Skip to main content
Log in

Who Regulates Ethics in the Virtual World?

  • Original Paper
  • Published:
Science and Engineering Ethics Aims and scope Submit manuscript

Abstract

This paper attempts to give an insight into emerging ethical issues due to the increased usage of the Internet in our lives. We discuss three main theoretical approaches relating to the ethics involved in the information technology (IT) era: first, the use of IT as a tool; second, the use of social constructivist methods; and third, the approach of phenomenologists. Certain aspects of ethics and IT have been discussed based on a phenomenological approach and moral development. Further, ethical issues related to social networking sites are discussed. A plausible way to make the virtual world ethically responsive is collective responsibility which proposes that society has the power to influence but not control behavior in the virtual world.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Branscomb, A. W. (1990). Rogue computer programs and computer rogues: tailoring the punishment to fit the crime. Rutgers Computer and Technology Law Journal, 16, 1–61.

    Google Scholar 

  • Charles, R. (1987). Computer bulletin boards and defamation: Who should be liable? Under what standard? JL and Tech, 2, 121–325.

    Google Scholar 

  • Ermann, D., Williams, M., & Shauf, M. (1997). Computers, ethics, and society. Oxford: Oxford University Press.

    Google Scholar 

  • Heidegger, M. (1977). The question concerning technology and other essays. New York: Harper Torchbooks.

    Google Scholar 

  • Introna, L. (2011). Phenomenological approaches to ethics and information technology, The Stanford Encyclopedia of Philosophy (Summer 2011 Edition). Edward N. Zalta (ed.). http://plato.stanford.edu/archives/sum2011/entries/ethics-it-phenomenology/. Accessed 15 May 2012.

  • Johnson, Deborah G. (1997). Ethics online: shaping social behavior online takes more than new laws and modified edicts. Communications of the ACM, 40(1), 60–65.

    Article  Google Scholar 

  • Jonas, H. (1984). The imperative of responsibility: In search of an ethics for the technological age. Chicago: University of Chicago Press.

    Google Scholar 

  • Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction—A review of psychological literature. International Journal of Environmental Research and Public Health, 8, 3528–3552.

    Article  Google Scholar 

  • Light, B., & McGrath, K. (2010). Ethics and social networking sites: A disclosive analysis of Facebook. Information Technology & People, 23(4), 290–311.

    Article  Google Scholar 

  • May, L. (1987). The morality of groups: Collective responsibility, group-based harm, and corporate rights. Notre Dame, IN: University of Notre Dame Press.

    Google Scholar 

  • Mayo, M. (1998). Social impact of the internet: What does it mean? Communications of the ACM, 41(12), 21.

    Article  Google Scholar 

  • Mesthene E. G (1997). The Role of Technology in Society. Technology and values (pp. 71-86). Rowman & Littlefield, Lanham.

  • Mooradian, N. (2009). The importance of privacy revisited. Ethics and Information Technology, 11(3), 163–174. doi:10.1007/s10676-009-9201-2.

    Article  Google Scholar 

  • Motahari, S., Manikopoulos, C., Hiltz, R., & Jones, Q. (2007). Seven privacy worries in ubiquitous social computing. Proceedings of the 3rd Symposium on Usable Privacy and Security, 171–172.

  • Nielsen and NM Incite. State of the Media: The Social Media Report 2012. December 3, 2012. http://blog.nielsen.com/nielsenwire/global/social-media-report-2012-social-media-comes-of-age/.

  • Nov, O., & Wattal, S. (2009). Social computing privacy concerns: Antecedents and effects. In Proceedings of the SIGCHI conference on human factors in computing systems, 333–336.

  • Rheingold, H. (1993). A slice of life in my virtual community. In L. Harasim (Ed.), Global networks (pp. 57–80). MA: MIT Press.

    Google Scholar 

  • Smiley, M. (2011). Collective Responsibility, In Edward N. Zalta (ed.) The Stanford Encyclopedia of Philosophy. (Summer 2011 Edition). http://plato.stanford.edu/archives/fall2011/entries/collective-responsibility/. Accessed 17 May 2012.

  • Spafford, E. H. (1995). Are computer hacker break-ins ethical? In D. G. Johnson & H. Nissenbaum (Eds.), Computers, ethics, and social values. Englewood Cliffs, NJ: Prentice Hall.

    Google Scholar 

  • Social networking sites. (2010). Retrieved from http://www.mass.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community Safety&L2 = Cyber Crime & Internet Safety&L3 = Social Interaction Online&sid = Cago&b = terminalcontent&f = community_social_networking_sites&csid = Cago. Accessed 15 November 2010.

  • Stiegler, B. (1998). Technics and time, 1: The fault of epimetheus. Stanford: Stanford University Press.

    Google Scholar 

  • Turiel, E. (1978). Social regulations and domains of social concepts. New Directions for Child and Adolescent Development, 1978(1), 45–74.

    Article  Google Scholar 

  • Wang, F. Y., Carley, K. M., Zeng, D., & Mao, W. (2007). Social computing: From social informatics to social intelligence. Intelligent Systems, IEEE, 22(2), 79–83.

    Article  Google Scholar 

  • Young, K. (1999). Internet addiction: Evaluation and treatment. Student British Medical Journal, 7(351), 352.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seemu Sharma.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sharma, S., Lomash, H. & Bawa, S. Who Regulates Ethics in the Virtual World?. Sci Eng Ethics 21, 19–28 (2015). https://doi.org/10.1007/s11948-014-9516-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11948-014-9516-1

Keywords

Navigation