Computer Security Ethics and Privacy | WebReference
Ten Commandments of Computer Ethics - Wikipedia
Computer Crime. With the proliferation of computer viruses, spyware, phishing and fraud schemes, and hacking activity from every location in the world, computer crime and security are certainly topics of concern when discussing computer ethics.
Privacy and Ethics Policy | Pri-Med
When establishing a computer ethics program and accompanying training and awareness programs, it is important to consider the topics that have been addressed and researched.
These links are provided for additional information only
If computer users in the , for example, wish toprotect their freedom of speech on the internet, whose laws apply? Nearly twohundred countries are already interconnected by the internet, so the UnitedStates Constitution (with its First Amendment protection for freedom of speech)is just a "local law" on the internet -- it does not apply to therest of the world. How can issues like freedom of speech, control of"pornography", protection of intellectual property, invasions ofprivacy, and many others to be governed by law when so many countries areinvolved? If a citizen in a European country, for example, has internetdealings with someone in a far-away land, and the government of that landconsiders those dealings to be illegal, can the European be tried by the courtsin the far-away country?
Networking & Cloud Computing
Questions of anonymity on the internet are sometimes discussed in the samecontext with questions of privacy and the internet, because anonymity canprovide many of the same benefits as privacy. For example, if someone is usingthe internet to obtain medical or psychological counseling, or to discusssensitive topics (for example, AIDS, abortion, gay rights, venereal disease, dissent), anonymity can afford protection similarto that of privacy. Similarly, both anonymity and privacy on the internet canbe helpful in preserving human values such as security, mental health,self-fulfillment and peace of mind. Unfortunately, privacy and anonymity alsocan be exploited to facilitate unwanted and undesirable computer-aidedactivities in cyberspace, such as money laundering, drug trading, terrorism, orpreying upon the vulnerable (see [Marx, 2001] and [,1999]).