Cyberbullying: Ethical Issues Arising from ICT Technologies Report
VerifiedAdded on 2020/05/16
|6
|1264
|202
Report
AI Summary
This report examines cyberbullying as a significant ethical issue arising from the use of Information and Communication Technology (ICT). It discusses the nature of cyberbullying, its prevalence, and its impact, drawing upon a personal experience of the author. The report highlights the security issues associated with social media, such as personal information theft, malware entry, and interactions with strangers, and analyzes the negative impacts of mobile phones, including credit card scams and financial crimes. Furthermore, it references the ACS Ethical Guidelines to assess the ethical dimensions of cyberbullying and suggests preventative measures. The report concludes by emphasizing the importance of responsible ICT usage and awareness of the potential ethical pitfalls within the digital landscape.

Running head: CYBER BULLYING
Ethical Issue arising from the Use of ICT Technologies: Cyber bullying
Name of the Student
Name of the University
Author’s Note:
Ethical Issue arising from the Use of ICT Technologies: Cyber bullying
Name of the Student
Name of the University
Author’s Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
CYBER BULLYING
Table of Contents
Introduction......................................................................................................................................................2
Discussion.........................................................................................................................................................2
Cyber Bullying...............................................................................................................................................2
Personal Experience.....................................................................................................................................2
Security Issues in Social Media.....................................................................................................................2
Negative Impact of Mobile Phones...............................................................................................................3
ACS Ethical Guidelines..................................................................................................................................3
Conclusion........................................................................................................................................................3
References........................................................................................................................................................5
CYBER BULLYING
Table of Contents
Introduction......................................................................................................................................................2
Discussion.........................................................................................................................................................2
Cyber Bullying...............................................................................................................................................2
Personal Experience.....................................................................................................................................2
Security Issues in Social Media.....................................................................................................................2
Negative Impact of Mobile Phones...............................................................................................................3
ACS Ethical Guidelines..................................................................................................................................3
Conclusion........................................................................................................................................................3
References........................................................................................................................................................5

2
CYBER BULLYING
Introduction
ICT is the integration of computers and telecommunication. Although, it has various utilizations, it is
extremely threatening for the cyber world [3]. The most deadly cyber threats include hacking, cyber
bullying, malware, distributed denial of service attacks and many more.
In the following report, I shall outline a brief discussion on one of such most degrading ethical
issues, cyber bullying by utilizing the Ethical Guidelines of ACS. I would describe the topic based on my own
experience [6]. I had once received notification from a third party with the invitation for participating in an
event. I did not have any idea how they got my details. I shall properly describe about the negative impact
of cyber technology and social media.
Discussion
Cyber Bullying
Cyber bullying is the specific type of harassment that is done by utilizing any electronic devices. This
has become a major issue in the cyber world as it is increasing day by day [1]. This is because of the
excessive utilization of mobile applications. The most common behaviour of cyber bullying include various
cyber threats, rumours, leakage of personal information, sexual remarks, hate speech and many more. This
type of harassment is often done repeatedly and thus the victims, with low mental strength, end up
committing suicides [5]. This is type of bullying is considered as more dangerous than the traditional form
of bullying.
Personal Experience
I had once faced cyber bullying in my life. I received a notification from a third party with the
invitation for participating in any event. I was not sure from where did they get my personal details. They
were continuously sending me notifications for attending that event [4]. After few days, I understood that I
had shared my personal mail ID in one of the popular social media. They had my mail ID from that
particular social media. I understood that there could be several security issues if personal information is
shared on any social media or networking site.
Security Issues in Social Media
The most significant and dangerous security issues that occur when personal information is shared
on social media are as follows:
i) Personal Information Theft: I often forget to log out from the social media and thus, my
information could be easily exploited by any intruder or hacker. This mainly happens when I use social
CYBER BULLYING
Introduction
ICT is the integration of computers and telecommunication. Although, it has various utilizations, it is
extremely threatening for the cyber world [3]. The most deadly cyber threats include hacking, cyber
bullying, malware, distributed denial of service attacks and many more.
In the following report, I shall outline a brief discussion on one of such most degrading ethical
issues, cyber bullying by utilizing the Ethical Guidelines of ACS. I would describe the topic based on my own
experience [6]. I had once received notification from a third party with the invitation for participating in an
event. I did not have any idea how they got my details. I shall properly describe about the negative impact
of cyber technology and social media.
Discussion
Cyber Bullying
Cyber bullying is the specific type of harassment that is done by utilizing any electronic devices. This
has become a major issue in the cyber world as it is increasing day by day [1]. This is because of the
excessive utilization of mobile applications. The most common behaviour of cyber bullying include various
cyber threats, rumours, leakage of personal information, sexual remarks, hate speech and many more. This
type of harassment is often done repeatedly and thus the victims, with low mental strength, end up
committing suicides [5]. This is type of bullying is considered as more dangerous than the traditional form
of bullying.
Personal Experience
I had once faced cyber bullying in my life. I received a notification from a third party with the
invitation for participating in any event. I was not sure from where did they get my personal details. They
were continuously sending me notifications for attending that event [4]. After few days, I understood that I
had shared my personal mail ID in one of the popular social media. They had my mail ID from that
particular social media. I understood that there could be several security issues if personal information is
shared on any social media or networking site.
Security Issues in Social Media
The most significant and dangerous security issues that occur when personal information is shared
on social media are as follows:
i) Personal Information Theft: I often forget to log out from the social media and thus, my
information could be easily exploited by any intruder or hacker. This mainly happens when I use social
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
CYBER BULLYING
media in my personal computer or laptop [3]. When someone else is utilizing my laptop or computer, he or
she can easily log into my account and exploit all personal information.
ii) Entry of Virus or Malware: Various advertisements or windows often come up when social
media is used. This is again one of the basic ways of entrance of virus, malware or hackers to the system.
iii) Connection with the Strangers: The sudden invitations from strangers on the social networking
sites are another important and significant security issue [2]. When the legitimate users accept such
invitations, unknowingly several unauthorized hackers or virus gets into the system.
Negative Impact of Mobile Phones
Cyber bullying or any such ethical issues have come into account due to the excess usage of mobile
applications [1]. The mobile applications are always enabled to several technologies of communication like
Wi-Fi, Bluetooth, Third Generation or 3G, virtual private networks, dial up services and many more. There
are various negative impacts of mobile phones. They are as follows:
i) Credit Card Scams: This is the most dangerous impact of mobile phones. The username or
password of the users is stolen by hackers and they perform all types of unethical acts with this confidential
information.
ii) Financial Crimes: The banking transactions are done with the help of mobile phones [4]. When
the user logs into the banking account, his details are stolen by intruders.
There are other impacts as well like cyber bullying, cyber squatting, cyber threatening and many
more.
ACS Ethical Guidelines
ACS provides various ethical and professional guidelines for all organizations [6]. The cyber bullying
that I had faced in my life is extremely unethical. According to those guidelines, one should not leak
anyone’s personal information and exploit them. Moreover, strict legal actions can be undertaken for such
degradable job. I could have easily filed a complaint against the social media to the cyber legal squad.
However, I did not do any such thing [3]. Rather I just deactivated my account from that particular social
media and in the future, I had taken care of not leaking any personal information on any social media or
networking sites.
Conclusion
Therefore, from the above discussion, I can conclude that ICT or information and communication
technology is the extended form of information technology. Apart from having such uses, ICT also
welcomes some of the significant ethical issues, which are extremely dangerous for the entire cyber world.
CYBER BULLYING
media in my personal computer or laptop [3]. When someone else is utilizing my laptop or computer, he or
she can easily log into my account and exploit all personal information.
ii) Entry of Virus or Malware: Various advertisements or windows often come up when social
media is used. This is again one of the basic ways of entrance of virus, malware or hackers to the system.
iii) Connection with the Strangers: The sudden invitations from strangers on the social networking
sites are another important and significant security issue [2]. When the legitimate users accept such
invitations, unknowingly several unauthorized hackers or virus gets into the system.
Negative Impact of Mobile Phones
Cyber bullying or any such ethical issues have come into account due to the excess usage of mobile
applications [1]. The mobile applications are always enabled to several technologies of communication like
Wi-Fi, Bluetooth, Third Generation or 3G, virtual private networks, dial up services and many more. There
are various negative impacts of mobile phones. They are as follows:
i) Credit Card Scams: This is the most dangerous impact of mobile phones. The username or
password of the users is stolen by hackers and they perform all types of unethical acts with this confidential
information.
ii) Financial Crimes: The banking transactions are done with the help of mobile phones [4]. When
the user logs into the banking account, his details are stolen by intruders.
There are other impacts as well like cyber bullying, cyber squatting, cyber threatening and many
more.
ACS Ethical Guidelines
ACS provides various ethical and professional guidelines for all organizations [6]. The cyber bullying
that I had faced in my life is extremely unethical. According to those guidelines, one should not leak
anyone’s personal information and exploit them. Moreover, strict legal actions can be undertaken for such
degradable job. I could have easily filed a complaint against the social media to the cyber legal squad.
However, I did not do any such thing [3]. Rather I just deactivated my account from that particular social
media and in the future, I had taken care of not leaking any personal information on any social media or
networking sites.
Conclusion
Therefore, from the above discussion, I can conclude that ICT or information and communication
technology is the extended form of information technology. Apart from having such uses, ICT also
welcomes some of the significant ethical issues, which are extremely dangerous for the entire cyber world.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
CYBER BULLYING
It focuses on the proper integration of any telecommunication like wireless signal o telephone line,
systems, software, audio and visual systems. The users of ICT can easily utilize and perform various
functionalities of information. In the above report, I have explained about cyber bullying with respect to
one of my personal experiences by using ACS ethical guidelines. Moreover, I have also explained about the
security problems that arise when excess personal information is shared on the social media.
CYBER BULLYING
It focuses on the proper integration of any telecommunication like wireless signal o telephone line,
systems, software, audio and visual systems. The users of ICT can easily utilize and perform various
functionalities of information. In the above report, I have explained about cyber bullying with respect to
one of my personal experiences by using ACS ethical guidelines. Moreover, I have also explained about the
security problems that arise when excess personal information is shared on the social media.

5
CYBER BULLYING
References
[1] Chesley, Noelle. "Information and communication technology use, work intensification and employee
strain and distress." Work, employment and society 28, no. 4 (2014): 589-610.
[2] Stahl, Berndt C., Grace Eden, and Marina Jirotka. "Responsible research and innovation in information
and communication technology: Identifying and engaging with the ethical implications of ICTs." Responsible
innovation (2013): 199-218.
[3] Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber security." computers
& security38 (2013): 97-102.
[4] Quinn, Michael J. Ethics for the information age. Boston, MA: Pearson, 2014.
[5] Chretien, Katherine C., and Terry Kind. "Social media and clinical care: ethical, professional, and social
implications." Circulation 127, no. 13 (2013): 1413-1421.
[6] Weckert, John, and Richard Lucas. Professionalism in the information and communication technology
industry. ANU Press, 2013.
CYBER BULLYING
References
[1] Chesley, Noelle. "Information and communication technology use, work intensification and employee
strain and distress." Work, employment and society 28, no. 4 (2014): 589-610.
[2] Stahl, Berndt C., Grace Eden, and Marina Jirotka. "Responsible research and innovation in information
and communication technology: Identifying and engaging with the ethical implications of ICTs." Responsible
innovation (2013): 199-218.
[3] Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber security." computers
& security38 (2013): 97-102.
[4] Quinn, Michael J. Ethics for the information age. Boston, MA: Pearson, 2014.
[5] Chretien, Katherine C., and Terry Kind. "Social media and clinical care: ethical, professional, and social
implications." Circulation 127, no. 13 (2013): 1413-1421.
[6] Weckert, John, and Richard Lucas. Professionalism in the information and communication technology
industry. ANU Press, 2013.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.