Cyber Ethics
Cyber Ethics
Syllabus:
Unit : Cyber Ethics
Netiquettes.
Software licenses and the open source software movement.
Intellectual property rights, plagiarism and digital property rights.
Freedom of information and the digital divide.
E-commerce: Privacy, fraud, secure data transmission.
NETIQUETTE
We all follow a set of rules or norms while behaving and communicating in the real world. The rules
of etiquette are just as important in cyberspace as they are in the real world.
Netiquette is a combination of the words network and etiquette and is defined as a set of rules to be
followed while communicating via Internet.
We must follow rules or etiquettes while communicating online such as using email, social
media, chatting etc. Following netiquette will help you to maintain and establish positive
online relationships as well as develop a positive online reputation.
Some rules that we must follow whenever we are online are as follows
Be Polite and do not use offensive or abusive language
We should choose our words carefully ensuring that we do not hurt the sentiments or
feelings of others.
Respect other people's privacy
We should not read messages, mails etc of others without taking permission. Pictures and
messages of others should not be circulated without permission.
Do not spread rumours or spam messages
We must carefully verify all facts before online communication.
Do not plagiarize
There are copyright issues involved with content on the internet. We must be careful and
seek adult guidance while using internet. We must always give the site name in the
reference list if we have used the content available on the site for some project work.
In business and career related online communications netiquette should be used to
ensure that correct spelling, grammar, and punctuation are put in place to project
professionalism.
Do not fill someone's inbox with forwarded messages or spam mail.
EMAIL ETIQUETTES
The following are some important points to be kept in mind before sending an email.
Be concise
Open source software is software with source code that anyone can inspect, modify, and
enhance. Programmers who have access to a computer program's source code can improve
that program by adding features to it or fixing parts that don't always work correctly. Most of
the time open source software is free of cost.
Eamples of Open Source software: Libre Office, OpenOffice (Writer, Base, Calc, Impress),
GNU Image Manipulation Program (GIMP)
Advantages
Open source software licenses promote collaboration and sharing because they
permit other people to make modifications to source code and incorporate those
changes into their own projects.
They encourage computer programmers to access, view, and modify open source
software whenever they like, as long as they let others do the same when they share
their work.
PLAGIARISM
The Merriam Webster dictionary defines the act of plagiarism as; “to steal and pass off ideas
or words of another as one’s own”. Simply put, plagiarism is the process of taking other
people’s words and/or ideas and pretending that they are your own.
The following steps should be taken to prevent plagiarism:
Digital property (or digital assets) can be understood as any information about you or
created by you that exists in digital form, either online or on an electronic storage device.
According to Wikipedia, “A digital divide is any uneven distribution in the access to, use
of, or impact of information and communication technologies (ICT)”. In India, we observe
digital divide between states and between urban and rural areas.
E-COMMERCE
E-commerce is just the process of buying and selling produce by electronic means such as by
mobile applications and the Internet. Ecommerce refers to both online retail as well as
electronic transactions.
Online privacy is essential for ecommerce visitors and customers. The frequent headlines of
security breaches and inappropriate data use by major companies have consumers more
vigilant than ever about their privacy protection.
The merchant or seller must clearly state how data will be used. The terms and
conditions must be clearly listed on the site
The user must go through all terms and conditions before any transaction
The merchant must assure the user about data safety and security. All measures to
implement the same must be taken
E-COMMERCE FRAUD
Non-delivered goods
Non-existent companies
Fraudulent payments
Transaction done with stolen credentials—someone else’s credit card, banking info,
etc.
Phishing or Account Takeover Fraud
Phishing fraud occurs when a thief gains access to someone else’s online account—
maybe the login to Amazon or an online store or possibly to their PayPal, Apple Pay
or other site where payment data is stored.
2. Data Encryption
Encrypted data when sent over Internet is hard to steal and hence is safer.