skip to main content
article
Free Access

Ethics online

Published:01 January 1997Publication History
First page image

References

  1. 1 Branscomb, A. W. Rogue computer programs and computer rogues: Tailoring the punishment to fit the crime. Rutgers Comput. Tech. LawJ. 16 (1990), 1-61.Google ScholarGoogle Scholar
  2. 2 Charles, R. Computer bulletin boards and defamation: Who should be liable? Under what standard?J. Law Tech. 2 (1987), 121-150.Google ScholarGoogle Scholar
  3. 3 Dibbell, J. A rape in cyberspace. The Village Voice 38 (Dec. 21, 1993), 36-42.Google ScholarGoogle Scholar
  4. 4 Gurak, L.J. The rhetorical dynamics of a community protest in cyberspace: The case of Lotus Marketplace. Dissertation, Rensselaer Polytechnic Institute, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Johnson, D.G. Computer Ethics. Prentice Hall, Englewood Cliffs, N.J., 1985, 1994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Kiesler, S., Siegel, J. and McGuire, T.W. Social psychological aspects of computer-mediated communication. Am. Psychol. 39, 10 (1984), 1123-1134.Google ScholarGoogle ScholarCross RefCross Ref
  7. 7 Levy, S. Battle of the Clipper chip. NY Times Mag. (June 12, 1994), 44.Google ScholarGoogle Scholar
  8. 8 Spafford, E. H. Are computer hacker break-ins ethical? In Computers, Ethics, and Social Values, D.G. Johnson and H. Nissenbaum, Eds. Prentice-Hall, Englewood Cliffs, N.J., 1995.Google ScholarGoogle Scholar
  9. 9 Sproull, L. and Kiesler, S. Reducing social context cues: Electronic mail in organizational communication. Manage. Sci. 32, 11 (Nov. 1986), 1492-1512. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Stone, A. R. Will the real body please stand up? In Cyberspace: First Steps, M. Benedikt, Ed. MIT Press, Cambridge, Mass., 1991, 81-118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 Winner, L. A victory for computer populism. Tech. Rev. (May/June, 1991), 66.Google ScholarGoogle Scholar
  12. 12 Zimbardo, P.G. The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos in Nebraska. In Symposium on Motivation, W.J. Arnold and D. Levine, Eds. University of Nebraska Press, Lincoln, 1969.Google ScholarGoogle Scholar

Index Terms

  1. Ethics online

        Recommendations

        Reviews

        Joseph S. Fulda

        Unlike most critiques of the Internet, which are at least partly uninformed and, where informed, do not get to the heart of the matter—how communication via the Internet is different from other forms of communication—Johnson's paper is fully informed and goes right to the heart of the matter. Communication via the internet, Johnson tells us, differs from offline communication in three essential ways: scope, anonymity, and reproducibility. By “scope” she means the combination of vast reach, interactivity, and immediacy, which together allow anyone to broadcast anything to millions of people and have them respond by the millions almost immediately. This scope, Johnson points out, gives the communicator unprecedented power. Second, the medium lends itself to anonymous or pseudo nymous communication, thereby divorcing the message from the messenger and thus freeing the messenger from responsibility for the message. Third, reproducibility means that it is possible, at no cost, to take a message from anyone and send multiple copies of it anywhere, altered or unaltered, while leaving the original intact, without any sign that it has been reproduced. Johnson convincingly argues that it is these three aspects of communication online that set it apart from communication offline and, therefore, make an ethical difference. As legislators grapple with the complex questions of fraud, identity theft, copyright violation, invasion of privacy, spamming, harassment, and defamation online, they would do well to consider the roles these three factors play. The more they are in evidence, the more likely it is that new legislation, narrowly tailored to mitigate their effects, will be called for.

        Andrew Robert Huber

        Offline behavior cannot be controlled only by laws or technology. Why should online behavior be any different__?__ Johnson argues that since offline behavior is ruled by established social norms, similar norms for online behavior must be established. Johnson identifies three special aspects of online communication: scope, anonymity, and reproducibility. While these exist in offline communication, they tend to have different online characteristics (especially defaults) and reinforce each other. For example, offline communication is typically not reproducible without special action (such as videotaping), whereas online messages are automatically reproducible. With the anonymity available online, reproducibility makes it simple to copy or alter communications, spreading either real or forged versions widely. Johnson's solution is twofold. First, since these three characteristics can be both beneficial and dangerous, establish varied modes of communications (such as chat rooms or bulletin boards) with different degrees of these attributes. These can vary the degree of anonymity provided and allowed. Second, make the rules of communication explicit before communication begins, including the norms for anonymity and other attributes. Finally, Johnson offers three general online rules: know and follow the rules; respect the privacy and property rights of others; and r<__?__Pub Caret>espect the individuals with whom you communicate and those affected by your communication. While the paper is well written and Johnson's case is clearly made, her solution seems simplistic. She leaves unanswered the question of what to do with those who do not follow the rules. Also, to establish norms, users must agree on the rules. This is difficult to accomplish offline, let alone online. Respecting the privacy and property rights of others requires agreement on what those rights are. Spammers claim the right to send commercial email to anyone, which many recipients reject. While Johnson offers some initial norms, she gives little help on the more difficult task of getting a diverse global online community to agree on these or any norms.

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 40, Issue 1
          Jan. 1997
          79 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/242857
          Issue’s Table of Contents

          Copyright © 1997 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 January 1997

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader