You are on page 1of 6

Information Ethics

Information ethics has been defined as
 The branch of ethics that focuses on the relationship
between the creation, organization, dissemination,
and use of information, and the ethical standards and
moral codes governing human conduct in society.
 It provides a critical framework for considering moral
issues concerning informational privacy, new
environmental issues (especially how agents should
behave in the Infosphere), problems arising from the
life-cycle (creation, collection, recording, distribution,
processing, etc.) of information (especially ownership
and copyright, digital divide, and digital rights).

History
 The evolution of the information (or rather) databasedsociety causes ethical problems.
 Norbert Wiener (father of cybernetics)
 “Computer ethics” coined by Walter Maner in the mid-1970s,
to refer to the field of research that studies ethical problems
“aggravated, transformed or created by computer
technology”.

In other words. Organization – The data that we have right after it has been created needs processing. or the inception of information. . filtering and balancing. which is the process of organizing data and having it in the form of processed information which definitely facilitates the access and usage of data. the birth. acreator 2. The sources from which it is obtained may be multifarious but every single bit of information needs to have a source or simply.Life cycle of Information C re a ti on D is s e m in a t io n M or al Cod es O rg a n iz a t io n Informati on Pub lic U se 1. Creation – referring to the actual procedure of the creation of data.

to which demographic the information is available. Public Use – as much as the name suggests. if at all any particular information is available to any region or not. 5. IE: AN INNOVATIVE APPROACH Information Ethics can be considered as an expansion of Environmental Ethics.3. one can have an idea that the processed information is now to be shared in public for their general use 4.  Stressing on the concept that the environment is essentially is made up of natural and artificial ecosystems and both have unmatched potential that can be harnessed . The approach presented here is  Less anthropocentric concept that includes nonhuman(artificial) and non-individual(distributed) entities  Less biologically biased concept that includes not only what we can speak of as ‘life’ (in the sense of living organisms) but also any form of existence. Moral Codes – illustrates the pertinent codes of conduct that necessary for us to follow while dealing with information. Dissemination – refers to the act of circulation of information to public for their general use but is different from public use in the sense where it rules out or sets forth rules about how the public should be using.

provide a significant challenge to computer security. or “programmed threats”. which .Fields of Implementation of Information Ethics Privacy Intellect ual Property ETHICS Crim e Globaliz ation  Computer Crime Malicious kinds of software. These include “viruses”.

For example. in the mid-1960s the American government already had created large databases of information about private citizens (census data. As Krystyna Gorniak-Kocikowska perceptively notes in her paper. or constrained by a specific religion or culture. and efforts to advance and defend human values. efforts to develop mutually agreed standards of conduct. “Trojan horses” which appear to be one sort of program. are being made in a truly global context. and “bacteria” or “rabbits” which multiply rapidly and fill up the computer's memory. welfare records. and so on). “worms” which can move from machine to machine across networks. for the first time in history. for the first time in the history of the earth. and may have parts of themselves running on different machines. “The Computer Revolution and the Problem of Global Ethics” According to her. So. military service records.  Privacy and Anonymity One of the earliest computer ethics topics to arouse public interest was privacy. “logic bombs” which check for particular conditions and then execute when those conditions arise.cannot run on their own. but rather are inserted into other computer programs. ethics and values will be debated and transformed in a context that is not limited to a particular geographic region.  Intellectual Property This is in fact the information that belongs to a person and the invention or discovery of that information solely belongs to that individual  Globalization Global networks like the Internet and especially the world-wide-web are connecting people all over the earth. . but actually are doing damage behind the scenes. tax records.

TWO CENTRAL THEMES PCAloagpgryai nrtgs ofrecxlosuelyv imr gtah isngovthre w oitrkngsf anothaeur whoitern. movies and songs for free.lw ork Situations where we tend to get unethical in the field of information 1.odurat permanisd otnhear idn thle icntueal ion f pas ing the d sired result off as mohwrtigknsa.sit cel ra wurieth. 3. 2. Usage of torrents to download proprietary software. Copying from websites seamlessly without acknowledging the fact that we have. cloumdipnogsmeru. Use information to cause harm to any particular individual .