Professional Documents
Culture Documents
INTRODUCTION:-
Computer ethics deals with the procedures, values and practices that govern the
process of consuming computing technology and its related disciplines without
damaging or violating the moral values and beliefs of any individual, organization
or entity.
Computer ethics is a concept in ethics that addresses the ethical issues and
constraints that arise from the use of computers, and how they can be mitigated or
prevented.
The core issues surrounding computer ethics are based on the scenarios arising
from the use of the Internet, such as Internet privacy, the publication of
copyrighted content and user interaction with websites, software and related
services.
Computer ethics can be thought of as the field of study that examines ethical issues
distinctive to an information society. Information society is the term often used
(especially by economists and sociologists) to characterize societies in which
human activity and social institutions have been significantly transformed by
computer and information technology (Webster 2002). The focus of attention in
this field has varied over its twenty-five- to thirty-year history as the technology
has evolved. Because the field is relatively new and computer technology is
continually changing and being used in new domains, computer ethics overlaps
with other fields of study such as information ethics, media ethics, and
communication ethics, as well as domain-specific ethics such as medical ethics,
business ethics, environmental ethics, and legal ethics. Computer ethics is centrally
focused on understanding the interactions among science, technology, and ethics
and, arguably, it is one of the most developed fields with such a focus.
In hindsight this concern was the result in part of the size of computers. At that
time, they were huge mainframe systems that cost a lot, took up a lot of space, and
were labor-intensive; hence large organizations were the only viable users.
Moreover, in those early days of computing, mainframes were used for large-scale
calculations and to create and maintain huge databases. Such calculations made
weapons development, space travel, and census tracking possible on a broader
scale than ever before. The databases mostly contained personal information. In
any event, large organizations were the likely users and hence the concerns about
centralization of power and privacy.
The next major technological shift was the development of small computers
referred to initially as microcomputers and later personal computers. Public
interest, for a time at least, turned to the democratizing aspects of computers.
Computer enthusiasts saw in these small machines the potential for a major social
revolution. With visions of computers in every home and shifts in power from
large organizations to small businesses and individuals, the fear of Big Brother
dissipated somewhat.
To make computers effective tools for the wide range of activities that seemed
possible, user-friendly software was critical. Companies and individuals began
developing software with a fury, and with that development came a new set of
ethical issues. Issues having to do with property rights and platform dominance in
software were particularly important in this era. Software was recognized as
something with enormous market value; hence, the questions: Should software be
owned? If so, how? Would existing intellectual property law—copyright, patents,
trade secrecy—be adequate protection for software developers? Ownership rights
in programs used to create computer or video games were the first kinds of
software cases brought before the courts; the market value of owning these
programs was significant.
Along with property rights issues came issues of liability and responsibility.
Consumers who buy and use computers and software want to be able to rely on
these tools, and when something goes wrong, they want to know whom to blame or
they want to be compensated for their losses. Computer ethicists as well as lawyers
and computing professionals rose to the challenge and questions of property rights
and liability were debated in print as well as in courts.
In the 1980s, more attention began to focus on hackers. Hackers did not like the
idea of property rights in software. However those who were acquiring such
property rights or making a business of computing were threatened by hackers not
only because the latter were breaking into systems but also because they had a
different vision of how the system of computers, software, and telecommunications
connections should be set up and how software should be distributed. At that time,
there were no laws against breaking into computer systems or duplicating software.
Hackers argued for open systems with fewer controls on access to information.
Perhaps the best illustration of this movement is Richard Stallman's work and the
development of the Free Software Association (Stallman 1995).
By the 1990s, the development of the Internet was well underway and seen as a
revolutionary event. The coming together of computers, telecommunications, and
media and the global scale of the Internet produced a seemingly endless array of
ethical issues. The Internet was being used in many different ways, in many
different domains of life. In effect the Internet recreated much of the world in a
new medium. Property rights, freedom of speech, trust, liability, and privacy had to
be rethought for a medium in which instantaneous communication was the norm;
the reproduction of information, documents, or programs was almost effortless;
and anonymity was favored. Moreover the new medium facilitated interaction on a
global scale, raising issues regarding what laws and conventions applied in
cyberspace.
During the 1980s and 1990s, computer technology also began to be used for a wide
variety of visualization activities. Computer graphics and gaming were part of this,
but equally if not more important was the development of many simulation
applications including medical imagining and graphical dynamic models of the
natural world. The power and reliability of these technologies raised ethical
concern. An offshoot of these developments was a focus on virtual reality and what
it might mean to human experience. Would human beings become addicted to
living in fantasy worlds? Would experiences in violent, virtual computer games
make individuals more violent than they would otherwise be? These concerns
continue in the early-twenty-first century as new applications are developed. For
example, important ethical issues are being raised about tele-medicine. Computing
together with the Internet makes it possible for many aspects of medical treatment
to be performed electronically. Issues of responsibility and liability are diffused
when doctors do surgery remotely. A doctor in one location can manipulate
machines that are electronically connected to machines in a second location where
the surgical procedure actually occurs. Should doctors be allowed to do this? That
is, is it appropriate? Is it safe? Who is responsible if something goes wrong?
SOFTWARE PIRACY
As mentioned, software piracy is the unauthorized duplication of computer
software. Although most computer users today are aware that unauthorized use and
duplication of software are illegal, yet general disregard is shown towards treating
software as valuable intellectual property. Common forms of software piracy are
Software piracy means denial of intellectual property rights to the software creator
or developer. It is not ethical to use someone else's property without his/her content
and without giving him/her the benefit of it. Developing a software application
involves a major investment of time, money and effort. Software piracy denies the
creator the revenue he/she deserves and harms paying customers, who ultimately
bear the cost of illegal use of products. Piracy limits the creator's ability to be
competitive, leading to higher-priced, less advanced products for customers.
VIRUS
A computer virus is a type of computer program that, when executed, replicates
itself by modifying other computer programs and inserting its own code. When this
replication succeeds, the affected areas are then said to be "infected" with a
computer virus.
Virus writers use social engineering deceptions and exploit detailed knowledge of
security vulnerabilities to initially infect systems and to spread the virus. The vast
majority of viruses target systems running Microsoft Windows, employing a
variety of mechanisms to infect new hosts, and often using complex anti-
detection/stealth strategies to evade antivirus software. Motives for creating viruses
can include seeking profit (e.g., with ransomware), desire to send a political
message, personal amusement, to demonstrate that a vulnerability exists in
software, for sabotage and denial of service, or simply because they wish to
explore cybersecurity issues, artificial life and evolutionary algorithms.
The term "virus" is also misused by extension to refer to other types of malware.
"Malware" encompasses computer viruses along with many other forms of
malicious software, such as computer "worms", ransomware, spyware, adware,
trojan horses, keyloggers, rootkits, bootkits, malicious Browser Helper Object
(BHOs), and other malicious software. The majority of active malware threats are
actually trojan horse programs or computer worms rather than computer viruses.
The term computer virus, coined by Fred Cohen in 1985, is a misnomer. Viruses
often perform some type of harmful activity on infected host computers, such as
acquisition of hard disk space or central processing unit (CPU) time, accessing and
stealing private information (e.g., credit card numbers, Debit card numbers, phone
numbers, names, email addresses, passwords, Bank Information, House Addresses,
etc), corrupting data, displaying political, humorous or threatening messages on the
user's screen, spamming their e-mail contacts, logging their keystrokes, or even
rendering the computer useless. However, not all viruses carry a destructive
"payload" and attempt to hide themselves—the defining characteristic of viruses is
that they are self-replicating computer programs which modify other software
without user consent.
GETTING PROTECTED
Before you implement protection measures for your computers, you must be aware
of the forms of attacks that hackers may launch. In the following steps, we are
going to discuss different forms of attacks that generally take place.
1. Spamming: Spamming refers to the sending of bulk-mail by an identified or
unidentified source. In non-malicious form, bulk advertising mail is sent to
many accounts. In malicious form (e-mail bombing), the attacker keeps on
sending bulk mail until the mail server runs out of disk space.
2. Computer viruses: Computer viruses are malicious codes/programs that
cause damage to data and files on a system. Viruses can attack any part of a
computer's software such as boot block, operating system, system areas,
files, and application-program-macros.
3. Worms: A worm is a self-replicating program which eats up the entire disk
space or memory. A worm keeps on creating its copies until all the disk
space or memory is filled.
4. Trojan horses: A Trojan horse is a program that appears harmless(such as a
text editor or a utility program) but actually performs malicious functions
such as deleting or damaging files.
5. Sweeper: This is another malicious program used by hackers. It sweeps or
deletes all the data from the system.
6. Denial of services: This type of attack eats up all the resources of a system
and the system or applications come to a half. Example of such an attack is
flooding a system with junk mail.
7. Password guessing: Most hackers crack or guess passwords of system
accounts and gain entry into remote computer systems. And then they use it
for causing damages in one or another form.
There are other forms of attacks also such a sniffing, packet forge spoofing, IP
spoofing etc. But we are not discussing them as in order to understand these, one
needs to know the working of networks.
PROTECTIVE MEASURES
Now after knowing different forms of attacks, let us now discuss different
protective measures that may be taken against such attacks.
The entire computer security is based on a system of safeguards that are designed
to protect a computer system from deliberate or accidental access and/or damage
by unauthorized persons.
The combination of identification, authentication, and authorization can control
access to a system. This combination is very useful, especially in network security.
Various techniques used for network security are -
SECURING DATA
Though controlled access to a system indirectly secures data, yet there are some
other measures that must be taken in case data gets corrupted even after taking
security measures. These include taking backups from time to time, preparing
recovery mechanism, maintaining transaction logs and having a proper disaster
recovery plan. Data security also involves measures like a secured waste, effective
passwords, internal controls, conducting audits, and using cryptography.
CYBERCRIME:-
Cybercrime, or computer-oriented crime, is a crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it
may be the target. Cybercrimes can be defined as: "Offences that are committed
against individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm, or loss, to the
victim directly or indirectly, using modern telecommunication networks such as
Internet (networks including chat rooms, emails, notice boards and groups) and
mobile phones (Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a
nation's security and financial health. Issues surrounding these types of crimes
have become high-profile, particularly those surrounding hacking, copyright
infringement, unwarranted mass-surveillance, sextortion, child pornography, and
child grooming.
Classifications
Other forms of fraud may be facilitated using computer systems, including bank
fraud, carding, identity theft, extortion, and theft of classified information. These
types of crime often result in the loss of private information or monetary
information.
2. Cyberterrorism:
3. Cyberextortion:
4. Cyberwarfare:
The U.S. Department of Defense (DoD) notes that the cyberspace has emerged as a
national-level concern through several recent events of geostrategic significance.
Among those are included, the attack on Estonia's infrastructure in 2007, allegedly
by Russian hackers. "In August 2008, Russia again allegedly conducted cyber
attacks, this time in a coordinated and synchronized kinetic and non-kinetic
campaign against the country of Georgia. The December 2015 Ukraine power grid
cyberattack has also been attributed to Russia and is considered the first successful
cyber attack on a power grid.[citation needed] Fearing that such attacks may
become the norm in future warfare among nation-states, the concept of cyberspace
operations impacts and will be adapted by warfighting military commanders in the
future.
5. Computer as a target:
These crimes are committed by a selected group of criminals. Unlike crimes using
the computer as a tool, these crimes require the technical knowledge of the
perpetrators. As such, as technology evolves, so too does the nature of the crime.
These crimes are relatively new, having been in existence for only as long as
computers have—which explains how unprepared society and the world, in
general, is towards combating these crimes. There are numerous crimes of this
nature committed daily on the internet.
Computer viruses
Denial-of-service attacks
Malware (malicious code)
6. Computer as a tool:
When the individual is the main target of cybercrime, the computer can be
considered as the tool rather than the target. These crimes generally involve less
technical expertise. Human weaknesses are generally exploited. The damage dealt
is largely psychological and intangible, making legal action against the variants
more difficult. These are the crimes which have existed for centuries in the offline
world. Scams, theft, and the likes have existed even before the development in
high-tech equipment. The same criminal has simply been given a tool which
increases their potential pool of victims and makes them all the harder to trace and
apprehend.
Crimes that use computer networks or devices to advance other ends include:
Fraud and identity theft (although this increasingly uses malware, hacking or
phishing, making it an example of both "computer as target" and "computer
as tool" crime)
Information warfare
Phishing scams
Spam
Propagation of illegal obscene or offensive content, including harassment
and threats
The unsolicited sending of bulk email for commercial purposes (spam) is unlawful
in some jurisdictions.
Phishing is mostly propagated via email. Phishing emails may contain links to
other websites that are affected by malware.[15] Or, they may contain links to fake
online banking or other websites used to steal private account information.
The extent to which these communications are unlawful varies greatly between
countries, and even within nations. It is a sensitive area in which the courts can
become involved in arbitrating between groups with strong beliefs.
One area of Internet pornography that has been the target of the strongest efforts at
curtailment is child pornography, which is illegal in most jurisdictions in the
world.
8. Online harassment:
The examples and perspective in this section may not represent a worldwide view
of the subject. You may improve this section, discuss the issue on the talk page, or
create a new article, as appropriate. (March 2016) (Learn how and when to remove
this template message)
There are instances where committing a crime using a computer can lead to an
enhanced sentence. For example, in the case of United States v. Neil Scott Kramer,
Kramer was served an enhanced sentence according to the U.S. Sentencing
Guidelines Manual §2G1. For his use of a cell phone to "persuade, induce, entice,
coerce, or facilitate the travel of, the minor to engage in prohibited sexual
conduct." Kramer argued that this claim was insufficient because his charge
included persuading through a computer device and his cellular phone technically
is not a computer. Although Kramer tried to argue this point, U.S. Sentencing
Guidelines Manual states that the term computer "means an electronic, magnetic,
optical, electrochemically, or other high-speed data processing device performing
logical, arithmetic, or storage functions, and includes any data storage facility or
communications facility directly related to or operating in conjunction with such
device."
Connecticut was the U.S. state to pass a statute making it a criminal offense to
harass someone by computer. Michigan, Arizona, and Virginia and South Carolina
have also passed laws banning harassment by electronic means.
9. Drug trafficking:
Darknet markets are used to buy and sell recreational drugs online. Some drug
traffickers use encrypted messaging tools to communicate with drug mules. The
dark web site Silk Road was a major online marketplace for drugs before it was
shut down by law enforcement (then reopened under new management, and then
shut down by law enforcement again). After Silk Road 2.0 went down, Silk Road 3
Reloaded emerged. However, it was just an older marketplace named
DiabolusMarket, that used the name for more exposure from the brand's previous
success.
THE TEN COMMANDMENTS OF COMPUTER
ETHICS:-
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10.Thou shalt use a computer in ways that show consideration and respect.
EMAIL ETIQUETTE:-
In the age of the Internet, you might find yourself clicking "reply," typing up a
quick response, and hitting "send" without giving so much as a thought about what
you've just written. But experts agree that your e-mail behavior has the potential to
sabotage your reputation both personally and professionally. Inc.com got in touch
with some of the industry's most seasoned e-mail experts and had them weigh in on
how to perfect your e-mail etiquette.
We've all heard the stories about a "private" e-mail that ended up being passed
around to the entire company, and in some cases, all over the Internet. One of
the most important things to consider when it comes to e-mail etiquette is
whether the matter you're discussing is a public one, or something that should
be talked about behind closed doors. Ask yourself if the topic being discussed is
something you'd write on company letterhead or post on a bulletin board for all
to see before clicking "send." --Judith Kallos,author of E-Mail Etiquette Made
Easy, E-Mail: The Manual, and E-Mail: A Write It Well Guide
2. Briefly introduce yourself:
Do not assume the person receiving your e-mail knows who you are, or
remembers meeting you. If you are uncertain whether the recipient recognizes
your e-mail address or name, include a simple reminder of who you are in
relation to the person you are reaching out to; a formal and extensive biography
of yourself is not necessary. --Peggy Duncan, personal productivity expert and
author of Conquer Email Overload with Better Habits, Etiquette, and Outlook
2007
Unless you work in some type of emergency capacity, it's not necessary to be
available the instant an e-mail arrives. Depending on the nature of the e-mail
and the sender, responding within 24 to 48 hours is acceptable. --Duncan
7. Refrain from sending one-liners:
"Thanks," and "Oh, OK" do not advance the conversation in any way. Feel free
to put "No Reply Necessary" at the top of the e-mail when you don't anticipate a
response. --Duncan
Words from grown, business people using shortcuts such as "4 u" (instead of
"for you"), "Gr8" (for great) in business-related e-mail is not acceptable. If you
wouldn't put a smiley face or emoticon on your business correspondence, you
shouldn't put it in an e-mail message. Any of the above has the potential to
make you look less than professional. --Duncan
9. Keep it clean:
Nothing annoys recipients more than when people reply and leave the
messages messy, for example, an e-mail chain that includes excessive carets
(>>>), or pages and pages of e-mail addresses that weren't protected using Bcc.
You can get rid of carets by selecting the text, Ctrl+F to use the Find and
Replace command to find a caret and replace all of them with nothing. You can
get rid of all the e-mail addresses just by deleting. Clean it up, then send it. --
Duncan
With inboxes being clogged by hundreds of e-mails a day, it's crucial that your
subject line gets to the point. It should be reasonably simple and descriptive of
what you have written about. Expect that any e-mail with a cute, vague, or
obscure subject will get trashed. Also, proof your subject line as carefully as
you would proof the rest of the e-mail. --Post
Avoid subject lines that are in all caps, all lower case, and those that include
URLs and exclamation points - which tend to look like Spam to the recipient. --
Judith Kallos, author of E-Mail Etiquette Made Easy, E-Mail: The Manual, and
E-Mail: A Write It Well Guide
12.Your subject line must match the message:
Never open an old e-mail, hit Reply, and send a message that has nothing to do
with the previous one. Do not hesitate to change the subject as soon as the
thread or content of the e-mail chain changes. --Peggy Duncan, personal
productivity expert and author of Conquer Email Overload with Better Habits,
Etiquette, and Outlook 2007
Sending unannounced large attachments can clog the receiver's inbox and
cause other important e-mails to bounce. If you are sending something that is
over 500KB, senders should ask, 'Would you mind if I sent you an attachment?
When would be the best time for you?' --Kallos
Unless it's been specifically requested, refrain from sending a message with
more than two attachments. Also, give the attached file(s) a logical name so the
recipient knows at a glance the subject and the sender. --Duncan
Before you click Reply All or put names on the Cc or Bcc lines, ask yourself if
all the recipients need the information in your message. If they don't, why send
it? Take time to send your messages to the right people. --Duncan
Do not hit "reply all" unless every member on the e-mail chain needs to know.
You want to make sure that you are not sending everyone on a list your answer-
whether they needed to know or not. --Duncan
When a topic has lots of parameters that need to be explained or negotiated and
will generate too many questions and confusion, don't handle it via e-mail.
Also, e-mail should not be used for last minute cancellations of meetings,
lunches, interviews, and never for devastating news. If you have an employee or
a friend you need to deliver bad news to, a phone call is preferable. If it's news
you have to deliver to a large group, e-mail is more practical. --Duncan
Don't overuse the high priority option. If you overuse this feature, few people
will take it seriously. A better solution is to use descriptive subject lines that
explain exactly what a message is about. --Duncan
19.Maintain privacy:
If you're sending a message to a group of people and you need to protect the
privacy of your list, you should always use "Bcc." Additionally, avoid giving
out e-mail addresses to a third party (such as an Evite, newsletter, etc). Make
sure that addresses you willingly hand over to third parties stay with them,
especially when the service they're offering is free. --Duncan
The long e-mail is a thing of the past. Write concisely, with lots of white space,
so as to not overwhelm the recipient. Make sure when you look at what you're
sending it doesn't look like a burden to read - feel free to use bullet points. The
person reading your e-mail should not have to dig through several paragraphs in
order to figure out what you're asking. You should state the purpose of the e-
mail within the first two sentences. Be clear, and be up front. --Lindsey Pollak,
career and workplace expert, e-mail etiquette consultant, and author of Getting
from College to Career
Your e-mail greeting and sign-off should be consistent with the level of respect
and formality of the person you're communicating with. Also, write for the
person who will be reading it - if they tend to be very polite and formal, write in
that language. The same goes for a receiver who tends to be more informal and
relaxed. --Lindsey Pollak, career and workplace expert, e-mail etiquette
consultant, and author of Getting From College to Career
An automatic response that says, "Thank you for your e-mail message. I will
respond to you as soon as I can" is useless. However, one thing these messages
do great is alert spammers that your e-mail is real and that they can add you to
their spam list. --Peggy Duncan, personal productivity expert and author of
Conquer Email Overload with Better Habits, Etiquette, and Outlook 2007
Every e-mail you send adds to, or detracts from your reputation. If your e-mail
is scattered, disorganized, and filled with mistakes, the recipient will be inclined
to think of you as a scattered, careless, and disorganized businessperson. Other
people's opinions matter and in the professional world, their perception of you
will be critical to your success. --Peter Post, director of the Burlington,
Vermont-based Emily Post Institute, which offers etiquette advice and answers
to manners questions such as wedding etiquette, parenting issues and table
manners.
• Digital plagiarism
• Hacking
Hacking is breaking into computer systems for unauthorized purposes, which may
be either malicious or non-malicious. Hacking may involve, for example, snooping
around on someone’s personal computer through remote access,
intentionallymodifying or destroying files to which one has not been granted
access, releasing computer viruses, stealing passwords or files, exposing personal
information, and stealing electronic money. Students and staff members at both
virtual and conventional universities may engage in hacking for a variety of
reasons. They may simply be unaware that they are breaking into a computer
system, they may just be curious, they may be out to harm someone, they may
want to benefit themselves, or they may have entirely different reasons. Malicious
hacking is clearly morally problematic, but non-malicious hacking has been
defended by hackers as morally acceptable and socially harmless or even beneficial
(cf. Baase, p. 242). Clearly, universities need clear policies and guidelines on
hacking (including policies that define what kinds of computer systems access are
unauthorized for whom) and probably need to distinguish malicious from non-
malicious hacking.
Hacking is the use of computer resources to which one is not supposed to have
access. However, students and staff may also have authorized access to computer
resources, but then go on to use these resources improperly. They may have a
university Internet account, or they may use a computer system or computer
network or computer software that is owned by the university, or they may use
computerized services offered by the university, and do so in a way that does not
meet the university’s standards for proper use of that particular resource. For
example, students may use their student account to run their own Internet business,
contrary to the university’s policies. Or students may open up a popular website or
service that generates loads of traffic that incapacitates the university’s server, e.g.,
peer to peer downloads of MP3 files. Or staff members may use the university’s
server or computer systems to download or view or store content that is either
illegal or against the university’s policies (e.g., racist or fascist materials or
pornography). Or members of the academic community may spread computer
viruses or worms. Clearly, universities need policies regarding the proper use
ofcomputer resources in an academic context by students and staff.