In the present world, so called information technology
age, the term
Internet is not new to most of us. Although started
in recent
past years, today it has become one of basic needs
of life,
especially in urban context. Our focus in this term
paper is our
present Indian Internet community, and is focussed
to bring
certain important aspects into discussion and contemplation.
This
is especially because in our country India, the Internet
has mainly
come into much into day-today life only few years
back. And thus it
is very important to bring into discussion many important
aspects of
this new introduction called cyberspace in our daily
lives, which
may not have been adequately handled, talked about
or known to
us. As we know, man is a social being. The society
we live in has
its norms and ethics, and it is expected in almost
every society
to live a moral and ethical life according to that
society. But
as we know that a child can't be expected to cater
all
responsibilities of a full-fledged citizen. As she
or he grows,
it starts noticing the many things in the world,
and if a
value-based life is lived by people around, it starts
learning
them. The same should hold for virtual world or cyberspace.
A
person born and brought up in cyber environment is
expected to
know its norms and ethics, and to follow and propagate
them to
live a moral cyber life. But, if we see our present
Indian, or
any developing country or even developed countries
Internet
community, things started only recently, and thus
a full-fledged
Internet citizen may not be expected which has been
brought up in
cyber environment. Thus, we need to know many new
things,
learning many new things and practice them in our
Internet lives.
One aim of our term paper is to handle this issue.
Our
paper also tries to handle some of so called technical
aspects of
Internet or Internet ethics. We will explore it in
detail, and
will try to associate technicality into morality.
There are some
inherent aims which we may not exclusively express,
or bring
forth, but they are expected to be noticed in due
contexts in
this paper. Some of these are willingly or knowingly
done mischief
and misconduct on the Internet, issues regarding
cyberlife or
e-life, and many others. From anything brought to
anyone, the one
who is receiving has certain expectations. Thus you
must be
having certain inherent expectations from any paper
based on
Internet ethics. But here we need to be frank that
many commonly
talked or discussed issues like pornography over
the net,
patents, copyright issues etc have not been discussed
in much
details, because as we said above, our aim is coherent
around
certain other very important issues. So we hope you
to accordingly
change your expectations from our paper. As you go
through it,
contents might seem sometimes very common, or sometimes
like
never seen. But what we hope you to contemplate,
is on the essence
of the contents and not the contents themselves.
We then
sincerely hope that you will be able to see how is
this paper
handling issues that are inherently different from
normal
Internet lives, yet very important when seen in a
moral
point of
view. We hope you will really enjoy reading
this paper.
Snap 1 - Do Computers think?
The question of whether computers can think is
just like the
question of whether submarines can swim.
- Edsger W. Dijkstra
For this topic to be discussed, we assume that the
reader has
seen and worked on any computer sometime. Now let
us start with a
digital machine like calculator. The basic difference
between a
computer and electronic calculator is that although
both of them
have memory, a computer can be programmed but a calculator
may
not be programmed. So one thing is very clear that
a computer can
be made to think or at least follow a predefined
set of
instructions. We will not go much deep into
this discussion, but
some great computer wizards say that computer can
think, while
other equally great minds say that computers cannot
think. To
answer this question, one need to explore the meaning
of word
thinking, and must have adequate knowledge
of theoretical
computer science with expertise on theory of computation.
The
research work that is currently going on has inclination
that
computers can think, and thus a branch of computer
science called
the Artificial Intelligence is devoted to studies
in this field.
For our present requirement, we assume that although
computers
can think or at least try to simulate a thinking
person, but
actually they cannot think as humans think. We also
assume that
computers cannot create something entirely
new, as an
artist can, or write an entirely new program as a
computer
scientist can. When we define any computer or finite
automaton we
define both its syntactic and semantic domains. We
are supposing
for this text that computer cannot generate semantic
or
rather saying, new semantic domains for themselves.
Although
these may be viewed as question of computing capabilities
by critical philosophers of the subject, but we don't
go much
into details as per present situation. However, we
want you not
to stop with us, as this is one of the fundamental
questions, and
even though one may not be able to answer objectively,
but one
must think over this very interesting question of
computer being
intelligent or not.
Snap 2 - The Virtual World
The world of computers or specifically Internet is
called the
virtual world. It is also called cyberspace. The
common sense
meaning of word virtual is that it is not real. But
as a person
of computer science, I would say that it is not actually
true
when viewed in computer science world. For example,
the word
virtual memory doesn't mean a memory that
does not exist,
but a real memory that gives a sense or illusion
of memory of
infinite size. For a person not into much of computer
world, it
may seem that the virtual world has nothing to do
with the real
world, but such is not the case. Let us try to explore
this in
detail. When something happens over the computer,
it is very much
clear that nothing happens in real life, only when
we are viewing
it in a sense of something happening physically or
something
which involves displacement or any physical change,
to be
precise. For example, somebody claiming that she
has slapped you
by showing a neticon of slapping, on the IRC (Internet
Relay
Chat). She hasn't exactly slapped you physically.
Now consider
another similar case, you read your email, but you
will not say
that I haven't got the message as it was given over
the computer,
as an email in any case is not less informative than
a real life
letter sent through post. Thus something in the cyber
world is
taking the place of something in the real world.
Now lets go a
bit deeper. We most of the times try to relate anything
in the
cyber world with real world counterpart, and then
come into
conclusion that nothing has happened in the real
world. This is
much because the cyber world has started after the
real world.
But as the cyber world gets aged and matured, many
things or
events in the cyber world will not need their counterparts
in the
real world just for their being those things or events.
Let us consider the case of introduction of money
into the world.
It must have replaced the barter system in the beginning.
In the
initial stage, it had something for its reference
or value, like
gold, silver or diamond. But as the time passed,
this reference
started losing its importance, and now if we see,
we no more
require any such reference. Thus, although in the
beginning money
was not supposed to be independent, and its existence
was
dependent upon gold or silver for its value, but
in the due
course, it became independent. If we apply an analogy
of this to
the Internet world and the real world, we expect
the similar
thing to happen to Internet world as was to the money.
What we
are trying to say here is that virtual world will
try to sustain
without real world being its reference. By world
here, much of
our inclination is towards what happens in these
worlds rather
than any physical interpretation of the worlds themselves.
Obviously, there will be no virtual world without
a real world
because the people who constitute the virtual world
will have to
be in the real world. Now if we look in a different
view, we care
so much about the real world due to another reason
that we spend
most of the time of our days in the real world activities.
So,
thinking on the same lines, for a person who spends
most of her
or his time in the cyber world activities then for
that person,
cyber world is equally important in almost all regards.
And thus
anything being done there is equally significant
as that same
thing being done in the real world. Thus if there
is case of any
sexual misbehaviour over the net, or usage of any
bad language or
anything which is offensive in real life world, will
deemed to be
equally offensive and immoral in the Internet world.
Thus the
Internet isn't only virtual world, but something
more called the
world with the virtual reality. And this reality
will no
longer seem to be virtual but will in future to us
as real as
touching a flower or drinking a cold drink or any
real life
activity as the matter of fact. Thus, as for any
other world, we
need to think of many aspects of the Internet, and
one of them is
the ethics and morality in the virtual world, which
we call the
Internet Ethics. We will try to bring out some of
the important
issues regarding the Internet ethics.
Snap 3 - What is the Internet
The Internet, as the name suggests, is complex network
of many
smaller regional networks. The computers that are
very important,
or rather say joining these networks to the Internet,
are called
backbone computers or backbone servers. In this text
we will
interchangeably use the words computers, machines,
hosts or servers,
although they may be very different if we go into
their
particularities. These backbone servers join the
geographical
networks. But very important thing to notice here
is that the
Internet is not run by a single computer or computers.
This is
both its greatest strength and greatest weakness.
This approach
suggests that it is virtually impossible for entire
net to crash
down at once - even if a single computer or set of
computers
shuts down, then also the network sustains.
Nobody really knows how many computers and networks
actually make up this Net. Some estimates say there are now as many as
5,000 networks connecting nearly 2 million computers and more than 15 million
people around the world. Whatever the actual numbers, however, it is clear
they are only increasing.
The Net is more than just a technological marvel.
It is human communication at its most fundamental level.
The pace may be a little quicker when the messages
race around
the world in a few seconds, but it's not much different
from a
large and interesting party. You'll see things in
cyberspace that
will make you laugh; you'll see things that will
anger you.
You'll read silly little snippets and new ideas that
make you
think. You'll make new friends and meet people you
wish would
just go away. Being connected to the Net takes more
than just
reading conferences and logging messages to your
computer; it
takes asking and answering questions, exchanging
opinions -- getting involved. If you choose to go forward, to use
and contribute, you
will become a "citizen of Cyberspace".
The more can read about the Internet from Big Dummy's
Guide to the
Internet:
http://www.cm.cf.ac.uk/Bigdummy/bdg_41.html
Snap 4 - Dictionary definition of Ethics
The dictionary tells us that ethics pertains to
a
system of
moral principles; the rules of conduct recognized
in respect
to a particular class of human actions or a particular
group or
culture; the branch of philosophy dealing with
values relating
to human conduct, with respect to the rightness
and wrongness
of certain actions and to the goodness and badness
of the motives
and ends of such actions.
Snap 5 - Why bother about Ethics?
As we said earlier, for people who are new to any
world or realm,
something important things are to be familiarized,
learned and
practiced. The ethics of that realm are very important
part of
this new adventure. Without a moral or ethical approach
in
background considerations, anything done in that
realm is not
acceptable. Hence, one needs to bother about ethics.
Snap 6 - What is ethics good for?
This is very important question, which may be rephrased
as what
really one gets or achieves when doing something
in ethical way?
A very clear thing that anybody can notice is that
it brings out
a regular way or common way of doing that thing.
Most of the
times, the set of possible ways of doing a thing
morally right,
is a bounded or closed set. Thus it helps in bringing
order in that particular field or way, from
randomness or
chaos. The thing becomes more and more planned as
it improves
with ethical considerations in background. And, as
most of us
might have experienced, planning makes our lives
much easier and
better. To understand this better, let us consider
a newly
developing city. In particular, consider the traffic
in the city.
If from the beginning itself the roads of the city
are planned,
then the day-today lives of citizens will be much
simpler because
of less traffic jams and road accidents. The world
of the
Internet is like that of a city being developed.
Thus each and
every aspect of it has to be well planned and thought
of. Thus a
good set of Internet ethics will go a long way towards
improving
our lives on the net. Although we may not be able
plan everything
in correct details due to always changing and uncertain
future of
this very complex world, a little flexibility is
always a virtue.
Another very important point in this regard is that
ethics just
can't be avoided or bypassed. Whenever a question
of what
should one do, how should one do and what
is best comes up, then
ethics have to be involved in. The questions above
are not just questions but are central ethical questions. Almost any question
of good, better, best, should or ought to involves ethics in it. Once answered,
we can see clearly why is ethics good for.
Another very important reason, about which we
are most of times
ignorant in our discussions, is that ethics bring
a sense of
peace and satisfaction within us. Although, we may
easily try to
counter argue this fact, mostly because it is much
inclined
towards subjectivity, but we cannot just eliminate
it. After
living a life, one reason for a person to be satisfied
upon his
or her life may be living an ethically and morally
justified
life, although there may not be any apparent achievement.
The
people who might have experienced this peace may
easily say that
living this life in itself is a great achievement.
What a joy it
brings to a person, whether he or she may not have
been
successful in their effort, but whatever they do
is accomplished
in a morally and ethically unquestionable way!
This may be
extended further to the question of means and ends.
The end in
itself may not be all that is required if viewed
in a moral
framework. The means used to attain that end are
equally
important moral considerations. And thus if the means
used are
supposed to be right, then it carries a sense of
accomplishment.
The experience of this bliss, mentioned in
above lines,
may usually be very difficult to attain for most
of us. One
important reason for this might be that we most of
the times do
not bother about such bliss. Once experienced, the
joy involved
is inexpressible, the bliss experienced is unexplainable.
It is
just an experience, for those who strive for it.
Snap 7 - Do I require Internet Ethics?
As we have been discussing anybody using the Internet
requires
knowing morality and ethics related to it and its
usage. If I use
the Internet, then I surely require myself to know
about the
Internet ethics.
Snap 8 - Is there anything special about the Internet ethics?
This is very crucial question, and we will try to
explore it in
detail. We know that different realms have different
way of
communication. For example, in our real world, we
communicate
through analog signals like sound we make, and also
through
auxiliary ways like making signs or languages and
even through
body language. In the same way, the Internet has
way of
communication through digital signals in form of
packets, and
thus anything we want to communicate has to be understood
in
written language, and less commonly through images
or animations,
sounds or video collectively called multimedia. This
is the prime
specialty of the Internet ethics that its communication
depends
upon how it is expressed in writing. Also, many other
aspects in
the Internet are online like chatting, message passing,
playing
games or other similar things, which are much more
complicated
due to their being expressed in writing as well as
being
expressed interactively. Thus, when we view the Internet
ethics,
it has to be contemplated with special context in
the background.
Snap 9 - The technical Aspect
In this section, we need to direct our attention to
certain
physical details or rather technical details which
seem to be far
from ethics or morality, but as we said, our aim
is the
rendezvous of both of these seemingly much different
issues. So
let us start with what really is anything we do over
the
Internet? As per present technology, almost anything,
which is
said to be done over the Internet, is a TCP/IP connection.
IP
stands for Internet Protocol and TCP for Transmission
Control
Protocol. Anything going by only IP connection is
not secure,
thus we require TCP incorporated so that information
is securely
passed over the Internet. Telnet connection is major
consumer of
the network bandwidth.
Every time you press a key to be sent to the remote
computer,
Telnet will send something like 300 characters over
the network,
giving Telnet quite a high overhead. Any connection
like ftp,
sending mail, or doing any other similar work is
like telnet
connection to an associated port related to that
service. The normal
or by default telnet is connection to port number
23. Similarly ftp
is like telnet connection to port number 21, and
sending email is to port 25. Net surfing (http) is also same thing to port
number 80 or 8080.
Thus telnet is very important thing to ponder upon.
As we know
that the Internet is collection of various networks
joined
together to form a single network. In this, any packet
or
information passed has to be passed through networks
of people
different from those of one sender request and another
processing
that request, also called the client and the server.
Thus
indirectly, we are using other people's resources.
Another very
important thing to notice here that they have agreed
to share
their resources, or may be they can't escape sharing
their
resources if they want to be part of the Internet.
In one way,
they might rather said to be bound to pass your information.
Otherwise, they will have to explicitly deny passing
your
information through their network. If they do this,
it seems
negative even though their intention in doing so
may not
originally have anything like that. But mostly in
the Internet
world, no network explicitly denies to pass other
networks
information, and this may be based on mutual understanding,
protocols or honour policy based on mutual need and
benefits. Now
suppose that somehow we are misusing other people's
resources. It
seems very astounding, isn't it? Such may be the
case when we are
not much aware or careful in using the Internet.
Let us try to
find out more about it. As the technical detail says,
a single
key pressed over dedicated Internet connection is
same as passing
about 300 characters over the network through physical
channel.
If we unnecessarily press keys just because feel
like doing so,
we might be adding to unwanted Internet traffic.
If the server we
have made connection is very far, like in other continent,
then
the havoc of this unwanted overhead may be easily
estimated. We
leave it to reader to judge whether it is will
be ethically
right to misuse the resources of others just because
we might be
ignorant about it?
Another very important thing to notice is that most
of the people dialing-in from their home through modem for the Internet
connection, Have a very slow connectivity. Sometimes, it even becomes horribly
slow due to bandwidth problem, peak hour, or telephone
lines problem. Now if due to certain reasons, suppose this speed goes still
slower, then consider the pity of people who might be suffering.
Will it bring ethical questions regarding people
who might be using
the Internet in ignorance or lack of knowledge
or lack of proper
considerations causing the much of the problems
like slow speed
which may be otherwise avoided? I personally
think that it does
bring, but answers may be subjective for others.
So do these
technical issues raise moral questions? We
will discuss this point
in due course in our paper.
Snap 10 - Misuse of the Internet tools and commands
These will again seem to be very technical but yet
need to be
discussed. We know that whenever a system is made,
it has a
control subsystem associated or rather say it must
have certain
tools to handle problems that might occur in day-today
working of
that system. Similar is the case with the Internet.
It has many
important tools or commands that follow certain mandatory
or
standard protocols and are used to doctor the Internet.
These
tools can't be eliminated as the problems in the
Internet can't
be eliminated. The responsible people of the net,
called system
administrators use these tools. But the very fact
is that even
other people use these tools mostly with intentions
that do not
seem to be positive, and even when responsible people
use them,
they also don't do it responsibly.
The following are typical misused system tools or commands:
ping
traceroute
We will discuss the command ping briefly.
The command ping is used to know whether a host is
alive or not.
The client sends a ping request, and the server has
to respond
to ping request of client by sending back the packets
to the client.
Its command-line syntax for Unix systems is:
ping -c <number> hostname
When one gives just a simple command without -c option,
then server
has to respond back with 56 packets many times and
thus
unnecessarily increases the traffic in the Internet.
The
providing the number argument to be 1 for -c option
will ask for
reply only once and the job would be done. We usually,
most of
the times the technical people, do not notice such
things which
seem minor to us, but actually these little things
may create
havoc to other systems and thus to other people associated
with
them. In many public access servers, like grex.cyberspace.org,
they don't allow to use such very important commands
just because
people don't realize what really such a simple command
can cause,
or many people use it in a harmful way knowingly.
They earlier
used to allow, but now they have stopped. This may
seem not to
involve any serious ethical issues, but when viewed
in the
Internet frame, where the whole world unites into
one, this is a
very serious ethical question. We need to
be very conscious and
careful while using any Internet system administration
tools.
The case for traceroute is also very interesting,
although we are
not discussing it now, and involves questions on
ethical grounds
other than one discussed for ping, whether it
is ethical to trace
the route of a packet to know about a person?
The another term
paper dealing with the Internet ethics, focussing
on hacking and
other similar aspects will try to explore much regarding
this.
Snap 11 - The Ten Commandments for Computer Ethics
1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with other people's computer work.
3. Thou shall not snoop around in other people's files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not use or copy software for which you have not paid.
7. Thou shall not use other people's computer resources
without
authorization.
8. Thou shall not appropriate other people's intellectual output.
9. Thou shall think about the social consequences
of the program you
write.
10.Thou shall use a computer in ways that show consideration
and
respect.
Many of the above issues are quite clear why they
have been added
into ethics. We will discuss few of them that are
related much to
technicalities. Let's consider Thou shall not
use a computer
to bear false witness. For a layman, it may
seem quite
absurd, because he or she may not be able to figure
out its
meaning. Let's go technical, this may simply mean
that one will
not use a computer to claim to another computer.
This may
technically cause what is called IP address conflict.
But more to
this is that it may also be used to catch or steal
some data from
other machines by claiming to be some machine. I
am not sure
whether such a case has ever happened, but in principle
it is
possible. Thus led by this commandment, one would
safely choose
not to bear false witness to avoid any ethical wrongdoing
in the
Internet world.
Another commandment about which we would like to discuss
is
Thou shall think about the social consequences
of the program
you write. It may be very important for computer
enthusiasts to
follow this commandment. To explain this, we may
use Existentialism principle that whatever a person does, he doesthat for
all. Thus
while doing anything, one need to look thatthing
in the perspective
of all the people associated and the benefit or harm
of all of
them. Just because one might be genius of assembly
language or
machine language, one should not write any arbitrary
piece of code.
One needs to look into the social consequences of
it. The ethical question, which may be asked here, is whether one is
a responsible citizen of cyberspace? The other thing that may be discussed
is what
makes a netizen or citizen of cyberspace responsible?
The last thing in this we discuss is the last commandment
Thou
shall use a computer in ways that show consideration
and
respect. It seems very simple, but again let's
view in the
technical framework. Consider what happens when an
email is sent.
The client machine when trying to make a connection
to a
mailserver for sending an email, the first thing
it is supposed
to do as a sort of formality is to say hello
to server
machine and gives its domain name address in the
process. The
protocol used for this is called helo protocol.
I am not
sure whether you have ever experienced or noticed,
many a time an
email message has a header saying the client machine
did not
use the helo protocol. This may be viewed
as breach of
norms or ethics at the machine level. This lack ethical
consideration may, by transitivity, be attributed
to client
system administrators who have installed the corresponding
program on that client machine. Although, nothing
much to worry
about, but in the long run even these minute details
are
important. This ethical issue may further be extended
to issue
regarding usage of non-standard programs or services
over the
Internet. This may also be particularized to discuss
issues like
distorting the original standards just to show pride
or monopoly,
as is the case regarding Microsoft Incorporated distortion
of
Java standards which was created by Sun Microsystems.
In this
paper, we are not discussing any of these issues.
Snap 12 - Telnet Etiquette
1. Remain on the system only long enough to get your
information,
then logoff.
2. Download and review instructions locally rather
than occupying
ports.
3. When you connect to a remote Internet host with
telnet, remember
that someone at some remote location
has taken the time to let
people on the Internet use their computer.
In exchange and in
respect you should always follow
whatever rules are posted on
the host.
4. Avoid using telnet services at top business
hours or hours
indicated by host, so that you
may also avoid slow speed and
net congestion.
In this case, things are quite clear from our earlier
discussions.
We will discuss the first point, and issues that
make it etiquette.
For the people who are already accessing any public
access servers,
like grex.cyberspace.org, might know the pain and
helplessness
incurred while waiting a queue of more than 60-70
people already
waiting for a free port to log-in. The pain becomes
deeper when
one is fervently waiting to discuss something on
the bulletin
board system (BBS) or conferences, and is not able
to get a
terminal. The reason being, many people might have
unnecessarily
occupying the terminals for nothing. When doing telnet,
one
should logout as soon as possible so that other people
may also
get chance to login. This issue may further be viewed
in ethical
realm of our earlier point, whether the resources
should be
wasted just because we don't care about them?
We need to
remember that our one useless pressing of key means
300 useless
characters to flow over the dedicated channel of
connectivity.
The ethical issue is apparent.
The last point in the telnet ethics is important in
the regard of
our honour and respect towards others who bother
to provide services
to us. We need to be considerate about their business
productivity
by avoiding using their resources when they themselves
need them. If
it is not urgent, we can use their resources for
our benefit at some
later time usually after normal business hour according
to that
machine time, and this will enhance the productivity
of both of
us, ours by fast access and theirs by their business
profit or
productivity. As we have earlier pointed out,
telnet is most
important Internet connection, thus its ethics must
be understood
in a closer and very careful way. This will make
our lives much
simpler in the virtual world.
Snap 13 - FTP Etiquette
1. Lest we forget, the Internet is there for people
to do work.
People using the network and the systems
on it are doing so for
a purpose, whether it be research, development,
whatever. Any
heavy activity takes away from the
overall performance of the
network as a whole.
2. The effects of an FTP connection on a site and
its link can vary;
the general rule of thumb is that any
extra traffic created
detracts from the ability of
that site's users to perform their
tasks. To help be considerate of this,
it's highly recommended
that FTP sessions be held only after
normal business hours for
that site, preferably late at night.
3. Think in terms of the current time at the site
that's being
visited, not of local time. This
is especially true when
accessing sites on another continents.
4. The Internet is financed in a cooperative effort.
All sites
share the charges incurred by users.
5. If you find some files that may be of interest
to others at your
own site, publicize it and try
to make it available.
As we can ourselves view, the ftp ethics are self-explanatory.
The fourth point needs a bit consideration. This
is related to
our earlier ethical issue regarding services being
provided by
others for us. Thus to provide services to us, others
might be
paying money, may be in a collective way. Thus any
ftp archieve
should be viewed with desired respect, and should
be used
efficiently so that the actual aim of providing service
for all
may be fulfilled.
The last point is also important, especially when
considering ftp
sites for Linux operating system, where thousands
of people may be
doing ftp simultaneously. These machines' administrators
strongly
urge to use other similar backup archieves machines
for ftp to the users, because these machines get too much overloaded. Thus
try to distribute the software as per license agreements locally, so that
bandwidth may be saved and others things may also go fine in the
other side. This is extremely important when we download
software
from servers in the other continents.
Snap 14 - Email Ethics
1. Never assume your email messages are private
nor that
they can be read by only yourself or
the recipient. Never send
something that you would mind seeing
on the evening news.
2. When quoting another person, edit out
whatever is
directly not applicable to your
reply. Don't let your
mailing or Usenet software automatically
quote the entire body of
messages you are replying to when it's
not necessary. Take the
time to edit any quotations down
to the minimum
necessary to provide context for your
reply. Nobody likes
reading a long message in quotes for
the third or fourth time,
only to be followed by a one line response:
"Yeah, me too."
3. Focus on one subject per email and always
include an
appropriate subject title for the message,
that way the reader
can locate the message quickly.
4. Use email signatures while writing email
to new people.
5. Capitalize words only to highlight
an important point or to
distinguish a title or heading. Capitalizing
whole words that
are not titles is generally termed as
SHOUTING!
6. *Asterisks* surrounding a word can be used to make
a stronger
point.
7. Use !!!! sparingly. You can only generate so much
emotion with
the single !
8. Never send chain letters through the Internet.
Sending them can
cause the loss of your Internet Access.
9. Please be considerate and avoid misinterpretation
of dates by
listing dates including the spelled
out month: Example:
24th June, 1996 or June 24, 1996
10.Follow chain of command procedures for corresponding
with
superiors. For example, don't
send a complaint via
email directly to the top just
because you can.
11.Be professional and careful what you say
about others. Email
is easily forwarded.
12.It is considered extremely rude to forward personal
email to
mailing lists or Usenet without
the original author's permission.
13.Be careful when using sarcasm and humor.
Without
face to face
communications your joke may
be viewed as criticism. Use emoticons
to express humor
:-) happy face for humour,
;-) winking
14.Messages that are filled with acronyms can be confusing
and
annoying to the reader.
So use of acronyms should be minimized.
Examples:
a/s/l = age/sex/location (chatting jargon)
Original Author: Arlene Rinaldi, Florida Atlantic
University
(locally edited copy)
As in other cases, this case also many things are
self-explanatory.
We will be discussing few important points. The second
point which
says that edit out other persons quotation is something
about which people have been very much ignorant, which we now try to bring
into discussion. It is very important to know that people who are
comfortable in sharing their views or personal thoughts
with you
might not be so with so many others, especially in
public. So we
need to very careful when replying to others regarding
a personal
mail. We must be very careful to include only the
relevant and not offending matters in the reply text, editing out all personal
details. If some personal information is disclosed
to other through mail, then it may be a great offence against the original
sender of
the mail. So one needs to be very particular and
careful about this point of email ethics. Another very important reason
for editing out
the quotations is that they make the email text long,
thus
unnecessary information is propagated again and again,
which may
not be required. This causes wastage of resource
and increase in
network traffic as pointed out earlier.
Another point of notice is that of ethics regarding
sending chain letters. In a small age, the net has suffered a lot over
this point. Some people who initiate the chain letters ask others to forward
the letters to people they may be considerate about. Thus the information,
which may also have loopholes on its authenticity, is kept on passing
and thus precious resources of network bandwidth
is unnecessarily
wasted with even false ideas being propagated. There
are chain
letters like people dying due to rat-infected grains,
and things
like that, which have been found not to be true.
The present net
community is very stern towards the chain letters.
Another very important thing, which we will bring
out into issue, is
expression of emotions over emails. We have already
discussed in
the beginning that when on the Internet, what you
are thinking
might not be important, but what that is written
really matters.
So your emails might be easily misunderstood and
misinterpreted
if you have not been careful in the expression of
your emotions,
causing lot of unintended troubles in real life relationships.
One needs to be very precise, to the point and clear
in the
communication. Also the spellings of words should
be carefully
checked so that they may not bring unexpected meaning.
The email
is most important and most widely used feature of
the Internet.
Thus we must know and be careful about every particularities
of
its ethics. The emails may be viewed as virtual life
counterpart
of real life talking, and real life ethics says one
should think
before speaking anything.
Snap 15 - Conclusion
The purpose of this paper has been not to pass any
moral
judgement, but to bring out the issues into discussion.
The world
of the Internet is very new to most of us, thus we
may not be
mature enough to pass any serious judgements over
the various
issues in the virtual world. But as the issues have
been opened,
they will reside in our minds and slowly mould our
day-today
cyberlife in accordance with its vast ethical realm.
We have not
discussed many similar issues, like those related
to newsgroup ethics
in Usenet services and common telnet services like
gopher, Archie,
WAIS (Wide Area Information Systems) etc. Most of
the things
regarding ethics are common in all of them, but they
also need to
be noticed in the particularity of the purpose
of that
service. The essence of the Internet is in these
services, and to
feel this essence, foremost thing one requires is
to
involve oneself in it. The waters are deep
and the real
gems are on the bed, sometimes visible with faint
light from the
surface, and sometimes even not visible at all. As
in every case,
one who dares to dive deep procures the real precious
gems, the
cyber world is no exception to this. The Internet
ethics are the
swimsuits and tools one wears to have a good and
safe experience
of journey in this adventure. A good and careful
swimmer would
not like to swim without proper tools, so is a good
netizen who
always holds-on to follow and honour the Internet
ethics.
In this paper, we have tried to dive into the vast
sea of the
Internet ethics, explored some of its jewels and
gems, and tried
to come to its shore with something in our hands.
But we might
have not been successful in many aspects, and our
expectations
are also not so. The Internet is like a labyrinth,
a maze, where
you take a street, and you go on exploring it, but
the end never
seems be nears - such is the depth and vastness of
the Internet
in any of its form -
telnet, ftp, Usenet, gopher or www ...
Our aim has been to put the issue into your hands,
which you may
like to think about in future. So next time when
you go to CSC,
or departmental lab or use a PC connected to internet
and as you
start surfing the net, do a telnet to netearth, ftp
a file, join
a newsgroup, ping a server, download a file from
net or send an
email, before clicking the mouse or pressing the
enter key, stop
for a moment, and consider whether your action is
just clicking
the mouse button or just pressing a key or is it
more than that?
The real question is:
Will it somewhere affect someone in someway?
If you find yourself thinking about it, then the purpose
of this
paper is supposed to be fulfilled.
Wish you a wonderful cyberlife ahead!