Characteristics of an Islamic View of Cyber-Ethics

author

  • Hamidreza Ayatollahy Ph.D., Professor of Philosophy, Department of Philosophy, University of Allameh Tabatabaʿi, Tehran, Iran.
Abstract:

The current Cyber-ethics in Western societies (and its followers in other societies) have been compiled based on secularist presupposition. This presupposition has different principles in comparison with the Islamic attitude which can lead one to take a different approach toward ethical problems. This paper is an attempt to propose principles of Islamic cyber-ethics upon which we can prepare answers for the problems of cyber-ethics, having evident characteristics of an Islamic approach that are distinguished from secularist answers. After a prefatory study on the background of the Islamic attitude to ethics, these characteristics will be propounded under four categories: fundamental and content components, spiritual components, legal components, and penal components. Under these categories, themes such as giving importance to agent goodness, the basic difference in one’s goal of living an ethical life, the relation of reason and revelation, and the basis for the legitimacy of the penal justice system will be discussed. Needless to say, this paper does not seek to prepare arguments for this model, and such arguments can be discussed in other philosophical investigations.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

An Islamic Ethical Approach to Promotion Model of Sports Ethics

Ethical contradictions in the field of sports and development of the ethical virtues in sports environments have attracted little attention of scholars which can be called a problem. Based on the fact that religion has a position in promotion of ethics and even it has significant effects in sports positions and successes, institutionalizing the ethical criteria taken from religious teachings ca...

full text

The Ethics of Cyber Conflict

At least on the surface, most cyber attacks appear to be clearly unethical as well as illegal. These include attacks performed for amusement or bragging rights, such as web defacements conducted “just for fun” and computer viruses launched out of curiosity but disregard for their consequences. They also include attacks done for personal gain, such as system intrusions to steal credit card numbe...

full text

Abortion from an Islamic Ethical Point of View

Different nations interact differently with problems based on their different traditional background, interest, as well as their different approaches. But there are issues which need common perspective and the same sense of responsibility in doing good things that concern all such as induced abortion. In this article the researcher analyzed induced abortion from an Islamic ethical point of view...

full text

an application of fuzzy logic for car insurance underwriting

در ایران بیمه خودرو سهم بزرگی در صنعت بیمه دارد. تعیین حق بیمه مناسب و عادلانه نیازمند طبقه بندی خریداران بیمه نامه براساس خطرات احتمالی آنها است. عوامل ریسکی فراوانی می تواند بر این قیمت گذاری تاثیر بگذارد. طبقه بندی و تعیین میزان تاثیر گذاری هر عامل ریسکی بر قیمت گذاری بیمه خودرو پیچیدگی خاصی دارد. در این پایان نامه سعی در ارائه راهی جدید برای طبقه بندی عوامل ریسکی با استفاده از اصول و روش ها...

Ethics and responsibility in journalism: An Islamic perspective

This article presents a summary of existing codes of media ethics and analyzes their impact on mass media practices. It then attempts to develop an Islamic perspective of mass media ethics by focusing on the moral guidelines provided by Quran and the tradition of Prophet Muhammad (the Sunnah). The paper also examines the issues, problems, and challenges in operationalizing these guidelines into...

full text

The lack of ethics in cyber space: a case for cyber ethics

The Cyber World has become a most important part of our everyday lives. We spend an increasingly significant portion of our lives in it and use it to communicate with friends, acquaintances, loved ones, and business associates. We make use of our computers and Internet connectivity to look for and purchase all kinds of goods and services. We make airline and other travel reservations through th...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 22  issue 3

pages  35- 49

publication date 2020-11-21

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023