Science and Engineering Ethics

, Volume 21, Issue 1, pp 19–28 | Cite as

Who Regulates Ethics in the Virtual World?

  • Seemu Sharma
  • Hitashi Lomash
  • Seema Bawa
Original Paper


This paper attempts to give an insight into emerging ethical issues due to the increased usage of the Internet in our lives. We discuss three main theoretical approaches relating to the ethics involved in the information technology (IT) era: first, the use of IT as a tool; second, the use of social constructivist methods; and third, the approach of phenomenologists. Certain aspects of ethics and IT have been discussed based on a phenomenological approach and moral development. Further, ethical issues related to social networking sites are discussed. A plausible way to make the virtual world ethically responsive is collective responsibility which proposes that society has the power to influence but not control behavior in the virtual world.


Ethics Technology Virtual world Social networking sites Society 


  1. Branscomb, A. W. (1990). Rogue computer programs and computer rogues: tailoring the punishment to fit the crime. Rutgers Computer and Technology Law Journal, 16, 1–61.Google Scholar
  2. Charles, R. (1987). Computer bulletin boards and defamation: Who should be liable? Under what standard? JL and Tech, 2, 121–325.Google Scholar
  3. Ermann, D., Williams, M., & Shauf, M. (1997). Computers, ethics, and society. Oxford: Oxford University Press.Google Scholar
  4. Heidegger, M. (1977). The question concerning technology and other essays. New York: Harper Torchbooks.Google Scholar
  5. Introna, L. (2011). Phenomenological approaches to ethics and information technology, The Stanford Encyclopedia of Philosophy (Summer 2011 Edition). Edward N. Zalta (ed.). Accessed 15 May 2012.
  6. Johnson, Deborah G. (1997). Ethics online: shaping social behavior online takes more than new laws and modified edicts. Communications of the ACM, 40(1), 60–65.CrossRefGoogle Scholar
  7. Jonas, H. (1984). The imperative of responsibility: In search of an ethics for the technological age. Chicago: University of Chicago Press.Google Scholar
  8. Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction—A review of psychological literature. International Journal of Environmental Research and Public Health, 8, 3528–3552.CrossRefGoogle Scholar
  9. Light, B., & McGrath, K. (2010). Ethics and social networking sites: A disclosive analysis of Facebook. Information Technology & People, 23(4), 290–311.CrossRefGoogle Scholar
  10. May, L. (1987). The morality of groups: Collective responsibility, group-based harm, and corporate rights. Notre Dame, IN: University of Notre Dame Press.Google Scholar
  11. Mayo, M. (1998). Social impact of the internet: What does it mean? Communications of the ACM, 41(12), 21.CrossRefGoogle Scholar
  12. Mesthene E. G (1997). The Role of Technology in Society. Technology and values (pp. 71-86). Rowman & Littlefield, Lanham.Google Scholar
  13. Mooradian, N. (2009). The importance of privacy revisited. Ethics and Information Technology, 11(3), 163–174. doi: 10.1007/s10676-009-9201-2.CrossRefGoogle Scholar
  14. Motahari, S., Manikopoulos, C., Hiltz, R., & Jones, Q. (2007). Seven privacy worries in ubiquitous social computing. Proceedings of the 3rd Symposium on Usable Privacy and Security, 171–172.Google Scholar
  15. Nielsen and NM Incite. State of the Media: The Social Media Report 2012. December 3, 2012.
  16. Nov, O., & Wattal, S. (2009). Social computing privacy concerns: Antecedents and effects. In Proceedings of the SIGCHI conference on human factors in computing systems, 333–336.Google Scholar
  17. Rheingold, H. (1993). A slice of life in my virtual community. In L. Harasim (Ed.), Global networks (pp. 57–80). MA: MIT Press.Google Scholar
  18. Smiley, M. (2011). Collective Responsibility, In Edward N. Zalta (ed.) The Stanford Encyclopedia of Philosophy. (Summer 2011 Edition). Accessed 17 May 2012.
  19. Spafford, E. H. (1995). Are computer hacker break-ins ethical? In D. G. Johnson & H. Nissenbaum (Eds.), Computers, ethics, and social values. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
  20. Social networking sites. (2010). Retrieved from Safety&L2 = Cyber Crime & Internet Safety&L3 = Social Interaction Online&sid = Cago&b = terminalcontent&f = community_social_networking_sites&csid = Cago. Accessed 15 November 2010.
  21. Stiegler, B. (1998). Technics and time, 1: The fault of epimetheus. Stanford: Stanford University Press.Google Scholar
  22. Turiel, E. (1978). Social regulations and domains of social concepts. New Directions for Child and Adolescent Development, 1978(1), 45–74.CrossRefGoogle Scholar
  23. Wang, F. Y., Carley, K. M., Zeng, D., & Mao, W. (2007). Social computing: From social informatics to social intelligence. Intelligent Systems, IEEE, 22(2), 79–83.CrossRefGoogle Scholar
  24. Young, K. (1999). Internet addiction: Evaluation and treatment. Student British Medical Journal, 7(351), 352.Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Computer Science and Engineering DeptartmentThapar UniversityPatialaIndia
  2. 2.School of Behavioral Sciences and Business StudiesThapar UniversityPatialaIndia

Personalised recommendations