Computer and Internet Ethics and Crimes
Computer and Internet Ethics and Crimes
Internet ethics means acceptable behaviour for using Internet. We should be honest, respect
the rights and property of others on the Internet.
Acceptance
One has to accept that Internet is not a value free-zone .It means World Wide Web is a place
where values are considered in the broadest sense so we must take care while shaping content
and services and we should recognize that Internet is not apart from universal society but it is a
primary component of it.
Ethics
Ethics are standards of moral conduct
o Standards of right and wrong behavior
o A measurement of personal integrity
o The basis of trust and cooperation in relationships with others
Ethical Principals
Ethical principals are tools which are used to think through difficult situations.
Three useful ethical principals:
o An act is ethical if all of society benefits from the act.
o An act is ethical if people are treated as an end and not as a means to an end.
(people are not values but are used)
o An act is ethical if it is fair to all parties involved.
Computer Ethics
Computer ethics are morally acceptable use of computers
o i.e. using computers appropriately
Standards or guidelines are important in this industry, because technology changes are
overtaking the legal system’s ability to keep up
Computer Professionals:
Are experts in their field,
Know customers rely on their knowledge, expertise, and honesty,
Understand their products (and related risks) affect many people,
Follow good professional standards and practices,
Maintain an expected level of competence and are up-to-date on current
knowledge and technology, and
Educate the non-computer professional
E-Mail Netiquette
Promptly respond to messages.
Delete messages after you read them if you don’t need to save the information.
Don’t send messages you wouldn’t want others to read.
Keep the message short and to the point.
Don’t type in all capital letters.
Be careful with sarcasm and humor in your message.
Copyright Laws
Software developers (or the companies they work for) own their programs.
Software buyers only own the right to use the software according to the license agreement.
No copying, reselling, lending, renting, leasing, or distributing is legal without the software
owner’s permission.
Software Licenses
There are four types of software licenses:
1. Public Domain License
Public domain software has no owner and is not protected by copyright law.
It was either created with public funds, or the ownership was forfeited by the creator.
Can be copied, sold, and/or modified
Often is of poor quality/unreliable
2. Freeware License
Freeware is copyrighted software that is licensed to be copied and distributed without charge.
Freeware is free, but it’s still under the owner’s control.
o Examples:
a. Eudora Light
b. Netscape
3. Shareware License
A shareware software license allows you to use the software for a trial period, but you must pay
a registration fee to the owner for permanent use.
o Some shareware trials expire on a certain date
o Payment depends on the honor system
Purchasing (the right to use) the software may also get you a version with more powerful
features and published documentation.
Software Piracy
SPA (Software Publishers Association) polices software piracy and mainly targets:
o Illegal duplication
o Sale of copyrighted software
o Companies that purchase single copies and load the software on multiple computers or
networks
They rely on whistle-blowers.
Penalties (for primary user of PC) may include fines up to $250,000 and/or imprisonment up to
5 years in jail
System Quality
Bug-free software is difficult to produce
It must be carefully designed, developed, and tested
Mistakes generated by computers can be far reaching
Commenting and documenting software is required for effective maintenance throughout the
life of the program
Computer Crime
Computer criminals -using a computer to commit an illegal act
Who are computer criminals?
o Employees – disgruntled or dishonest --the largest category
o Outside users - customers or suppliers
o “Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent
o Organized crime - tracking illegal enterprises, forgery, counterfeiting
Computer Security
Computer security involves protecting:
o information, hardware and software
o from unauthorized use and damage and
o from sabotage and natural disasters
Restricting access both to the hardware locations (physical access) and into the system itself
(over the network) using firewalls
Implementing a plan to prevent break-ins
Changing passwords frequently
Making backup copies
Using anti-virus software
Encrypting data to frustrate interception
Anticipating disasters (disaster recovery plan)
Hiring trustworthy employees
Ergonomics
Ergonomics:
o helps computer users to avoid
physical and mental health risks
o and to increase
productivity
The Environment
Microcomputers are the greatest user of electricity in the workplace
“Green” PCs
o System unit and display - minimize unnecessary energy consumption and power down
when not in use
o Manufacturing - avoids harmful chemicals in production, focus on chlorofluorocarbons
(CFC’s) which some blame for ozone layer depletion
Personal Responsibility of Users
Conserve
o Turn computers off at end of work day
o Use screen savers
Recycle
o Most of the paper we use is eligible
o Dispose of old parts via recycling programs – most computer parts are dangerous in
landfills
Educate
o Know the facts about ecological issues
The introduction of electric power in the 19th century led to the rise of electrical and
hybrid electro-mechanical devices to carry out both digital (Hollerith punch-card
machine) and analog (Bush’s differential analyzer) calculation. Telephone switching
came to be based on this technology, which led to the development of machines that we
would recognize as early computers.
The presentation of the Edison Effect in 1885 provided the theoretical background for
electronic devices. Originally in the form of vacuum tubes, electronic components were
rapidly integrated into electric devices, revolutionizing radio and later television. It was in
computers however, where the full impact of electronics was felt. Analog computers
used to calculate ballistics were crucial to the outcome of World War II, and the
Colossus and the ENIAC, the two earliest electronic digital computers, were developed
during the war.
With the invention of solid-state electronics, the transistor and ultimately the integrated
circuit, computers would become much smaller and eventually affordable for the
average consumer. Today “computers” are present in nearly every aspect of everyday
life, from watches to automobiles.
III. GLOSSARY
IV. REFERENCES
Web Resources
History of Computers: Timeline & Evolution: https://study.com/academy/lesson/history-
of-computers-timeline-evolution.html#:~:text=While%20the%20conceptual%20idea
%20behind,the%20microprocessors%20we%20use%20today.
A BRIEF COMPUTER HISTORY: http://people.bu.edu/baws/brief%20computer
%20history.html
History of Computers: A Brief Timeline: https://www.livescience.com/20718-
computer-history.html