scholarly journals Information Technology (IT) Ethics in the Light of Islam

IIUC Studies ◽  
2015 ◽  
Vol 9 ◽  
pp. 243-260 ◽  
Author(s):  
Abdul Kadar Muhammad Masum ◽  
Md Cholem Ullah ◽  
Md Abul Kalam Azad

Globalization and digital convergence in the emerging knowledge society has raised complex ethical, legal and societal issues. We are faced with complex and difficult questions regarding the freedom of expression, access to information, the right to privacy, intellectual property rights, and cultural diversity. To overcome these issues, it requires qualified and educated IT (Information Technology) beneficiaries professionally and ethically. Professional organizations like ACM, IEEE and ABET have established codes of ethics to help IT professionals, specially end users to understand and manage their ethical responsibilities. Islamic ethics comprise moral principles and guidance that differentiate between right and wrong, which are comprehensive, stable, fair, and historically proved success in building ethically great societies. The estimated 1.5 billion of Muslims should have an effective role in IT related activities and life, which requires them to understand and implement ethics, specially the Islamic ethics in their IT related works. This paper is a roadmap for modeling the IT user principles, which show the main phases for solving such problems. It focuses mainly on adopting a new version of IT user principles based on Islamic ethical values.IIUC Studies Vol.9 December 2012: 243-260

Author(s):  
Allan Hepburn

In the 1940s and 1950s, Britain was relatively uniform in terms of race and religion. The majority of Britons adhered to the Church of England, although Anglo-Catholic leanings—the last gasp of the Oxford Movement—prompted some people to convert to Roman Catholicism. Although the secularization thesis has had a tenacious grip on twentieth-century literary studies, it does not account for the flare-up of interest in religion in mid-century Britain. The ecumenical movement, which began in the 1930s in Europe, went into suspension during the war, and returned with vigour after 1945, advocated international collaboration among Christian denominations and consequently overlapped with the promotion of human rights, especially the defence of freedom of worship, the right to privacy, freedom of conscience, and freedom of expression.


Author(s):  
Sophy Baird

Children are afforded a number of protections when they encounter the criminal justice system. The need for special protection stems from the vulnerable position children occupy in society. When children form part of the criminal justice system, either by being an offender, victim, or witness, they may be subjected to harm. To mitigate against the potential harm that may be caused, our law provides that criminal proceedings involving children should not be open to the public, subject to the discretion of the court. This protection naturally seems at odds with the principle of open justice. However, the courts have reconciled the limitation with the legal purpose it serves. For all the protection and the lengths that the law goes to protect the identity of children in this regard, it appears there is an unofficial timer dictating when this protection should end. The media have been at the forefront of this conundrum to the extent that they believe that once a child (offender, victim, or witness) turns 18 years old, they are free to reveal the child's identity. This belief, grounded in the right to freedom of expression and the principle of open justice, is at odds with the principle of child's best interests, right to dignity and the right to privacy. It also stares incredulously in the face of the aims of the Child Justice Act and the principles of restorative justice. Measured against the detrimental psychological effects experienced by child victims, witnesses, and offenders, this article aims to critically analyse the legal and practical implications of revealing the identity of child victims, witnesses, and offenders after they turn 18 years old.


Author(s):  
José Poças Rascão ◽  
Nuno Gonçalo Poças

The article is about human rights freedom of expression, the right to privacy, and ethics. Technological development (internet and social networks) emphasizes the issue of dialectics and poses many challenges. It makes the theoretical review, the history of human rights through and reference documents, an analysis of the concepts of freedom, privacy, and ethics. The internet and social networks pose many problems: digital data, people's tracks, the surveillance of citizens, the social engineering of power, online social networks, e-commerce, spaces of trust, and conflict.


Author(s):  
Randall C. Reid ◽  
Mario Pascalev

Outsourcing of information technology (IT) is the transfer of a company’s information technology functions to external vendors. Ordinarily, such transfer is considered only with regard to its strategic and economic impact on the organization. However, as the recent practice demonstrated, cost-benefit considerations and other strategic considerations are not sufficient to analyze an outsourcing case. Important ethical concerns relating to fiduciary responsibilities, insiders’ bidding for outsourcing contracts, and the like, are also pertinent to the analysis of outsourcing. This chapter will identify major ethical problems and will propose guidelines for ethical conduct in the process of outsourcing IT. Such guidelines could have broad practical implications for the practice of outsourcing. The chapter will analyze literature on outsourcing models and professional ethical standards. It will have the following structure. First, the benefits and models of outsourcing information technology will be discussed. Second, ethical literature in general and professional organizations’ codes of ethics in particular will be considered. Third, a recent case of IT outsourcing will be presented and analyzed. The ethical standards established in the thesis will be applied to the case. Finally, generalized ethical guidelines will be suggested for outsourcing models.


2016 ◽  
Vol 6 (2) ◽  
pp. 32-40 ◽  
Author(s):  
Andrew N. Liaropoulos

The cyber security discourse is dominated by states and corporations that focus on the protection of critical information infrastructure and databases. The priority is the security of information systems and networks, rather than the protection of connected users. The dominance of war metaphors in the cyber security debates has produced a security dilemma, which is not sufficiently addressing the needs of people. This article underlines this shortcoming and views cyber security through a human-centric perspective. Freedom of expression and the right to privacy are under attack in the era of cyber surveillance. From a human-centric perspective such rights should be understood as a critical part of cyber security. Human rights protections need to be effectively addressed in the digital sphere and gain their place in the cyber security agendas.


2021 ◽  
Author(s):  
◽  
Zuryati Mohamed Yusoff

<p>In Malaysia, the rights and liberties of the individual are recognised in the Federal Constitution of Malaysia. However, the right to privacy does not have the express constitutional recognition enjoyed by other rights such as the right to life and liberty and freedom of expression. This thesis identifies gaps in the protection of privacy interests in the current legal framework. There is no self-standing law on privacy in Malaysia, though there are several laws which provide limited rights to privacy such as the laws on data protection and criminal law. The existing laws are inadequate to protect private information and to protect against the intrusion of privacy. The importation of foreign principles through the reception of English Common Law offers only limited protection. Malaysia should, therefore, have a specific law to protect privacy. With a view to attaining that goal for Malaysia, this thesis undertakes a comparative analysis of two different experiences of the development of the law of privacy. They are the privacy law in England, which is largely based on the law of breach of confidence, and the privacy law in New Zealand, which has a distinct privacy tort recognised in its case law. The conclusion is that those countries’ experience can inform developments in Malaysia, and that the best way for Malaysia to develop its law now is by the enactment of a specific Privacy Act.</p>


Author(s):  
Milana Pisaric

Every person has the right to privacy and protection of personal data and these rights may be restricted only in order to protect the general interest or the preservation of important values in society. If there is a certain degree of suspicion that a person committed a criminal offense, the competent authorities are authorized to limit his/her privacy rights and to collect and process personal data for the purposes of criminal proceedings, by taking certain actions and measures in accordance with the law. On the basis of legal authorization certain subjects may take regular and special evidentiary actions and measures, but possible privacy infringement and data collection should be limited to the extent necessary to suppress a specific criminal offense in accordance with the principle of proportionality. It is necessary and useful to apply the methods and techniques of information technology in order to detect and prove criminal offenses. However, uncritical regulation and voluntary application of advanced methods and techniques of surveillance and monitoring of user?s activities (whose daily activities increasingly rely on information technology) would create a real risk of expanding and deepening the scope of spheres of life to be monitored to a much greater extent than legitimate monitoring within the concept of pro?activity and creation of a complete and panoptic surveillance of personal data. This could not be justified by the needs to oppose even the most severe forms of criminal offenses. Thus, actions and measures based on the use of these techniques and methods should be laid down and applied in accordance with the principles of specificity, necessity and proportionality, and with control of the judicial authorities, so the right to privacy would not be jeopardized. It is necessary to find a proper balance between the needs of criminal proceedings and respect for human rights, with regard to regulating powers of investigative bodies in collecting data of individuals. In online environment, the protection of the right to legal personality and the right to free development of personality through the right to privacy as well as the protection of personal data are necessary to be provided by legal regulations containing even stricter and more precise rules (comparing to offline environment) that determine the scope of powers of the authorities to collect evidence for the purposes of criminal proceedings, because certain actions or measures can greatly interfere with the private sphere of individuals in the direction of a complete privacy annulment.


2021 ◽  
Author(s):  
◽  
Abby Ward

<p>This paper examines the potential impact of recent English privacy jurisprudence on the New Zealand tort of privacy. The paper contrasts the New Zealand Court of Appeal’s aversion towards an over-expansive privacy right expressed in Hosking v Runting with an increasing readiness to override freedom of expression in favour of privacy interests in the United Kingdom. Three central conflicts in the courts’ reasoning are addressed in detail, namely privacy’s relationship with public places, individuals with public profiles and mediums of publication. While developments in English privacy law highlight reasoning flaws and theoretical shortcomings in Hosking, the increasing influence European jurisprudence on English law may nevertheless justify some divergence in the two jurisdictions’ balancing of privacy and freedom of expression.</p>


2021 ◽  
Vol 12 (12) ◽  
pp. 179-190
Author(s):  
Everson Alexandre de Assumpção

This scientific article was based on a case study, judged by the Argentine Supreme Court. In this process, the author filed a civil action in the civil court to compensate the damage against the authors, understanding that the right to privacy, privacy, honor and image rights were violated. The article sought to analyze the collision of principles, rules, rights and jurisprudence that led the Inter-American Court of Human Rights to rule in favor of Jorge Fontevecchia and Heitor D’amico. These were condemned by the Argentine State for understanding that there was a violation of the Right to Privacy. However, the international court decided to revoke the judgment passed and judged by the Supreme Court of the Argentine Nation, understanding that Fontevechia and D’amigo did not violate the Right to Freedom of Expression, making the action illegal and, therefore, forcing the Argentine State to withdraw the action and also to promote the due reparation of the damages caused to the. On February 14, 2017, the Argentine State rejected the decision of the Inter-American Court, transforming this case into one of the most famous “leading cases” of Argentine international public law. Finally, on October 18, 2017, the International Court issued another resolution to render the sentence in the Fontevecchia y D’Amico case ineffective. It was concluded, therefore, that even with the Argentine constitutional reform of 1994 and the granting of a constitutional hierarchy to international human rights standards, it was defined that the rules of international treaties “do not derogate from the provisions of the first part of the Argentine Constitution” under the terms of article 75, item 22, but attributed to the international treaties a character of complementarity, in addition to the prohibition, provided for in article 27 of the Vienna Convention on the Law of Treaties, to invoke reasons of domestic law for non-compliance in order to comply with international obligations. For the preparation of this scientific article, the deductive method and qualitative and descriptive research were used. As bibliographic references were used published materials, scientific literature, Law and Jurisprudence that were relevant to the purposes discussed here.


Author(s):  
Jamal Barafi ◽  
Ali Hadi Al-Obeidi

Abstract The development of the Internet and mass media has facilitated access to information and freedom of expression in unprecedented ways, but in so doing there have been many violations, especially of the right to privacy. Such violations have led to calls for the establishment of the right to be forgotten. In this paper, we focus on clarifying the concept of the right to be forgotten and the conditions for establishing this. Moreover, we consider the European approach to the right to be forgotten (RTBF), showing how different European instruments have been employed to recognize this right, such as recommendations, regulations, and directives, in order to coordinate national efforts on this issue. In addition, this paper will analyze the stance of some national Arabic legislation regarding the RTBF.


Sign in / Sign up

Export Citation Format

Share Document