect my property and respect the property of others. Appropriate
Use - I will use technology in constructive ways and in ways which
do not break the rules of my family,church, school, or government.
2.4 Methodology
Research background
The following data are drawn from five educational institu-
tions, which examined cyber ethics perception evaluated ac-
tual problem and described attempts to be made by schools to
alleviate this ethical dilemma that prevails among the stu-
dents. The research took the form of semi structured inter-
view. Field sites were selected to produce a diversity of cate-
gories and information in order to provide some basis towards
generalization (Kennedy, 1979). Overall, two primary schools
two middle schools and three higher secondary schools were
selected as field sites (see table 1). Additionally, it believed
that cyber ethical perception might change as staff gained
more online experience, so schools were selected that had es-
tablished Internet use. Whilst the person with primary respon-
sibility for information and communication technology (ICT)
in school served as an initial contact, teachers with no specific
internet related roles were also interviewed. Fourty two staff
member were interviewed, twelve in St. Marks, 10 in Monfort
school, 10 in St. Santhome school, 8 in St Peters school and 2 in
St.Johns. Within the practice of qualitative interviewing it
should be recognized that there may exist some difference
between the responses of an interviewee and the reality that
these responses were intended to capture. This might be per-
ceived as an issue of validity, that is, whether an account
accurately represents certain features of a phenomenon that it
is intended to describe, explain or theories (Hammersley, 1992,
p, 69). As Gomm (2004, pp.152-153) notes, validity in inter-
views might be compromised where respondents do not know
the information required, where they Table 1 Details of re-
search field sites
Choose to answer inaccurately, where they are unwilling to
answer the question or where a different interpretation of the
question may have been made. It would be naïve to dismiss
the possibility that such occurrence might have compromised
the validity of aspect of the subsequent data on staff narra-
tives.
Time was spent in schools to build up rapport with staff and
were guaranteed that all research data was confidential. It
was recognized that the objectivity might be compromised
through engagement teachers. Yet, disengagement is not al-
ways a realistic, or , some would argue, desirable, possibility
in qualitative research and is perhaps best understood as a
process constructed after the event.
Teacher’s perception of cyber ethics from student’s use of Internet
As already stated perception of cyber ethics of students may
not necessarily correlate with actual dangers, yet understand-
ing expressed fears can provide an insight into potential ha-
zards,. Importantly, these perceptions need to be understood
on a hermeneutic level. In exploring staff perception issues
relating to the status of student, the cultural construction of
ethics can also will be considered.
The major issues surrounding technology ethics can be catego-
rized into three areas: privacy, property, and appropriate use.
Of the 42 staff interviewed, 26 expressed concern about pla-
giarism, 9 focused on copyright and 7 on the hacking.
Privacy:
This was a significant concerns among the staff as they ap-
proached it in ethical perspective, student using internet must
reflect that their use of this technology should not violate the
privacy of others and they should not give information to
other. Children need to understand that businesses and or-
ganizations use information to market products. Information
given to one organization may well sell it to others. All stu-
dents need to know that a stranger is a stranger, whether on
the playground or on the Internet. The same rules we teach
children about physical strangers apply to virtual strangers as
well. Information inadvertently left accessible does not mean
that it is appropriate to access it.
they develop a sense of comfort with the online stranger than the
physical one. This many because of the anonymity provided by the
medium.” Stated a Santhome high school teacher.
Plagiarism
S.NO
NAME OF
SCHOOL
AGE
RANGE
MONTHS
SCHOOl ON-
LINE
1.
Monfort
Higher
Secondary
24
2.
Santhome
Higher
Secondary
24
3.
St. Johns
High
School
6
4.
St.Peters
High
School
10
5.
St.Marks
High
School
18
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 4
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
Concepts like plagiarism, hacking are not understood by stu-
dents in a proper sense but by youth narratives the teachers
say that the student consider it to heroic and more knowled-
geable when they crack codes. Students need to understand
when and how to cite sources in both print and electronic
formats. Students need to learn to treat intellectual property,
existing only in virtual spaces, the same way they would treat
physical property and that the theft or destruction of such
property is unethical (and unlawful).
The basic purpose of assignment is to develop a better understand-
ing on the subject. But the very essence is spoiled when they copy
and paste materials from the internet for the assignment”
“the concept of plagiarism existed even before computers but with
advent of internet it is become easier”
Copyright violation
Overall, seven of the staff interviewed expressed concern over
copyright infringement. It was recognized in the primary
schools that students tend to copy and print images from the
web with little awareness of copyright laws. It was difficult
explaining to young children why they could not copy certain
images. Rather, students tended to cut and paste whatever
online material they want without awareness of copyright
laws. Moreover the most common they attempt to do is to
download songs, movies and sometimes software download
the ethical issue to be considered is that these student will
comment viewing movie in pirated version is ethically wrong
but a similar kind of action in online is not considered so by
them. Teacher of Monfort School stated that
One thing most commonly done by students is downloading music
and movies, now the problem with that for me is there are licensing
issues, which of course the student are not interested in.
Students need to know that computer software is protected by
copyright law. It is unlawful, as well as unethical, to make cop-
ies of computer programs without permission or payment of
the producer of those programs.
Appropriate usage
Not all information in internet is suitable for students and stu-
   
on the internet. There are sites which misguide them and can
also influence student in a worse way. Students must be
guided in what is the appropriate way to use internet for the
knowledge base.
“A good deal of Internet content, if not obscene, is certainly tasteless,
offensive, and lacking in educational value.”
Digital literacy
All the teachers interviewed labelled poor online education
recourses and they wanted infusion of responsible computing
to be taught in school and added in the curriculum. Teachers
anticipate that the more digitally literate or skilled children
become, the more they will gain from the internet while also
being better prepared to avoid or cope with online risks. While
digital literacy is generally defined as including a broad range
of skills and competences, digital safety skills represent a spe-
cific subset of digital or media literacy. Children should gain
internet access in advance of an infrastructure of awareness-
raising, parental understanding, regulation and safety protec-
tion.
5 CONCLUSION
        
    d-
         
The critical system she infers here is their mind and professes
         
foundation the mind will continue to adapt and develop for a
lifetime and the stimulus she refers to is the computer. This
paper helps to identify and emphasizes areas where an under-
        
future understanding in the use of the Internet and their inte-
raction with other aspects of the Internet and its environment.
If a student encounters unsafe behaviour on the Internet, the
student will be able to behave and act appropriately. By inte-
grating cyber ethics in school curriculum the college will help
prompt students, teachers and parents to re-examine their de-
cision framework with regard to Internet usage and hence
move them to reflect and consider the use of the technology
ethically. Ultimately, "the goal of technology literacy is to ena-
ble young people to develop their own creative and critical
capacities in relating to technology, not to train them to be ma-
chine operators. Then they will clearly see that their own
choices are not limited to adjusting themselves to a 21' century
2). Although
the challenges facing those who teach technology are great,
educators remain hopeful. Tom Lickona,
professor of education at the State University of New York at
Cortland sums it up perfectly by saying, "Even in a rotten
world, it's possible to raise a moral child, if we make it a high
priority" (Newman, para. 11). As Capurro (2008) states that

to do the good, and, we could add,to dream about it
6 REFERENCES
[1]Armstrong, A. (2001). The Child and the Machine: how
computers put our children's education at risk.
[2]Axel, F. (2001). Does the Internet make us lonely? Institute
for Sociology, University of Berne,Lerchenweg, Switzerland.
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 5
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
[3]Abdul Ghany, H. (2003). The effect of using the internet for
the youth: the ninth scientific conference for media college
media ethics: theory and application, media college ,Cairo.
[4] Aziz, N. (1999). The internet is a way of learning within the
classroom and distance learning.The Education Journal, 30.
[5] Capurro, R. (2008). Information ethics for and from Africa.
Journal of the American Society for Information Science and Tech-
nology.
[6] Chun-Hsu Lin, Shih-Ming Huang, Pei-Shan Wu, and
Chiung-Hui Chiu (2010)    n-
making Argumentation in Cyber-ethics Dilemmas IEEE Fron-
tiers in Education Conference pp 27-30.
[7] Cordes, C, Monke, L., & Tafbott, S. (2004). Technology litera-
cy: Four guiding principles for educators and parents.
[8] DeGaetano, G. (2000). Raising Media Literate Children,
Grow Smart Brains.
[9] Deborah Johnson Computer Ethics,2nd Edition (Prentice-
Hall, 1994)
[10] DeMaio, H.B. (1988). Information ethics 
naturally. Computer Security Journal, 5(1), 719.
[11]Gilster, P. (1997). Digital Literacy, John Wiley & Sons,
Hauptman, R. (1988). Ethical challenges in librarianship.
Phoenix, AZ: Oryx Press.
[12]Healy, J. M. (1998). Endangered Minds. Creating the Fu-
ture. D. Dickinson. Seattle, WA
98115, New Horizons for Learning.
[13] Janna J. Baum( 2008) CyberEthics:The New Frontier Tech-
Trends Volume 49, pp 54-56
[14]Newman, A. M. (n.d.). 21"-century cheating
http://www.scholastic.com/schoolage/grade5/homework/cheat
ing.htm
[15] Patronis, T., Potari, D. and Spiliotopoulou, V., "Students'
argumentation in decision-making on a socio-scientific issue:
implications for teaching", International Journal of Science Educa-
tion,Vol 21, No 7, 1999, pp. 745-754.
[16] Reznitskaya, A. and Anderson, R. C., "The argument
schema and learning to reason", in Comprehension instruction:
Research-based best practices, Block, C. C. and Pressley, M. E.,
Eds., New York: Guilford, 2002, pp. 319-334.
[17] Toni Carbo, Martha M. Smith (2008), Global Information
Ethics: Intercultural Perspectives On Past And Future Research
Journal Of The American Society For Information Science And
Technology, 59(7):11111123,
[18] SAFEKIDS.COM <http://www.safekids.com>
Strategies for Teaching Children Responsible Use of Technolo-
gy.
[19]<http://www.computerlearning.org/ARTICLES/ethictch.ht
m>
[20]Tavani Bibliography of Computing, Ethics, and Social Re-
sponsibility
[21]<http://www.siu.edu/departments/coba/mgmt/iswnet/iseth
ics/biblio/>
.
... With all these interpretations, due to the not so long history of virtual education in Iran, the vacancy of research to guide ethical practices in virtual education is strongly felt and few studies have been conducted in Iran (Alikhani & Bazrafshan, 2011;Narimani et al, 2013) and internationally (Jamil & Shah, 2014;Sargolzaei & Nikbakht, 2017;Thunman et al., 2018;Vesna & Niveditha, 2012) indicates thatthe faculty members' experience of this type of educations has not been clear. In this regard, Mata and Boghian (2019) state that ensuring a fair and efficient use of new technologies in teaching, which is an increasingly important part of personal and professional life, is one of the main challenges of the twenty-first centur. ...
Article
Full-text available
The use of virtual education in teaching has provided a wide range of new educational opportunities; but the combination of ethical and legal risks associated with accessing and exchanging information in the form of ethical issues in the digital space has challenged this type of education. In this regard, in the present study, an attempt has been made to express the faculty members' experiences of ethics in virtual education. The research method was qualitative and based on this, 15 samples were interviewed from two groups of experts in technology and computer science and the field of social and humanities sciences. Content analysis method was used to analyze qualitative data. The results showed that faculty members' perceptions of the issue of ethics in virtual education originates from two approaches: ethical character and ethical security. Also, the results of research related to the ethical issues of using virtual education in higher education by faculty members show that these issues are raised in four dimensions of learning environmental health, cultural dimension, security dimension and identity dimension. In addition, the results show that ethical standards can be placed in three levels of civil liability to students, civil liability as a professional faculty member, and civil liability to the virtual education system. These ethical standards can include ethical issues try to solve them.
... What makes the situation more complex is that it is much more difficult for children to judge behaviour as right or wrong in the virtual world (Vesnaj & Niveditha 2012:2) due to a "sense of disorientation and isolation leading to the disregard of reality" and a blending of reality and virtual reality (Minić & Spalević 2014:418-419). ...
Chapter
This book addresses different challenges that endanger the lives of children in South Africa from an ethical perspective. The text is meant to position itself as a resource for specialists (and practitioners) in ethics and childhood studies. The content is systematically and intersectionally presented, based on scholarly analyses, insights, reasoning, and expertise – originating in different disciplines and backgrounds. It endeavours to help especially those who study the sociocultural contexts of children and families in terms of challenges and opportunities, and for possible support.
... What makes the situation more complex is that it is much more difficult for children to judge behaviour as right or wrong in the virtual world (Vesnaj & Niveditha 2012:2) due to a "sense of disorientation and isolation leading to the disregard of reality" and a blending of reality and virtual reality (Minić & Spalević 2014:418-419). ...
Chapter
Full-text available
This book addresses different challenges that endanger the lives of children in South Africa from an ethical perspective. The text is meant to position itself as a resource for specialists (and practitioners) in ethics and childhood studies. The content is systematically and intersectionally presented, based on scholarly analyses, insights, reasoning, and expertise – originating in different disciplines and backgrounds. It endeavours to help especially those who study the sociocultural contexts of children and families in terms of challenges and opportunities, and for possible support.
... Bilişim etiğine yönelik karşılaşılan sorunlarla mücadele etmenin en etkili yolu toplumda bir etik anlayışının oluşturulması ve bu alana özgü bilgi ve farkındalığın artırılmasıdır (Dyrud, 2004;Willcocks ve Whitley, 2009). Bilgi ve farkındalığın istenen düzeylere ulaştırılabilmesi için bu konunun öğretim programlarına dahil edilmesi gerekmektedir (Brey, 2007;Vesna ve Niveditha, 2012). Harncharnchai ve Inplao (2015), bilgisayar ve internete yönelik etik olmayan kullanımların küçük yaşlardan itibaren görüldüğünü vurgulamışlardır. ...
Article
Full-text available
Bu araştırmada ortaokul öğrencileri ile meslek lisesi öğrencilerinin bilişim etiği düzeylerini ortaya koymak ve karşılaştırmak, bu düzeylerinin cinsiyetlerine ve bulundukları öğrenme kademelerine göre değişimini incelemek amaçlanmıştır. Araştırmada genel tarama modellerinden biri olan ilişkisel tarama modelinden yararlanılmıştır. Araştırmanın örneklemi; İzmir ilinde öğrenim gören 101 ortaokul öğrencisi ile 179 meslek lisesi öğrencisi olmak üzere toplam 280 öğrenciden oluşmaktadır Çalışmanın verileri, Arıkan ve Duymaz (2014) tarafından Türkçe'ye uyarlanan “Gerçek Yaşam Durum Senaryolarıyla Bilişim Etiği (GYDSBE)” ölçeği kullanılarak toplanmıştır. 68 maddelik ölçeğin lise öğrencilere uygunluğunu belirlemek amacıyla araştırmacılar tarafından geçerlik güvenirlik çalışması yapılmıştır. Ölçek, “Google Formlar” üzerine aktarılarak çevrimiçi ortamda öğrencilere uygulanmıştır. Kolmogorov Smirnov testi kullanılarak araştırmada elde edilen verilerin normal dağılıma uygunluğu incelenmiştir. Bu testten elde edilen sonuçlara göre analizlerde ilişkisiz t-testi, frekans ve yüzdelerden faydalanılmıştır. Elde edilen bulgulara göre, öğrencilerin mahremiyet, ifade özgürlüğü ve fikri mülkiyet konularındaki etik bilgilerinin düşük düzeyde, doğruluk konusuna yönelik etik bilgilerinin ise orta düzeyde olduğu, ortaokul öğrencileri ile meslek lisesi öğrencilerinin bilişim etiği düzeylerinin ise farklılaşmadığı görülmüştür. Araştırmada elde edilen bir diğer sonuç ise, öğrencilerin bilişim etiği düzeylerinin cinsiyetlerine göre farklılaştığı ve bu farklılığın erkek öğrenciler lehine olduğu şeklindedir. Elde edilen sonuçlar hem ortaokul öğrencilerine hem de meslek lisesi öğrencilerine verilen bilgisayar derslerinin içeriklerinin bilişim etiği konusunda öğrencilere yeterince fayda sağlayamadığını, bu derslerin içeriklerinde bilişim etiği gibi önemli bir konuya yönelik iyileştirmelere gereksinim duyulduğunu ortaya koymaktadır.
... По их мнению, школьные дисциплины должны уделять внимание взаимодействию обучающихся с интернет-пространством. Киберэтика не может руководствоваться общими моральными принципами, сложившимися в прежнем обществе, поэтому уже с юного возраста следует помогать детям понять, что такое интернет-среда и как в ней существовать [14]. ...
Article
Full-text available
The article provides a philosophical and anthropological interpretation of modern scientific achievements and analyses their possible consequences in social and ethical aspects. Special attention is paid to the problem of ethical gap between generations under the conditions of digital technologies impetuous development. Modern cyber-space influences a human’s perception of reality and, consequently, his value orientations. The problem of forming a future generation’s ethical identity requires comprehensive academic study; in this connection, the authors emphasize the necessity to actualize the applied component of ethics through the system of education and upbringing.
Article
Full-text available
MUI Fatwa Number 24 of 2017 contains The Laws and Guidelines for Doing Muamalah Through Social Media. The MUI Fatwa can be applied to social networking ethics (netiquette). The millennial generation has excellent power in countering hoax narratives. The research purpose was to determine netiquette of the millennial generation in doing muamalah and warding off hoax in social media based on MUI Fatwa. The design of this study is qualitative research using an online qualitative survey. Netiquette as a guideline based on the MUI Fatwa focuses on discussing guidelines for doing muamalah on social media and creating and disseminating related content/information in countering hoaxes by the millennial generation from the four existing guidelines. Millennial's netiquette in doing muamalah on social media should be done properly and correctly, not violating the Shari'a and regulations (MUI Fatwa and others), and responding well to each other's content. The content shared is positive and not a hoax. Millennials sort out contents that will be disseminated on social media by studying, understanding, confirming, then following. The netiquette for millennials in warding off hoaxes is to ensure that the content is appropriately verified, helpful, not provocative and does not contain hoaxes, slander, backbiting, bullying, gossip, and other forbidden things. Millennials avoid spreading hoax content on social media by limiting accounts, avoiding and discontinuing, seeking truth from trusted sources, following the Indonesia Anti Hoax page, reporting harmful content through content complaints websites, or directly using the block and report features on social media. If this is not possible, they choose to remain silent, skip, and not share that hoax content.
Article
Full-text available
MUI Fatwa Number 24 of 2017 contains The Laws and Guidelines for Doing Muamalah Through Social Media. The MUI Fatwa can be applied to social networking ethics (netiquette). The millennial generation has excellent power in countering hoax narratives. The research purpose was to determine netiquette of the millennial generation in doing muamalah and warding off hoax in social media based on MUI Fatwa. The design of this study is qualitative research using an online qualitative survey. Netiquette as a guideline based on the MUI Fatwa focuses on discussing guidelines for doing muamalah on social media and creating and disseminating related content/information in countering hoaxes by the millennial generation from the four existing guidelines. Millennial's netiquette in doing muamalah on social media should be done properly and correctly, not violating the Shari'a and regulations (MUI Fatwa and others), and responding well to each other's content. The content shared is positive and not a hoax. Millennials sort out contents that will be disseminated on social media by studying, understanding, confirming, then following. The netiquette for millennials in warding off hoaxes is to ensure that the content is appropriately verified, helpful, not provocative and does not contain hoaxes, slander, backbiting, bullying, gossip, and other forbidden things. Millennials avoid spreading hoax content on social media by limiting accounts, avoiding and discontinuing, seeking truth from trusted sources, following the Indonesia Anti Hoax page, reporting harmful content through content complaints websites, or directly using the block and report features on social media. If this is not possible, they choose to remain silent, skip, and not share that hoax content.
Chapter
Full-text available
The chapter negotiates teachers’ and principals’ perspectives on the current issue of students’ risky online behaviors as well as the role of their resilience in their perspectives under study. In the introduction of the chapter, it is highlighted that the use of new technologies and especially the internet, except for the educational and social-interpersonal benefits brought to students’ daily lives, can also be considered as an “arena” where risky behaviors can be developed. Specifically, the chapter presents the most frequently recorded risky online behaviors among elementary and adolescent students. This fact implies the imperative need the chapter to present teachers’ and principals’ related perceptions, as according to the Theory of Planned Behavior (TPB), people’s perceptions on a specific issue can predict their related behavior towards it. The chapter reveals differences between teachers’ and principals’ perceptions based on their position at school. Furthermore, the effect of demographic characteristics on these perceptions is discussed. The second part of the chapter focuses on the important role of teachers’ and principals’ resilience in their perspective towards the issue under study. This is of major importance considering the aftermath of the global financial crisis as well as the current period of the Covid-19 pandemic, which have negatively affected school staff’s emotionally and professionally. The chapter concludes with basic guidelines of the school prevention actions regarding students’ risky online behaviors as well as the different ways in which teachers and principals can contribute to this issue. Finally, the need to enhance school staff’s resilience in their work environment is emphasized, in order to contribute in a more active and responsible way towards current school issues that affect students’ mental well-being.
Article
Full-text available
The purpose of the article is to reveal the essence of the value-oriented approach and substantiate the necessity of its application during the development and implementation of information technologies. The research methodology is based on the application of a systematic approach as a gen­eral scientific principle of understanding complex organized objects, as well as a dialectical method necessary for the implementation of cultural studies research. The scientific novelty of the research is that the article has further developed approaches to the development of technology on humanistic principles, due to the dehumanization of modern society under the influence of new technologies. Conclusions. The importance of carrying out relevant scientific and technological research, making efforts to raise awareness at the turning points of technology development and initi­ating discussions on the context of their application, including consideration of social values at different stages of technological development. It was revealed that among the priorities of technology application should be: focus on social values, empowerment, promoting the formation of the future by people and for people, etc. This requires responsible management of technologies, control over their use, substantiation of the optimal implementation of values in their development. The social values and needs of mankind should become an indispensable criterion of perception of the newest technologies.
Article
Full-text available
The Internet and its potential effects on society receive much attention in public discussions. Many discussants expect that the World Wide Web will enhance global trade of products and services and thus will increase economic wealth. However, social scientists are concerned with possible social side-effects of the Internet. Specifically, a recent experimental study by Robert Kraut et al. (1998) found that greater use of the Internet decreases communication within the family, diminishes the size of the subjects' local social networks, and increases feelings of loneliness and depression. This study sheds doubt on the generality of these findings. Results from a survey of 15 842 Internet users and a control group of 1196 non-users conducted in Switzerland suggest that Internet use neither decreases respondents' network size nor the time spent with friends. The study also shows that electronic mail is widely used and has positive effects on people's social networks. The study uses many socio-demographic control variables and statistical methods to control for simultaneity.
Article
Full-text available
The first part of this article deals with some initiatives concerning the role of information ethics for Africa, such as the New Partnership for Africa's Development, United Nations Information Communications Technology (ICT), and the African Information Society Initiative particularly since the World Summit on the Information Society. Information Ethics from Africa is a young academic field, and not much has been published so far on the impact of ICT on African societies and cultures from a philosophical perspective. The second part of the article analyzes some recent research on this matter particularly with regard to the concept of ubuntu. Finally, the article addresses some issues of the African Conference on Information Ethics held February 3–5, 2007, in Pretoria, South Africa. © 2008 Wiley Periodicals, Inc. The following essay is adapted from a keynote address delivered at the Africa Information Ethics Conference in Pretoria, South Africa, February 5–7, 2007. Under the patronage of UNESCO, sponsored by the South African government, and organized with assistance from the Department of Information Science at the University of Pretoria, the School of Information Studies at the University of Wisconsin-Milwaukee, and the supporters and members of the International Center for Information Ethics (ICIE), the theme of the conference was “Ethical Challenges in the Information Age: The Joy of Sharing Knowledge.” The full version of the address as well as selected articles from the conference were published in Vol. 7 of ICIE's online journal, International Review of Information Ethics (for more information, visit )
Article
This study explores the arguments used by 14-year-old students in making decisions about the design of a road in their area. The whole activity was based on an actual problem at the time the research took place. The procedure was a sequence, where students worked first individually, then in groups and finally they had to take a class decision. Then they had to realize one of the final proposals and design the construction of a bridge that their planning had involved. This paper first elaborates the general perspective of such an approach; it then describes the process of argumentation and analyses the nature of the students' arguments, which are discussed on the basis of a specifically constructed network.
Conference Paper
This study involved 38 primary school students in a detective game about cyber-ethics dilemmas and explored students' skills at making a reasoned decision and presenting a convincing argument. This game continued for five weeks and was supported by a computer system. It started with a given speculation/hypothesis. Then each student collected at least a piece of supporting evidence and wrote it up on the computer system for each week. During the evidence collection period, the researchers, playing a witness of the opposing side, actively provided refuting evidence each week. For the last week, the students were required to draw respective conclusions/decisions based on their collected evidence and given refuting evidence. All the students' constructed arguments for describing evidences and conclusions were analyzed. It was found that most of the students (about 92%) developed arguments consisting of either claims only or claims and data. They would not be able to construct complicated arguments with backings, warrants and rebuttals.
Article
Ethics are the reflection on morality and observes the ways people communicate with each other as moral persons and the ways the moral identity is observed. Ethical issues have been addressed in libraries and other cultural institutions, corporations, non profit institutions, academia, government agencies, library, information science research, and in media. The terminology used include ethics in librarianship, ethics and computers, technology, and ethics, and other similar terms. A more extended version of Information ethics (IE) includes concern with the moral dilemmas and other ethical conflicts that arise in interactions between human beings and information, information and communication technologies (ICT), and information systems.
Raising Media Literate Children, Grow Smart Brains
  • G Degaetano
DeGaetano, G. (2000). Raising Media Literate Children, Grow Smart Brains.
Technology literacy: Four guiding principles for educators and parents
  • C Cordes
  • L Monke
  • S Tafbott
Cordes, C, Monke, L., & Tafbott, S. (2004). Technology literacy: Four guiding principles for educators and parents.
Digital Literacy Ethical challenges in librarianship
  • P Gilster
  • R Hauptman
Gilster, P. (1997). Digital Literacy, John Wiley & Sons, Hauptman, R. (1988). Ethical challenges in librarianship. Phoenix, AZ: Oryx Press.
/www.safekids.com> Strategies for Teaching Children Responsible Use of Technolo-gy
  • Safekids Com
SAFEKIDS.COM <http://www.safekids.com> Strategies for Teaching Children Responsible Use of Technolo-gy.