Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 22, Issue 37;   September 21, 2022: Online Ethics

Online Ethics

by

The array of media for exchanging our thoughts in text has created new opportunities for acting unethically. Cyberbullying is one well-known example. But sending text is just one way to cross the line ethically. Here are some examples of alternatives.
A compass is like a code of ethics in that it provides a sense of direction

A compass is like a code of ethics in that it provides a sense of direction. Compasses distinguish North from South. Codes of ethics distinguish right from wrong.

Image by Christian Plass courtesy Pixabay.com.

Whether the medium is email, text, social, Teams, or any of the dozens of text exchange platforms, they are all vulnerable to unethical usage. Cyberbullying is probably the most famous of all unethical online text activities. And whether an abusive message is sent in response to abusive text, or sent to harass someone, or sent to exact revenge, or to push someone over the edge, abusive text is over the line.

But it's possible to act unethically by doing nothing at all. For example, what I call abusive silence is choosing not to respond to someone's message, or delaying a response intentionally, to offend or to harm that person. Abusive silence is over the line. It's the equivalent of listening to someone who's speaking to you face-to-face, and then turning your back and walking away. The telephone conversation equivalent is hanging up while someone is speaking to you.

Abusive It's possible to act unethically
by doing nothing at all
silence is common in cases of cyberbullying because it provides a means of isolating someone from organizational activity. One seriously unethical example of abusive silence arises when it's combined with lying. When questioned later about the reason for failing to respond to a message, the perpetrator says, "Goodness, so sorry, I never received your message. I wonder what happened."

And there are ways to cross the ethical line that have nothing to do with forms of textual abuse. Here are a few examples.

Flooding
Creating or executing any program intended to flood someone's inbox is unacceptable. This practice is rare in in-house communications, but less rare in the wider world. It is over the line.
Forwarding to harm the sender
Forwarding a message without the sender's permission or knowledge, with the expectation of harming the sender or those affiliated with the sender, is over the line.
Forwarding messages is sometimes done as a way of reporting an infraction. In these cases, the message forwarded is the evidence of infraction. If you feel compelled to report an infraction, be certain to alert the sender to the fact that you have reported the act.
Plagiarism and meta-plagiarism
Copying the words of another and presenting them as your own is plagiarism. It's unacceptable in the commercial realm. But because the identical act in the context of online text communication would likely go undetected, many feel that plagiarism in online text is acceptable. It might go undetected, but it is over the line — in email, text, or anywhere else.
Meta-plagiarism is copying the concepts (but not necessarily the words) of another and presenting them as your own. That is also over the line — in email, text, or anywhere else.
Fomenting panic
It is dangerous to forward a message that warns of dire electronic peril — new malware or a security flaw are examples — if the warning is unwarranted. It can cause people to take steps that harm themselves or their organizations. Before distributing such information, always either (a) validate the warning with a legitimate authority and reference that authority, or (b) include a disclaimer clearly stating that you are unable to evaluate the validity of the claims in the forwarded message.
Spreading malware
Taking any action, with intent, that results in spreading malware is unforgivable. And knowingly using electronic media in a way that spreads malware is also unforgivable. Forwarding an attachment that you received unsolicited from a third party, without first verifying that the attachment is safe, is an example of conduct that is over the line. Failing to defend your computer or device from attack and infestation by electronic malefactors is another example.

Last words

This catalog isn't exhaustive. In the realm of unethical behavior, people can be endlessly creative. To deter this behavior, make the people in your organization aware of the tactics. That awareness alone can reduce the incidence of these behaviors. Go to top Top  Next issue: The Illusion of Explanatory Depth  Next Issue

52 Tips for Leaders of Project-Oriented OrganizationsAre your projects always (or almost always) late and over budget? Are your project teams plagued by turnover, burnout, and high defect rates? Turn your culture around. Read 52 Tips for Leaders of Project-Oriented Organizations, filled with tips and techniques for organizational leaders. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Ethics at Work:

Harry Stonecipher, former CEO of The Boeing CompanyPersonnel-Sensitive Risks: II
Personnel-sensitive risks are risks that are difficult to discuss openly. Open discussion could infringe on someone's privacy, or lead to hurt feelings, or to toxic politics or toxic conflict. If we can't discuss them openly, how can we deal with them?
Police line tapeCounterproductive Knowledge Work Behavior
With the emergence of knowledge-oriented workplaces, counterproductive work behavior is taking on new forms that are rare or inherently impossible in workplaces where knowledge plays a less central role. Here are some examples.
Boeing 737 MAX grounded aircraft near Boeing Field, April 2019On Standing Aside
Occasionally we're asked to participate in deliberations about issues relating to our work responsibilities. Usually we respond in good faith. And sometimes we — or those around us — can't be certain that we're responding in good faith. In those situations, we must stand aside.
A meeting held in a long conference room.Multi-Expert Consensus
Some working groups consist of experts from many fields. When they must reach a decision by consensus, members have several options. Defining those options in advance can help the group reach a decision with all its relationships intact.
A happy dogMore Things I've Learned Along the Way: V
When I gain an important insight, or when I learn a lesson, I make a note. Example: If you're interested in changing how a social construct operates, knowing how it came to be the way it is can be much less useful than knowing what keeps it the way it is.

See also Ethics at Work and Ethics at Work for more related articles.

Forthcoming issues of Point Lookout

A game of Jenga underwayComing September 4: Beating the Layoffs: I
If you work in an organization likely to conduct layoffs soon, keep in mind that exiting voluntarily before the layoffs can carry significant advantages. Here are some that relate to self-esteem, financial anxiety, and future employment. Available here and by RSS on September 4.
A child at a fork in a pathAnd on September 11: Beating the Layoffs: II
If you work in an organization likely to conduct layoffs soon, keep in mind that exiting voluntarily can carry advantages. Here are some advantages that relate to collegial relationships, future interviews, health, and severance packages. Available here and by RSS on September 11.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.