Internet morality: Should it be the same as real world morality?
Should we have the same expectations?
Name: Stephen Donnelly
Matric. No: 01012291
Programme: BEng (Hons) Computer Networks & Systems
Module: INF10101 – Information: Society & Security
Assessment: Coursework Element 2: Essay
Word Count: 1994
Declaration: I hereby confirm that this assignment is my own and has not been submitted for any other assessment.
Abstract
The aim of this paper is to examine the questions “Internet morality: Should it be the same as real world morality? Should we have the same expectations?” In this paper three areas of the Internet have been discussed to examine how the morality of the Internet world relates to the expectations we have of morality in the real world. The main findings of the paper show that currently interactions within the Internet do not conform to our expectations of morality, when compared to real world situations. In the examples explored the use of personal data, the sharing of copyrighted material and through offensive online messages it is shown how many users of the Internet demonstrate little in the way of an understanding of the morality and implication of the actions they are taking. The conclusions of this paper are that we do not see real world morality translated to the Internet world, however it is something we should expect and strive for.
Contents
1. Introduction 1
2. Morality and the Internet 2
2.1 Use of Personal Data 2
2.2
In his paper, Fried writes that trust is bought through “moral capital” (Fried 484). This moral capital is bought by revealing information that might otherwise be kept private to a friend, loved one, or individual whose trust the informer would like to gain. Moral capital is the trust that an individual will treat another with morality meaning, according to Fried, that they will“[respect] the basic rights of the other” (Fried 479). Fried also states that, “There can be no trust where there is no possibility of error,” suggesting that without privacy there can be no trust as privacy creates the risk of confidential information being disclosed by the receiver of said information (Fried 486). The idea that privacy creates trust has only become more evident with the rise of the internet. In their paper, “Young people online and the social value of privacy,” George Mason University professor Priscilla Regan and University of Ottawa professor Valerie Steeves explore how young people’s understanding and value of privacy has been shaped by the internet. The two found that while young people understand that information posted on the internet can be viewed by family members and the public, they trust that others will follow the unwritten social rules of the internet–essentially that they will act with morality–and respect their privacy by not looking at posts not directed at them (Regan and Steeves 302). This example shows that despite the interconnectedness
In Esther Dyson’s “Cyberspace: If You Don’t Love It, Leave It”, the existence of the internet is seen as potentially dangerous to today’s society. Dyson insists that the internet was once a sanctuary for tech savvy individuals such as gamers and professionals like engineers. The author focuses on the negative websites and communities that are often found offensive to the majority. She thinks the World Wide Web harbors a lot of power. This power can be accessed and conquered easily by most of the population. According to Dyson, responsibility is the key to changing the future (295). Her argument is convincing but slightly unrealistic. The internet seems to be growing into a whole other alternate universe. Society’s rapidly growing technology industry will only be harder to regulate. Most people will do what they want, when they want especially when it comes to the internet.
Online technologies are beneficial to the modern world. It can improve a person’s education, business, and helps in everyday life hassles. It has become an essential part of the way that people live and it is very likely that people would be a loss without it. In “Ethics and the New Genetics,” the Dalai Lama claims that to ethically use new technological advancements we need to develop a “moral compass”. Peter Singer, in “Visible Man: Ethics in a World without Secrets,” discusses whether new technology and “openness” makes our lives better, or if the lack of privacy takes away the rights of individuals. Both authors discuss how technology is advancing very rapidly and can significantly have major pros and cons to society. The two authors, however, have different viewpoints in which how the society can determine when technology has become ethical. Dalai Lama is firm believer that technology is evolving so fast that ethics could hardly keep up with it. He addresses how people should have ethical standards when dealing with the internet. Thus, he is directly proving to us how he would want society to ethically determine when and how technology should be used. Yet, on another spectrum, Peter Singer argues that although ethically, internet is invading our privacy, this invasion of privacy is the only way that the public is safe and people should brutally discover the truth about everything but somehow it can cause harm. Peter Singer and Dalai Lama both agree how the new online
Chapter 13 Suler discusses the different kinds of deviant behavior in the digital world. Advances in technology have resulted in new forms of deviance as well as new forms of control. The internet is the place for deviance because of the lack of proper constraints and restraints on associations. The internet has the ability to form communities that creates and supports behaviors that are no longer a norm.
Daniel Solove, a professor who specializes in internet privacy law, wrote this book to give his personal take on how the internet was transforming the way people connect through social mediums and how that could change in the future. An important thing to note about this book is that it was published in 2007, so some of the social and technological aspects of the book are slightly dated. Regardless of this though, this book provides an inquisitive perspective on the dynamic nature of the internet as a vessel of our society’s changing norms on privacy in the social sphere. Many of our learning points in class relate to topics discussed in this book and help to strengthen the context and significance of the underlying message.
The issues raised by Bennett illustrate that the Internet is still in its infancy in terms of how it is best-integrated into society and regulated by the same ethical, social, and legal principles as traditional forms of communications. It is likely that the solution lies, not in the evolution of regulations or in limitations on free speech; rather, the solution is likely to evolve naturally as subsequent generations develop a better and more nearly comprehensive understanding of how to integrate their offline and online identities in ways that maintain their privacy. Meanwhile, the deeper explanation of the contemporary digital communications
Both articles discuss the relationship between burgeoning technology and human ethics and put human morality in the critic position because of the unprecedented technologies. Even though technologies tremendously alter human societies and push humans’ ethics borderlines, people still need to hold their ethical boundaries and define their human values to positively contribute to the society.
In "Girl," the mother provides instruction to her daughter on how to live life responsibly and run a home. She also attempts to educate, in a loving manner, morality, attempting to prepare her daughter to become an independent, self-sufficient woman and to avoid a promiscuous life. She seems to believe that her daughter is headed in that direction and that it is something that the daughter desires. The mother makes that clear when she states, "on Sundays try to walk like a lady and not like the slut you are so bent on becoming" (Kincaid). The mother seems to be aware of what can happen, either by her own experience or just general awareness and is genuinely attempting to help avoid that lifestyle for her daughter. In "Everyday Use," by Alice
With the introduction of the Internet, there has been a global shift in our human culture. A profound, intense change in which every one of us has been impacted by, and one that has never been so pervasive or immediate as the one we have seen grow with each passing day. Now, the Internet was conceived with the purest of notions, where the intentions were good and the purpose was true: a glorified, all-encompassing systematic collection of the world’s expressions, where ideas, thoughts, reforms, and opinions can circle the globe, for conversations to be sparked and a global culture to be established. However, through the passage of time, certain facets of the Internet have become polluted, perverse even, where the malicious and ill willed could
A “moral operating system” is essentially a formulated structure that would be implemented to influence individual and group decision-making about how to develop and use technology. The government has the capability to gather large amounts of information from people simply based on their Internet habits and patterns. This information is usually used with the knowledge and consent of these users. The overall idea behind the moral operating system is to think about how that technology and information should be used.
As the utilization of PCs and the web turns out to be more predominant, moral issues identified with PC use will keep on making a bigger effect on individuals' lives and the way that society capacities. PC morals include the ethical standards and behavioral rules related to the path in which people, associations, and society all in all utilization PCs and data innovation. A few cases of moral issues identified with PC utilize incorporate individual data protection, PC security, wholesale fraud, licensed innovation, level with access to data and so on.
Spinello, R. A. (2011). Regulating Internet Privacy. Cyber Ethics - Morality and Law in Cyberspace. Sudbury, MA: Jones and Bartlett Learning.
There is no way to truly verify age on the internet; this is a big concern because there is a wealth of content that should not be accessed by children. Pornographic material is the most prominent, and children can very easily stumble upon these types of websites and be exposed to things that they should not be. Along with finding inappropriate materials online, children are also at a great risk because of how easy it is to communicate with people. Children every day are persuaded by online “friends” to meet them or do things for them that put them at great risk.
Some people lose their moral intuition when using computer technology because they assume that their actions do not have real consequences to others. The lack of physicality on the internet can alter one’s ability to empathize with other, which makes them feel that cybercrime morally acceptable. The moral imperatives in the ACM code of ethics can help people make moral choices with computer technology.
Cyberspace is a non-physical environment created by computers interoperating on a network. People can interact in ways that are similar to reality, but does not require physical movement beyond typing. Advanced technology established this parallel world, ‘cyberspace’. This can be convenient for people to chat, shop, share, explore or research online, but it can also be a disadvantage at the same time. The prime examples of the disadvantages are, people are able to create fake, imaginative identities and use it to abuse others and this can lead to serious issues, such as sexual abuse or child grooming; and since, the Internet can be recognised as a parallel world to reality, this discourages people to have face-to-face human interaction. Consequently, cyberspace can be harmful to all people, because there are hardly any restrictions on the Internet. Technology inaugurated this and it is having an inimical influence on the majority of people who have access to the Internet on a daily basis.