SlideShare una empresa de Scribd logo
1 de 46
Ethics in Cyber Space
What are Ethics anyway?
 Understanding how your actions affect other people
 Knowing right from wrong
 Taking personal responsibility for your actions
 So , “Ethics is about putting principles into action. Consistency between what
we say and … what our actions say… is a matter of integrity.”
Unethical vs. Illegal
 What is unethical is not necessarily illegal.
 For example, the issue of a company legally monitoring Employee‟s E-mail is
very controversial issues.
 Employees have limited protection against employer‟s electronic surveillance.
 The law appears to support employer‟s rights to read electronic mail and
other electronic documents of their employees.
 Here, The definitions of “Right” and “Wrong” are not clear. Also, the
distinction between what is illegal and what is unethical is not always obvious
What do we mean by CYBERETHICS ?
 Cyberethics is the philosophic study of ethics pertaining to computer
networks, encompassing user behaviour.
 what networked computers are programmed to do, and how this
affects individuals and society.
 Cyber-Ethics is the Ethics applied to the online environment.
Why should we be Concerned about
Cyber Ethics ?
 Anonymous posting to blogs, websites and social media can encourage bad
behaviour anytime.
 Information in cyberspace can be accessed globally.
 what is right and wrong for Internet users can do,
 what are the social impacts of Information Technology (IT).
 understand security, privacy issues, and major negative impacts of IT on
cyberspace
 Computer Networks can be threatened by many internal and external hazards
internationally,
Why Cyber Ethics ?
Cyber Ethics underpin actions that must be
taken not only to harness the power of the IT
itself, but also to survive its revolution so it
should be the concern of everyone.
Three main types of Ethical issues
 Privacy
IT enables exchange of information on a large scale enables increased
potential for disclosing information and violating the privacy
 Access Right
The topic of computer security and access right has moved quickly from
being a low priority for corporations to high priority for government
agencies.
 Harmful Actions
Harm to any of users, the general public, employees, and employers .
Harmful actions include intentional destruction or modification of files and
programs leading to serious loss of resources or unnecessary expenditure of
human resources.
Let’s review and discuss some common
cyber-ethical
concerns…
Acceptable Use Policy (AUP)
Violations
 Disregard for technology or
network rules and policies. This
could be willful or unintended
disregard.
Piracy
 Unauthorized duplication and distribution of
items such as games, software, DVDs, music, etc.
 End User License Agreement Violation : When
you purchase a game or CD, you are purchasing a
license to USE them; you do not OWN them.
Plagiarism
 Using another person’s ideas,
words, images, or original works
as your own without
acknowledging the source.
Cyber-bullying
"Cyber-bullying" is when a child or
teen is tormented, threatened,
harassed, humiliated, embarrassed,
or otherwise targeted by another
child or teen using the Internet,
interactive and digital technologies,
or cell phones.
Cyber-libel
 Deliberate misrepresentation of
people or events.
 False statements that harm
another’s reputation.
Worms and Viruses
 Malicious programs shared
with the intent of shutting down
a computer or computer system.
Violating Privacy
 Willfully using another person’s
password to access his or her
email or documents online,
distributing private information
of or about another.
Cyber-stalking
 The use of the Internet, email,
or other electronic
communications devices
to stalk another
person.
79.5
73.1
59.3 59
55.2
48.5
10.4
0
10
20
30
40
50
60
70
80
90
Fraudulent
Information
violation of
privacy
False Rumors Obscence
Information
Libel Information Civil Rights
Violation
Gambling
Information
Illegal Information on Internet
Call into Questions…
 Is it ok to display personal information
about other on the Internet ?
 Who owns digital data ( such as
music, movies, books, webpages etc.)
and what should users be allowed to do
with it ?
 Who is allowed to access the data and
information?
 How can we safeguards to ensure that
the information can be accessed only by
the right person or organizations?
Who should be Concerned about Cyber
Ethics ?
 businesses and governments rely on technical measures to protect themselves
from false information, stealing, deny access, or even destroy valuable
information.
 Self-protection is not sufficient to make cyberspace a safe place to conduct
business. The rule of law must also be enforced.
 Cyber ethics must be taught and reinforced at every level of computer use
 From the novice user just learning to navigate a computer and the
internet, to an information technology professional
 Those who use the internet in any mode must be taught ethical practices in
every aspect of its use
The Rules of Ethical Cyber Activity
 Basic Rule – Do not do something in cyber space that you would consider
wrong or illegal in everyday life
 Do not use rude or offensive language
 Do not be a bully on the Internet. Do not call peoples name, lie about
them, send embarrassing pictures of them, or anything else to try to heart
them.
 Don‟t encourage the cyberbullies. Do report cyberbullying.
 Do use internet for research and information but don‟t use copyrighted
information as your own.
The Rules of Ethical Cyber Activity
 Do not break into someone else‟s computer.
 Do not attempt to infect or in any way try to make someone else‟s computer
unusable.
 Don‟t share personal information too easily.
 Do use the internet to expand your social and business network but don‟t
hamper other in doing so.
Internet Safety
 Guard your privacy : What people know about you is up to you.
 Protect your reputation: Self-reflect before you self-reveal. What‟s funny or
edgy today could cost you tomorrow.
 Nothing is private online: Anything you say or do can be copied, pasted and
sent to billions of people without your permission.
 Assume everyone is watching: There is huge vast audience out there.
Someone you don‟t know also has access to your information.
 Apply the golden rule: If you don‟t want it done to you, then don‟t do it with
someone else.
 Watch the clock : A virtual hug never matches a real one. Balance your life.
Internet Safety
 Choose wisely: Not all the content is appropriate. You know what we mean.
 Don‟t hide: Using anonymity to cloak your actions doen‟t turn you into a
trustworthy, responsible human being.
 Think about what you see: Just because you find it over internet doesn‟t
make it true.
 Be smart, be safe: Not everyone is who they say they are. Be smart while
sitting online and interacting with people.
ACM Commitments on Ethics
1. Contribute to society and human being.
2. Avoid harm to others.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate.
5. Honor property rights including copyrights and patents.
6. Give proper credit for intellectual property.
7. Respect the privacy of others.
8. Honor confidentiality.
9. Contribute to society and human being.
CONCLUSION
 The new world of information society with global networks and cyberspace
will inevitably generate a wide variety of social, political, and ethical
problems.
 Basic issues have been solved partially using technological approaches and
legal laws in cyberspace.
 Guidelines and strategies should be implemented so that global information
can be exploited in a socially and ethically sensitive way for our future
benefit and applications.
CASE STUDY 1
Facebook confessions page
Facebook confessions page
 It is page on Facebook on which any one can anonymously post a
personal information.
 Juicy-campus launched in 2007 with the goal of enabling “online
anonymous free speech on college campuses”.
 College ACB.com in 2007 which peaked with over 900,000 views
in a single day
 College ACB closed down in October 2011 but anonymous online
confession sites didn‟t go away
What is it ?
Facebook confessions page
 US college students began using a combination of Facebook pages
and anonymous forms such as Google Forms or SurveyMonkey to
create school based Facebook Confession Pages.
 In India it started in IIT-B and just after one day It also started in
LNMIIT and various other collages.
 These services were controversial as many of the posted
confessions hurt the school‟s image.
What is it ?
Facebook confessions page
ANONYMITY is the answer to this.
 Anonymity is an important and useful tool in many
situations.
 Most adults have at some time read newspaper advice
columns where readers anonymously submit problems and
an “Agony Aunt” responds with advice so that others with
similar problems benefit.
 Voting is usually done anonymously to allow freedom of
expression and governments protect anonymous
whistleblowers with legislation.
Why do Students use them ?
Facebook confessions page
 And police “Tips” phone services assure anonymity as a way
of getting people to share others‟ misdeeds.
 Kids Help Phone encourages teens and children to phone in
and share their problems anonymously because this helps
teens and children to address problems they can‟t in other
ways
 What no one can deny is that the need to share
anonymously is deep-seated.
Why do Students use them ?
Facebook confessions page
 Facebook Confession Pages are simply pages that allow
students to anonymously submit their deepest secrets.
 The moderator of the page posts the confessions on the
Facebook page.
 Students who „like‟ the page can see each confession and
can „like‟ each confession and comment.
 The moderators of the page are often unknown to the
students, as are the contributors.
How do they work ?
Facebook confessions page
 The Facebook Confession Page model has caught on and
spreading fast.
 The pages are free, easy to set up and tap into this deep-
seated need teens and young adults have to share what
they‟re really thinking and feeling without fear of adult
sanctions.
How do they work ?
Facebook confessions page
 While the original intent of Facebook Confession Pages was
to offer a forum for students to share problems, concerns
and secrets that isn‟t all students are sharing. The online
dis-inhibition effect, a loosening of social restrictions and
inhibitions that would normally be present in social
interactions, means that many students want to also use
the confessions pages to share stories of alcohol and drug
use or sexual behaviour. In some cases the pages lead to
cyberbullying or even slander.
What are the problems ?
Facebook confessions page
 Invasion of Privacy
 Character Assassination
What is Unethical here ?
Facebook confessions page
 Experience in other jurisdictions suggests that taking pages
down won‟t solve the problem. Pages are easy to set
up, and often when one is taken down another pops up
right away moderated by a different student.
 Teens expressing depression, issues with body image or
alcohol and drug use should concern us all and rather than
preventing them from posting about it we should be looking
at the behavior and trying to address it.
What can educators and parents to do?
Facebook confessions page
 Students clearly have a need to post anonymously about
their problems, concerns and fears.
 Schools should embrace the opportunity and set up their
own “Confessions Pages”, moderated by students but with
guidelines
 Confession Pages and their associated problems also
highlight the need for greater education about digital
citizenship for students
What can educators and parents to do?
Facebook confessions page
 need to better understand the risks of posting and the
permanent and public nature of digital spaces.
 This starts at an early age with parents talking to children
about social media and modeling good online behavior
themselves.
What can educators and parents to do?
CASE STUDY 2
Napster vs RIAA
The Napster Controversy: RIAA vs. Napster
 In the summer of 1999, a website, www.napster.com, was
launched in the US. The website made it possible for its
users to freely share their music files through the Internet
with other users all over the world.
 The service became extremely popular within a short span
of time. The website attracted 1.6 million simultaneous
users during the height of its popularity in February 2000.
 Napster's offering of this 'peer-to-peer' technology was
strongly condemned by the Recording Industry Association of
America (RIAA), a trade group representing the world's
biggest record labels, Universal Music, Sony Music, Warner
Music, EMI Group and Bertelsmann AG.
Allegation on Napster
 RIAA alleged that Napster was engaging in or assisting others
in copying copyrighted music without payment or the
express permission of the rights owners.
 RIAA also claimed that Napster would significantly harm the
sales of the recording industry.
 In December 1999, the body sued Napster in the Federal
District Court for copyright infringements and petitioned the
court to shut down the website.
What Happened NEXT.
 The legal battle was covered extensively in the global media.
 In the beginning of July 2001, Napster had to stop offering its services
due to certain technical problems. While the company was working
towards setting the problems right and resuming operations, in mid
July 2001, a District Court Judge order barred Napster from offering
the file-sharing service.
 Even as Napster users strongly protested against the order, the
company appealed the ruling before the US Court of Appeals in San
Francisco. The Appeals Court granted Napster temporary reprieve
against injunction until a further review of the injunction request.
 Napster was eventually acquired by Roxio. In its second incarnation
Napster became an online music store until it was acquired by
Rhapsody from Best Buy on 1 December 2011.
Questions Raised
 The controversy raised several questions regarding the
impact of the emergence of newer technologies like Napster
on the traditional modes of conducting business.
 Was the recording industry using its financial power to
suppress technological innovations in the music business?
 Was Napster wrong in allowing people across the globe to
access music without paying for it and without the artistes'
permission?
 The case eventually came to be seen as a struggle by the
powerful entertainment industry against a new technology
threatening it.
Ethical Point of View
 Shared Music For Free But Not
FREE MUSIC.
What went wrong ?
Ethical Point of View
 Firstly, Because it caused Heavy Loses to the Recording
industry; Artists & Recording houses who spent millions in
productions.
 Secondly, It directly encouraged Piracy of Music and giving
birth to Many other similar websites
Why was it Unethical ?
Thank You…

Más contenido relacionado

La actualidad más candente

Professional ethics and responsibilities
Professional ethics and responsibilitiesProfessional ethics and responsibilities
Professional ethics and responsibilities17221598-012
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptxMarvenParay
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 

La actualidad más candente (20)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Professional ethics and responsibilities
Professional ethics and responsibilitiesProfessional ethics and responsibilities
Professional ethics and responsibilities
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Ethics of technology
Ethics of technologyEthics of technology
Ethics of technology
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

Destacado

QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATIONQUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATIONMary Blaise Mantiza
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Quality assurance in education through voluntary accreditation
Quality assurance in education through voluntary accreditationQuality assurance in education through voluntary accreditation
Quality assurance in education through voluntary accreditationgratinale
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
Curricular landscape for the 21 st century
Curricular landscape for the 21 st centuryCurricular landscape for the 21 st century
Curricular landscape for the 21 st centuryNina Graye Sean Lanante
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Mother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
Mother Tongue Based - Multilingual Education (MTB-MLE) in PhilippinesMother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
Mother Tongue Based - Multilingual Education (MTB-MLE) in PhilippinesDåLé Rǝnomǝron
 

Destacado (20)

Ethical issues in cyberspace
Ethical issues in cyberspaceEthical issues in cyberspace
Ethical issues in cyberspace
 
Bridging Between Languages
Bridging Between LanguagesBridging Between Languages
Bridging Between Languages
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATIONQUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
QUALITY ASSURANCE IN EDUCATION THROUGH VOLUNTARY ACCREDITATION
 
Cyber law
Cyber lawCyber law
Cyber law
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Quality assurance in education through voluntary accreditation
Quality assurance in education through voluntary accreditationQuality assurance in education through voluntary accreditation
Quality assurance in education through voluntary accreditation
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Spiral progression in Science
Spiral progression in ScienceSpiral progression in Science
Spiral progression in Science
 
Curricular landscape for the 21 st century
Curricular landscape for the 21 st centuryCurricular landscape for the 21 st century
Curricular landscape for the 21 st century
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Mother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
Mother Tongue Based - Multilingual Education (MTB-MLE) in PhilippinesMother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
Mother Tongue Based - Multilingual Education (MTB-MLE) in Philippines
 

Similar a Ethics in cyber space

Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)Maria Obaidi
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rulesMazni Salleh
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
The Nine Elements of Technology
The Nine Elements of TechnologyThe Nine Elements of Technology
The Nine Elements of TechnologyYousef93
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.vitor94
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 

Similar a Ethics in cyber space (20)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Ethicsincyberspace (3)
Ethicsincyberspace (3)Ethicsincyberspace (3)
Ethicsincyberspace (3)
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
The Nine Elements of Technology
The Nine Elements of TechnologyThe Nine Elements of Technology
The Nine Elements of Technology
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 

Más de nitss007

Practical ethics
Practical ethicsPractical ethics
Practical ethicsnitss007
 
Political violence
Political violencePolitical violence
Political violencenitss007
 
Incentives
IncentivesIncentives
Incentivesnitss007
 
Freakonomics
FreakonomicsFreakonomics
Freakonomicsnitss007
 
Personality Development
Personality DevelopmentPersonality Development
Personality Developmentnitss007
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 

Más de nitss007 (6)

Practical ethics
Practical ethicsPractical ethics
Practical ethics
 
Political violence
Political violencePolitical violence
Political violence
 
Incentives
IncentivesIncentives
Incentives
 
Freakonomics
FreakonomicsFreakonomics
Freakonomics
 
Personality Development
Personality DevelopmentPersonality Development
Personality Development
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 

Último

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Último (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 

Ethics in cyber space

  • 2. What are Ethics anyway?  Understanding how your actions affect other people  Knowing right from wrong  Taking personal responsibility for your actions  So , “Ethics is about putting principles into action. Consistency between what we say and … what our actions say… is a matter of integrity.”
  • 3. Unethical vs. Illegal  What is unethical is not necessarily illegal.  For example, the issue of a company legally monitoring Employee‟s E-mail is very controversial issues.  Employees have limited protection against employer‟s electronic surveillance.  The law appears to support employer‟s rights to read electronic mail and other electronic documents of their employees.  Here, The definitions of “Right” and “Wrong” are not clear. Also, the distinction between what is illegal and what is unethical is not always obvious
  • 4. What do we mean by CYBERETHICS ?  Cyberethics is the philosophic study of ethics pertaining to computer networks, encompassing user behaviour.  what networked computers are programmed to do, and how this affects individuals and society.  Cyber-Ethics is the Ethics applied to the online environment.
  • 5. Why should we be Concerned about Cyber Ethics ?  Anonymous posting to blogs, websites and social media can encourage bad behaviour anytime.  Information in cyberspace can be accessed globally.  what is right and wrong for Internet users can do,  what are the social impacts of Information Technology (IT).  understand security, privacy issues, and major negative impacts of IT on cyberspace  Computer Networks can be threatened by many internal and external hazards internationally,
  • 6. Why Cyber Ethics ? Cyber Ethics underpin actions that must be taken not only to harness the power of the IT itself, but also to survive its revolution so it should be the concern of everyone.
  • 7. Three main types of Ethical issues  Privacy IT enables exchange of information on a large scale enables increased potential for disclosing information and violating the privacy  Access Right The topic of computer security and access right has moved quickly from being a low priority for corporations to high priority for government agencies.  Harmful Actions Harm to any of users, the general public, employees, and employers . Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources.
  • 8. Let’s review and discuss some common cyber-ethical concerns…
  • 9. Acceptable Use Policy (AUP) Violations  Disregard for technology or network rules and policies. This could be willful or unintended disregard.
  • 10. Piracy  Unauthorized duplication and distribution of items such as games, software, DVDs, music, etc.  End User License Agreement Violation : When you purchase a game or CD, you are purchasing a license to USE them; you do not OWN them.
  • 11. Plagiarism  Using another person’s ideas, words, images, or original works as your own without acknowledging the source.
  • 12. Cyber-bullying "Cyber-bullying" is when a child or teen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child or teen using the Internet, interactive and digital technologies, or cell phones.
  • 13. Cyber-libel  Deliberate misrepresentation of people or events.  False statements that harm another’s reputation.
  • 14. Worms and Viruses  Malicious programs shared with the intent of shutting down a computer or computer system.
  • 15. Violating Privacy  Willfully using another person’s password to access his or her email or documents online, distributing private information of or about another.
  • 16. Cyber-stalking  The use of the Internet, email, or other electronic communications devices to stalk another person.
  • 17. 79.5 73.1 59.3 59 55.2 48.5 10.4 0 10 20 30 40 50 60 70 80 90 Fraudulent Information violation of privacy False Rumors Obscence Information Libel Information Civil Rights Violation Gambling Information Illegal Information on Internet
  • 18. Call into Questions…  Is it ok to display personal information about other on the Internet ?  Who owns digital data ( such as music, movies, books, webpages etc.) and what should users be allowed to do with it ?  Who is allowed to access the data and information?  How can we safeguards to ensure that the information can be accessed only by the right person or organizations?
  • 19. Who should be Concerned about Cyber Ethics ?  businesses and governments rely on technical measures to protect themselves from false information, stealing, deny access, or even destroy valuable information.  Self-protection is not sufficient to make cyberspace a safe place to conduct business. The rule of law must also be enforced.  Cyber ethics must be taught and reinforced at every level of computer use  From the novice user just learning to navigate a computer and the internet, to an information technology professional  Those who use the internet in any mode must be taught ethical practices in every aspect of its use
  • 20. The Rules of Ethical Cyber Activity  Basic Rule – Do not do something in cyber space that you would consider wrong or illegal in everyday life  Do not use rude or offensive language  Do not be a bully on the Internet. Do not call peoples name, lie about them, send embarrassing pictures of them, or anything else to try to heart them.  Don‟t encourage the cyberbullies. Do report cyberbullying.  Do use internet for research and information but don‟t use copyrighted information as your own.
  • 21. The Rules of Ethical Cyber Activity  Do not break into someone else‟s computer.  Do not attempt to infect or in any way try to make someone else‟s computer unusable.  Don‟t share personal information too easily.  Do use the internet to expand your social and business network but don‟t hamper other in doing so.
  • 22. Internet Safety  Guard your privacy : What people know about you is up to you.  Protect your reputation: Self-reflect before you self-reveal. What‟s funny or edgy today could cost you tomorrow.  Nothing is private online: Anything you say or do can be copied, pasted and sent to billions of people without your permission.  Assume everyone is watching: There is huge vast audience out there. Someone you don‟t know also has access to your information.  Apply the golden rule: If you don‟t want it done to you, then don‟t do it with someone else.  Watch the clock : A virtual hug never matches a real one. Balance your life.
  • 23. Internet Safety  Choose wisely: Not all the content is appropriate. You know what we mean.  Don‟t hide: Using anonymity to cloak your actions doen‟t turn you into a trustworthy, responsible human being.  Think about what you see: Just because you find it over internet doesn‟t make it true.  Be smart, be safe: Not everyone is who they say they are. Be smart while sitting online and interacting with people.
  • 24. ACM Commitments on Ethics 1. Contribute to society and human being. 2. Avoid harm to others. 3. Be honest and trustworthy. 4. Be fair and take action not to discriminate. 5. Honor property rights including copyrights and patents. 6. Give proper credit for intellectual property. 7. Respect the privacy of others. 8. Honor confidentiality. 9. Contribute to society and human being.
  • 25. CONCLUSION  The new world of information society with global networks and cyberspace will inevitably generate a wide variety of social, political, and ethical problems.  Basic issues have been solved partially using technological approaches and legal laws in cyberspace.  Guidelines and strategies should be implemented so that global information can be exploited in a socially and ethically sensitive way for our future benefit and applications.
  • 26. CASE STUDY 1 Facebook confessions page
  • 27. Facebook confessions page  It is page on Facebook on which any one can anonymously post a personal information.  Juicy-campus launched in 2007 with the goal of enabling “online anonymous free speech on college campuses”.  College ACB.com in 2007 which peaked with over 900,000 views in a single day  College ACB closed down in October 2011 but anonymous online confession sites didn‟t go away What is it ?
  • 28. Facebook confessions page  US college students began using a combination of Facebook pages and anonymous forms such as Google Forms or SurveyMonkey to create school based Facebook Confession Pages.  In India it started in IIT-B and just after one day It also started in LNMIIT and various other collages.  These services were controversial as many of the posted confessions hurt the school‟s image. What is it ?
  • 29. Facebook confessions page ANONYMITY is the answer to this.  Anonymity is an important and useful tool in many situations.  Most adults have at some time read newspaper advice columns where readers anonymously submit problems and an “Agony Aunt” responds with advice so that others with similar problems benefit.  Voting is usually done anonymously to allow freedom of expression and governments protect anonymous whistleblowers with legislation. Why do Students use them ?
  • 30. Facebook confessions page  And police “Tips” phone services assure anonymity as a way of getting people to share others‟ misdeeds.  Kids Help Phone encourages teens and children to phone in and share their problems anonymously because this helps teens and children to address problems they can‟t in other ways  What no one can deny is that the need to share anonymously is deep-seated. Why do Students use them ?
  • 31. Facebook confessions page  Facebook Confession Pages are simply pages that allow students to anonymously submit their deepest secrets.  The moderator of the page posts the confessions on the Facebook page.  Students who „like‟ the page can see each confession and can „like‟ each confession and comment.  The moderators of the page are often unknown to the students, as are the contributors. How do they work ?
  • 32. Facebook confessions page  The Facebook Confession Page model has caught on and spreading fast.  The pages are free, easy to set up and tap into this deep- seated need teens and young adults have to share what they‟re really thinking and feeling without fear of adult sanctions. How do they work ?
  • 33. Facebook confessions page  While the original intent of Facebook Confession Pages was to offer a forum for students to share problems, concerns and secrets that isn‟t all students are sharing. The online dis-inhibition effect, a loosening of social restrictions and inhibitions that would normally be present in social interactions, means that many students want to also use the confessions pages to share stories of alcohol and drug use or sexual behaviour. In some cases the pages lead to cyberbullying or even slander. What are the problems ?
  • 34. Facebook confessions page  Invasion of Privacy  Character Assassination What is Unethical here ?
  • 35. Facebook confessions page  Experience in other jurisdictions suggests that taking pages down won‟t solve the problem. Pages are easy to set up, and often when one is taken down another pops up right away moderated by a different student.  Teens expressing depression, issues with body image or alcohol and drug use should concern us all and rather than preventing them from posting about it we should be looking at the behavior and trying to address it. What can educators and parents to do?
  • 36. Facebook confessions page  Students clearly have a need to post anonymously about their problems, concerns and fears.  Schools should embrace the opportunity and set up their own “Confessions Pages”, moderated by students but with guidelines  Confession Pages and their associated problems also highlight the need for greater education about digital citizenship for students What can educators and parents to do?
  • 37. Facebook confessions page  need to better understand the risks of posting and the permanent and public nature of digital spaces.  This starts at an early age with parents talking to children about social media and modeling good online behavior themselves. What can educators and parents to do?
  • 39. The Napster Controversy: RIAA vs. Napster  In the summer of 1999, a website, www.napster.com, was launched in the US. The website made it possible for its users to freely share their music files through the Internet with other users all over the world.  The service became extremely popular within a short span of time. The website attracted 1.6 million simultaneous users during the height of its popularity in February 2000.  Napster's offering of this 'peer-to-peer' technology was strongly condemned by the Recording Industry Association of America (RIAA), a trade group representing the world's biggest record labels, Universal Music, Sony Music, Warner Music, EMI Group and Bertelsmann AG.
  • 40. Allegation on Napster  RIAA alleged that Napster was engaging in or assisting others in copying copyrighted music without payment or the express permission of the rights owners.  RIAA also claimed that Napster would significantly harm the sales of the recording industry.  In December 1999, the body sued Napster in the Federal District Court for copyright infringements and petitioned the court to shut down the website.
  • 41. What Happened NEXT.  The legal battle was covered extensively in the global media.  In the beginning of July 2001, Napster had to stop offering its services due to certain technical problems. While the company was working towards setting the problems right and resuming operations, in mid July 2001, a District Court Judge order barred Napster from offering the file-sharing service.  Even as Napster users strongly protested against the order, the company appealed the ruling before the US Court of Appeals in San Francisco. The Appeals Court granted Napster temporary reprieve against injunction until a further review of the injunction request.  Napster was eventually acquired by Roxio. In its second incarnation Napster became an online music store until it was acquired by Rhapsody from Best Buy on 1 December 2011.
  • 42. Questions Raised  The controversy raised several questions regarding the impact of the emergence of newer technologies like Napster on the traditional modes of conducting business.  Was the recording industry using its financial power to suppress technological innovations in the music business?  Was Napster wrong in allowing people across the globe to access music without paying for it and without the artistes' permission?  The case eventually came to be seen as a struggle by the powerful entertainment industry against a new technology threatening it.
  • 43. Ethical Point of View  Shared Music For Free But Not FREE MUSIC. What went wrong ?
  • 44. Ethical Point of View  Firstly, Because it caused Heavy Loses to the Recording industry; Artists & Recording houses who spent millions in productions.  Secondly, It directly encouraged Piracy of Music and giving birth to Many other similar websites Why was it Unethical ?
  • 45.