You are on page 1of 2

CYBER ETHICS

1 Netiquettes: Netiquette is short for "Internet etiquette." Just like etiquette is a code of
polite behaviour in society, netiquette is a code of good behaviour on the Internet. ... Below
are ten examples of rules to follow for good netiquette: Avoid posting inflammatory or
offensive comments online

2 Software licenses and the open-source software movement: Open-source


licenses are licenses that comply with the Open-Source Definition — in brief, they allow
software to be freely used, modified, and shared. To be approved by the Open-
Source Initiative (also known as the OSI), a license must go through the Open-
Source Initiative's license review process.

3 Intellectual property rights, plagiarism and digital property rights:


The phrase "intellectual property" describes any work that is distinct, owned, and protected
by patent, trade secret, or copyright laws. Examples of protected work: ... An API package
protected by copyright, so that no one may use, modify, or redistribute the API without
permission.
Plagiarism is the act of taking or copying ideas or words without clearly acknowledging the
source of information. Using a direct quote, paraphrasing or editing a sentence, or even
copying from your own assignment can be considered cheating under the Student Code of
Conduct and Due Process (Policy 04:02:00).
Digital property includes data, Internet accounts, and other rights in the digital world,
including contractual rights and intellectual property rights. Intellectual property
rights also can exist in digital property, such as pictures, music, movies, literary works,
Web pages, computer code, and other creative works.

4 Freedom of information and the digital divide: Freedom of


Information (FOI), or the right to information, can be defined as the right to
access information held by public bodies. ... Over the past 10 years, the right
to information has been recognized by an increasing number of countries, including
developing ones, through the adoption of a wave of FOI laws.
Digital divide is a term that refers to the gap between demographics and regions that have
access to modern information and communications technology, and those that don't or
have restricted access. This technology can include the telephone, television, personal
computers and the Internet.

5 E-commerce: Privacy, fraud, secure data transmission: privacy is the


right to be let alone, or freedom from interference or intrusion. Information privacy is the
right to have some control over how your personal information is collected and used.
eCommerce fraud is an illegal transaction performed on an eCommerce platform by a
criminal or fraudster by using stolen payment information for online transactions without the
account owner's knowledge. It is also known as purchase fraud.
In computer science, secure transmission refers to the transfer of data such as
confidential or proprietary information over a secure channel. Many secure
transmission methods require a type of encryption. The most common email encryption is
called PKI.

You might also like