What is meant by the term cyberethics and cyberlaw

Assignment Help Management Information Sys
Reference no: EM131958482

1. Discussion Minimum 350 Words

1) What is meant by the term "Cyberethics and Cyberlaw" in relation to the Internet? Which groups of people are most negatively affected by the Cyberethics and Cyberlaw, and why? What are some of the consequences of the Cyberethics and Cyberlawtoboth individuals and society?

2) Provide the URL of at least two sites that discuss the impact of the Internet on any one of the concepts discussed this week and provide a brief review of the information contained there. Did you learn anything new? Were you surprised by any of the information presented on the site?

2. Respond to discussion minimum 150 words

Class,

Cyberethics are basically acceptable behaviors done on the internet. Just like there are ethics for what we do and do not do when interacting with people in real life, there are ethics online as well. Microsoft has laid them out very plainly on their site. They are basically a list of do's and do not's. The basics are pretty simple. You should use the internet to communicate with other people. You should use the internet to conduct research and to learn. You should use it to watch movies, listen to music and play games.

Also, use it for social networking and to help build business networks. On the other side of the do's, the do not's should be fairly obvious as well. Keep your information private, and share it only with those you trust. You shouldn't download copyrighted materials. Finally, do not participate in cyberbullying, and report it when you witness it (Practice cyberethics, n.d.).

Cyberlaw are laws that are put in place to protect assets and people on the internet. More specifically, it includes intellectual properties such as inventions, literature, music and businesses. Copyrights, patents, trade secrets, privacy, trademarks, defamation, and data retention all have to do with cyberlaw (Cyber Law, n.d.).

I think a large portion of those affected today are those that have to endure cyberbullying. My daughter is almost 14, and I hope she does not have to endure it. Another issue is copyright infringement. Stealing someone else's work is the wrong thing to do, but many people do it. Whether it is for profit or for personal use, it is still illegal.

I found an article about cyberbullying I found interesting. In it, it relates that nearly 50 percent of teens have experienced cyberbullying and that only 1 in 3 teens tell their parents about it (Scheff, 2017). This concerns me as I mentioned I have a daughter who may be experiencing this right now and I may not know about it.

The second I found was about torrenting. In the article, it weighs the difference between the good and bad of torrents. Unfortunately, the bad seems to outweigh the good. The good is used to distribute copies of linux, copyright free independent movies, and to share files easily (Woodward, 2016). What I found interesting was there are good reasons to torrent. Everyone who has heard of torrents may liken them to illegally obtaining media and maybe even getting viruses.

References

Cyber Law: Everything You Need to Know. (n.d.).

Practice cyberethics. (n.d.)

Scheff, S. (2017). The Impact of Cyberbullying on Young Lives.

Woodward, M. (2016). Torrents: The good, the bad, and the ugly.

3. Respond to discussion minimum 150 words

What is meant by the term "Cyberethics and Cyberlaw" in relation to the Internet? Which groups of people are most negatively affected by the Cyberethics and Cyberlaw, and why? What are some of the consequences of the Cyberethics and Cyberlaw to both individuals and society?

Well, we should all know what ethics are or at least have a general idea. It's simply a standard of how we should treat one another. Cyberethics is similar in that it is a standard of how the internet should be used. Some suggestions from Microsoft on Cyberethics on how we should use the internet are research, communication, consuming content such as videos and music, shopping and other personal tasks such as paying bills and online banking, and business-related functions. Some things we should not do are cyberbully, encourage cyberbullies, share or use copyrighted material without giving credit to the creator, and not share personal information.

As you can see, this is simply a set of rules that we should abide by, but people do not always do so. I could not find any definitive information regarding which groups of people are most negatively affected by Cyberethics and cyberlaw. In my opinion, the people negatively affected are those that abide by them. My reasoning is that not following the ‘rules' doesn't stop most cybercrimes due to the anonymity the internet provides.

Also, when they are caught we are using antiquated laws to prosecute which don't really deter cybercrime. The heaviest penalties for cybercrimes are those carried out against governments. There are consequences regarding Cyberethics and cyberlaw. The article written by Dan Lohrmann that I referenced provides some excellent examples. As an example, plagiarism is a great example. The student doesn't truly learn, they have stolen someone else's ideas, and this reflects their lack of integrity. This can also affect the school's academic integrity, students are not earning their degrees, and the more of this that is allowed there will be label of mistrust placed on the school.

Provide the URL of at least two sites that discuss the impact of the Internet on any one of the concepts discussed this week and provide a brief review of the information contained there. Did you learn anything new? Were you surprised by any of the information presented on the site?

Each of the articles below discusses cyberethics to some degree. I think cyberethics is important because it defines how we should conduct ourselves on the internet, while there isn't a way to enforce it, there is still a positive for practicing ethics online. The same can be said for understanding ethics in everyday life. Most of the world's population will abide, but there are always people with no moral compass that will exploit those that are following the rules.

The article by Lohrmann provided a lot of insight and made me actually think about how cyberethics affects everyone and how profound the impact can be. There were a few things on the Microsoft page that I had not ever given much thought, which is not being a cyberbully. Doing so has not once ever crossed my mind, but I did go through a ‘trolling' phase when I was younger.

References

Lohrmann, D. (2012, September 23). Online Checkup: Why Cyberethics Matter More Than You Think.

Practice cyberethics. (n.d.).

Reference no: EM131958482

Questions Cloud

Why is it important to have a process for decision making : Why is it important to have a process for decision making? What process works best to make the more important decisions?
Who is the intended audience for the given source : Who is the intended audience for this source? How might the intended audience shape the perspective of this source? Why do you think author created this source?
Discuss how individual can improve their credit score : Discuss how an individual can improve their credit score.
Various reasons why training is needed : There are various reasons why training is needed. Identify some causes, and pick one to explain in detail.
What is meant by the term cyberethics and cyberlaw : What is meant by the term "Cyberethics and Cyberlaw" in relation to the Internet? Discuss the impact of the Internet on any one of the concepts discussed.
Which capital is transferred between savers and borrowers : What are the three primary ways in which capital is transferred between savers and borrowers?
How do secure software development concepts : How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?
Key attributes of the transformational style of leadership : What are the key attributes of the transformational style of leadership? Explain why you think these attributes are required of a transformational leader.
About the maturity treasury securities : calculate the current (long-term) rates for one-, two-, three-, and four-year maturity Treasury securities.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why software as a service

Why "software as a service" is (or is not - pick one) going to dominate the next several years in information management. Be sure to include some reference to SaaS material in your paper.

  Porters value chain and five forces models and a swot

This case study uses Porter's Value Chain and Five Forces models and a SWOT - Make sure you have in-text citations and a reference page.

  Ids in the cloud

IDS in the Cloud-From the e-Activities, explain whether or not you believe technologies such as IDS are still relevant and useful as there is a push toward SaaS and cloud-based solutions

  Why is a post-implementation evaluation important

Why is a post-implementation evaluation important? Who should conduct it, and why?What specific information would you want to know about the recipient?

  Briefly introduce the company you have chosen to research

Briefly introduce the company you have chosen to research. Summarize the two articles you found in the CSU Online Library. Describe how these companies are using electronic media and e-mail

  How each component is relevant to business analytics

Find and describe at least three technological components that are required for data-driven decision making

  Develop business recovery strategies for sangrafix

Develop business recovery strategies for SanGrafix, a video game design company. The strategies should contain detailed guidance and procedures for restoring a damaged system unique to the system's security impact level and recovery requirements.

  Tools and technologies for developing rule-based dss

Analyze and describe the tools and technologies for developing rule-based DSS. Introduction: Using DSS involves interactive analytical modeling processing and information systems can support a variety of management decision-making levels and decis..

  Develop two proposals in different professional settings

Explain how you would feel about being diagnosed by a doctor who could be hundreds or thousands of miles from you.

  Implement the scm system

Business Problem: The order fulfillment team has been using several legacy technology systems to manage inventory and distribution.

  Workplace telecommunications systemsprepare a paper

workplace telecommunications systemsprepare a paper describing the telecommunication systems used at your workplace.you

  Write a research paper about the spin-out organizations

Write an original research report consisting of one of the following topic areas: 1) Virtual Organizations, 2) Network Organizations, etc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd