Computer Ethics Chap 5
Computer Ethics Chap 5
Computer Ethics Chap 5
Computer Ethics
Last Updated : 06 Jun, 2021
What does the word ‘ethics’ mean? The dictionary defines ethics because of the moral
principles that govern the behavior of a gaggle or individual. But, not every people in
society need to live an absolutely moral life. Ethics are actually the unwritten code of
conduct that every individual should follow. These codes are considered correct only
by the members of that particular profession. Similarly, for computer users, computer
ethics is a set of principles that regulates the use of computers. Computer ethics
address issues related to the misuse of computers and how they can be prevented. It
primarily imposes the ethical use of computing resources. It includes methods to
avoid violating the unauthorized distribution of digital content. The core issues
surrounding computer ethics are based on the use of the internet, internet privacy,
copyrighted content, software, and related services, and user interaction with websites.
The Internet has changed our lifestyle. It has become a part of our life. It allows us to
communicate with a person from another part of the world. collecting information on
any topic, social meets, and many other activities. But at the same time, some peoples
are always trying to cheat or harm others.
The Internet offers the facility to communicate with a person in any part of the
world.
We can easily collect information related to any topic from the world wide web on
the internet.
Various types of business are carried out through Internet, which is referred to as e-
commerce. From booking railway tickets and flight tickets or tickets for movies to
purchasing any type of merchandise or commodities, are possible via the Internet.
The Internet allows social networking, that is, it provides the ability to share our
information, emotions, and feelings with our friends and relatives.
A group of people is trying to get personal information (like bank detail, address,
contact details, etc,) over the Internet and uses that for unethical benefits.
Malware or viruses are becoming quick access to different networks and ultimately
Commandment 6: Do not use the software unless you pay for this software.
Commandment 9: Before developing software, think about the social impact it can of
that software.
Commandment 10: While computers for communication, always respectful with fellow
members.
Internet Security
The internet is an insecure channel for exchanging information because it features a
high risk of fraud or phishing. Internet security is a branch of computer security
specifically associated with the utilization of the internet, involving browser security
and network security. Its objective is to determine measures against attacks over the
web. Insufficient internet security can be dangerous. It can cause many dangerous
situations, like starting from the computer system getting infected with viruses and
worms to the collapse of an e-commerce business. Different methods have been
devised to protect the transfer of data over the internet such as information privacy
and staying alert against cyber attacks.
Healthcare records
Financial institution
transactions
Biological traits
Residence records
Location-based service
The risk involved in internet privacy is sometimes dangerous. In the process of data
transfer over the internet, if a password is revealed, a victim’s identity may be
deceitfully used.
To minimize internet privacy violation risks, the following measures need to be taken:
In most cyberbullying cases, they do not reveal their identities. Due to cyberbullying,
some bullied persons are affected emotionally or mentally. Even if those are fake
information, the bullied person may become depressed or it may affect their day-to-day
life. In the case of the students or kids, it may affect their study or they may lose self-
esteem.
2. Phishing: An internet hacking activity used to steal user data. In this activity, an
email is sent to the user which misleads him/her to believe that it is from a trusted
organization. After sending the email, the attacker asks the user to visit their website,
and on their website, they will ask for the personal information of the user like
password, credit card information, etc. So, this is how the attacker steals the personal
information of the user.
How to protect yourself from phishing:
Never open a link, attachment, etc in an email that is sent by some unknown
person.
Never share your personal information in an email that is asked by an unknown
person.
Always on the firewall of the computer system.
Always check your bank statements regularly to ensure that no unauthorized
transactions are made. If unauthorized transactions are made in your account, then
immediately report this issue to your bank.
Sample Questions
Solution:
Solution:
The Internet offers the facility to communicate with a person in any part of the
world.
We can easily collect information related to any topic from the world wide web
on the internet.
Various types of business are carried out through Internet, which is referred to
as e-commerce. From booking railway tickets and flight tickets or tickets for
movies to purchasing any type of merchandises or commodities, are possible
via the Internet.
The Internet allows social networking, that is, it provides the facility to share
our information, emotions and feelings with our friends and relatives.
Solution:
Plagiarism
Cyberbullying
Unauthorized Hacking
Spamming
Phishing
Software piracy
Solution:
Cybercrime may be a criminal activity done with the help of computers and the
Internet. It includes downloading illegal data, online fraud bank transaction, etc.
Question 6. The organization that has established the guideline for copyright Law.
Solution:
WIPO
Spyware
Suggest improvement
Previous Next
Similar Reads
Concept of Comments in Computer
Generations of Computer
Programming
V vivekray59
Company Explore
About Us Hack-A-Thons
Contact Us Master CP
Languages DSA
Java Algorithms
Tutorials Archive
Django Tutorial
GCP Top 50 DP
OOAD NodeJS
Puzzles Biology
English Grammar
World GK
SAP C++
Linux CS Subjects
Excel