Derek Ricard
Seattle Pacific University
Abstract Hacking without the consent of the user cannot be ethically justified. The hacker’s code of ethics is an attempt to justify hacking and make it ethical. Part of their ethic is all information should be free and available to everyone and that break-ins help reveal security threats. Even these two ethics cannot be considered because of how weak and wrong they are. Downloading P2P files has always been a huge digital ethic that never stops being debated. The problem is sharing copyrighted files over the Internet without the right to do so; it is done so much that law enforcement had to stop pursuing individuals and pursue the organizations that provide the torrents. Even though downloading P2P files is ethically wrong I believe that it helps spread music across the globe and help people discover new artists and even increase the artist’s earnings by going to concerts and buying merchandise and so on. Businesses need ethics in order stay in business. Stakeholders and shareholders are the two popular business ethics used. Microsoft has an intensive and well thought out code of ethics, although they do hold the shareholders view of business ethics.
Introduction
With all the new technology and how young the Internet is there is a need for cyber ethics to be defined and enforced to some degree. Ethics relate to the discipline dealing with what is ethically right or wrong and with moral duty and obligation. People argue that ethics are ethics no matter how they are applied, but given the nature of computers themselves produce unique dilemmas making the ethics involved different in kind and separate ethics from computer ethics. It is important to point out that ethics are about raising questions rather than actually giving answers. By raising questions about certain usage of cyber technology it will bring that question to the forefront and may eventually get answered and resolve the potential
Bibliography: Ermann, M. D., Williams, M. B., & Shauf, M. S. (1997). Computers, ethics, and society (2nd ed.). New York: Oxford University Press. Forester, T., & Morrison, P. (1994). Computer ethics: cautionary tales and ethical dilemmas in computing (2nd ed.). Cambridge, Mass.: MIT Press. Himma, K. E., & Tavani, H. T. (2008). The handbook of information and computer ethics. Hoboken, N.J.: Wiley. Pfanner, E. (n.d.). Swedes charge 4 in case involving copyright infringement of music and films - International Herald Tribune. Internet Archive: Wayback Machine. Retrieved November 29, 2010, from http://web.archive.org/web/200802 Riley, J Mostrous A., Brown D., (2008, January 16.) Microsoft seeks patent for office “spy” software. The Sunday Times. Retrieved from http://technology.timesonline.co.uk/tol/news/tech_and_web/article3193480.ece Salehnia, A (N. D. Cal. 2000). U.S.C. A&M Records. Inc. v. Napster. Inc. 114 F. Supp. 2d 896 Paid Content Weisenthal J. (2008, September 15). The next chapter: best buy to acquire Napster for $121 million. Wilkins, L., & Christians, C. G. (2009). The handbook of mass media ethics. New York: Routledge.