Cyberethics

View this topic in
Cyberethics is the study of ethics pertaining to computer networks, encompassing user behavior and what networked computers are programmed to do, and how this affects individuals and society. (Wikipedia.org)




IEEE Organizations related to Cyberethics

Back to Top


Conferences related to Cyberethics

Back to Top

2012 International Conference on Cyberworlds (CW)

Cyberworlds seriously impact our lives and the evolution of the world conomy by taking such forms as social networking services, 3D shared virtual communities and assively multiplayer online role-playing games.

  • 2011 International Conference on Cyberworlds (CW)

    Cyberworlds are information worlds or communities created on cyberspace by collaborating participants either intentionally or spontaneously. As information worlds, they accumulate information regardless whether or not anyone is in, and they can be with or without 2D or 3D visual graphics appearance. The examples of such cyberworlds are communities created in different social networking services, 3D shared virtual environments, and multiplayer online games. Cyberworlds are closely related to the real world and have a serious impact on it. Cyberworlds have been created and applied in such areas as e-business, e-commerce, e-manufacturing, e-learning, e-medicine, and cultural heritage, etc. Cyberworlds augment and sometimes replace the real life and become a significant component of real economy.

  • 2010 International Conference on Cyberworlds (CW)

    Cyberworlds are information worlds or communities created on cyberspace by collaborating participants either intentionally or spontaneously. As information worlds, they accumulate information regardless whether or not anyone is in, and they can be with or without 2D or 3D visual graphics appearance. The examples of such cyberworlds are communities created in different social networking services, 3D shared virtual environments, and multiplayer online games. Cyberworlds are closely related to the real world a

  • 2009 International Conference on Cyberworlds (CW)

    Call for Papers CW2009 will provide an opportunity for academics, scientists and engineers from around the world to share the latest research, ideas and developments in these fields. The conference will consist of full paper sessions, workshops and poster sessions which will demonstrate the state-of-the-art in the field.


2011 IEEE International Symposium on Technology and Society (ISTAS)

ISTAS is an annual international forum sponsored by the IEEE Society on Social Implications of Technology. ISTAS 2011 is co-sponsored by the ACM Special Interest Group on Computers and Society. ISTAS welcomes engineers; scientists; philosophers; researchers in social sciences, arts, law, and humanities; and policy experts in technology and society.



Periodicals related to Cyberethics

Back to Top

No periodicals are currently tagged "Cyberethics"


Most published Xplore authors for Cyberethics

Back to Top

Xplore Articles related to Cyberethics

Back to Top

Toward Applied Cyberethics

Computer, 2018

A cybersecurity blueprint for the Internet of Things and Industry 4.0 must address ethical behavior of users and developers as well as ways to secure the technology itself. The Future Life Institutes standards for AI practitioners point in this direction.


Reflections on Cyberethics Education for Millennial Software Engineers

2017 IEEE/ACM 1st International Workshop on Software Engineering Curricula for Millennials (SECM), 2017

Software is a key component of solutions for 21st Century problems. These problems are often "wicked", complex, and unpredictable. To provide the best possible solution, millennial software engineers must be prepared to make ethical decisions, thinking critically, and acting systematically. This reality demands continuous changes in educational systems and curricula delivery, as misjudgment might have serious social impact. This study ...


On the Confirmation Method of the User's Record of the GakuNinMoodle

2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), 2018

The GakuNinMoodle provides the teaching materials for information ethics called "The princess Rin-Rin" to the universities through the academic access federation in Japan named "GakuNin". In order to confirm user's record on the GakuNinMoodle, the administrator of university needs reidentificate anonymized user id saved on the GakuNinMoodle. We compare several methods to reidentificate anonymized user id. LTI is also included ...


Cyber crime information system for cybernetics awareness

Proceedings. 2003 International Conference on Cyberworlds, 2003

Cyber Civilization considers knowledge as an integral part of society and human systems. With the facilities of cyber civilization the evils of cyber civilization also need to be equally tackled through technological as well as social means. Efforts on the lines of centralized as well as globally sharable resource and support infrastructure appear to be the need. The paper builds ...


Learning-Aided Physical Layer Authentication as an Intelligent Process

IEEE Transactions on Communications, 2019

Performance of the existing physical layer authentication schemes could be severely affected by the imperfect estimates and variations of the communication link attributes used. The commonly adopted static hypothesis testing for physical layer authentication faces significant challenges in time-varying communication channels due to the changing propagation and interference conditions, which are typically unknown at the design stage. To circumvent this ...


More Xplore Articles

Educational Resources on Cyberethics

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Cyberethics"

IEEE-USA E-Books

  • Toward Applied Cyberethics

    A cybersecurity blueprint for the Internet of Things and Industry 4.0 must address ethical behavior of users and developers as well as ways to secure the technology itself. The Future Life Institutes standards for AI practitioners point in this direction.

  • Reflections on Cyberethics Education for Millennial Software Engineers

    Software is a key component of solutions for 21st Century problems. These problems are often "wicked", complex, and unpredictable. To provide the best possible solution, millennial software engineers must be prepared to make ethical decisions, thinking critically, and acting systematically. This reality demands continuous changes in educational systems and curricula delivery, as misjudgment might have serious social impact. This study aims to investigate and reflect on Software Engineering (SE) Programs, proposing a conceptual framework for analyzing cyberethics education and a set of suggestions on how to integrate it into the SE undergraduate curriculum.

  • On the Confirmation Method of the User's Record of the GakuNinMoodle

    The GakuNinMoodle provides the teaching materials for information ethics called "The princess Rin-Rin" to the universities through the academic access federation in Japan named "GakuNin". In order to confirm user's record on the GakuNinMoodle, the administrator of university needs reidentificate anonymized user id saved on the GakuNinMoodle. We compare several methods to reidentificate anonymized user id. LTI is also included one of the method. We are developing the cyberethics grade confirmation system (CEGC) which is used by the university administrator to confirm user's record. In the present paper, we discuss how the confirmation of the user's record are implemented to CEGC. And based on the result of comparison between the confirmation methods and test result of the method, we describe the improved method for next version of CEGC.

  • Cyber crime information system for cybernetics awareness

    Cyber Civilization considers knowledge as an integral part of society and human systems. With the facilities of cyber civilization the evils of cyber civilization also need to be equally tackled through technological as well as social means. Efforts on the lines of centralized as well as globally sharable resource and support infrastructure appear to be the need. The paper builds a case for consideration and support from United Nations. Such an infrastructure set up can use portal based systems deploying fuzzy data bases.

  • Learning-Aided Physical Layer Authentication as an Intelligent Process

    Performance of the existing physical layer authentication schemes could be severely affected by the imperfect estimates and variations of the communication link attributes used. The commonly adopted static hypothesis testing for physical layer authentication faces significant challenges in time-varying communication channels due to the changing propagation and interference conditions, which are typically unknown at the design stage. To circumvent this impediment, we propose an adaptive physical layer authentication scheme based on machine-learning as an intelligent process to learn and utilize the complex time-varying environment, and hence to improve the reliability and robustness of physical layer authentication. Explicitly, a physical layer attribute fusion model based on a kernel machine is designed for dealing with multiple attributes without requiring the knowledge of their statistical properties. By modeling the physical layer authentication as a linear system, the proposed technique directly reduces the authentication scope from a combined $N$ -dimensional feature space to a single-dimensional (scalar) space, hence leading to reduced authentication complexity. By formulating the learning (training) objective of the physical layer authentication as a convex problem, an adaptive algorithm based on kernel least mean square is then proposed as an intelligent process to learn and track the variations of multiple attributes, and therefore to enhance the authentication performance. Both the convergence and the authentication performance of the proposed intelligent authentication process are theoretically analyzed. Our simulations demonstrate that our solution significantly improves the authentication performance in time-varying environments.

  • Incorporating ethics in computing courses extra class activities

    Teaching ethics in undergraduate computing-oriented courses is important because the specific nature of the development and application of software products affects the professional and personal interests of so many people. Two different approaches in teaching ethics for computer science and information systems students are described here. The first approach consists of incorporating ethical concepts into the teaching material of several computing courses. The second approach implements miscellaneous forms of extra class activities. Both approaches can be united through service learning applications related to the respective academic community. The description of practical solutions relevant to the different methods of teaching cyberethics is discussed.

  • Table of contents

    The following topics are dealt with: software engineering curricula; undergraduate software engineering courses; software engineering teaching; software project management course; and cyberethics education.



Standards related to Cyberethics

Back to Top

No standards are currently tagged "Cyberethics"


Jobs related to Cyberethics

Back to Top