Ethics in Cyber World
Cyber ethics, also known as computer ethics or internet ethics, focuses on the
responsible and ethical use of technology, particularly in the context of the internet and
digital communications. It involves considering the moral and social implications of
technology and how individuals, organizations, and society should interact with and
through technology. Cyber ethics provides a framework for appropriate behavior in the
field of technology. There are some guidelines to stick by when going through the
internet world, just like the laws we obey in the actual world. Cyber ethics help
safeguard individual privacy, data security, and intellectual property rights while also
promoting respectful and honest interactions in cyberspace. By adhering to cyber ethics,
individuals and organizations can mitigate the risks of cybercrime, protect their
reputation, and contribute to a safer and more trustworthy online environment,
ultimately fostering a more ethical and harmonious cyberspace. Embracing cyber ethics
principles ensures a positive and respectful online experience.
Cyber Ethics: Tips for Online Behaviour
Key principles of computer ethics or internet ethics include respecting others’ privacy
by abstaining from sharing personal data without consent and using language that is
respectful.
In 1992, the Computer Ethics Institute introduced the Ten Commandments of
Computer Ethics, which remain a valuable guide for online behavior. These
commandments continue to be relevant today, providing essential guidance for frequent
internet users. The guiding principles in these commandments are as follows:
Avoid using technology to cause harm to others.
Refrain from using technology to intrude on others’ privacy.
Steer clear of using technology for dishonest or thieving purposes.
Resist using technology in order to spread false information about others.
Abstain from using technology to tarnish the reputation of others.
Avoid using technology in ways that harm our environment.
Do not use technology in order to hack into other people’s computers and
networks.
Refrain from using technology to alter, access, or destroy other people’s data
without proper authorization.
Do not use technology in order to tamper with emails, messages, or online
available digital documents without authorization.
Always employ technology in an ethical and responsible manner.
Cyber Ethics Policies: Personal and
Organizational (1)
Cyber-ethical policies are important in the online world. They guide us in being ethical
online. There are two types of these policies: personal and organizational. Let us have a
better understanding of both in the upcoming section.
Personal Cyber Ethics Policies
Personal cyber ethics guidelines are like reminders for how to behave online. They
include the following:
Respecting others’ privacy
Using respectful language
Thoughtful posting
Personal cyber ethics policies aren’t just about social media. It applies to all online
activities, like email and virtual meetings. Following these guidelines helps create a
positive online environment. It’s not just about being responsible online but also making
the internet a better place.
Organizational Cyber Ethics Policies
Similar to personal-level cyber ethics policies, organizational equivalents are designed
for businesses or institutions to ensure ethical and responsible conduct online. These
policies play a protective role for both employees and employers by establishing clear
boundaries and expectations.
Some considerations for creating organization-level cyber ethics policies include:
Clear Expectations: Define expectations for all individuals connected with the
organization.
Consequences: Clearly communicate the results of violating the policy.
Regular Review: Regularly review and update the policies of cyber ethics to keep
them relevant.
Key regions to address in organization-level cyber ethics policies include intellectual
property, social media, cybersecurity, data security, email communication, and
acceptable usage of company resources. Additionally, companies may extend these
policies to cover contractors, vendors, and third parties with access to their systems or
data, reducing potential liabilities. Organization cyber ethics policies are instrumental
in encouraging secure and responsible online environments for all stakeholders.
Importance of Cyber Ethics (2)
Importance of cyber ethics includes the following points:
Integrity
The first principle of ethical cyber security is to protect the privacy of individuals. This means
that any data that is collected should be done so with the explicit consent of the person or
organisation. Any data that is collected should be stored securely, and not shared without
consent. This ensures that sensitive information such as credit card details and other personal
information is not collected without the individual's knowledge.
In the world of cyber security, ethical practices are essential for protecting data and maintaining
trust. As technology advances, we need to uphold a set of standards when handling sensitive
information. Without these guidelines, there can be serious consequences both legally and
financially.
Acting with integrity involves taking steps such as encrypting data to protect against potential
breaches. Additionally, organisations should have policies in place regarding how they handle
data so customers know their information will remain safe.
Professionalism
Another key aspect of ethical practice is professionalism, and transparency about what kind of
data an organisation collects and why they need it. Organisations must make sure their users
understand exactly what type of information they’re collecting and how it will be used before
asking for consent to collect it, and then only use this data for the purposes stated.
If changes are made down the line, users should always be informed ahead of time so they can
decide if they still want their information collected under the new terms or not.
Credibility
Finally, the third area we look at under our Ethical Declaration is credibility. This includes
acting with accountability: making sure everyone involved takes responsibility for their actions.
For example, companies should take measures like conducting regular audits to identify areas
where improvements could be made; employees should report any suspicious activity
immediately; and executives should lead by example by adhering strictly to company policies
related to cybersecurity protocols. It is everyone's responsibility to avoid negligence with it
comes to handling data.
Cybercrime (3)
Cybercrime, or computer crime, is defined as a crime that is committed using a computer or the
internet. Cybercriminals can use a variety of methods to get access to your computer, including
viruses, phishing scams, and social engineering. They can use this access to commit a variety of
offenses, such as fraud, identity theft, and cyberstalking.
Protecting yourself from cybercrime
Mentioned below is a comprehensive list of tips and measures that an individual can take to
protect themselves from cybercrime:
Use strong passwords
One of the simplest ways to prevent cyber crimes is to use strong passwords. Don’t go for
123456…and other simple passwords that are too easy to guess. Don’t use the names of your
partners or dear ones or your birth date as your password. Instead, use a unique password that
is a combination of alphabets, numerals, and special characters/symbols. Another trick is to use
different passwords for different sites and change your passwords frequently.
Keeping your software updated
Keep checking for the updates for your operating system and internet security software.
Generally, cybercriminals take advantage of the glitches and flaws in your software for gaining
access to your systems and devices. Thus, keeping your software updated to the latest version
takes you one step closer to preventing cyber crimes.
Manage your social media settings
The next easy thing that you can do is keep your personal information private. Social media
platforms usually have a feature where that allows you to hide your phone numbers and other
contact/personal information. It might be a reasonable choice to hide such information and keep
it locked down from the public eye for if you disclose your pet’s name in your public profile, you
are giving away the answer to one of the most basic security questions.
Strengthening your network
Use strong encryption passwords to protect your home network from hackers and unwanted
interceptions. If you are someone who uses public WI-FI, you must use a VPN(Virtual Private
Network). A VPN encrypts all traffic until it reaches your computer. Thus, even if hackers can
hack your communication line, they won’t intercept anything but encrypted data.
Bibliography
1. https://intellipaat.com/blog/what-is-cyber-ethics/
2. https://www.ukcybersecuritycouncil.org.uk/news/news/why-do-we-need-ethics-in-
cyber/#:~:text=In%20the%20world%20of%20cyber,consequences%20both%20legally
%20and%20financially
3. https://blog.ipleaders.in/how-to-prevent-cyber-crime/
#Protecting_yourself_from_cybercrime
4.