The role of family in monitoring and moral control of children in social networks

Document Type : Scientific-Research Article

Authors

1 Associate Professor and Faculty Member, Department of Cultural Studies and Communication, Baqer al-Uloom University, Qom. Iran

2 PhD student in Islamic Education, Qom University of Education.Qom. Iran

Abstract

The arrival, learning and availability of social networks has caused many harms to adolescents and young people, and many of the harms of these networks have caused problems in the family. These injuries directly affect adolescents and young adults, including fraud, hacking, contact with unhealthy people, and contact with the opposite sex. The family is a safe place for all members to minimize the harm of social networks, but in many cases, it is possible to protect children from the potential dangers of these networks by monitoring and controlling children, and this Unauthorized monitoring and control is an example of a violation of children's privacy. Thinking about demarcating privacy on the one hand and maintaining family security and peace on the other hand has created a conflict between these two tasks, namely maintaining security and not violating privacy. This article uses a descriptive-analytical method and with reference to the original Islamic sources, seeks to answer the question of whether the family can monitor the intrusion into users' systems and their information and communications to maintain their security or not. ? The present article followed the finding that due to more interests (otherworldly interests and the number of people), compliance with moral goals and maintaining the dignity of individuals, maintaining family security and the user of the moral principle is ambiguous.

Keywords

Main Subjects

قرآن کریم
ایران‎پور، پرستو (1391). میزان سواد رسانه‏ای و نقش آن در استفاده از رسانه‏های تعاملی. (پایان‏نامه کارشناسی‏ارشد). دانشکده علوم اجتماعی دانشگاه علامه طباطبایی تهران، تهران، ایران.
آمدی، عبدالواحد (1410). غررالحکم و دررالکلم. قم: دارالکتاب الاسلامی.
تویسرکانی، محمدنبی ‎ابن‎احمد (1413). لئالی الاخبار. قم: مکتب العلامه.
جوادی‏آملی، عبدالله (1391). مفاتیح الحیاه. قم: اسراء.
حسن‏بن محمد دیلمی (1408). اعلام الدین فی صفات المومنین. قم: مؤسسه آل البیت.
خادمی، عین‎اله؛ حیدری، علی و عباسی‎کیا، کبری (1393). «ارزیابی راه‏حل‏های اندیشمندان اسلامی در مواجهه با تزاحم تکالیف اخلاقی». فصلنامه آینه معرفت، شماره 39، صص 152-139.
الخادمی، نورالدین (1421). المصلحه المرسله حقیقتها و ضوابطها. بیروت: دار ابن‎حز.
خان‎محمدی، کریم؛ شاملی، علی‌اکبر (1395). «اخلاق اسلامی حریم خصوصی در شبکه‏های اجتماعی سایبری»، مجله اسلام و مطالعات اجتماعی، شماره 14.
شریفی، احمدحسین (1384). نقد و بررسی مکاتب اخلاقی استاد محمدتقی مصباح یزدی. قم: انتشارات مؤسسه آموزشی و پژوهشی امام خمینی.
العالم، یوسف حامد (1421). المقاصد العامه للشریعه الاسلامیه، قاهره: دارالحدیث.
کاستلز، مانوئل (1380). عصر اطلاعات: اقتصاد، جامعه و فرهنگ (جلد1) (احد علیقلیان، افشین خاکباز و علی پایا، مترجمان). تهران: طرح نو.
مجلسی، محمدباقر (1413). بحارالانوار. بیروت: دارالاضواء.
مسعودی، محمدهاشم (1389). ماهیت و مبانی کلامی تکلیف. قم: بوستان کتاب.
Bennett, C. (2001). Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web. Ethics and Information Technology, 3 (3), 195-208.
Boyd, D. M, & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of computer- mediated communication, http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html.
Brey (2007). Ethical Aspects of Information Security and Privacy. in: Security, Privacy, and Trust in Modern Data Management. M. Petković and W. Jonker (Eds.), Springer Berlin Heidelberg, 21-36.
Cross, Richard (2006). Social Network Analysis: an introduction. Social Networking http: /www.bioteams.com/2006/03/28/social_network_ analysis.html.
Driver, Julia (2014). The History of Utilitarianism. The Stanford Encyclopedia of Philosophy (Winter 2014 Edition), Edward N. Zalta (ed.), http://plato.stanford.edu/archives/win2014/entries/utilitarianism-history
Flaherty, David H. (1989). Protecting Privacy in Surveillance Societies: the Federal Republic of Germany, Sweden, France, Canada and the United States.
Gattiker. E. & Perlusz. Stefano & Bohmann. Kristoffer & Morck Sorensen. Christian, (2001). The virtual community: Building on social structure, Relation and trust to achieve value. in Community informatic reader, edited by Keeble. L and Loader. B. London and New York, Routledg.
Lazer, David (2008). Introduction To Social Network Analysis. Director Program on Networked Governance Kennedy School of Government Harvard University.
Ross, W. D. (1930). The Right and the Good. oxford university press.
Shostack. A. and Syverson. P. (2004). What price privacy, J. in Economics of Information Security. The Netherland, Kluwer.
Walther, J. B. & Ramirez, Jr. A. (2009). New technologies and new direction in nonline relating. In S. Smith, & S. Wilson (Eds.), New directions in interpersonal communication, 264-284, Thousand Oaks. CA: Sage.
Westin, A. F. (1969). Privacy and Freedom. Administrative Law Review, Vol. 22, No. 1, 101-106.