Thursday, September 5, 2019
Ethical Analysis of Children on the Internet
Ethical Analysis of Children on the Internet Children on the Internet Abeer AlSouly Ghada AlFantookhà Naima AlRashed Overview: Many people may consider the Internet as the greatest invention ever created by man. Noà doubt about that if we talked about how fast knowledge exchanging has become today, orà how easy can people communicate with each other globally. Also children nowadays practiceà many activities on the Internet; the most popular ones are schoolwork, social networking andà online gaming. Childrenââ¬â¢s ability to access the Internet has grown rapidly. It has made ourà life much easier and it has become an essential part of modern life. Even though the benefits of the Internet are countless, it may be considered as an extremelyà dangerous environment for children because some of the Internet contents canââ¬â¢t be controlledà and uncensored. Also children are not fully aware of how horrible and devastating theà consequences could be. However, there is no universally accepted view of what is more important whether theà education of children or protection, which is also another challenge! Also the differences inà peopleââ¬â¢s cultures and geographical location in legal and social norms reflect the lack ofà common agreement. In this report, we will discuss three main issues that raise the concerns about children on the internet: The possibility that children could obverse inappropriate content in the Internet. Contact with people who seek to abuse children. Privacy risk from game sites that ask children for extensive personal and familyà Information for marketing purposes. Background and The Importance of The Internet: The evolution of the Internet in the last 3 decades has been hugely improved and nowadaysà we rely on it in most of our daily needs. Itââ¬â¢s both informative and entertaining medium. Some children use it to expand their horizonà and increase their knowledge and other use it just for fun. Also these activities doesnââ¬â¢t require the traditional desktop computer anymore, the platformsà has increased to handheld devices such as smart phones and tablets. The Internet doesnââ¬â¢t just improve children mental skills but also improves their imaginationà and develops their interaction skills. The ways of using the Internet and the reasons differ from child to child according to theà child age and interests. Explanation of the issues: Despite the many benefits of using the Internet and its associated services among childrenà there are also risks, which they must be made aware of 1. In this report we will explain someà issues such as: The possibility that children could obverse inappropriate content in theà Internet (as in Networked Communications- Children Inappropriate Content section in theà course), contact with people who seek to abuse children and privacy risk from game sites thatà ask children for extensive personal and family information for marketing purposes. The possibility that children could obverse inappropriate content in theà Internet: The term inappropriate content may vary across generations and across countries andà cultures. On the other hand, there is content that is considered in all cultures as inappropriateà for children, such as the depiction of graphic violence or sexual abuse, and encouragement toà harm ones self or others. Moreover, some content can be considered as illegal, such asà violent or sexual acts against children, and the promotion of racism and xenophobia. Theà different types of inappropriate content and risks that children can encounter online isà classified based on the role of the child (as recipient, participant or as actor) and the motivesà of the provider (commercial, aggressive, sexual and values-related). Children inevitablyà encounter content such as pornography as it is widely available on the Internet. Childà pornography in particular has important implications and considered as one of the mostà serious crimes on the Internet. Sexual content, like pornographic or sexual depictions, mightà cause harm to children or lead them to personal contact with potentially dangerous strangers. Contacting with people who seek to abuse children: Speaking of contacting with people who seek to abuse children, ââ¬ËBritish investigators flew toà America to rescue a six-year-old-girl who was being repeatedly raped on video by her fatherà for the gratification of members of a highly secretive internet paedophile ring.ââ¬â¢ And manyà other stories like this one appear on a regular basis. Child abuse takes new forms, leavingà social workers and parents confused about new threats that may arrive with newà technologies. Contact offences can be committed by adults where an adult commits or seeksà to commit a sexual offence on a child. Historically most child sex abuse was by a familyà member or from people in his social circles. On the Internet adults who may becomeà involved with sexually abusing children can locate them and make the initial contact using aà different interactive, communications technologies. Usually the adult and the child willà initially meet in an Internet chat room. Committed paedophiles are known to frequent chatà rooms that are popular with children such as chat rooms related to music, fashion, or sport. The paedophile may be very skillful in communicating with children, he shows himself to theà child as a nice guy or tries to become their special friend and persuades the child to leave theà public space and go off into a private chat room. The paedophile and the child can thenà arrange to continue to communicate with each other in different ways. He will ensure that theà child does not keep any record of their conversations, as sooner or later he will seek toà sexualize the contact and conversations as part of the grooming process. The effect onà children of being sexually abused is almost deeply damaging both in the short and longerà runs. A child who knew that images or a record of their abuse were out there on the Internet,à might be worried that the image could reach their classmates, neighbors or other familyà members. Alternatively the image could fall into the hands of other people who know themà and who might then use it against them. Children who have be en abused in front of a webà cam similarly could never be absolutely sure that they would not meet someone who mightà have witnessed their abuse and recognize them in real life. Privacy risk from game sites that ask children for extensive personal andà family information for marketing purposes: Moreover on the issues of children on the Internet, the privacy risks from game sites thatà arise from asking children for extensive personal and family information for marketingà purposes. Many corporations seeking to capitalize on this market create websites that offerà games, quizzes, chat environments, and advice in order to encourage children to provide theirà personal information, which can then be used to target the children with advertising, Forà example Kraft, which owns Lifesavers, are interested in kids because of their spendingà power. Corporations Typically, these childrenââ¬â¢s sites play into their developmental needs inà order to encourage kids to talk about themselves. Many of these sites, like Tickle.com, useà personality tests to collect information from, and market to, individual girls. These quizzesà ask detailed questions about the childââ¬â¢s personality, preferences, hopes, and aspirations. Sinceà children have to register with the si te before they can access the quizzes, the marketer is ableà to record the childââ¬â¢s responses linked to his or her first and last name, zip/postal code, emailà address, gender, marital status, and level of education. This information can also be matchedà against the data trail that the child generates as she surfs through the site, selecting articles,à chatting online and playing games. Tickle also uses the information they collect to target girlsà with personalized advertisements. Analysis and Evaluation: Issue (1): ââ¬Å"The possibility that children could obverse inappropriate content in the Internetâ⬠1. Kantianism 1st formulation: Proposed Rule ââ¬Å"Some people post graphic violence or sexual abuse or encouragement to harmà ones self or othersâ⬠Universalize rule Everyone can post graphic violence or sexual abuse or encouragement to harm onesà self or others and everyone can see it. Result 1- Physiological harms to the children. 2- Children will try to apply what they see of encouragement to harm ones self orà others, which leads to death in some cases. 3- May lead them to personal contact with potentially dangerous strangers to talkà about what they had seen instead of talking with their parents. So, based on Kantianism first formulation this rule canââ¬â¢t be universalized which makesà it morally wrong. 2nd formulation: Proposed Rule ââ¬Å"Some people post graphic violence or sexual abuse or encouragement to harmà ones self or othersâ⬠Goal People who post these kinds of posts aim to gain fame and attention of others or satisfyà their physiological desires. Mean Since everyone can see the posts including children, innocent people who shouldnââ¬â¢t seeà this content including children will become the mean to achieve their goal. Result So, based on Kantianism second formulation this rule is morally wrong. 2. Act Utilitarianism Proposed Rule ââ¬Å"Some people post graphic violence or sexual abuse or encouragement to harm onesà self or othersâ⬠Benefits 1. Sometimes this content may be used to increase the knowledge of the child about theà inappropriate actions and things to avoid. Harms 1. Physiological harms to the children. 2. Children will try to apply what they see of encouragement to harm ones self orà others, which leads to death in some cases. 3. May lead them to personal contact with potentially dangerous strangers to talk aboutà what they had seen instead of talking with their parents.à Result We can see above that harms overweigh the benefits, so, based on Act Utilitarianism thisà rule is morally wrong. Our point of view: The theories above all agree that it is morally wrong that people post graphic violence orà sexual abuse or encouragement to harm ones self or others on the Internet. From our point ofà view, we totally agree with this result since these posts will cause physiological harms to theà children, they will try to apply what they see of encouragement to harm ones self or othersà which leads to death in some cases and may lead them to personal contact with potentiallyà dangerous strangers to talk about what they had seen instead of talking with their parents. Weà actually think these posts will kill the childhood innocence. Issue (2): ââ¬Å"Contacting with people who seek to abuse childrenâ⬠1. Kantianism à ¯Ã¢â¬Å¡Ã¢â¬ ¢Ã ¯Ã¢â ¬Ã 1st formulation: Proposed Rule ââ¬Å"People who seek to abuse children contact them on the Internetâ⬠Universalize rule Everyone can use the Internet to satiate their bad desires. Result 1- The Internet will become a dangerous place everyone is afraid of. 2- Crime in all of its forms is going to increase exponentially. 3- Trusted content will significantly decrease. So, based on Kantianism first formulation this rule canââ¬â¢t be universalized which makes ità morally wrong. à ¯Ã¢â¬Å¡Ã¢â¬ ¢Ã ¯Ã¢â ¬Ã 2nd formulation: Proposed Rule ââ¬Å"People who seek to abuse children contact them on the Internetâ⬠Goal People who make this kind of connection aim to satiate their desires. Mean In this rule they use the children as a mean to satiate their bad desires. Result So, based on Kantianism second formulation this rule is morally wrong. 2. Act Utilitarianism Proposed Rule ââ¬Å"People who seek to abuse children contact them on the Internetâ⬠Benefits No benefits. Harms 1. A child who knew that images or a record of their abuse were out there on theà Internet, might be worried that the image could reach their classmates, neighbors orà other family members; which will shake his/her self-confidence. 2. Children who have been abused in front of a web cam similarly could never beà absolutely sure that they would not meet someone who might have witnessed theirà abuse and recognize them in real life; which may make them prefer the isolation andà hate the social life. 3. The image of the childââ¬â¢s abuse could fall into the hands of other people who knowà them and who might then use it against them. Result We can see above that harms overweigh the benefits, so, based on Act Utilitarianismà this rule is morally wrong. Our point of view: The theories above all agree that it is morally wrong that people who seek to abuse childrenà contact them on the Internet. From our point of view, this result is absolutely right, sinceà these kinds of communication will harm the child, shake his/her self-confidence, make themà prefer the isolation and hate the social life, the image of the childââ¬â¢s abuse could fall into theà hands of other people who know them and who might then use it against them also, theà Internet will become a dangerous place everyone is afraid of, crime in all of its forms is goingà to increase exponentially and finally trusted content will significantly decrease. Issue (3): ââ¬Å"Privacy risk from game sites that ask children for extensive personal and familyà information for marketing purposesâ⬠. 1. Kantianism à ¯Ã¢â¬Å¡Ã¢â¬ ¢Ã ¯Ã¢â ¬Ã 1st formulation: Proposed Rule ââ¬Å"Game sites collect personal and family information from children for marketingà purposesâ⬠Universalizeà rule Everyone can collect private information from children. Result 1- May result in child giving her/his parentsââ¬â¢ credit card number or financialà information. 2- Crime in many of its forms is going to increase, since many of the privateà information had been leaked. 3- Blackmail propagation. So, based on Kantianism first formulation this rule canââ¬â¢t be universalized which makes ità morally wrong. à ¯Ã¢â¬Å¡Ã¢â¬ ¢Ã ¯Ã¢â ¬Ã 2nd formulation: Proposed Rule ââ¬Å"Game sites collect personal and family information from children for marketingà purposesâ⬠Goal People who collect these information aim to promote for their products or services inà order to increase their revenue. Mean In this rule they use the children as a mean to collect the personal and familyà information needed for this promotion. Result So, based on Kantianism second formulation this rule is morally wrong. 2. Act Utilitarianism Proposed Rule ââ¬Å"Game sites collect personal and family information from children for marketingà purposesâ⬠Benefits 1. Child would benefit from enjoying playing the games. 2. Some of these games may enhance his/her intelligence and his/her way of thinking. 3. Corporations will suggest the appropriate games based on the collected informationà (ex: age, gender, interests, etc.) ; so both parties will benefit. Harms 1. Parents or any of the family members of the child will receive so many annoyingà spam emails. 2. Corporations sell these personal and family information to other corporations withoutà the permission of the informationââ¬â¢s owner. 3. Parents or any of the family members of the child may receive many annoying salesà or advertisementsââ¬â¢ phone calls or SPIMs*. 4. All of the above wastes the targetââ¬â¢s time, since the information had been collectedà without his/her permission which means (s)heââ¬â¢s not interested in theseà advertisements. * SPIM: Stands for Spam Instance Messaging. Result We can see above that harms overweigh the benefits, so, based on Act Utilitarianismà this rule is morally wrong. Our point of view: The theories above all agree that it is morally wrong to collect personal and familyà information from children for marketing purposes. Also, from our point of view we agreeà with this result, because the parents or any of the family members of the child will receive soà many annoying spam emails, their information will be exchanged between the companiesà without their permission and they also will receive so many annoying sales orà advertisementsââ¬â¢ phone calls. These things wastes so much time especially if the targetedà person is not interested in these advertisements. Summary and conclusions: To summaries, the Internet today has a very useful and important resources and a lot ofà schools depend on it almost completely, but also there is no clear accepted view that willà everyone agree on when it comes to also protection. We had explained some issues such as: The possibility that children could obverse inappropriate content in the Internet which proveà to be morally wrong based on Kantianism, Act Utilitarianism and from our point of view,à contact with people who seek to abuse children and privacy risk from game sites that askà children for extensive personal which prove to be morally wrong based on Kantianism, Actà Utilitarianism and from our point of view and family information for marketing purposesà which prove to be morally wrong based on Kantianism, Act Utilitarianism and from our pointà of view. Eventually, we know that we canââ¬â¢t prevent the children from accessing the Internet; insteadà we can apply parental control over what the children can access. Moreover, children shouldà be aware of the consequences of what their actions may lead to. Various laws have beenà passed to protect the children nowadays such as; The Child Online Protection Act (COPA),à which was passed to restrict access by minors to any material, defined as harmful to suchà minors on the Internet5 and the Childrens Online Privacy Protection Act of 1998 (COPPA)à ââ¬Å"which was designed to limit the collection and use of personal information about children byà the operators of Internet services and Web sitesâ⬠6. References:à [1] S. Livingstone, L. Haddon.(2009, Sep 30). Kids Online: Opportunities and Risks forà Children. (1st Edition). [On-line]. Available:à http://books.google.com.sa/books?id=aPsXzcjf9vMCprintsec=frontcoverdq=Kids+Online+bookhl=ensa=Xei=SeaBVLrSAcisU5fSgPAPredir_esc=y#v=onepageq=Kids%20Online%20bookf=false [Nov. 15, 2014]. [2] Oââ¬â¢NEILL S (2002), Paedophile Squad Saves Girl, 6, from Rapist Father, Daily Telegraph,à 3 July 2002, p. 7. [3] J. Carr. ââ¬Å"child abuse, child pornography and the internet.â⬠NCH (National Childrensà Homes) (Dec, 2003). [4] V. Steeves.(2006). ââ¬Å"Itââ¬â¢s Not Childââ¬â¢s Play: The Online Invasion of Childrenââ¬â¢s Privacy.â⬠à University of Ottawa Law Technology Journal. Available:à http://www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Steeves.169-188.pdf?origin=publication_detail [Nov. 17, 2014]. [5] A. Carr. (2013, Feb 26). Child Protection. (1st Edition). [On-line]. Available:à http://books.google.com.sa/books?id=UwKfxyy_S2cCprintsec=frontcoverhl=ar#v=onepageqf=false [Dec. 5, 2014]. [6] ââ¬Å"ChildrenS Online Privacy Protection Act (COPPA).â⬠Internet:à http://www.inc.com/encyclopedia/childrens-online-privacy-protection-act-COPPA.html, [Dec. 5, 2014].
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.