Content uploaded by Lourdu Vesna
Author content
All content in this area was uploaded by Lourdu Vesna on Feb 17, 2015
Content may be subject to copyright.
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 1
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
Ethics in cyberspace- a philosophical approach
Lourdu vesna.J ** Dr. D. Niveditha
Lourdu Vesna.J) Department of Electronic Media and Mass Communication, Pondicherry University, Puducherry, India; 2(Dr. D. Nivedhitha) De-
partment of Electronic Media and Mass Communication, Pondicherry University, Puducherry, India
Email: vesnaj20@gmail.com
ABSTRACT
Encouraging students to expand their search for knowledge in cyberspace has brought in new dimension, on the handling of the
new technology by the students and brought to light whether or not our curriculum demand such leap development and fur-
thermore will student use the Internet in more socially responsible way. Children begin to learn ethical values right from birth
ols
have the responsibility to teach and reinforce some moral values. New technologies bring about the need to interpret old values
in new ways, but also may call for the creation of new codes of conduct when new actions are made possible with the use of
technology. Children can quickly identify whether the behavior is right or wrong in real world but when students use virtual
world behavior may not be as easily judged to be right or wrong. This study attempts to show the prevailing misconception the
cyber ethics among students. This paper examines basis ethical issues when students have had to make ethical decisions. The
study will qualitatively explore the level of understanding of teachers concerns and role in bringing in an ethical behavior on
students on the Internet. If a student encounters unsafe behavior on the Internet, the student will be able to behave and act ap-
propriately.
Keywords : Ethics, cyberspace
1 INTRODUCTION
Ethics is a branch of study which deals with moral judgments,
issues of right and wrong, and determining what behaviors
are humane and inhumane. An action is said to be ethical if it
does not have a damaging impact on oneself, other individual
or on society. . o-
At the
Centre for the Advancement of Ethics and Character, the guid-
x-
re-engage the hearts, minds and hands
of our children in forming their own characters, helping them
1996).
Children begin to learn ethical values right from birth
through families and religious institution. They are considered
have the responsibility to teach and reinforce some moral val-
ues. Since the first appearance of the
term in 1988, this topic more commonly has been referred to as
Information Ethics (IE). Robert Hauptman (1988) used the term
in the first chapter of Ethical Challenges in Librarianship, which
is the first use in English. Capurro (1988) challenged informa-
tion professionals to take responsibility and action for infor-
mation policy in professional and public settings. He saw IE as
the appropriate term for the contemporary information ethos
or environment. The third appeared in the criminal justice
literature (DeMaio, 1988). But still Children do not know what
they can or cannot do with intellectual property on the inter-
net ,many computer-savvy kids as well as educators, adminis-
trators and parents are unclear about what is and what is not
ethical when dealing with the World Wide Web (Janna J.
Baum, 2008).
the document, select “Page Layout” from the “View” menu
in
IJOART staff will edit and complete the final formatting of
your paper.
2 REVIEW OF LITERATURE
2.1 Ethics in Internet
Aristotle, the founder of ethics as an academic discipline ar-
gued ethics as a reflection of morality. As Rafael Capurro
(2008), who heads the International Center for Information
-referential process ethics is
an unending quest on explicit and implicit use of the moral
code, that is to say of respect or disrespect, with regard to in-
dividual and social communication. In other words, ethics
observes the ways we communicate with each other as moral
persons and the ways this moral identity is understood. There
Definition of Information Ethics includes concern with the
moral dilemmas and ethical conflicts that arise in Interactions
between human beings and information (creation, organiza-
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 2
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
tion, dissemination, and use), information and communica-
tions technologies (ICTs), and information systems. (Toni Car-
bo ,2008).Cyber ethics (information and communication ethics)
differs from the rest and requires a special attention because
we
that happens within the computer network, a new phenome-
non that is not always well understood because they receive
all the basic moral values from primary institution like school,
religion and family which does not represent the virtual
world. These are two different worlds and it is easy for stu-
dents to judge what is right from wrong in real world for the
same behavior than the virtual world. Ethical decisions can be
as simple as to choose a drink or as complicated as whether to
support the cloning of human beings. The ability to make and
evaluate arguments appears even more important in a modern
world where people have to deal with a lot of new information
in diversifying technology convergence. Argumentation is a
process of making and justifying arguments. To justify an ar-
gument is to support it with evidence because people may
just be a personal opinion (Reznitskaya, A, 2002)
2.2 Two Different World
Children can quickly identify whether the behavior is right or
wrong in real world but when students use internet (described
as virtual world) behavior may not be as easily judged to be
right or wrong. (Janna J. Baum, 2008) New technologies bring
about the need to interpret old values in new ways, but also
may call for the creation of new codes of conduct when new
actions are made possible with the use of technology such as
The ability to send unsolicited commercial messages to mil-
lions of Internet email users (spamming) was not possible be-
fore there was email or the Internet. Digital photography has
made the manipulation of images undetectable, an impossible
feat with chemical photography. Prior to the Internet, minors
faced physical barriers of access to sexually explicit materials.
What safeguards do schools, libraries, and parents need to
take to keep children from freely accessing inappropriate ma-
terials? Intellectual property in digital format can now be dup-
licated with incredible ease. Do we need clearer definitions of
property? Capurro, R. (2008). One of the most significant rea-
sons that computer ethics deserve special attention is because
of our rather human ability to view one's actions in the intang-
ible, virtual world of information technologies as being less
serious than one's actions in the real world. Most of us, adults
or children, would never contemplate walking into a computer
store and shoplifting a computer program. Yet software piracy
(the illegal duplication of computer programs) costs the com-
puter business billions of dollars each year. Most of us would
never pick a lock, but guessing passwords to gain access to
Teachers who need to give students opportunities to construct
value judgments and counter-arguments, to compare their
own ethical decision with opposing arguments and to develop
their reasoning ability (Patronis, T, et al 1999). Students also
need chances to improve their conceptual understanding and
value judgments Most of the students developed low level
arguments consisting of either claims only or claims and data.
Due to the lack of rebuttal in arguments, (Chun-Hsu Lin, et al
2010). Teachers need to develop learning objectives and activi-
ties that specifically address technology ethics. Proper use
needs to be taught at the same time that other computer skills
are taught. Capurro, R. (2008).
.
2.3 Ethical Dilemma
The usage of internet has grown explosively as fast internet
connections get cheaper. However, a Lot of the children who
uses internet are not aware of the fact that personal informa-
tion may be revealed when they go online (Sonia Livingstone
,2003). Information technology misuse by many people, espe-
cially the young, is viewed as a low-risk, game-like challenge.
There is a physical risk when breaking into a real office that
does not exist when hacking into a computer database from
one's living room or den. Illegally copying a book is costly and
time consuming; illegally copying a computer program can be
done in seconds at very small expense. Media plays a vital
role in the ethical dilemma, Movies, as well as book and tele-
vision programs, often make questionably ethical actions such
as breaking into secure computer systems seem heroic or at
least sympathetic .( Doug Johnson, 1999 ) as these action are
not questions ethically but approached as a outcome of intelli-
gence. The viewed pornography on a website seems to dis-
appear as soon as the browser window is closed. Not long ago,
ethical technology questions were only of interest to a very
few specialists. But as the use of information technologies
spreads throughout society and its importance to our national
economies and individual careers grows, everyone will need
to make good ethical decisions when using computers. Studies
show that persons involved in computer crimes acquire both
their interest and skills at an early age.
Association for Computing Machinery's Code of Ethics and
Professional Conduct (1993) stresses many of the same ideas
as The 10 Commandments of Computer Ethics. Their "moral
imperatives" include:
1. I will contribute to society and human well-being
2. I will avoid harm to others.
3. I will be honest and trustworthy.
4. I will be fair and not discriminate.
5. I will honor property rights including copyrights and pa-
tents.
6. I will give proper credit for intellectual property.
7. I will respect the privacy of others.
8. I will honor confidentiality.
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 3
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
Deborah Johnson in Computer Ethics,2nd Edition (Prentice-Hall,
1994) include: Johnson's 3 P's of Technology Ethics: Privacy - I will
protect my privacy and respect the privacy of others. Property - I will
protect my property and respect the property of others. Appropriate
Use - I will use technology in constructive ways and in ways which
do not break the rules of my family,church, school, or government.
2.4 Methodology
Research background
The following data are drawn from five educational institu-
tions, which examined cyber ethics perception evaluated ac-
tual problem and described attempts to be made by schools to
alleviate this ethical dilemma that prevails among the stu-
dents. The research took the form of semi structured inter-
view. Field sites were selected to produce a diversity of cate-
gories and information in order to provide some basis towards
generalization (Kennedy, 1979). Overall, two primary schools
two middle schools and three higher secondary schools were
selected as field sites (see table 1). Additionally, it believed
that cyber ethical perception might change as staff gained
more online experience, so schools were selected that had es-
tablished Internet use. Whilst the person with primary respon-
sibility for information and communication technology (ICT)
in school served as an initial contact, teachers with no specific
internet related roles were also interviewed. Fourty two staff
member were interviewed, twelve in St. Marks, 10 in Monfort
school, 10 in St. Santhome school, 8 in St Peters school and 2 in
St.Johns. Within the practice of qualitative interviewing it
should be recognized that there may exist some difference
between the responses of an interviewee and the reality that
these responses were intended to capture. This might be per-
ceived as an issue of validity, that is, whether an account
accurately represents certain features of a phenomenon that it
is intended to describe, explain or theories (Hammersley, 1992,
p, 69). As Gomm (2004, pp.152-153) notes, validity in inter-
views might be compromised where respondents do not know
the information required, where they Table 1 Details of re-
search field sites
Choose to answer inaccurately, where they are unwilling to
answer the question or where a different interpretation of the
question may have been made. It would be naïve to dismiss
the possibility that such occurrence might have compromised
the validity of aspect of the subsequent data on staff narra-
tives.
Time was spent in schools to build up rapport with staff and
were guaranteed that all research data was confidential. It
was recognized that the objectivity might be compromised
through engagement teachers. Yet, disengagement is not al-
ways a realistic, or , some would argue, desirable, possibility
in qualitative research and is perhaps best understood as a
process constructed after the event.
Teacher’s perception of cyber ethics from student’s use of Internet
As already stated perception of cyber ethics of students may
not necessarily correlate with actual dangers, yet understand-
ing expressed fears can provide an insight into potential ha-
zards,. Importantly, these perceptions need to be understood
on a hermeneutic level. In exploring staff perception issues
relating to the status of student, the cultural construction of
ethics can also will be considered.
The major issues surrounding technology ethics can be catego-
rized into three areas: privacy, property, and appropriate use.
Of the 42 staff interviewed, 26 expressed concern about pla-
giarism, 9 focused on copyright and 7 on the hacking.
Privacy:
This was a significant concerns among the staff as they ap-
proached it in ethical perspective, student using internet must
reflect that their use of this technology should not violate the
privacy of others and they should not give information to
other. Children need to understand that businesses and or-
ganizations use information to market products. Information
given to one organization may well sell it to others. All stu-
dents need to know that a stranger is a stranger, whether on
the playground or on the Internet. The same rules we teach
children about physical strangers apply to virtual strangers as
well. Information inadvertently left accessible does not mean
that it is appropriate to access it.
they develop a sense of comfort with the online stranger than the
physical one. This many because of the anonymity provided by the
medium.” Stated a Santhome high school teacher.
Plagiarism
S.NO
NAME OF
SCHOOL
AGE
RANGE
MONTHS
SCHOOl ON-
LINE
1.
Monfort
Higher
Secondary
24
2.
Santhome
Higher
Secondary
24
3.
St. Johns
High
School
6
4.
St.Peters
High
School
10
5.
St.Marks
High
School
18
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 4
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
Concepts like plagiarism, hacking are not understood by stu-
dents in a proper sense but by youth narratives the teachers
say that the student consider it to heroic and more knowled-
geable when they crack codes. Students need to understand
when and how to cite sources in both print and electronic
formats. Students need to learn to treat intellectual property,
existing only in virtual spaces, the same way they would treat
physical property and that the theft or destruction of such
property is unethical (and unlawful).
The basic purpose of assignment is to develop a better understand-
ing on the subject. But the very essence is spoiled when they copy
and paste materials from the internet for the assignment”
“the concept of plagiarism existed even before computers but with
advent of internet it is become easier”
Copyright violation
Overall, seven of the staff interviewed expressed concern over
copyright infringement. It was recognized in the primary
schools that students tend to copy and print images from the
web with little awareness of copyright laws. It was difficult
explaining to young children why they could not copy certain
images. Rather, students tended to cut and paste whatever
online material they want without awareness of copyright
laws. Moreover the most common they attempt to do is to
download songs, movies and sometimes software download
the ethical issue to be considered is that these student will
comment viewing movie in pirated version is ethically wrong
but a similar kind of action in online is not considered so by
them. Teacher of Monfort School stated that
One thing most commonly done by students is downloading music
and movies, now the problem with that for me is there are licensing
issues, which of course the student are not interested in.
Students need to know that computer software is protected by
copyright law. It is unlawful, as well as unethical, to make cop-
ies of computer programs without permission or payment of
the producer of those programs.
Appropriate usage
Not all information in internet is suitable for students and stu-
on the internet. There are sites which misguide them and can
also influence student in a worse way. Students must be
guided in what is the appropriate way to use internet for the
knowledge base.
“A good deal of Internet content, if not obscene, is certainly tasteless,
offensive, and lacking in educational value.”
Digital literacy
All the teachers interviewed labelled poor online education
recourses and they wanted infusion of responsible computing
to be taught in school and added in the curriculum. Teachers
anticipate that the more digitally literate or skilled children
become, the more they will gain from the internet while also
being better prepared to avoid or cope with online risks. While
digital literacy is generally defined as including a broad range
of skills and competences, digital safety skills represent a spe-
cific subset of digital or media literacy. Children should gain
internet access in advance of an infrastructure of awareness-
raising, parental understanding, regulation and safety protec-
tion.
5 CONCLUSION
d-
The critical system she infers here is their mind and professes
foundation the mind will continue to adapt and develop for a
lifetime and the stimulus she refers to is the computer. This
paper helps to identify and emphasizes areas where an under-
future understanding in the use of the Internet and their inte-
raction with other aspects of the Internet and its environment.
If a student encounters unsafe behaviour on the Internet, the
student will be able to behave and act appropriately. By inte-
grating cyber ethics in school curriculum the college will help
prompt students, teachers and parents to re-examine their de-
cision framework with regard to Internet usage and hence
move them to reflect and consider the use of the technology
ethically. Ultimately, "the goal of technology literacy is to ena-
ble young people to develop their own creative and critical
capacities in relating to technology, not to train them to be ma-
chine operators. Then they will clearly see that their own
choices are not limited to adjusting themselves to a 21' century
2). Although
the challenges facing those who teach technology are great,
educators remain hopeful. Tom Lickona,
professor of education at the State University of New York at
Cortland sums it up perfectly by saying, "Even in a rotten
world, it's possible to raise a moral child, if we make it a high
priority" (Newman, para. 11). As Capurro (2008) states that
to do the good, and, we could add,to dream about it
6 REFERENCES
[1]Armstrong, A. (2001). The Child and the Machine: how
computers put our children's education at risk.
[2]Axel, F. (2001). Does the Internet make us lonely? Institute
for Sociology, University of Berne,Lerchenweg, Switzerland.
International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 5
ISSN 2278-7763
Copyright © 2012 SciResPub. IJOART
[3]Abdul Ghany, H. (2003). The effect of using the internet for
the youth: the ninth scientific conference for media college
media ethics: theory and application, media college ,Cairo.
[4] Aziz, N. (1999). The internet is a way of learning within the
classroom and distance learning.The Education Journal, 30.
[5] Capurro, R. (2008). Information ethics for and from Africa.
Journal of the American Society for Information Science and Tech-
nology.
[6] Chun-Hsu Lin, Shih-Ming Huang, Pei-Shan Wu, and
Chiung-Hui Chiu (2010) n-
making Argumentation in Cyber-ethics Dilemmas IEEE Fron-
tiers in Education Conference pp 27-30.
[7] Cordes, C, Monke, L., & Tafbott, S. (2004). Technology litera-
cy: Four guiding principles for educators and parents.
[8] DeGaetano, G. (2000). Raising Media Literate Children,
Grow Smart Brains.
[9] Deborah Johnson Computer Ethics,2nd Edition (Prentice-
Hall, 1994)
[10] DeMaio, H.B. (1988). Information ethics
naturally. Computer Security Journal, 5(1), 719.
[11]Gilster, P. (1997). Digital Literacy, John Wiley & Sons,
Hauptman, R. (1988). Ethical challenges in librarianship.
Phoenix, AZ: Oryx Press.
[12]Healy, J. M. (1998). Endangered Minds. Creating the Fu-
ture. D. Dickinson. Seattle, WA
98115, New Horizons for Learning.
[13] Janna J. Baum( 2008) CyberEthics:The New Frontier Tech-
Trends Volume 49, pp 54-56
[14]Newman, A. M. (n.d.). 21"-century cheating
http://www.scholastic.com/schoolage/grade5/homework/cheat
ing.htm
[15] Patronis, T., Potari, D. and Spiliotopoulou, V., "Students'
argumentation in decision-making on a socio-scientific issue:
implications for teaching", International Journal of Science Educa-
tion,Vol 21, No 7, 1999, pp. 745-754.
[16] Reznitskaya, A. and Anderson, R. C., "The argument
schema and learning to reason", in Comprehension instruction:
Research-based best practices, Block, C. C. and Pressley, M. E.,
Eds., New York: Guilford, 2002, pp. 319-334.
[17] Toni Carbo, Martha M. Smith (2008), Global Information
Ethics: Intercultural Perspectives On Past And Future Research
Journal Of The American Society For Information Science And
Technology, 59(7):11111123,
[18] SAFEKIDS.COM <http://www.safekids.com>
Strategies for Teaching Children Responsible Use of Technolo-
gy.
[19]<http://www.computerlearning.org/ARTICLES/ethictch.ht
m>
[20]Tavani Bibliography of Computing, Ethics, and Social Re-
sponsibility
[21]<http://www.siu.edu/departments/coba/mgmt/iswnet/iseth
ics/biblio/>
.