New Frontiers for Computer Ethics: Cyberspace

  • Joseph Migga Kizza
Part of the Texts in Computer Science book series (TCS)


This chapter discusses cyberspace as one of the new frontiers of ethics. In our discussion, we note that is a global artificial reality environment based on a global mesh of interconnected computer networks. This mesh allows and makes it possible for anyone using a point-of-entry device like a computer, smartphone, or any other Internet-enabled electronic device to reach anyone else, with the potential to access the mesh, through a one-on-one, one-to-many, and many-to-one communication capabilities or through broadcasting via the World Wide Web. Cyberspace, because of immerse and telepresence capabilities and global reach, is used either in real time or otherwise, simultaneously by millions if not billions of people around the world. We note that these notions give cyberspace and in fact makes cyberspace not only a virtual environment but also makes it a potentially dangerous environment where one can do anything with no elegance, no accountability and limited responsibility, and all in a cover. So personal privacy becomes the number one social and ethical issue of concern in our discussion. With the changing cyberspace technologies, we wonder whether cyberspace communities will see their etiquettes, if any, eventually amalgamate, mutate, and spread into global cyberethics. How about cyberspace lingua franca and a global cyber culture?


Intellectual Property Intrusion Detection Network Traffic Intrusion Detection System Online Social Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Stance J Net twins’ in Missouri, but home still unclear. The Associated Press.
  2. 2.
  3. 3.
    Ranum M Network forensics: network traffic monitoring.
  4. 4.
    Jackson S ESM NetRecon: ultrascan technology.
  5. 5.
    Carnegie Mellon University, Software Engineering Institute Survivable network systems: an emerging discipline.
  6. 6.
    Simons B (2001) The ACM declaration in Felten v. RIAA. Commun ACM 44(10):23–26CrossRefGoogle Scholar
  7. 7.
    Rosenblum R (1999) Sorting through the confusion: interpreting recording agreement provisions of the digital era. The entertainment law reporter, November 1999Google Scholar
  8. 8.
    Rosenberg M (1995) Copyrights law meets the world wide web. Crossroads 2(2).
  9. 9.
    Leesing L, Post D, Vololch E Copyright law in cyberspace, cyberspace law institute for non-lawyers.
  10. 10.
  11. 11.
    Lewis P (1996) Limiting a medium without boundaries. New York Times, 15 January, 1996, D1Google Scholar
  12. 12.
    Ang D, Nadarajan B (1996) Censorship and the internet: a Singapore perspective. Commun ACM 39(6):72–78CrossRefGoogle Scholar
  13. 13.
    Bhimani A (1996) Securing the commercial internet. Commun ACM 39(6):29–35CrossRefGoogle Scholar
  14. 14.
    Brandt D (1993) Cyberspace wars: microprocessing vs. big brother. NameBase NewsLine 2, July–August 1993.
  15. 15.
    Kung H Declaration towards a global ethic.∼origin/genetic.html
  16. 16.
    Hiroike C (2002) Towards supreme morality. The Institute of Moralogy, KashiwaGoogle Scholar
  17. 17.
    Internet as ‘Intellectual Colonialism’. The Council Chronicle, June 1996, p 6Google Scholar
  18. 18.
    Korpela J English: the universal language on the internet?
  19. 19.
    Hauben M Culture and communication: interplay in the new public commons—usenet and community networks.∼hauben/project-book.html
  20. 20.
    North T The internet and usenet global networks: an investigation of their culture and its effects on new users [on-line].

Further Reading

  1. Borestein N (1996) Perils and pitfalls of practical cybercommerce. Commun ACM 39(6):36–44CrossRefGoogle Scholar
  2. CNN headline news, 15 January, 1996.
  3. Denning D, Branstad DK (1996) A taxonomy for key escrow encryption systems. Commun ACM 39(3):34–39CrossRefGoogle Scholar
  4. Dornin R The internet: will it last or fade into the past? CNN Interactive.
  5. Kung H The principle of a global ethic.∼origin/genetic.html
  6. Levy S (1994) Prophet of privacy. Wired, November, p 126Google Scholar
  7. Maher D (1996) Crypto backup and kew escrow. Commun ACM 39(3):48–53CrossRefGoogle Scholar
  8. Pyle R (1996) Electronic commerce and the internet. Commun ACM 39(6):23CrossRefGoogle Scholar
  9. Samuelson P (1996) Intellectual property rights and the global information economy. Commun ACM 39(1):23–28CrossRefGoogle Scholar
  10. Sterling B History of the internet.
  11. Walker S, Lipner S, Ellison C, Balenson D (1996) Commercial key recovery. Commun ACM 39(3):41–47CrossRefGoogle Scholar
  12. Weiser M (2001) Whatever happened to the next-generation internet? Commun ACM 44(9):61–68CrossRefGoogle Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer Science and EngineeringUniversity of TennesseeChattanoogaUSA

Personalised recommendations