Most agree that it is ethical and prudent to shield young children from violent or sexual Internet content by using software filters such content. Some parents of older children have installed computer monitoring software that records all their children's Internet activity. They believe this is warranted because they need to know what their kids are doing online. Do you think it is ethical of parents to do this? Explain your position.

Principles of Information Systems (MindTap Course List)
13th Edition
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter1: An Introduction To Information Systems
Section: Chapter Questions
Problem 2WE
icon
Related questions
Question
100%

Most agree that it is ethical and prudent to shield young children from violent or sexual Internet content by using software filters such content. Some parents of older children have installed computer monitoring software that records all their children's Internet activity. They believe this is warranted because they need to know what their kids are doing online. Do you think it is ethical of parents to do this? Explain your position. 

Expert Solution
Step 1

Here, Before know about ethical and prudent let's understand about what is cyber-ethics which is related internet protection. on this base try to can understand about What is Cyber security, Cyber crime and protection related to child.

What is Cyber-ethics :-

Cyber ethics is the philosophical research of computer ethics, which includes user behavior and also what systems can programmed to accomplish, and therefore how these factors influence individuals and society. For years, numerous governments and organizations have adopted rules and created cyber-ethics guidelines.

There are two Harvard Law Reviewer during 1890, Warren and Brandeis has given theory about privacy based on ethical point of view :  " fundamental to boyhood's honor as well as personality Confidentiality is also necessary for a sense of self-sufficiency. implies 'the sensation that there would be a part of one's life that's also completely under one's command, that seems to be free coming from external influence.' Privacy invasion can potentially put a person's health at jeopardy. "

trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Encryption and Decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning