Term Paper: Ethics in Cyberspace Summary

Pages: 9 (3444 words)  ·  Bibliography Sources: 1+  ·  Level: College Senior  ·  Topic: Education - Computers  ·  Buy This Paper

SAMPLE EXCERPT:

[. . .] Irrespective of the real influence of the industry in our thinking the cyberspace crucially has become a new centre point in consonance with the neo-classical economic program of global capitalism. The corporate interests have paramount prioritization in the sphere of information technology, as is evident from the regulations for piracy, privacy, competitions in cyberspace along with, to some extent, the reluctant interests put forth in support of the public benefit like universal access, diversity in cyberspace, unprofitable cyberspace however are not taking into account the digital democracy, justice, human security and freedom. It is felt by Cees that the only method of evolving a popular and acceptable global controlling system of cyberspace is active participation of the associated community in the controlling process and ensuring their interference in policy making. The ways of organizing the cyberspace by the democratic society have been proposed by the Cees J. Hamelink emphasizing significance of the civil liberty of the people rather than the profit. He advocated that the traditional approaches on morality and ethics have serious weaknesses.

Cees in the last section, emphasized on the necessity of the public education for a problematic approach to gain awareness of the cyberspace, which would enable to comprehend the meaning of the choices essential for constructing the democratic digital environment. It endeavors to investigate the underlying principles, which is considered as the great potency of the book; about the reasons that bestow the cyberspace with vast qualities seem to look like miracles. It seems to have succeeded in mystifying the realities and creating interest among the readers to look into the logic of facts even farther than simply being aware of such views. Cees accord cyberspace its importance that it deserves and seeks to find within it the generalized principles of world economy that treats the information as capital and the nexus between power and knowledge.

The book asserts the democratization of the cyberspace is the universal objective and it is the responsibility of the common people to exploit the benefits directing it in their desired direction. The greatest weakness of the book lies in the fact of its failure to express the way that debatable communication leads to ethical agreement. When the present problems are considered to be the in consonance with the 'competing definitions of truth' multiplicity of principles of civil liberty is felt essential to level solutions to the most intense problems of world. Emphasizing the deficiencies of present global control measures and designs the writer in this book affords to examine various deficiencies in them and advocates the principles that prioritized the justice, security and liberty of the mankind. The book seems necessary to the policy framers, however, any one taking interest in computer and Internet and is associated with them and applying them should go through this book. To the common reader, it serves as a guide to predict the future expectations and problems involved with the technology. For the executives it indicates the criticalities affecting directly or indirectly the company and the service of the company. This is viewed as a crucial book worth keeping for all times to serve as an orientation, as well as for assistance and motivation.

Academic Discussion on the issues involved in cyberspace

In almost every sphere of life, such as effecting to the business dealings as customers, accumulating necessary information, emancipation in the political discourses, performing jobs, keeping in touch with the dear ones and corresponding with them, etc. The impact of growth of the World Wide Web is felt quite significant along with the new dimensions in provisions of new skills and new strategies. The Internet presently is thought of as expression of the upsurge of the digital technologies that creates major threat to the traditional conceptions of the ways to control mankind. Discourses are continuing about the parts of the governments, the effectiveness of the conventional legal tools, the essentiality for new forms of self administration and the necessity for international collaboration, etc. The cyberspace advances many problematic queries, relating to effecting contracts and transactions, safeguarding of people being inflicted, stimulate the democratic experiences, and ensure the fundamental civil liberties and independencies. The cyberspace also enhances threats among most of them relating to the uncontrollability of damaging behaviors and activities.

The policy formulators thinking of imposing legal restraints on the ever growing virtual world in form of electronics faces several queries fundamental of them are: the authority to control the cyberspace and by implementation of which methods. Finding out the ways of orienting the fundamental regulations of ordinary business with a view to facilitating the reliable transactions and establishing dependable business concerns. Identifying the authority to be vested with the powers to impose punitive actions for violations of principles in the electronic world, as well as identify, deter the culprits that inflict harm to the innocent users. The revolution in the Internet world has made it essential to formulate necessary measures for its control. The policy framers have designed many laws for its control in consonance with the principles enshrined to combat the real world crime ever since its introduction. However, the cyberspace is not considered as real world phenomenon and its functionalities spread beyond the limits of the borders and authorities demarcated in the real world. (Cerf, Vint; 2003)

The efforts to utilize the real world regulations in governing the cyberspace are considered as a limited approach in controlling such new medium of communication. The experiences with the electronic world emphasizes the necessity for formulation of a totally different sets of principles and regulations that attempt to tackle the vast skills and uniqueness of this virtual world without of course introducing the real world laws. Introduction of real world laws is visualized in this sphere as a threat to the unhindered growth of this world and concludes in safeguarding the interests of the profit making principles of the business concerns that is quite damaging to the very purpose of the system as a whole. These should be adhered to with much precaution if at all a regulation to control the world is considered worth addressing. (Featherstone; Burrows, 1995)

Cyberspace is considered to be such areas where the government control even though already initiated do not seem to be progressive in consonance with its rate of growth. Cees Hamelink, addressed the problem of hacking as having the most damaging potentialities in respect of the Internet. Presently, it is very difficult to identify the persons as well as the locations that inflict the damages through the cyber attacks. In reality, many expertises on computer do not suspect the hackers of their ill motives nor do they condemn their activities vehemently. According to some they are similar to the mechanics that leans down and enters in for investigating the car to detect a problem. It is the crackers who are the real culprits inflicting damages to the network. The hackers access the websites illegally only to show that they have the necessary capability to break the security system of cyberspace. Contrary to them the crackers have evil mentality of destroying and damaging the program. They violate the laws as the real world criminals do, resorting to unauthorized access to the websites with an ill motive of destroying the websites or to take away illegally the related software. (Edgar, 1997)

It is of absolute necessary that necessary programs assisting in catching hold of and advancing punitive action against them are to be developed. The actions in this respect has however already been initiated. In this connection it is felt necessary that the gravity of the situation must be explained to the new buyers purchasing a new computer. These problems however are not capable of being solved at once and nor will they be addressed peacefully. The book strives to emphasize on the principles of ethical standards that is to form the basis of the administration of the cyberspace. Like all the technological advancements the growth of cyberspace also imposes hostility in sphere of different levels which necessitates therefore, the emphasis on ethical choices while regulating the administration of such technology. Only when commercial disturbances results in, it impels the government and agencies to feel the need of intervention. The e-business is considered to be new concept and the authorities in charge of enforcement of law are not very much confident of the efficacy of the methods to combat the disturbances and to decide whether the disturbances are under their direct jurisdiction. (Lipschultz, 1999)

Moreover, the formulators of policy belief in the limited role of the government confined to formulation of the various measures to avoid the disturbances. Safeguarding the confidentiality of the financial and medical information over the World Wide Web is of utmost concern of the U.S. government. The protections however, should be constructed within the systems so as to make the users realize of the particular information being acquired and to the extent these… [END OF PREVIEW]

Information Technology IT Ethics and Wiretapping Article Review


Promising Phenomenon Dissertation


Internet Profiling and Privacy Term Paper


Grant Proposal for it Veteran Students Grant Proposal


Ewom Communication and Brand Trust Term Paper


View 18 other related papers  >>

Cite This Term Paper:

APA Format

Ethics in Cyberspace Summary.  (2004, August 1).  Retrieved August 26, 2019, from https://www.essaytown.com/subjects/paper/ethics-cyberspace-summary/1270128

MLA Format

"Ethics in Cyberspace Summary."  1 August 2004.  Web.  26 August 2019. <https://www.essaytown.com/subjects/paper/ethics-cyberspace-summary/1270128>.

Chicago Format

"Ethics in Cyberspace Summary."  Essaytown.com.  August 1, 2004.  Accessed August 26, 2019.
https://www.essaytown.com/subjects/paper/ethics-cyberspace-summary/1270128.