The Ethical Web Magazine Fall 2014 (Standalone) | Page 6

What is Cyber Ethics?

One of the most important challenges youth face today is making ethical decisions while using the Internet. Cyber Ethics is the study of ethical behaviors and issues involving users, computer programs, and the effects on society and individuals (Cyberethics 2014). Cyber Ethical issues includes but is not limited to:

•Bullying

•Harassment and stalking

•Threats of violence, terrorism, and extortion

•Production, distribution, and ownership of illegal pornography

•Hacking

•Identity theft and scams

•Phishing, Malware, Viruses, and spam

What does it mean to be ethical? According to the definition on Business Dictionary, Ethics is

“The basic concepts and fundamental principles of decent human conduct. It includes study of universal values such as the essential equality of all men and women, human or natural rights, obedience to the law of land, concern for health and safety and, increasingly, also for the natural environment.”

Cyber Ethics is a code of responsible behavior while using the Internet (Know the Rules of Cyber Ethics 2014). While there is much debate on what is considered “right” and “wrong,” the fundamental concept of treating other people with decency applies online as it applies in reality. The only barrier that divides people from each other is a computer screen and network of Wi-Fi and wires. At the same time technology is an opposite of a barrier in a sense that people can communicate and reach to many others in a short span of time. Bullies go far as to express communication abuse because of the comfort of hiding under anonymity and there are low barriers to selectively choosing what words to say.

One in three minors in the United States have received threats online (Cyber Bullying Statistics 2013). Victims are more likely to suffer low self-esteem and thoughts of suicide. The freedom to cross boundaries without immediate consequences leads to the collective view that people who use the Internet should expect to be “trolled.” This extends to other cyber crimes, such as making terroristic death and rape threats, viewing violent and illegal pornographic material, creating and distributing malware, hacking and stealing identity information, and creating fraud accounts. To the abuser, the consequences are not immediate and the victims are not visible. The person who has a blog full of photographs of her pet cat is still a real person. The person who sings his favorite song on YouTube with a “terrible” voice is still a real person. The person who trusted someone enough to share intimate, sexual photos only to be leaked is still a real person. Nobody deserves abuse, especially on the Internet. Cyber crimes are not victimless crimes.