When we talk about “ethics” we refer to attitude, values, beliefs and habits possessed by a person or a group. Ethics is the study of morality. Internet ethical problems deal with principles of problems all individual, social and global. In simple words, Computer ethics is a set of moral principles that govern the usage of Computers. They are a set of moral principles that govern an individual or a group on what is acceptable behaviour while using a computer. As we all know, that Computer is an effective technology and it raises ethical issues like Personal Intrusion, Deception, Breach of Privacy, Cyber-bullying, Cyber-stalking, Defamation, Evasion Technology or social responsibility and Intellectual Property Rights i.e. copyrighted electronic content.
Internet Ethics for everyone
One has to accept that Internet is not a value free-zone. It means World Wide Web is a place where values are considered in the broadest sense so we must take care while shaping content and services and we should recognize that internet is not apart from universal society but it is a primary component of it.
Sensitivity to National and Local cultures
It belongs to all and there is no barrier of national and local cultures. It cannot be subject to one set of values like the local TV channel or the local newspaper we have to accommodate multiplicity of usage.
While using e-Mail and chatting
Internet must be used for communication with family and friends. Avoid chatting with strangers and forwarding e-mails from unknown people /strangers. We must be aware of risks involved in chatting and forwarding e-mails to strangers.
Pretending to be someone else
We must not use internet to fool others by pretending to be someone else. Hiding our own identity to fool others in the Internet world is a crime and may also be a risk to others.
Avoid Bad language
We must not use rude or bad language in e-Mail, chatting, blogging and social networking; we need to respect their views and should not criticize anyone on the internet.
Hide personal information
We should not give personal details like home address, phone numbers, interests, passwords. No photographs should be sent to strangers because it might be misused and shared with others without their knowledge.
Internet it can be also used to watch videos and play games, browse or download information. We must be aware of the importance of copyrights and issues of copyright.
Access to Internet
The internet is a time-efficient tool for everyone that enlarges the possibilities for curriculum growth. Learning depends on the ability to find relevant and reliable information quickly and easily, and to select, understand and assess that information. Searching for information on the internet can help to develop these skills. Classroom exercises and take-home assessment tasks, where students are required to compare website content, are ideal for alerting students to the requirements of writing for different audiences, the purpose of particular content, identifying and judging accuracy and reliability. Since many sites adopt particular views about issues, the internet is a useful tool for developing the skills of distinguishing fact from opinion and exploring subjectivity and objectivity.
Ethical rules for Internet users
Some of the rules that individuals should follow while using a computer are listed below:
- Does not use to Internet to harm other users.
- Do not use Internet to steal others information.
- Do not access files without the permission of the owner.
- Do not copy copyrighted software without the author’s permission.
- Always respect copyright laws and policies.
- Respect the privacy of others, just as you expect the same from others.
- Do not use other user's computer resources without their permission.
- Complain about illegal communication and activities, if found, to Internet service Providers and local law enforcement authorities.
- Users are responsible for safeguarding their User Id and Passwords. They should not write them on paper or anywhere else for remembrance.
- Users should not intentionally use the computers to retrieve or modify the information of others, which may include password information, files, etc.,