Introduction to Info Security

CSCI 251 Introduction to Info Security, Law, and Ethics

Chapter 3 Quiz

Chapter 3 – Quiz 3

1. Based on what you have learned in this chapter and using appropriate components, properly construct an argument to (1) support or refute the view that all undergraduate students should be required to take a course in cyberethics; and (2) analyze your argument to see if it is either valid or invalid. (a) If it is valid, determine whether it is also sound. (b) If it is invalid, determine whether it is inductive or fallacious. Please elaborate (beyond a yes or no answer) and provide your rationale in support of your responses (comprehension)

After completion of the first three chapters, I believe it is mandatory for undergraduate students to take a course related to cyberethics. Most undergraduate students are new to their university, they are juvenile and fresh so, they are capable of grasping the new material more quickly and efficiently than the others. We know the computer has been a basic need in our lives. So, I believe it is necessary to have basic knowledge about ethical values like being moral in our decision and also can focus on improving their quality of life understanding harmony and modern law. We do a lot of activities such as reading, surfing the internet, watching movies are computer-dependent. Also, every university provides computer-based education. Though everybody knows how to operate a computer, they don’t know about its ethics and importance. In present conditions, cyber ethics is important because it will provide basic ethical values of using a computer such as copyright, software piracy, and plagiarism. Additionally, it provides us adequate knowledge to analyze and support any action that we do.

Having adequate knowledge on cyber ethic helps students understand how they could establish ethical standards in a professional field that is well defined by rapidly evolving technology where its technological consequences and impact of ethical technology cannot be known in the time frame in which standards must be established (Artz 2005). So, to be capable of handling such a challenging situation, ethics classes are necessary. When the student graduate, if they have knowledge of ethics law, they could work on the real world knowing the ethical rights and wrongs. They can ethically decide what might be fruitful for the society and what things are hampering it. Thus, these arguments make this statement valid and sound.

2. Using appropriate components construct an argument for or against the view that privacy protection should be improved in e-commerce transactions. Next evaluate your arguments against the rules for valid, inductive, and fallacious arguments. Does your argument contain any of the common or “informal” fallacies discussed in Section 3.9? If so, elaborate. Please elaborate (beyond a yes or no answer) and provide your rationale in support of your responses (knowledge)

The buying and selling of goods and transferring money through digital communication means via the internet can be referred to as e-commerce. Digital communication is an open-source of the internet which is the potential means to criminal activities like identity theft, money laundering or stealing of personal and financial information. Such a crime can bring the crisis to an individual’s social and financial status. Most of these crimes are committed by hackers and criminals. That’s why privacy protection should improvise on e-commerce so that no one could steal any sort of information from an individual or an organization.

Nowadays most of the activities are carried out through e-commerce like shopping, making appointments, etc. If a business has a secure way of providing e-commerce then the business is likely to bloom otherwise these online businesses are vulnerable to many crimes and fraud. They are a lot of piracy issues, copyright issues, and trust issues that should be maintained for e-commerce to provided customer’s privacy. We can take the example of uber, sony where databases of the user were stolen. Therefore, it makes a real and valid argument. This argument is not inductive as they can assume that there is no other facility around the third world and there is no chance for e-commerce being in danger. This argument is not the fallacious case. All of this is a valid argument and this concept can be applied where the system is available.


Artz, J. (2005). Addressing the central problem in cyberethics through stories. Retrieved from of Information Science and Technology (2nd Edition)/Addressing the Central Problem in Cyber Ethics through Stories.