Who Regulates Ethics in the Virtual World?
- 735 Downloads
This paper attempts to give an insight into emerging ethical issues due to the increased usage of the Internet in our lives. We discuss three main theoretical approaches relating to the ethics involved in the information technology (IT) era: first, the use of IT as a tool; second, the use of social constructivist methods; and third, the approach of phenomenologists. Certain aspects of ethics and IT have been discussed based on a phenomenological approach and moral development. Further, ethical issues related to social networking sites are discussed. A plausible way to make the virtual world ethically responsive is collective responsibility which proposes that society has the power to influence but not control behavior in the virtual world.
KeywordsEthics Technology Virtual world Social networking sites Society
- Branscomb, A. W. (1990). Rogue computer programs and computer rogues: tailoring the punishment to fit the crime. Rutgers Computer and Technology Law Journal, 16, 1–61.Google Scholar
- Charles, R. (1987). Computer bulletin boards and defamation: Who should be liable? Under what standard? JL and Tech, 2, 121–325.Google Scholar
- Ermann, D., Williams, M., & Shauf, M. (1997). Computers, ethics, and society. Oxford: Oxford University Press.Google Scholar
- Heidegger, M. (1977). The question concerning technology and other essays. New York: Harper Torchbooks.Google Scholar
- Introna, L. (2011). Phenomenological approaches to ethics and information technology, The Stanford Encyclopedia of Philosophy (Summer 2011 Edition). Edward N. Zalta (ed.). http://plato.stanford.edu/archives/sum2011/entries/ethics-it-phenomenology/. Accessed 15 May 2012.
- Jonas, H. (1984). The imperative of responsibility: In search of an ethics for the technological age. Chicago: University of Chicago Press.Google Scholar
- May, L. (1987). The morality of groups: Collective responsibility, group-based harm, and corporate rights. Notre Dame, IN: University of Notre Dame Press.Google Scholar
- Mesthene E. G (1997). The Role of Technology in Society. Technology and values (pp. 71-86). Rowman & Littlefield, Lanham.Google Scholar
- Motahari, S., Manikopoulos, C., Hiltz, R., & Jones, Q. (2007). Seven privacy worries in ubiquitous social computing. Proceedings of the 3rd Symposium on Usable Privacy and Security, 171–172.Google Scholar
- Nielsen and NM Incite. State of the Media: The Social Media Report 2012. December 3, 2012. http://blog.nielsen.com/nielsenwire/global/social-media-report-2012-social-media-comes-of-age/.
- Nov, O., & Wattal, S. (2009). Social computing privacy concerns: Antecedents and effects. In Proceedings of the SIGCHI conference on human factors in computing systems, 333–336.Google Scholar
- Rheingold, H. (1993). A slice of life in my virtual community. In L. Harasim (Ed.), Global networks (pp. 57–80). MA: MIT Press.Google Scholar
- Smiley, M. (2011). Collective Responsibility, In Edward N. Zalta (ed.) The Stanford Encyclopedia of Philosophy. (Summer 2011 Edition). http://plato.stanford.edu/archives/fall2011/entries/collective-responsibility/. Accessed 17 May 2012.
- Spafford, E. H. (1995). Are computer hacker break-ins ethical? In D. G. Johnson & H. Nissenbaum (Eds.), Computers, ethics, and social values. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
- Social networking sites. (2010). Retrieved from http://www.mass.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community Safety&L2 = Cyber Crime & Internet Safety&L3 = Social Interaction Online&sid = Cago&b = terminalcontent&f = community_social_networking_sites&csid = Cago. Accessed 15 November 2010.
- Stiegler, B. (1998). Technics and time, 1: The fault of epimetheus. Stanford: Stanford University Press.Google Scholar
- Young, K. (1999). Internet addiction: Evaluation and treatment. Student British Medical Journal, 7(351), 352.Google Scholar